An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Hildegard Ferraiolo, Ketan L. Mehta, Nabil Ghadiali, Jason Mohler, Vincent Johnson, Steven Brady
This recommendation provides a technical guideline to use Personal Identity Verification (PIV) Cards in facility access; enabling federal agencies to operate as...
Wo L. Chang, Arnab Roy, Mark Underwood, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor- laden, information-driven world. While opportunities exist...
Wo L. Chang, Nancy Grady, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor- laden, information-driven world. The growth of data is...
Wo L. Chang, Russell Reinsch, NBD-PWG NIST Big Data Public Working Group
The potential for organizations to capture value from Big Data improves every day as the pace of the Big Data revolution continues to increase, but the level of...
Wo L. Chang, Russell Reinsch, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor- laden, information-driven world. While opportunities exist...
Wo L. Chang, Nancy Grady, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor- laden, information-driven world. While opportunities exist...
Wo L. Chang, Geoffrey Fox, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor- laden, information-driven world. While opportunities exist...
Wo L. Chang, David Boyd, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor- laden, information-driven world. While opportunities exist...
Wo L. Chang, Gregor von Laszewski, NBD-PWG NIST Big Data Public Working Group
This document summarizes interfaces that are instrumental for the interaction with Clouds, Containers, and High Performance Computing (HPC) systems to manage...
The protection of Controlled Unclassified Information (CUI) resident in nonfederal systems and organizations is of paramount importance to federal agencies and...
Debra L. Kaiser, Neil Alderoty, Richard R. Cavanagh, Barbara Guttman, Robert J. Hanisch, Adam G. Morey, Jeanita Pritchett, Yuri Ralchenko, Stacy S. Schuur, William E. Wallace
On October 17, 2017, the ODI sponsored a day-long Standard Reference Data Workshop. More than 120 NIST staff members and associates from four NIST laboratories...
The Hypervisor platform is a collection of software modules that provides virtualization of hardware resources (such as CPU, Memory, Network and Storage) and...
Among the many classes of engineered nanomaterials, gold nanoparticles (GNPs) are one of the most widely studied and utilized nanoscale platforms for biomedical...
Richard Ayers, Benjamin R. Livelsberger, Barbara Guttman
This guide provides procedures for documenting and populating various data elements typically found within the contents of a mobile device, e.g., mobile phone...
This document provides technical guidelines and recommendations supporting resiliency of platform firmware and data against potentially destructive attacks. The...
Michael A. Boss, Andrew M. Dienstfrey, Zydrunas Gimbutas, Kathryn E. Keenan, Jolene D. Splett, Karl F. Stupic, Stephen E. Russek
This document describes the calibration service to measure proton spin relaxation times, T1 and T2, of materials used in phantoms (calibration artifacts) to...
Frederic J. de Vaulx, Eric D. Simmon, Robert B. Bohn
With cloud computing in the mainstream, there is a preponderance of cloud based services in the market and the choices for consumers increase daily. However...
The Homeland Security Presidential Directive HSPD-12 called for new standards to be adopted governing the interoperable use of identity credentials to allow...
Elaine B. Barker, Lidong Chen, Allen L. Roginsky, Apostol T. Vassilev, Richard Davis
This Recommendation specifies key-establishment schemes based on the discrete logarithm problem over finite fields and elliptic curves, including several...
This Recommendation specifies techniques for the derivation of keying material from a shared secret established during a key-establishment scheme defined in...
Over the past two years, the ODI has undertaken an ambitious effort to modernize the SRD Program. This report covers one aspect of this modernization effort, a...
The 2017 NIST/DHS/FDA Workshop: Standards for Pathogen Detection for Biosurveillance and Clinical Applications brought together subject matter experts from the...
With the continuing frequency, intensity, and adverse consequences of cyber-attacks, disruptions, hazards, and other threats to federal, state, and local...
Erica L. Romsos, Margaret C. Kline, Natalia Farkas, David L. Duewer, Blaza Toman
Standard Reference Material (SRM) 2372a is intended for use in the value assignment of human genomic deoxyribonucleic acid (DNA) forensic quantitation materials...
Michaela Iorga, Larry Feldman, Robert Barton, Michael J. Martin, Nedim S. Goren, Charif Mahmoudi
Managing the data generated by Internet of Things (IoT) sensors and actuators is one of the biggest challenges faced when deploying an IoT system. Traditional...
NIST hosted workshop, Future Needs for Reducing the Fire Hazard of Materials, provided an opportunity for worlds experts to come together to discuss the...
This document provides clarification for qualifying a given computing capability as a cloud service by determining if it aligns with the NIST definition of...
Stephen Quinn, Murugiah Souppaya, Melanie R. Cook, Karen A. Scarfone
A security configuration checklist is a document that contains instructions or procedures for configuring an information technology (IT) product to an...