NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology

Displaying records 81 to 90 of 961 records.
Resort by: Date / Title


81. Markup Instructions for Extended Friction Ridge Features
Series: Special Publication (NIST SP)
Report Number: 1151
Topic: Information Technology
Published: 2/5/2013
Authors: Melissa K Taylor, Will Chapman, Austin Hicklin, George Kiebuzinski, Peter Komarinski, John Mayer-Splain, Rachel Wallner
Abstract: This document provides instructions for latent print examiners in marking friction ridge features to maximize consistency among examiners. This document builds upon the Extended Feature Set (EFS) defined in American National Standards Institute/N ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913169

82. Managing Identity Requirements for Remote Users of Information Systems to Protect System Security and Information Privacy
Series: ITL Bulletin
Topic: Information Technology
Published: 1/29/2013
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NISTIR 7817, A Credential Reliability and Revocation Model for Federated Identities, written by Hildegard Ferraiolo. The publication analyzes the different types of digital credentials used in aut ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913241

83. Mapping Evidence Graphs to Attack Graphs
Topic: Information Technology
Published: 1/17/2013
Authors: Changwei Liu, Anoop Singhal, Duminda Wijesekera
Abstract: Attack graphs compute potential attack paths from a system configuration and known vulnerabilities of a system. Evidence graphs model intrusion evidence and dependencies among them for forensic analysis. In this paper, we show how to map evidence gr ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911920

84. Using Attack Graphs in Forensic Examinations
Topic: Information Technology
Published: 1/16/2013
Authors: Changwei Liu, Anoop Singhal, Duminda Wijesekera
Abstract: Attack graphs are used to compute potential attack paths from a system configuration and known vulnerabilities of a system. Attack graphs can be used to eliminate known vulnerability sequences that can be eliminated to make attacks difficult and help ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911518

85. Extended Feature Set Profile Specification
Series: Special Publication (NIST SP)
Report Number: 1134
Topic: Information Technology
Published: 1/14/2013
Authors: Melissa K Taylor, Will Chapman, Austin Hicklin, George Kiebuzinski, John Mayer-Splain, Rachel Wallner, Peter Komarinski
Abstract: This specification defines Extended Feature Set (EFS) Profiles - sets of features to be used in latent friction ridge (fingerprint, palmprint or plantar) searches of automated friction ridge identification systems (AFIS). The EFS Profiles are des ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913056

86. AGVs and Forklifts Gaining Sight for Safety
Topic: Information Technology
Published: 1/10/2013
Author: Roger V Bostelman
Abstract: Forklifts and automated guided vehicles are useful tools for the manufacturing industry. With regard to safety of workers (and equipment) near industrial vehicles, there are issues when using either manned or automated powered industrial vehicles in ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912983

87. RF and A/MS Technologies
Topic: Information Technology
Published: 1/10/2013
Authors: Herbert S Bennett, John J. Pekarik
Abstract: Radio frequency (RF), high-frequency (HF) and analog/mixed-signal (A/MS) technologies serve the rapidly growing communications and More than Moore (MtM) markets and represent essential and critical technologies for the success of many semiconductor m ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914736

88. Generating Secure Cryptographic Keys: A Critical Component of Cryptographic Key Management and the Protection of Sensitive Information
Series: ITL Bulletin
Topic: Information Technology
Published: 12/19/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-133, Recommendation for Cryptographic Key Generation. The publication helps federal government organizations generate the cryptographic keys that are to be used w ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913043

89. Symbiosis Between the TRECVid Benchmark and Video Libraries at the Netherlands Institute for Sound and Vision
Topic: Information Technology
Published: 12/13/2012
Authors: Paul Douglas Over, Johan Oomen, Wessel Kraaij, Alan Smeaton
Abstract: Audiovisual archives are investing in large-scale digitisation efforts of their analogue holdings and in parallel ingest an ever-increasing amount of born-digital files in their digital storage facilities. Digitisation opened up new access paradigms ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910347

90. Evaluating Real-Time Search over Tweets
Topic: Information Technology
Published: 12/10/2012
Authors: Ian M Soboroff, Dean Paul McCullough, Jimmy Lin, Craig Macdonald, Iadh Ounis, Richard McCreadie
Abstract: Twitter offers a phenomenal platform for the social sharing of information. We describe new resources that have been created in the context of the Text Retrieval Conference (TREC) to support the academic study of Twitter as a real-time information so ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911362



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series