NIST logo

Publications Portal

You searched on: Topic Area: Information Technology Sorted by: title

Displaying records 21 to 30 of 677 records.
Resort by: Date / Title


21. A Framework to Canonicalize Manufacturing Service Capability Models
Topic: Information Technology
Published: 2/7/2015
Authors: Boonserm Kulvatunyou, Yunsu Lee, Nenad Ivezic, Yun Peng
Abstract: The ability to share precise models of suppliers‰ manufacturing service capability (MSC) information is necessary to develop reliable methods that enable Original Equipment Manufacturers (OEMs) to efficiently configure agile and responsive supply cha ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912725

22. A Guide to Performance Evaluation of Database Systems
Series: Special Publication (NIST SP)
Report Number: 500-118
Topic: Information Technology
Published: 12/1/1984
Author: Daniel R Benigni
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900371

23. A Head Start on Assurance Proceedings of an Invitational Workshop on Information Technology (IT) Assurance and Trustworthiness March 21-23, 1994
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5472
Topic: Information Technology
Published: 8/1/1994
Authors: Patricia R Toth, M D Abrams
Abstract: The purpose of the Invitational Workshop on Information Technology (IT) Assurance and Trustworthiness was to identify crucial issues on assurance in IT systems and to provide input into the development of policy guidance on determining the type and l ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900722

24. A Key Notarization System for Computer Networks
Series: Special Publication (NIST SP)
Report Number: 500-54
Topic: Information Technology
Published: 10/1/1979
Author: Miles E. Smid
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900310

25. A Knowledge-Based System for Physical Database Design
Series: Special Publication (NIST SP)
Report Number: 500-151
Topic: Information Technology
Published: 4/1/1988
Authors: Christopher E Dabrowski, D Jefferson
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900404

26. A Location-Based Mechanism for Mobile Device Security
Topic: Information Technology
Published: 3/31/2009
Authors: Wayne Jansen, Vlad Korolev
Abstract: While mobile handheld devices, such as cell phones and PDAs, provide productivity benefits, they also pose new risks. A vital safeguard against unauthorized access to a device s contents is authentication. This paper describes a location-based auth ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901332

27. A Matter of Policy
Topic: Information Technology
Published: 3/26/2012
Authors: David F Ferraiolo, Jeffrey Mark Voas, George Hurlburt
Abstract: This paper discusses system security policies. System policies are the set of rules that when implemented afford a strategy for the protection of information. The policy objectives are diverse and span the social-economic spectrum. System policies g ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909608

28. A Method for Visualizing and Managing Role-Based Policies on Identity-Based Systems
Topic: Information Technology
Published: 7/27/2000
Authors: David F Ferraiolo, Serban Ilie Gavrila
Abstract: In recent years, numerous commercial and experimental Role-Based Access Control (RBAC) implementations have emerged. Central to several of these RBAC systems are administrative facilities for displaying and managing user/role and role/privileges, and ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151207

29. A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7849
Topic: Information Technology
Published: 3/5/2014
Author: Ramaswamy Chandramouli
Abstract: Smart cards (smart identity tokens) are now being extensively deployed for identity verification for controlling access to Information Technology (IT) resources as well as physical resources. Depending upon the sensitivity of the resources and the ri ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911836

30. A New Analysis of the False-Positive Rate of a Bloom Filter
Topic: Information Technology
Published: 10/15/2010
Authors: Ken Christensen, Allen L Roginsky, Miguel Jimeno
Abstract: A Bloom filter is a space-efficient data structure used for probabilistic set membership testing. When testing an object for set membership, a Bloom filter may give a false positive. The analysis of the false positive rate is key to understanding the ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903775



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series