An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Michael D. Hogan, Fang Liu, Annie W. Sokol, Tong Jin
The NIST Cloud Computing Standards Roadmap Working Group has surveyed the existing standards landscape for security, portability, and interoperability standards
Robert R. Zarr, Amanda C. Harris, John F. Roller, Stefan D. Leigh
Thermal conductivity measurements at and near room temperature are presented as the basis for certified values of thermal conductivity for SRM 1450d, Fibrous
The purpose of this workshop was to identify performance needs and establish research priorities to address the thermal characteristics of respiratory equipment
Linda D. Crown, Tina G. Butcher, Steven E. Cook, Lisa Warfield, David A. Sefcik
The 95th Annual Meeting of the National Conference on Weights and Measures (NCWM) was held July 11 to 15, 2010, at the Crowne Plaza St. Paul Riverfront, St
Keith A. Stouffer, Joseph A. Falco, Karen A. Scarfone
NIST Special Publication (SP) 800-82, Guide to Industrial Control Systems (ICS) Security, provides guidance on how to secure Industrial Control Systems (ICS)
David Cooper, William Polk, Andrew Regenscheid, Murugiah Souppaya
This document provides guidelines for preventing the unauthorized modification of Basic Input/Output System (BIOS) firmware on PC client systems. Unauthorized
Nelson P. Bryner, Stephen P. Fuss, Bryan W. Klein, Anthony D. Putorti Jr.
A fire occurred on the evening of June 18, 2007, in the Sofa Super Store in Charleston, SC. NIST analyzed the fire ground, consulted with other experts, and
Nelson P. Bryner, Stephen P. Fuss, Bryan W. Klein, Anthony D. Putorti Jr.
A fire occurred on the evening of June 18, 2007, in the Sofa Super Store in Charleston, SC. NIST analyzed the fire ground, consulted with other experts, and
David W. Allen, Edward A. Early, Benjamin K. Tsai, Catherine C. Cooksey
This document describes measurement services, instrumentation, and measurement techniques for regular spectral transmittance over the spectral range from 250 nm
The purpose of Special Publication 800-39 is to provide guidance for an integrated, organization-wide program for managing information security risk to
Elizabeth N. Fong, Paul E. Black, Michael J. Kass, Hsiao-Ming M. Koo
Software assurance tools are a fundamental resource to improve assurance in today's software applications. Some tools analyze software requirements or design
This publication provides recommendations for using two vulnerability naming schemes: Common Vulnerabilities and Exposures (CVE) and Common Configuration
David A. Waltermire, Stephen D. Quinn, Karen Scarfone
This document provides the definitive technical specification for Version 1.1 of the Security Content Automation Protocol (SCAP). SCAP consists of a suite of
Murugiah P. Souppaya, Karen Scarfone, Paul Hoffman
The purpose of SP 800-125 is to discuss the security concerns associated with full virtualization technologies for server and desktop virtualization, and to
Sheila E. Frankel, Richard Graveman, John Pearce, Mark Rooks
Due to the exhaustion of IPv4 address space, and the Office of Management and Budget (OMB) mandate that U.S. federal agencies begin to use the IPv6 protocol
Meltem Sonmez Turan, Elaine B. Barker, William E. Burr, Lidong Chen
This Recommendation specifies techniques for the derivation of master keys from passwords or passphrases to protect stored electronic data or data protection
Nelson P. Bryner, Anthony D. Putorti Jr., Stephen P. Fuss, Bryan W. Klein
A fire occurred on the evening of June 18, 2007, in the Sofa Super Store in Charleston, SC. NIST analyzed the fire ground, consulted with other experts, and
Nelson P. Bryner, Anthony D. Putorti Jr., Stephen P. Fuss, Bryan W. Klein
A fire occurred on the evening of June 18, 2007, in the Sofa Super Store in Charleston, SC. NIST analyzed the fire ground, consulted with other experts, and
A limitation to Cipher Block Chaining (CBC) mode, as specified in NIST Special Publication 800-38A, is that the plaintext input must consist of a sequence of
Although there is a great deal of high-quality information available on resilience-related topics hazard assessment, vulnerability assessment, risk assessment
Combinatorial testing can help detect problems like this early in the testing life cycle. The key insight underlying t-way combinatorial testing is that not