NIST logo

Publications Portal

You searched on: Topic Area: Information Technology

Displaying records 31 to 40 of 722 records.
Resort by: Date / Title


31. TRECVID 2014 -- An Overview of the Goals, Tasks, Data, Evaluation Mechanisms, and Metrics
Topic: Information Technology
Published: 3/26/2015
Authors: Paul Douglas Over, Jonathan G Fiscus, Gregory A Sanders, David M Joy, Martial Michel, George Awad, Alan Smeaton, Wessel Kraaij, Georges Quenot
Abstract: The TREC Video Retrieval Evaluation (TRECVID) 2014 was a TREC-style video analysis and retrieval evaluation, the goal of which remains to promote progress in content-based exploitation of digital video via open, metrics-based evaluation. Over the ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918038

32. Guidance for Secure Authorization of Mobile Applications in the Corporate Environment
Series: ITL Bulletin
Topic: Information Technology
Published: 3/19/2015
Authors: Athanasios T Karygiannis, Stephen Quirolgico, Larry Feldman, Gregory A. Witte
Abstract: This bulletin provides an overview of NIST Special Publication (SP) 800-163, "Vetting the Security of Mobile Applications." The NIST SP helps organizations understand the process for vetting the security of mobile applications, plan for the implement ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918252

33. The Multiplicative Complexity of Boolean Functions on Four and Five Variables
Topic: Information Technology
Published: 3/17/2015
Authors: Meltem Sonmez Turan, Rene C Peralta
Abstract: A generic way to design lightweight cryptographic primitives is to construct simple rounds using small nonlinear components such as 4x4 S-boxes and use these iteratively (e.g., PRESENT and SPONGENT). In order to efficiently implement the primitiv ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916439

34. National Voluntary Laboratory Accreditation Program (NVLAP) Common Criteria Testing
Series: Handbook (NIST HB)
Report Number: 150-20
Topic: Information Technology
Published: 3/4/2015
Author: Dana Smith Leaman
Abstract: NIST Handbook 150-20 represents the technical requirements and guidance for the accreditation of laboratories under the National Voluntary Laboratory Accreditation Program (NVLAP) Information Technology Security Testing: Common Criteria Testing. It ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915925

35. IT Security
Topic: Information Technology
Published: 2/4/2015
Authors: Morris Chang, David R Kuhn, Timothy Weil
Abstract: How can IT professionals adapt to ever-changing security challenges quickly and without draining their organizations' resources? Articles in this issue highlight emerging trends and suggest ways to approach and address cybersecurity challenges. [gue ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917217

36. Release of NIST Special Publication 800-53A, Revision 4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations
Series: ITL Bulletin
Topic: Information Technology
Published: 1/29/2015
Authors: Kelley L Dempsey, Larry Feldman, Gregory A. Witte
Abstract: NIST has published an updated version of Special Publication (SP) 800-53A, Assessing Security and Privacy Controls in Federal Information Systems and Organizations. SP 800-53A provides guidelines for building effective security assessment plans and p ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917886

37. A Logic Based Network Forensics Model for Evidence Analysis
Topic: Information Technology
Published: 1/28/2015
Authors: Changwei Liu, Anoop Singhal, Duminda Wijesekera
Abstract: Many attackers tend to use sophisticated multi-stage and/or multi-host attack techniques and anti-forensic tools to cover their traces. Due to the limitations of current intrusion detection and network forensic analysis tools, reconstructing attack s ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918321

38. Defensive code's impact on software performance
Series: Technical Note (NIST TN)
Report Number: 1860
Topic: Information Technology
Published: 1/26/2015
Author: David W Flater
Abstract: Defensive code is instructions added to software for the purpose of hardening it against uncontrolled failures and security problems. It is often assumed that defensive code causes a significant reduction in software performance, which justifies ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917376

39. Vetting the Security of Mobile Applications
Series: Special Publication (NIST SP)
Report Number: 800-163
Topic: Information Technology
Published: 1/26/2015
Authors: Stephen Quirolgico, Jeffrey Mark Voas, Athanasios T Karygiannis, Christoph Michael, Karen Scarfone
Abstract: The purpose of this document is to help organizations (1) understand the process for vetting the security of mobile applications, (2) plan for the implementation of an app vetting process, (3) develop app security requirements, (4) understand the typ ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917674

40. Security and Privacy Controls for Federal Information Systems and Organizations [including updates as of 1/22/2015]
Series: Special Publication (NIST SP)
Report Number: 800-53 Rev 4
Topic: Information Technology
Published: 1/22/2015
Author: Ronald S Ross
Abstract: This publication provides a catalog of security and privacy controls for federal information systems and organizations and a process for selecting controls to protect organizational operations (including mission, functions, image, and reputation), or ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917904



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series