Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Topic Area: Information Technology Sorted by: date

Displaying records 1 to 10 of 735 records.
Resort by: Date / Title

1. NIST Updates Personal Identity Verification (PIV) Guidelines
Series: ITL Bulletin
Report Number: August 2016
Topic: Information Technology
Published: 8/10/2016
Authors: Hildegard Ferraiolo, Larry Feldman, Gregory A. Witte
Abstract: This bulletin summarized the information presented in NIST SP 800-156: Derived PIV Application and Data Model Test Guidelines and NIST SP 800-166: Representation of PIV Chain-of-Trust for Import and Export. These publications support Federal Informa ...

2. Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security
Series: Special Publication (NIST SP)
Report Number: 800-46 Rev 2
Topic: Information Technology
Published: 7/29/2016
Authors: Murugiah P Souppaya, Karen Ann Scarfone
Abstract: For many organizations, their employees, contractors, business partners, vendors, and/or others use enterprise telework or remote access technologies to perform work from external locations. All components of these technologies, including organizatio ...

3. Diversifying Network Services under Cost Constraints for Better Resilience against Unknown Attacks
Topic: Information Technology
Published: 7/20/2016
Authors: Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal
Abstract: Diversity as a security mechanism has received revived interest recently due to its potential for improving the resilience of software and networks against unknown attacks. Recent work show diversity can be modeled and quantified as a security metric ...

4. Demystifiying the Internet of Things
Topic: Information Technology
Published: 6/27/2016
Author: Jeffrey Mark Voas
Abstract: This short column introduces the need for a foundational science to the Internet of Things (IoT). It introduces the notion of primitives and elements, and their relationship to trustworthiness.

5. Metamorphic Testing for Cybersecurity
Topic: Information Technology
Published: 6/27/2016
Authors: Tsong Yueh Chen, Fei-Ching Kuo, Wenjuan Ma, Willy Susilo, Dave Towey, Jeffrey Mark Voas, Zhi Quan Zhou
Abstract: Testing is a major approach for the detection of software defects, including security vulnerabilities. This article introduces metamorphic testing (MT), a relatively new testing method, and discusses how the new perspective of MT can help to conduct ...

6. Derived PIV Application and Data Model Test Guidelines
Series: Special Publication (NIST SP)
Report Number: 800-166
Topic: Information Technology
Published: 6/6/2016
Authors: David A Cooper, Hildegard Ferraiolo, Ramaswamy Chandramouli, Nabil Ghadiali, Jason Mohler, Steven Brady
Abstract: NIST Special Publication (SP) 800-157 contains technical guidelines for the implementation of standards-based, secure, reliable, interoperable Public Key Infrastructure (PKI)-based identity credentials that are issued for mobile devices by federal de ...

7. Extending Network Security into Virtualized Infrastructure
Series: ITL Bulletin
Report Number: June 2016
Topic: Information Technology
Published: 6/3/2016
Authors: Ramaswamy Chandramouli, Larry Feldman, Gregory A. Witte
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-125B, "Secure Virtual Network Configuration for Virtual Machine (VM) Protection." That publication provides an analysis of various virtual network configuration ...

8. Insights on Formal Methods of Cybersecurity
Topic: Information Technology
Published: 5/27/2016
Authors: Jeffrey Mark Voas, Kim Bernard Schaffer
Abstract: We asked 7 experts 1 simple question to find out what has occurred recently in terms of applying formal methods (FM) to security-centric, cyber problems: Please summarize in a paragraph the state of the research and practitioner communities in form ...

9. On various nonlinearity measures for boolean functions
Topic: Information Technology
Published: 5/19/2016
Authors: Joan Boyar, Magnus G. Find, Rene C Peralta
Abstract: A necessary condition for the security of cryptographic functions is to be "sufficiently distant" from linear, and cryptographers have proposed several measures for this distance. We show that six common measures, nonlinearity, algebraic degree, ann ...

10. Public Safety Analytics R&D Roadmap
Series: Technical Note (NIST TN)
Report Number: 1917
Topic: Information Technology
Published: 4/19/2016
Authors: Tracy A McElvaney, Ryan Felts, Marc Leh
Abstract: The public safety community is in a period of great transition. Over the next 20 years, technology advancements will increase accessibility of data/video applications to public safety, and allow for the eventual migration of voice communications ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series