Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Special Publication (NIST SP)

Improving Measurement for Smokestack Emissions - Workshop Summary

Author(s)
Rodney A. Bryant, Aaron N. Johnson, John D. Wright, Tamae M. Wong, James R. Whetstone, Michael R. Moldover, Iosif I. Shinder, Scott Swiggard, Chris Gunning, David Elam, Tom Martz, Eric Harman, David Nuckols, Liang Zhang, Woong Kang, Salvator Vigil
The complex flow conditions inherent in power plant smokestacks make accurate flow measurements challenging, which in turn limits the accuracy of hazardous

2017 NIST/ITL Cybersecurity Program: Annual Report

Author(s)
Patrick D. O'Reilly, Kristina G. Rigopoulos, Gregory A. Witte, Larry Feldman
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public

IT Asset Management : Financial Services

Author(s)
James M. Banoczi
While a physical asset management system can tell you the location of a computer, it cannot answer questions like, “What operating systems are our laptops

Research Needs to Support Immediate Occupancy Building Performance Following Natural Hazard Events

Author(s)
Siamak Sattar, Therese P. McAllister, Katherine J. Johnson, Christopher T. Clavin, Christopher L. Segura, Steven L. McCabe, Juan F. Fung, Leslie Abrahams, Emily Sylak-Glassman , Marc L. Levitan, Kenneth W. Harrison, John L. Harris
The performance of buildings in our communities depends on multiple factors including the availability of supporting infrastructure, the original design, the

Securing Electronic Health Records on Mobile Devices

Author(s)
Gavin W. O'Brien, Nate V. Lesser, Brett Pleasant, Sue Wang, Kangmin Zheng, Colin Bowers, Kyle Kamke
Health care providers increasingly use mobile devices to receive, store, process, and transmit patient clinical information. According to our own risk analysis

Guidance for Evaluating Contactless Fingerprint Acquisition Devices

Author(s)
John M. Libert, John D. Grantham, Bruce Bandini, Stephen S. Wood, Michael D. Garris, Kenneth Ko, Frederick R. Byers, Craig I. Watson
This document details efforts undertaken by the National Institute of Standards and Technology (NIST) to develop measurements and a protocol for the evaluation

NIST Measurement Services: Photometric Calibrations

Author(s)
Carl C. Miller, Maria E. Nadal, Benjamin K. Tsai, Yuqin Zong
The National Institute of Standards and Technology provides calibration services for submitted artifacts for luminous intensity, illuminance, color temperature

Guidelines for the Use of PIV Credentials in Facility Access

Author(s)
Hildegard Ferraiolo, Ketan L. Mehta, Nabil Ghadiali, Jason Mohler, Vincent Johnson, Steven Brady
This recommendation provides a technical guideline to use Personal Identity Verification (PIV) Cards in facility access; enabling federal agencies to operate as

Standard Reference Data Workshop Report

Author(s)
Debra L. Kaiser, Neil Alderoty, Richard R. Cavanagh, Barbara Guttman, Robert J. Hanisch, Adam G. Morey, Jeanita Pritchett, Yuri Ralchenko, Stacy S. Schuur, William E. Wallace
On October 17, 2017, the ODI sponsored a day-long Standard Reference Data Workshop. More than 120 NIST staff members and associates from four NIST laboratories

Quick Start Guide for Populating Mobile Test Devices

Author(s)
Richard Ayers, Benjamin R. Livelsberger, Barbara Guttman
This guide provides procedures for documenting and populating various data elements typically found within the contents of a mobile device, e.g., mobile phone

Platform Firmware Resiliency Guidelines

Author(s)
Andrew R. Regenscheid
This document provides technical guidelines and recommendations supporting resiliency of platform firmware and data against potentially destructive attacks. The

Cloud Computing Service Metrics Description

Author(s)
Frederic J. de Vaulx, Eric D. Simmon, Robert B. Bohn
With cloud computing in the mainstream, there is a preponderance of cloud based services in the market and the choices for consumers increase daily. However
Was this page helpful?