NIST logo

Publications Portal

You searched on: Topic Area: Information Technology Sorted by: title

Your search results exceeded 1,000 records. Please refine your search and try again.
Displaying records 41 to 50 of 1000 records.
Resort by: Date / Title

41. A Matter of Policy
Topic: Information Technology
Published: 3/26/2012
Authors: David F Ferraiolo, Jeffrey Mark Voas, George Hurlburt
Abstract: This paper discusses system security policies. System policies are the set of rules that when implemented afford a strategy for the protection of information. The policy objectives are diverse and span the social-economic spectrum. System policies g ...

42. A Method for Visualizing and Managing Role-Based Policies on Identity-Based Systems
Topic: Information Technology
Published: 7/27/2000
Authors: David F Ferraiolo, Serban Ilie Gavrila
Abstract: In recent years, numerous commercial and experimental Role-Based Access Control (RBAC) implementations have emerged. Central to several of these RBAC systems are administrative facilities for displaying and managing user/role and role/privileges, and ...

43. A Methodology for Compensating Errors Detected by Process-Intermittent Inspection
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 6811
Topic: Information Technology
Published: 10/1/2001
Authors: Herbert T Bandy, M Alkan Donmez, David E. Gilsinn, Michael Kennedy, Kenneth W Yee, Alice V. Ling, Neil D Wilkin
Abstract: This report describes principles and methodology for compensating geometric errors of machined parts due to machining processes. The error tendencies are identified by on-machine inspection of the part before the finish cut. Tool path adjustments com ...

44. A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7849
Topic: Information Technology
Published: 3/5/2014
Author: Ramaswamy Chandramouli
Abstract: Smart cards (smart identity tokens) are now being extensively deployed for identity verification for controlling access to Information Technology (IT) resources as well as physical resources. Depending upon the sensitivity of the resources and the ri ...

45. A Metrology-based Uncertainty Analysis Approach to V&V of Computer Models of High-consequence Engineering Systems
Topic: Information Technology
Published: 10/1/2004
Author: Jeffrey T Fong

46. A New Analysis of the False-Positive Rate of a Bloom Filter
Topic: Information Technology
Published: 10/15/2010
Authors: Ken Christensen, Allen L Roginsky, Miguel Jimeno
Abstract: A Bloom filter is a space-efficient data structure used for probabilistic set membership testing. When testing an object for set membership, a Bloom filter may give a false positive. The analysis of the false positive rate is key to understanding the ...

47. A New Classification of Information: A Step on the Road to Interpretability
Series: Special Publication (NIST SP)
Report Number: 990
Topic: Information Technology
Published: 9/1/2002
Authors: Larry H Reeker, Albert W Jones
Abstract: Complex systems, such as manufacturing supply chains, are often modeled as a collection of interacting components with information flows between them. These components are frequently responsible for making a wide range of decisions that are implemen ...

48. A New Combinational Logic Minimization Technique with Applications to Cryptology
Topic: Information Technology
Published: 5/20/2010
Authors: Joan Boyar, Rene C Peralta
Abstract: A new technique for combinational logic optimization is described. The technique is a two-step process. In the first step, the non-linearity of a circuit - as measured by the number of non-linear gates it contains - is reduced. The second step reduce ...

49. A New Standard for Securing Media-Independent Handover: IEEE 802.21a
Topic: Information Technology
Published: 12/31/2013
Authors: Rafa Marin-Lopez, Fernando Bernal-Hidalgo, Subir Das, Lidong Chen, Yoshihiro Ohba
Abstract: When enabling handover between different radio interfaces (e.g., handover from 3G to Wi-Fi), reducing network access authentication latency and securing handover related signaling messages are major challenging problems, amongst many others. The IEEE ...

50. A Perspective on Software Engineering Standards
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5546
Topic: Information Technology
Published: 12/1/1994
Authors: D Wallace, Roger J. Martin

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series