An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Paul A. Grassi, James L. Fenton, Elaine M. Newton, Ray Perlner, Andrew Regenscheid, William E. Burr, Justin P. Richer, Naomi Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen K. Greene, Mary Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or
Paul A. Grassi, James L. Fenton, Naomi Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen K. Greene, Mary Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or
Ronald S. Ross, Victoria Y. Pillitteri, Kelley L. Dempsey, Mark Riddle, Gary Guissanie
The protection of Controlled Unclassified Information (CUI) resident in nonfederal systems and organizations is of paramount importance to federal agencies and
Ashley B. Green, David M. Bunk, Nien F. Zhang, Wendell Alejo
This Standard Reference Material (SRM) is intended primarily for use in the preparation of calibration solutions for a candidate reference measurement procedure
This document presents the NIST Federated Cloud Reference Architecture model. This actor/role- based model used the guiding principles of the NIST Cloud
The CELL-FREE Workshop sought to identify and prioritize actionable steps towards more reproducible and comparable cell-free systems for practical applications
William M. Pitts, Martin Werrel, Marco G. Fernandez, Mary A. Long, Evan A. Eisenberg, James J. Filliben, Cory D. Runyon
This is the first of three reports describing a study designed to assess the feasibility of utilizing small-scale measurements in a cone calorimeter as inputs
Spencer J. Breiner, Blake S. Pollard, Eswaran Subrahmanian
This report presents the summary of a workshop held at NIST on March 15-16, 2018 on the topic of applied category theory (ACT). The meeting had two main goals:
This report highlights the GCTC/SC3 Expo event held on July 11-12, 2019 to foster discussion of and collaboration to address the cybersecurity and privacy
Keith Knipling, Frederick Meisenkothen, Eric B. Steel
The biennial International Field Emission Symposium (IFES), recently renamed Atom Probe Tomography and Microscopy (APT&M), has been in existence since 1952. The
In recent years, numerous routing control plane anomalies, such as Border Gateway Protocol (BGP) prefix hijacking and route leaks, have resulted in denial-of
This publication describes an election results common data format specification for pre-election setup information and post-election results reporting. It
Ronald S. Ross, Victoria Y. Pillitteri, Richard Graubart, Deborah Bodeau, Rosalie McQuaid
This publication is used in conjunction with ISO/IEC/IEEE 15288:2015, Systems and software engineering--Systems life cycle processes, NIST Special Publication
This document is a specification for a common data format for cast vote records (CVR) produced by vote-capture devices such as ballot scanners. It supports the
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with
The potential for organizations to capture value from Big Data improves every day as the pace of the Big Data revolution continues to increase, but the level of
This document summarizes interfaces that are instrumental for the interaction with Clouds, Containers, and High Performance Computing (HPC) systems to manage
Wo L. Chang, Russell Reinsch, David Boyd, Carl Buffington
While opportunities exist with Big Data, the data can overwhelm traditional technical approaches. To advance progress in Big Data, the NIST Big Data Public
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. The growth of data is
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with
Arnold Johnson, Kelley L. Dempsey, Ronald S. Ross, Sarbari Gupta, Dennis Bailey
[Includes updates as of October 10, 2019] Guide for Security-Focused Configuration Management of Information Systems provides guidelines for organizations
First responders today can leverage large quantities of multimedia data from a variety of sources within and outside their agencies, and the scope of this data