NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Linda D. Crown, Tina Butcher, Steven E. Cook, Richard A. Harshman
Handbook 44 was first printed in 1949, having been preceded by similar handbooks of various designations and in several forms. This 2012 edition was developed
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-137, Information Security Continuous Monitoring (ISCM) for Federal
The SRM Spotlight is a newsletter published by the Measurement Services Division for users of NIST standard reference materials. The Spotlight announces new
The BACnet Data Source (BDS) was developed to be used as a component of the Virtual Cybernetic Building Testbed (VCBT) (1), in conjunction with work on various
This handbook compiles uniform laws and regulations developed by the Committee on Laws and Regulations of the National Conference on Weights and Measures (NCWM)
The hp version of the finite element method (hp-FEM) combined with adaptive mesh refinement is a particularly efficient method for solving partial differential
Hsiao-Ming M. Koo, Romain Gaucher, Charline Cleraux, Jenise Reyes Rodriguez
This document provides a set of metrics, including test suites and methods, to determine how well a particular source code security analysis tool conforms to
This guide describes how to use SteelVis and its associated programs. SteelVis has two main functions: (1) to translate a CIS/2 (CIMsteel Integration Standards)
This paper describes the development and implementation of a simulation testbed used to study the concept of employing intelligent agents to optimize the
Randall P. Wagner, Victor Nedzelnitsky, Steven E. Fick
A new NIST measurement service has been developed for determining the pressure sensitivities of American National Standards Institute and International
Current existing and proposed U.S. flammability standards for soft furnishings such as mattresses and upholstered furniture specify a standard cigarette as
David A. Waltermire, Chalres Schmidt, Karen Scarfone, Neal Ziring
This report specifies the data model and Extensible Markup Language (XML) representation for the Extensible Configuration Checklist Description Format (XCCDF)
David A. Waltermire, Stephen D. Quinn, Adam M. Halbardier, Karen Scarfone
This document provides the definitive technical specification for version 1.2 of the Security Content Automation Protocol (SCAP). SCAP consists of a suite of
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks
Anti-sweat heaters are often used to prevent condensation from forming on the outer surface of refrigerated cabinets. Variable anti-sweat heaters (VASH)
Article for Weights and Measures Division "Connections" newsletter. Article discusses a suggested procedure for weights and measures officials to verify the
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-128, Guide to Security-Focused Configuration Management of Information
Elham Tabassi, Patrick J. Grother, Wayne J. Salamon
Iris is rapidly gaining acceptance and support as a viable biometric. Several large scale identity management applications are either using or considering iris
This document is the action plan to improve the suitability of Health Level Seven (HL7) Implementation Guide for CDA Release 2 Quality Reporting Document
This document analyzes the suitability of Quality Reporting Data Architecture (QRDA) to meet its purpose and to support the US Department of Health and Human
This report defines the Trust Model for Security Automation Data 1.0 (TMSAD), which permits users to establish integrity, authentication, and traceability for
Christofer J. McGinnis, Dylan J. Yaga, Fernando L. Podio
The current version of the ANSI/NIST-ITL standard "Data Format for the Interchange of Fingerprint, Facial & Other Biometric Information" is specified in two
This document outlines the basic process for the distribution of election material including registration material and blank ballots to UOCAVA voters. It
Andrew R. Regenscheid, Geoff Beier, Santosh Chokhani, Paul Hoffman, Jim Knoke, Scott Shorter
IT systems used to support UOCAVA voting face a variety of threats. If IT systems are not selected, configured and managed using security practices commensurate
This document is the action plan to improve the suitability of Health Level Seven (HL7) Continuity of Care Document (CCD) to support the Department of Health
This document analyzes the suitability of the Health Level Seven (HL7) Continuity of Care Document (CCD) specification to support the US Department of Health