NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology
Sorted by: title

Displaying records 31 to 40 of 987 records.
Resort by: Date / Title

31. A Formal Description of the SDNS Security Protocol at Layer 4 (SP4)
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 4792
Topic: Information Technology
Published: 3/1/1992
Author: Wayne Jansen

32. A Fortran 90 Interface for OpenGL
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5985
Topic: Information Technology
Published: 3/1/1997
Author: William F Mitchell

33. A Framework for the Development and Assurance of High Integrity Software
Series: Special Publication (NIST SP)
Report Number: 500-223
Topic: Information Technology
Published: 12/1/1994
Authors: D Wallace, L M Ippolito

34. A Functional Model for Fourth Generation Languages
Series: Special Publication (NIST SP)
Report Number: 500-138
Topic: Information Technology
Published: 6/1/1986
Author: G E Fisher

35. A Guide to Performance Evaluation of Database Systems
Series: Special Publication (NIST SP)
Report Number: 500-118
Topic: Information Technology
Published: 12/1/1984
Author: Daniel R Benigni

36. A Head Start on Assurance Proceedings of an Invitational Workshop on Information Technology (IT) Assurance and Trustworthiness March 21-23, 1994
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5472
Topic: Information Technology
Published: 8/1/1994
Authors: Patricia R Toth, M D Abrams

37. A Key Notarization System for Computer Networks
Series: Special Publication (NIST SP)
Report Number: 500-54
Topic: Information Technology
Published: 10/1/1979
Author: Miles E. Smid

38. A Knowledge-Based System for Physical Database Design
Series: Special Publication (NIST SP)
Report Number: 500-151
Topic: Information Technology
Published: 4/1/1988
Authors: Christopher E Dabrowski, D Jefferson

39. A Location-Based Mechanism for Mobile Device Security
Topic: Information Technology
Published: 3/31/2009
Authors: Wayne Jansen, Vlad Korolev
Abstract: While mobile handheld devices, such as cell phones and PDAs, provide productivity benefits, they also pose new risks. A vital safeguard against unauthorized access to a device s contents is authentication. This paper describes a location-based auth ...

40. A Matter of Policy
Topic: Information Technology
Published: 3/26/2012
Authors: David F Ferraiolo, Jeffrey Mark Voas, George Hurlburt
Abstract: This paper discusses system security policies. System policies are the set of rules that when implemented afford a strategy for the protection of information. The policy objectives are diverse and span the social-economic spectrum. System policies g ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series