Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Topic Area: Information Technology

Displaying records 1 to 10 of 732 records.
Resort by: Date / Title

1. Demystifiying the Internet of Things
Topic: Information Technology
Published: 6/27/2016
Author: Jeffrey Mark Voas
Abstract: This short column introduces the need for a foundational science to the Internet of Things (IoT). It introduces the notion of primitives and elements, and their relationship to trustworthiness.

2. Metamorphic Testing for Cybersecurity
Topic: Information Technology
Published: 6/27/2016
Authors: Tsong Yueh Chen, Fei-Ching Kuo, Wenjuan Ma, Willy Susilo, Dave Towey, Jeffrey Mark Voas, Zhi Quan Zhou
Abstract: Testing is a major approach for the detection of software defects, including security vulnerabilities. This article introduces metamorphic testing (MT), a relatively new testing method, and discusses how the new perspective of MT can help to conduct ...

3. Derived PIV Application and Data Model Test Guidelines
Series: Special Publication (NIST SP)
Report Number: 800-166
Topic: Information Technology
Published: 6/6/2016
Authors: David A Cooper, Hildegard Ferraiolo, Ramaswamy Chandramouli, Nabil Ghadiali, Jason Mohler, Steven Brady
Abstract: NIST Special Publication (SP) 800-157 contains technical guidelines for the implementation of standards-based, secure, reliable, interoperable Public Key Infrastructure (PKI)-based identity credentials that are issued for mobile devices by federal de ...

4. Extending Network Security into Virtualized Infrastructure
Series: ITL Bulletin
Report Number: June 2016
Topic: Information Technology
Published: 6/3/2016
Authors: Ramaswamy Chandramouli, Larry Feldman, Gregory A. Witte
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-125B, "Secure Virtual Network Configuration for Virtual Machine (VM) Protection." That publication provides an analysis of various virtual network configuration ...

5. Insights on Formal Methods of Cybersecurity
Topic: Information Technology
Published: 5/27/2016
Authors: Jeffrey Mark Voas, Kim Bernard Schaffer
Abstract: We asked 7 experts 1 simple question to find out what has occurred recently in terms of applying formal methods (FM) to security-centric, cyber problems: Please summarize in a paragraph the state of the research and practitioner communities in form ...

6. On various nonlinearity measures for boolean functions
Topic: Information Technology
Published: 5/19/2016
Authors: Rene C Peralta, Joan Boyar, Magnus G. Find
Abstract: A necessary condition for the security of cryptographic functions is to be "sufficiently distant" from linear, and cryptographers have proposed several measures for this distance. We show that six common measures, nonlinearity, algebraic degree, ann ...

7. Public Safety Analytics R&D Roadmap
Series: Technical Note (NIST TN)
Report Number: 1917
Topic: Information Technology
Published: 4/19/2016
Authors: Tracy A McElvaney, Ryan Felts, Marc Leh
Abstract: The public safety community is in a period of great transition. Over the next 20 years, technology advancements will increase accessibility of data/video applications to public safety, and allow for the eventual migration of voice communications ...

8. Catalyzing the Internet of Things and Smart Cities: Global City Teams Challenge.
Topic: Information Technology
Published: 4/11/2016
Author: Sokwoo Rhee
Abstract: Many smart city and Internet of Things (IoT) solutions are suffering from fragmentation and lack of economies of scale. To address this issue, the National Institute of Standards and Technology (NIST) initiated the Global City Teams Challenge (GCTC) ...

9. Analysis of Virtual Networking Options for Securing Virtual Machines
Topic: Information Technology
Published: 3/20/2016
Author: Ramaswamy Chandramouli
Abstract: Virtual Machines (VMs) constitute the primary category of resources to be protected in virtualized infrastructures. Out of the two types of protection for VMs -- Host-level and Network-level -- it is the approaches for the Network-level protection th ...

10. Secure Virtual Network Configuration for Virtual Machine (VM) Protection
Series: Special Publication (NIST SP)
Report Number: 800-125B
Topic: Information Technology
Published: 3/7/2016
Author: Ramaswamy Chandramouli
Abstract: Virtual Machines (VMs) are key resources to be protected since they are the compute engines hosting mission-critical applications. Since VMs are end-nodes of a virtual network, the configuration of the virtual network forms an important element in th ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series