NIST logo

Publications Portal

You searched on: Topic Area: Information Technology Sorted by: date

Displaying records 31 to 40 of 711 records.
Resort by: Date / Title

31. Deployment-driven Security Configuration for Virtual Networks
Topic: Information Technology
Published: 12/28/2014
Author: Ramaswamy Chandramouli
Abstract: Virtualized Infrastructures are increasingly deployed in many data centers. One of the key components of this virtualized infrastructure is the virtual network - a software-defined communication fabric that links together the various Virtual Machines ...

32. Guidelines for Derived Personal Identity Verification (PIV) Credentials
Series: Special Publication (NIST SP)
Report Number: 800-157
Topic: Information Technology
Published: 12/19/2014
Authors: Hildegard Ferraiolo, David A Cooper, Salvatore Francomacaro, Andrew Richard Regenscheid, Jason Mohler, Sarbari Gupta, William Edward Burr
Abstract: This recommendation provides technical guidelines for the implementation of standards-based, secure, reliable, interoperable PKI-based identity credentials that are issued by Federal departments and agencies to individuals who possess and prove c ...

33. Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans
Series: Special Publication (NIST SP)
Report Number: 800-53A Rev 4
Topic: Information Technology
Published: 12/11/2014
Author: Ronald S Ross
Abstract: This publication provides a set of procedures for conducting assessments of security controls and privacy controls employed within federal information systems and organizations. The assessment procedures, executed at various phases of the system deve ...

34. Cryptographic Module Validation Program (CMVP)
Series: ITL Bulletin
Topic: Information Technology
Published: 12/1/2014
Authors: Apostol T Vassilev, Larry Feldman, Gregory A. Witte
Abstract: The Cryptographic Module Validation Program (CMVP) validates cryptographic modules for compliance with Federal Information Processing Standard (FIPS) Publication 140-2, Security Requirements for Cryptographic Modules, and other cryptography based sta ...

35. Electrodermal Activity and Eye Movements Inform the Usability of Passwords
Topic: Information Technology
Published: 11/18/2014
Authors: Jennifer Romano Bergstrom, Kristen Greene, David C. Hawkins, Christian Gonzalez
Abstract: While measuring physiological responses is a common practice in the field of neuroscience, it is rare in the usability arena and in password usability studies, in particular. This is unfortunate, as the use of such implicit measures could complemen ...

36. An Additive Manufacturing Test Artifact
Series: Journal of Research (NIST JRES)
Report Number: 119.017
Topic: Information Technology
Published: 10/23/2014
Authors: Shawn P Moylan, John A. Slotwinski, A L Cooke, Kevin K Jurrens, M Alkan Donmez
Abstract: We propose a test artifact, intended for standardization, for the purpose of evaluating the performance of additive manufacturing (AM) systems. A thorough analysis of previously proposed AM test artifacts as well as experience with machining tes ...

37. NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0
Series: Special Publication (NIST SP)
Report Number: 1108r3
Topic: Information Technology
Published: 10/1/2014
Authors: Christopher Greer, David A Wollman, Dean Eldon Prochaska, Paul A Boynton, Jeffrey A. Mazer, Cuong T Nguyen, Gerald J FitzPatrick, Thomas L Nelson, Galen H Koepke, Allen R Hefner Jr., Victoria Y Pillitteri, Tanya L Brewer, Nada T Golmie, David H Su, Allan C Eustis, David G Holmberg, Steven T Bushby
Abstract: Section 1305 of the Energy Independence and Security Act (EISA) of 2007 (Pub. L. 110‹140) directs NIST ,,to coordinate the development of a framework that includes protocols and model standards for information management to achieve interoperabili ...

38. Ten-Print Fingerprint Self-Captures: Graphics-only User Guidance without Language
Topic: Information Technology
Published: 9/29/2014
Authors: Yee-Yin Choong, Mary Frances Theofanos
Abstract: Users of biometric systems have expanded from traditional law enforcement operators to the general population with diverse backgrounds. Past research has shown that usability is improved when users received real-time system feedback regarding t ...

39. The Future of Cybersecurity Education
Topic: Information Technology
Published: 8/19/2014
Authors: Ernest Leroy McDuffie, V. P. Piotrowski
Abstract: By fostering public-private partnerships in cybersecurity education, the US government is motivating federal agencies, industry, and academia to work more closely together to defend cyberspace.

40. Approximate Matching: Definition and Terminology
Series: Special Publication (NIST SP)
Report Number: 800-168
Topic: Information Technology
Published: 7/2/2014
Authors: Frank Breitinger, Barbara Guttman, Michael McCarrin, Vassil Roussev, Douglas R White
Abstract: This document provides a definition of and terminology for approximate matching. Approximate matching is a promising technology designed to identify similarities between two digital artifacts. It is used to find objects that resemble each other o ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series