Skip to main content
U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock ( ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Secure Systems and Applications

We research, develop and produce guidelines, recommendations and best practices for foundational security mechanisms, protocols and services.

Overview

The Secure Systems and Applications (SSA) Group’s security research focuses on identifying emerging and high-priority technologies, and on developing security solutions that will have a high impact on the U.S. critical information infrastructure. The group conducts research and development on behalf of government and industry from the earliest stages of technology development through proof-of-concept, reference and prototype implementations, and demonstrations. SSA works to transfer new technologies to industry, produce new standards and guidance for federal agencies and industry, and develop tests, test methodologies, and assurance methods.

For more information regarding the Secure Systems and Applications Group, visit the CSRC website.

Projects / Programs 

Publications

NIST Cloud Computing Forensic Science Challenges

Author(s)
Martin Herman, Michaela Iorga, Ahsen Michael Salim, Robert H. Jackson, Mark R. Hurst, Ross Leo, Richard Lee, Nancy Landreville, Anand K. Mishra, Yien Wang, Rodrigo Sardinas
This document summarizes research performed by the members of the NIST Cloud Computing Forensic Science Working Group and aggregates, categorizes, and discusses

Aggregating Atomic Clocks for Time-Stamping

Author(s)
Temur Saidkhodjaev, Jeffrey M. Voas, David R. Kuhn, Joanna DeFranco, Phil Laplante
A timestamp is a critical component in many applications, such as proof of transaction ordering or analyzing algorithm performance. This paper reports on a

General Access Control Guidance for Cloud Systems

Author(s)
Chung Tong Hu, Michaela Iorga, Wei Bao, Ang Li, Qinghua Li, Antonios Gouglidis
This document presents cloud access control characteristics and a set of general access control guidance for cloud service models: IaaS (Infrastructure as a

Contacts

Group Manager: