Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Interagency/Internal Report (NISTIR)

Access Control for SAR Systems

Author(s)
Stephen Quirolgico, Chung Tong Hu, Tom T. Karygiannis
The Access Control for SAR Systems (ACSS) project focused on developing a prototype privilege management system used to express and enforce policies for...

Specification for the Asset Reporting Format 1.1

Author(s)
David A. Waltermire, Adam Halbardier, Mark Johnson
This specification describes the Asset Reporting Format (ARF), a data model for expressing the transport format of information about assets and the...

Specification for Asset Identification 1.1

Author(s)
David A. Waltermire, John Wunder, Adam Halbardier
Asset identification plays an important role in an organization‟s ability to quickly correlate different sets of information about assets. This specification...

Computer Security Division 2010 Annual Report

Author(s)
Patrick D. O'Reilly
This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2010. It...

Robust Iris Recognition Baseline for the Grand Challenge

Author(s)
Yooyoung Lee, Ross J. Micheals, James J. Filliben, P J. Phillips
Due to its distinctiveness, the human iris is a popular biometric feature used to identity a person with high accuracy. The “Grand Challenge” in iris...

NIST Workshop on Ontology Evaluation (NISTIR 7774)

Author(s)
Ram D. Sriram, Conrad E. Bock, Fabian M. Neuhaus, Evan K. Wallace, Mary C. Brady, Mark Musen, Joanne Luciano
The National Institute for Standards and Technology sponsored a workshop in October, 2007, on the subject of ontology evaluation. An international group of...

When High-Quality Face Images Match Poorly

Author(s)
J. R. Beveridge, P. Jonathon Phillips, Geof H. Givens, Bruce A. Draper, Mohammad N. Teli, David Bolme
In face recognition, quality is typically thought of as a property of individual images, not image pairs. The implicit assumption is that high-quality images...

An Introduction to the Good, the Bad, & the Ugly Face Recognition Challenge Problem

Author(s)
P J. Phillips, J. R. Beveridge, Bruce A. Draper, Geof H. Givens, Alice J. O'Toole, David Bolme, Joseph Dunlop, Yui M. Lui, Hassan A. Sahibzada, Samuel Weimer
The Good, the Bad, & the Ugly Face Challenge Problem was created to encourage the development of algorithms that are robust to recognition across changes in...

Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition

Author(s)
Meltem Sonmez Turan, Ray A. Perlner, Lawrence E. Bassham, William E. Burr, Dong H. Chang, Shu-jen H. Chang, Morris J. Dworkin, John M. Kelsey, Souradyuti Paul, Rene C. Peralta
The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm - SHA-3...

Security Considerations for Remote Electronic UOCAVA Voting

Author(s)
Nelson Hastings, Rene Peralta, Stefan Popoveniuc, Andrew Regenscheid
This whitepaper for the Technical Guidelines Development Committee (TGDC) identifies desirable security properties of remote electronic voting systems...

Glossary of Key Information Security Terms

Author(s)
Richard L. Kissel
This glossary of key information security terms has been extracted from NIST Federal Information Processing Standards (FIPS), Special Publication (SP) 800...
Was this page helpful?