Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Topic Area: Information Technology Sorted by: title

Displaying records 31 to 40 of 735 records.
Resort by: Date / Title

31. A Method for Visualizing and Managing Role-Based Policies on Identity-Based Systems
Topic: Information Technology
Published: 7/27/2000
Authors: David F Ferraiolo, Serban Ilie Gavrila
Abstract: In recent years, numerous commercial and experimental Role-Based Access Control (RBAC) implementations have emerged. Central to several of these RBAC systems are administrative facilities for displaying and managing user/role and role/privileges, and ...

32. A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7849
Topic: Information Technology
Published: 3/5/2014
Author: Ramaswamy Chandramouli
Abstract: Smart cards (smart identity tokens) are now being extensively deployed for identity verification for controlling access to Information Technology (IT) resources as well as physical resources. Depending upon the sensitivity of the resources and the ri ...

33. A New Analysis of the False-Positive Rate of a Bloom Filter
Topic: Information Technology
Published: 10/15/2010
Authors: Ken Christensen, Allen L Roginsky, Miguel Jimeno
Abstract: A Bloom filter is a space-efficient data structure used for probabilistic set membership testing. When testing an object for set membership, a Bloom filter may give a false positive. The analysis of the false positive rate is key to understanding the ...

34. A New Classification of Information: A Step on the Road to Interpretability
Series: Special Publication (NIST SP)
Report Number: 990
Topic: Information Technology
Published: 9/1/2002
Authors: Larry H Reeker, Albert W Jones
Abstract: Complex systems, such as manufacturing supply chains, are often modeled as a collection of interacting components with information flows between them. These components are frequently responsible for making a wide range of decisions that are implemen ...

35. A New Combinational Logic Minimization Technique with Applications to Cryptology
Topic: Information Technology
Published: 5/20/2010
Authors: Joan Boyar, Rene C Peralta
Abstract: A new technique for combinational logic optimization is described. The technique is a two-step process. In the first step, the non-linearity of a circuit - as measured by the number of non-linear gates it contains - is reduced. The second step reduce ...

36. A New Standard for Securing Media-Independent Handover: IEEE 802.21a
Topic: Information Technology
Published: 12/31/2013
Authors: Rafa Marin-Lopez, Fernando Bernal-Hidalgo, Subir Das, Lidong Chen, Yoshihiro Ohba
Abstract: When enabling handover between different radio interfaces (e.g., handover from 3G to Wi-Fi), reducing network access authentication latency and securing handover related signaling messages are major challenging problems, amongst many others. The IEEE ...

37. A Perspective on Software Engineering Standards
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5546
Topic: Information Technology
Published: 12/1/1994
Authors: D Wallace, Roger J. Martin

38. A Policy Perspective on Electronic Commerce
Topic: Information Technology
Published: 9/1/1999
Authors: E Maxwell, S A. Wakid, J A Moline
Abstract: On July 1, 1997, President Clinton issued A Framework for Global Electronic Commerce identifying nine areas in which international agreements would be needed in order to preserve the Internet as a non-regulatory medium.The implementation of global el ...

39. A Prototype Expert System: An Automated Advisor to Select Data Sources From Chemical Information Databases
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 88-3689
Topic: Information Technology
Published: 1/1/1988
Authors: Elizabeth Nee nee Fong, Christopher E Dabrowski

40. A Rational Foundation for Software Metrology
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8101
Topic: Information Technology
Published: 1/20/2016
Authors: David W Flater, Paul E Black, Elizabeth Nee nee Fong, Raghu N Kacker, Vadim Okun, Stephen S Wood, David R Kuhn
Abstract: Much software research and practice involves ostensible measurements of software, yet little progress has been made on an SI-like metrological foundation for those measurements since the work of Gray, Hogan, et al. in 1996-2001. Given a physical ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series