An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Wo L. Chang, Russell Reinsch, David Boyd, Carl Buffington
While opportunities exist with Big Data, the data can overwhelm traditional technical approaches. To advance progress in Big Data, the NIST Big Data Public...
This document summarizes interfaces that are instrumental for the interaction with Clouds, Containers, and High Performance Computing (HPC) systems to manage...
The potential for organizations to capture value from Big Data improves every day as the pace of the Big Data revolution continues to increase, but the level of...
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with...
Arnold Johnson, Kelley L. Dempsey, Ronald S. Ross, Sarbari Gupta, Dennis Bailey
[Includes updates as of October 10, 2019] Guide for Security-Focused Configuration Management of Information Systems provides guidelines for organizations...
First responders today can leverage large quantities of multimedia data from a variety of sources within and outside their agencies, and the scope of this data...
A workshop on Consensus Safety Measurement Methodologies for Automated Driving System (ADS) - Equipped Vehicles was held at NIST 25-26 June 2019 on the NIST...
Transport Layer Security (TLS) provides mechanisms to protect data during electronic dissemination across the Internet. This Special Publication provides...
Samuel L. Manzello, Sara McAllister, Sayaka Suzuki, Raphaele Blanchi, Elsa Pastor, Ronchi Enrico
A workshop of the permanent working group, sponsored by the International Association for Fire Safety Science (IAFSS), entitled Large Outdoor Fires and the...
Federal Information Processing Standards (FIPS) Publication 201-2, Personal Identity Verification (PIV) of Federal Employees and Contractors, establishes a...
Andrea M. Medina-Smith, Kathryn Miller, Karen J. Wick
NIST is committed to the idea that results of federally funded research are a valuable national resource and a strategic asset. To the extent feasible and...
Andrea M. Medina-Smith, Kathryn Miller, Karen J. Wick
NIST is committed to the idea that results of federally funded research are a valuable national resource and a strategic asset. To the extent feasible and...
Andrea M. Medina-Smith, Kathryn Miller, Karen J. Wick
NIST is committed to the idea that results of federally funded research are a valuable national resource and a strategic asset. To the extent feasible and...
The definitive international reference on the International System of Units (SI) is a booklet published by the International Bureau of Weights and Measures...
Microservices architecture is increasingly being used to develop application systems since its smaller codebase facilitates faster code development, testing...
James J. McCarthy, Otis Alexander, Sallie Edwards, Don Faatz, Chris Peloquin, Susan Symington, Andre Thibault, John Wiltberger, Karen Viani
Through direct dialogue between NCCoE staff and members of the energy sector (comprised mainly of electric power companies and those who provide equipment and...
Chung Tong Hu, David F. Ferraiolo, David R. Kuhn, Adam Schnitzer, Kenneth Sandlin, Robert Miller, Karen Scarfone
[Includes updates as of August 2, 2019] This document provides Federal agencies with a definition of attribute based access control (ABAC). ABAC is a logical...
As retailers in the United States have adopted chip-and-signature and chip-and-PIN (personal identification number) point-of-sale (POS) security measures, there...
Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to...
This Guide Brief provides examples of how the NIST Community Resilience Planning Guide can also be used for resilience planning at the state, regional, county...
The purpose of this Guide Brief is to provide information that communities may use to accomplish the first step of the Guide: forming a collaborative planning...
William A. Haag Jr., Douglas C. Montgomery, Allen Y. Tan, William C. Barker
The Border Gateway Protocol (BGP) is the default routing protocol to route traffic among internet domains. While BGP performs adequately in identifying viable...
Attribute-based access control systems rely upon attributes to not only define access control policy rules but also enforce the access control. Attributes need...
NIST Special Publication (SP) 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best...