NIST logo

Publications Portal

You searched on: Topic Area: Information Technology Sorted by: date

Displaying records 11 to 20 of 692 records.
Resort by: Date / Title


11. Release of NIST Special Publication 800-53A, Revision 4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations
Series: ITL Bulletin
Topic: Information Technology
Published: 1/29/2015
Authors: Kelley L Dempsey, Larry Feldman, Gregory A. Witte
Abstract: NIST has published an updated version of Special Publication (SP) 800-53A, Assessing Security and Privacy Controls in Federal Information Systems and Organizations. SP 800-53A provides guidelines for building effective security assessment plans and p ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917886

12. Defensive code's impact on software performance
Series: Technical Note (NIST TN)
Report Number: 1860
Topic: Information Technology
Published: 1/26/2015
Author: David W Flater
Abstract: Defensive code is instructions added to software for the purpose of hardening it against uncontrolled failures and security problems. It is often assumed that defensive code causes a significant reduction in software performance, which justifies ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917376

13. Vetting the Security of Mobile Applications
Series: Special Publication (NIST SP)
Report Number: 800-163
Topic: Information Technology
Published: 1/26/2015
Authors: Stephen Quirolgico, Jeffrey Mark Voas, Athanasios T Karygiannis, Christoph Michael, Karen Scarfone
Abstract: The purpose of this document is to help organizations (1) understand the process for vetting the security of mobile applications, (2) plan for the implementation of an app vetting process, (3) develop app security requirements, (4) understand the typ ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917674

14. Security and Privacy Controls for Federal Information Systems and Organizations [including updates as of 1/22/2015]
Series: Special Publication (NIST SP)
Report Number: 800-53 Rev 4
Topic: Information Technology
Published: 1/22/2015
Author: Ronald S Ross
Abstract: This publication provides a catalog of security and privacy controls for federal information systems and organizations and a process for selecting controls to protect organizational operations (including mission, functions, image, and reputation), or ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917904

15. Spin-transfer torque switching observed in nanopillar superconducting-magnetic hybrid Josephson junctions
Topic: Information Technology
Published: 1/9/2015
Authors: Burm Baek, William H Rippard, Matthew R Pufall, Samuel Paul Benz, Stephen E Russek, Horst Rogalla, Paul David Dresselhaus
Abstract: Combining superconducting and magnetic materials to create novel superconducting devices has been motivated by the discovery of the Josephson critical current (Ics) oscillations with magnetic layer thickness and the demonstration of devices with ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917281

16. Release of NIST Special Publication 800-157, Guidelines for Derived Personal Identity Verification (PIV) Credentials
Series: ITL Bulletin
Topic: Information Technology
Published: 12/30/2014
Authors: Hildegard Ferraiolo, Larry Feldman, Gregory A. Witte
Abstract: NIST has recently released Special Publication (SP) 800-157, Guidelines for Derived Personal Identity Verification (PIV) Credentials. Itto provide the technical details for a system by which mobile devices such as smart phones and tables are provisio ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917746

17. Deployment-driven Security Configuration for Virtual Networks
Topic: Information Technology
Published: 12/28/2014
Author: Ramaswamy Chandramouli
Abstract: Virtualized Infrastructures are increasingly deployed in many data centers. One of the key components of this virtualized infrastructure is the virtual network - a software-defined communication fabric that links together the various Virtual Machines ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916369

18. Guidelines for Derived Personal Identity Verification (PIV) Credentials
Series: Special Publication (NIST SP)
Report Number: 800-157
Topic: Information Technology
Published: 12/19/2014
Authors: Hildegard Ferraiolo, David A Cooper, Salvatore Francomacaro, Andrew Richard Regenscheid, Mohler Jason, Sarbari Gupta, William Edward Burr
Abstract: This recommendation provides technical guidelines for the implementation of standards-based, secure, reliable, interoperable PKI-based identity credentials that are issued by Federal departments and agencies to individuals who possess and prove c ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917541

19. Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans
Series: Special Publication (NIST SP)
Report Number: 800-53A Rev 4
Topic: Information Technology
Published: 12/11/2014
Author: Ronald S Ross
Abstract: This publication provides a set of procedures for conducting assessments of security controls and privacy controls employed within federal information systems and organizations. The assessment procedures, executed at various phases of the system deve ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917644

20. Cryptographic Module Validation Program (CMVP)
Series: ITL Bulletin
Topic: Information Technology
Published: 12/1/2014
Authors: Apostol T Vassilev, Larry Feldman, Gregory A. Witte
Abstract: The Cryptographic Module Validation Program (CMVP) validates cryptographic modules for compliance with Federal Information Processing Standard (FIPS) Publication 140-2, Security Requirements for Cryptographic Modules, and other cryptography based sta ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917620



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series