NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology
Sorted by: date

Displaying records 1 to 10 of 995 records.
Resort by: Date / Title

1. Guidelines for Derived Personal Identity Verification (PIV) Credentials
Series: Special Publication (NIST SP)
Report Number: 800-157
Topic: Information Technology
Published: 12/19/2014
Authors: Hildegard Ferraiolo, David A Cooper, Salvatore Francomacaro, Andrew Richard Regenscheid, Burr William, Mohler Jason, Sarbari Gupta
Abstract: This recommendation provides technical guidelines for the implementation of standards-based, secure, reliable, interoperable PKI-based identity credentials that are issued by Federal departments and agencies to individuals who possess and prove c ...

2. Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans
Series: Special Publication (NIST SP)
Report Number: 800-53A Rev 4
Topic: Information Technology
Published: 12/11/2014
Author: Ronald S Ross
Abstract: This publication provides a set of procedures for conducting assessments of security controls and privacy controls employed within federal information systems and organizations. The assessment procedures, executed at various phases of the system deve ...

3. Cryptographic Module Validation Program (CMVP)
Series: ITL Bulletin
Topic: Information Technology
Published: 12/1/2014
Authors: Apostol T Vassilev, Larry Feldman, Greg Witte
Abstract: The Cryptographic Module Validation Program (CMVP) validates cryptographic modules for compliance with Federal Information Processing Standard (FIPS) Publication 140-2, Security Requirements for Cryptographic Modules, and other cryptography based sta ...

4. Screening for factors affecting application performance in profiling measurements
Series: Technical Note (NIST TN)
Report Number: 1855
Topic: Information Technology
Published: 10/30/2014
Author: David W Flater
Abstract: This report provides an example application of screening techniques in experimental computer science, including validation and selection of metrics and measures, the screening experiment itself, and supporting statistical methods. Together with rela ...

5. An ACT-R Model of Elliptical Endpoint Error Distributions in a Mobile Touchscreen 2-D Fitts‰ Law Task
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8015
Topic: Information Technology
Published: 10/14/2014
Authors: Kristen Greene, Melissa A. Gallagher, Franklin Tamborello
Abstract: Given the high propensity of users‰ motoric errors with smaller touchscreen buttons, knowing the endpoint distributions for finger- based pointing and tapping is especially important for higher-fidelity predictive modeling of tasks on such devices. ...

6. Challenges and Benefits of a Methodology for Scoring Web Content Accessibility Guidelines (WCAG) 2.0 Conformance
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8010
Topic: Information Technology
Published: 10/1/2014
Authors: Frederick E Boland Jr, Elizabeth Nee nee Fong
Abstract: The World Wide Web (W3C) Web Accessibility Initiative has developed comprehensive guidance on evaluating web accessibility. Web Content Accessibility Guidelines (WCAG) 2.0 specifies the success criteria for evaluating the conformance of web pages. ...

7. NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0
Series: Special Publication (NIST SP)
Report Number: 1108r3
Topic: Information Technology
Published: 10/1/2014
Authors: Christopher Greer, David A Wollman, Dean Eldon Prochaska, Paul A Boynton, Jeffrey A. Mazer, Cuong T Nguyen, Gerald J FitzPatrick, Thomas L Nelson, Galen H Koepke, Allen R Hefner Jr, Victoria Y Pillitteri, Tanya L Brewer, Nada T Golmie, David H Su, Allan C Eustis, David G Holmberg, Steven T Bushby
Abstract: Section 1305 of the Energy Independence and Security Act (EISA) of 2007 (Pub. L. 110‹140) directs NIST ,,to coordinate the development of a framework that includes protocols and model standards for information management to achieve interoperabili ...

8. Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks
Topic: Information Technology
Published: 9/11/2014
Authors: Lingyu Wang, Meng Zhang, Sushil Jajodia, Anoop Singhal, M. Albanese
Abstract: The interest in diversity as a security mechanism has recently been revived in various applications, such as Moving Target Defense (MTD), resisting worms in sensor networks, and improving the robustness of network routing. However, most existing effo ...

9. The Future of Cybersecurity Education
Topic: Information Technology
Published: 8/19/2014
Authors: Ernest Leroy McDuffie, V. P. Piotrowski
Abstract: By fostering public-private partnerships in cybersecurity education, the US government is motivating federal agencies, industry, and academia to work more closely together to defend cyberspace.

10. IT Pro Conference on Information Systems Governance
Topic: Information Technology
Published: 8/6/2014
Authors: Irena Bojanova, David R Kuhn
Abstract: Approximately 100 IT professionals participated in the 2014 IT Pro Conference on Information Systems Governance, held at the National Institute of Standards and Technology (NIST) on May 22, 2014 ( Information systems gover ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series