Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Pubs

Guide to Application Whitelisting

Author(s)
Adam Sedgewick, Murugiah Souppaya, Karen Scarfone
An application whitelist is a list of applications and application components that are authorized for use in an organization. Application whitelisting

Policy Machine: Features, Architecture, and Specification

Author(s)
David F. Ferraiolo, Serban I. Gavrila, Wayne Jansen
The ability to control access to sensitive data in accordance with policy is perhaps the most fundamental security requirement. Despite over four decades of

The NIST Plan for Providing Public Access to Results of Federally Funded Research

Author(s)
Katherine E. Sharpless, Regina L. Avila, Sally S. Bruce, Wo L. Chang, Robert M. Dimeo, Virginia Covahey, Alan K. Dohne, Heather M. Evans, Aaron P. Fein, Donna J. Kimball, Andrea M. Medina-Smith, Alan E. Munter, James K. Olthoff, Dianne L. Poster, Kathleen M. Roberts, Susannah B. Schiller, John H. Scott, Barbara P. Silcox, James A. St Pierre, Mark D. Stiles
Documentation of the evolution of NIST's plan for providing public access to results of federally funded research is provided, including the plan itself

De-Identification of Personal Information

Author(s)
Simson L. Garfinkel
Abstract: De-identification removes identifying information from a dataset so that individual data cannot be linked with specific individuals. De-identification

Protection of Controlled Unclassified Information

Author(s)
Ronald S. Ross, Kelley L. Dempsey, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information presented in NIST SP 800-171: Protecting Controlled Unclassified Information in Nonfederal Information Systems and

(NISTIR 7804-1)Technical Evaluation, Testing, and Validation of the Usability of Electronic Health Records: Empirically Based Use Cases for Validating Safety-Enhanced Usability and Guidelines for Standardization

Author(s)
Svetlana Z. Lowry, Mala Ramaiah, Emily S. Patterson, Sandra S. Prettyman, Debora Simmons, David Brick, Latkany A. Paul, Michael C. Gibbons, Sheryl L. Taylor
This document provides the empirical rationale for critical patient safety related usability guidelines for standardization and requirements for validation
Was this page helpful?