An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Paul A. Grassi, Ellen M. Nadeau, Justin P. Richer, Sarah K. Squire, James L. Fenton, Naomi B. Lefkovitz, Jamie M. Danker
This document and its companion documents, SP 800-63, SP 800-63A, and SP 800-63B, provide technical and procedural guidelines to agencies for the implementation...
Paul A. Grassi, James L. Fenton, Michael E. Garcia
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or...
Paul A. Grassi, Naomi B. Lefkovitz, James L. Fenton, Jamie M. Danker, Yee-Yin Choong, Kristen Greene, Mary F. Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or...
Paul A. Grassi, Ray A. Perlner, Elaine M. Newton, Andrew R. Regenscheid, William E. Burr, Justin P. Richer, Naomi B. Lefkovitz, Jamie M. Danker, Mary F. Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or...
Jennifer F. Helgeson, Shannon A. Grubb, David H. Webb
The EDGeS (Economic Decision Guide Software) Tool version 1.0 implements a rational, systemic methodology for selecting cost-effective community resilience...
This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algorithm (DEA...
The objective of the Advanced Electrical Power Sensors Workshop was to provide input into planning processes being undertaken by the National Institute of...
The National Institute of Standards and Technology (NIST) hosted the Time Distribution Alternatives for the Smart Grid Workshop at its Gaithersburg, Maryland...
Douglas S. Thomas, David T. Butry, Stanley W. Gilbert, David H. Webb, Juan F. Fung
This report enumerates all possible costs of wildfire management and wildfire-related losses. It, further, compiles estimates or proposes methods for estimating...
Patrick D. O'Reilly, Kristina G. Rigopoulos, Gregory A. Witte, Larry Feldman
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public...
Monique E. Johnson, Antonio R. Montoro Bustos, Elijah J. Petersen, Shannon K. Hanna, Karen E. Murphy, Lee L. Yu, Bryant C. Nelson, Michael R. Winchester
This protocol describes a strategy for separating Caenorhabditis elegans (C. elegans) from engineered nanomaterials, a critical step for accurate quantification...
Alex Olivas, Chiara C. Ferraris, Nicos Martys, Edward Garboczi, Blaza Toman, William L. George
Rheological measurements are often performed using a rotational rheometer. In this type of rheometer, the tested fluid is sheared between two surfaces, one of...
David A. Wollman, Marc A. Weiss, YaShian Li-Baboud, Edward R. Griffor, Martin J. Burns
Cyber-Physical Systems (CPS) comprise interacting digital, analog, physical, and human components engineered for function through integrated physics and logic...
Murugiah P. Souppaya, John Morello, Karen Scarfone
Application container technologies, also known as containers, are a form of operating system virtualization combined with application software packaging...
Scanning electron microscopy (SEM) is widely used for the measurement of dimensions of nanostructures. This document describes the calibration of SEM...
This publication is a colorful chart explaining the 7 base units of the SI (International System of Units) and prefix symbols, featuring the Measurement League...
This publication describes the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NICE Framework), a reference structure...
Samuel L. Manzello, Raphaele Blanchi, Michael Gollner, Sara McAllister, Eulalia Planas, Guillermo Rein, Pedro Reszka, Sayaka Suzuki
Large outdoor fires present risk to the built environment. In this workshop, presentations highlighted large outdoor fires throughout the world, and explored...
Tina G. Butcher, Linda D. Crown, Richard A. Harshman, David Sefcik, Lisa Warfield
The 101st Annual Meeting of the National of the National Conference on Weights and Measures (NCWM) was held July 24-28, 2016, at the Grand Hyatt Denver Hotel...
Access control systems are among the most critical of computer security components. Faulty policies, misconfigurations, or flaws in software implementations can...
Edward R. Griffor, Christopher Greer, David A. Wollman, Martin J. Burns
Cyber-Physical Systems (CPS) comprise interacting digital, analog, physical, and human components engineered for function through integrated physics and logic...
Edward R. Griffor, Christopher Greer, David A. Wollman, Martin J. Burns
Cyber-Physical Systems (CPS) comprise interacting digital, analog, physical, and human components engineered for function through integrated physics and logic...
Paul A. Grassi, James L. Fenton, Naomi B. Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen Greene, Mary F. Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or...
Michael Nieles, Kelley L. Dempsey, Victoria Y. Pillitteri
Organizations rely heavily on the use of information technology (IT) products and services to run their day-to-day activities. Ensuring the security of these...
Paul A. Grassi, Elaine M. Newton, Ray A. Perlner, Andrew R. Regenscheid, William E. Burr, Justin P. Richer, Naomi B. Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen Greene, Mary F. Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or...
Paul A. Grassi, Michael E. Garcia, James L. Fenton
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or...
Paul A. Grassi, Ellen M. Nadeau, Justin P. Richer, Sarah K. Squire, James L. Fenton, Naomi Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen K. Greene
This document and its companion documents, SP 800-63, SP 800-63A, and SP 800-63B, provide technical and procedural guidelines to agencies for the implementation...