Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Topic Area: Information Technology

Displaying records 1 to 10 of 728 records.
Resort by: Date / Title

1. Derived PIV Application and Data Model Test Guidelines
Series: Special Publication (NIST SP)
Report Number: 800-166
Topic: Information Technology
Published: 6/6/2016
Authors: David A Cooper, Hildegard Ferraiolo, Ramaswamy Chandramouli, Nabil Ghadiali, Jason Mohler, Steven Brady
Abstract: NIST Special Publication (SP) 800-157 contains technical guidelines for the implementation of standards-based, secure, reliable, interoperable Public Key Infrastructure (PKI)-based identity credentials that are issued for mobile devices by federal de ...

2. Extending Network Security into Virtualized Infrastructure
Series: ITL Bulletin
Topic: Information Technology
Published: 6/3/2016
Authors: Ramaswamy Chandramouli, Larry Feldman, Gregory A. Witte
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-125B, "Secure Virtual Network Configuration for Virtual Machine (VM) Protection." That publication provides an analysis of various virtual network configuration ...

3. On various nonlinearity measures for boolean functions
Topic: Information Technology
Published: 5/19/2016
Authors: Rene C Peralta, Joan Boyar, Magnus G. Find
Abstract: A necessary condition for the security of cryptographic functions is to be "sufficiently distant" from linear, and cryptographers have proposed several measures for this distance. We show that six common measures, nonlinearity, algebraic degree, ann ...

4. Catalyzing the Internet of Things and Smart Cities: Global City Teams Challenge.
Topic: Information Technology
Published: 4/11/2016
Author: Sokwoo Rhee
Abstract: Many smart city and Internet of Things (IoT) solutions are suffering from fragmentation and lack of economies of scale. To address this issue, the National Institute of Standards and Technology (NIST) initiated the Global City Teams Challenge (GCTC) ...

5. Analysis of Virtual Networking Options for Securing Virtual Machines
Topic: Information Technology
Published: 3/20/2016
Author: Ramaswamy Chandramouli
Abstract: Virtual Machines (VMs) constitute the primary category of resources to be protected in virtualized infrastructures. Out of the two types of protection for VMs -- Host-level and Network-level -- it is the approaches for the Network-level protection th ...

6. Secure Virtual Network Configuration for Virtual Machine (VM) Protection
Series: Special Publication (NIST SP)
Report Number: 800-125B
Topic: Information Technology
Published: 3/7/2016
Author: Ramaswamy Chandramouli
Abstract: Virtual Machines (VMs) are key resources to be protected since they are the compute engines hosting mission-critical applications. Since VMs are end-nodes of a virtual network, the configuration of the virtual network forms an important element in th ...

7. Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations [including updates as of 01-14-2016]
Series: Special Publication (NIST SP)
Report Number: 800-171
Topic: Information Technology
Published: 1/21/2016
Authors: Ronald S Ross, Kelley L Dempsey, Patrick Viscuso, Mark Riddle, Gary Guissanie
Abstract: The protection of Controlled Unclassified Information (CUI) while residing in nonfederal information systems and organizations is of paramount importance to federal agencies and can directly impact the ability of the federal government to successfull ...

8. A Rational Foundation for Software Metrology
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8101
Topic: Information Technology
Published: 1/20/2016
Authors: David W Flater, Paul E Black, Elizabeth Nee nee Fong, Raghu N Kacker, Vadim Okun, Stephen S Wood, David R Kuhn
Abstract: Much software research and practice involves ostensible measurements of software, yet little progress has been made on an SI-like metrological foundation for those measurements since the work of Gray, Hogan, et al. in 1996-2001. Given a physical ...

9. A metamodel for optimization problems
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8096
Topic: Information Technology
Published: 1/8/2016
Authors: Ibrahim Assouroko, Peter O Denno
Abstract: In mathematics, computer science, and operations research, mathematical optimization is the process of finding best feasible values (oftentimes maxima or minima) of a given objective that is modeled mathematically. This paper introduces the concept o ...

10. Third-Party Software's Trust Quagmire
Topic: Information Technology
Published: 12/18/2015
Authors: Jeffrey Mark Voas, George Hurlburt
Abstract: Integrating software developed by third-party organizations into a larger system raises concerns about the software's quality, origin, functionality, security, and interoperability. Addressing these concerns requires rethinking the roles of software' ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series