An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This report defines the Trust Model for Security Automation Data 1.0 (TMSAD), which permits users to establish integrity, authentication, and traceability for
Christofer J. McGinnis, Dylan J. Yaga, Fernando L. Podio
The current version of the ANSI/NIST-ITL standard "Data Format for the Interchange of Fingerprint, Facial & Other Biometric Information" is specified in two
Andrew R. Regenscheid, Geoff Beier, Santosh Chokhani, Paul Hoffman, Jim Knoke, Scott Shorter
IT systems used to support UOCAVA voting face a variety of threats. If IT systems are not selected, configured and managed using security practices commensurate
This document outlines the basic process for the distribution of election material including registration material and blank ballots to UOCAVA voters. It
The authors recently participated in a round robin evaluation of a new ISO document draft, ISO 13067: Microbeam analysis Electron backscatter diffraction
The term "lights-out" for AFIS ten-print fingerprint operations has been around for many years and is generally understood to mean "no human intervention is
Amy S. Rushing, Joshua D. Kneifel, Barbara C. Lippiatt
This is the 2011 edition of energy price indices and discount factors for performing life-cycle cost analyses of energy and water conservation and renewable
Charles R. McLean, Yung-Tsun Lee, Sanjay Jain, Charles W. Hutchings
The purpose of this document is to provide: 1) a compendium of information pertaining to incident management modeling and simulation, and 2) a foundation for
Charles R. McLean, Yung-Tsun Lee, Sanjay Jain, Charles W. Hutchings
The purpose of this document is to provide: 1) a compendium of information pertaining to the modeling and simulation of hazardous material releases, and 2) a
Charles R. McLean, Yung-Tsun Lee, Sanjay Jain, Charles W. Hutchings
The purpose of this document is to provide a foundation for establishing a modeling and simulation technical interest group whose focus is information exchange
Charles R. McLean, Yung-Tsun Lee, Sanjay Jain, Charles W. Hutchings
The purpose of this document is to provide a foundation for establishing a modeling and simulation technical interest group whose focus is information exchange
We address the problem of state estimation of the power system for the Smart Grid.We assume that the monitoring of the electrical grid is done by a network of
David A. Waltermire, Paul R. Cichonski, Karen Scarfone
This report defines the Common Platform Enumeration (CPE) Applicability Language version 2.3 specification. The CPE Applicability Language specification is part
Paul R. Cichonski, David A. Waltermire, Karen Scarfone
This report defines the Common Platform Enumeration (CPE) Dictionary version 2.3 specification. The CPE Dictionary Specification is a part of a stack of CPE
Mary Parmelee, Harold Booth, David A. Waltermire, Karen Scarfone
This report defines the Common Platform Enumeration (CPE) Name Matching version 2.3 specification. The CPE Name Matching specification is part of a stack of CPE
Richard E. Ricker, David J. Pitchure, Maureen E. Williams, Sandra W. Claggett
The U.S. Consumer Products Safety Commission, Sandia National Laboratory (SNL), and NIST collaborated in an investigation into the effects of "problem drywall"
Rick D. Davis, Yeon S. Kim, Richard H. Harris Jr., Marc R. Nyden, Nasir M. Uddin, Treye Thomas
An innovative technology was evaluated to generate fire and health safe soft furnishings. Nanoparticle-based thin coatings on a polyurethane foam and nonwoven
In this paper, a novel apparatus and fluorescence detection method for measuring the permeation of H 2O 2 through polymer barriers (i.e., plastic bottles, caps
Today's information systems face sophisticated attackers who combine multiple vulnerabilities to penetrate networks with devastating impact. The overall
Andrew P. Founds, Nick Orlans, Whiddon Genevieve, Craig I. Watson
This document and associated dataset is an update to the Multiple Encounter Dataset I (MEDS-I), originally published by the National Institute of Standards and
Conventional approach to cross-layer network optimization assumes elastic users adjusting their bandwidth requirements in response to the resource congestion
3D Model-Based Engineering (MBE) is an approach to product design, manufacturing, and support where a digital three-dimensional representation of the product
Stephen Quirolgico, Chung Tong Hu, Tom T. Karygiannis
The Access Control for SAR Systems (ACSS) project focused on developing a prototype privilege management system used to express and enforce policies for
Fernando L. Podio, Dylan J. Yaga, Christofer J. McGinnis
The Computer Security Division of NIST/ITL supports the development of biometric conformance testing methodology standards and other conformity assessment
Asset identification plays an important role in an organization‟s ability to quickly correlate different sets of information about assets. This specification
This paper presents a simple model to demonstrate the effect on grass-fire propagation of the winds induced by structural fires in a Wildland-Urban Interface
This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2010. It
Shahram Orandi, John M. Libert, John Grantham, Kenneth Ko, Stephen S. Wood, Jin Chu Wu
This paper presents the findings of a study conducted to measure the impact of JPEG 2000 compression on fingerprint imagery at various levels of compression