Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Pubs

Ballot Definition Common Data Format Specification

Author(s)
Benjamin Long, John Dziurłaj
This publication describes a ballot definition common data format for the interchange of logical and physical ballot style information. It contains a UML

Micro Common Data Format Specification

Author(s)
Benjamin Long, John Dziurłaj
This specification describes a data format for space-constrained environments, such as the placement of machine readable data on paper. The specification is

What does the pixel measure?

Author(s)
David W. Flater
The pixel is often used as a unit of measurement in information technology. Unfortunately, there is not a simple, consistently-applicable answer to what it is a

On Migrating ISO 10303 PMI Models to a Common Core

Author(s)
Allison Barnard Feeney, Thomas Thurman
Industrial users of ISO 10303 STandard for the Exchange of Product Model Data (STEP) protocols needed the ability to exchange design product data that is in

Cannabis Quality Assurance Program: Exercise 2 Toxic Elements Final Report

Author(s)
Chuck Barber, Colleen E. Bryan Sallee, Carolyn Burdette, Shaun Kotoski, Melissa M. Phillips, Walter Brent Wilson, Laura Wood
In 2020, NIST launched CannaQAP to improve the comparability of the analytical measurements of cannabis and cannabis-derived products in forensic and cannabis

Wind-Driven Fire Spread to a Structure from Fences and Mulch

Author(s)
Kathryn Butler, Erik L. Johnsson, Alexander Maranghides, Shonali Nazare, Marco G. Fernandez, Rachel McIntyre, William Saar, Mariusz Zarzecki, Wei Tang, Eric Auth, Michael Pryor, Colin McLaughlin
A series of field experiments was conducted to examine the effects on fire spread toward a structure for combustible fences and mulch under conditions that may

Supply Chain Assurance: Validating the Integrity of Computing Devices

Author(s)
Nakia R. Grayson, Murugiah Souppaya, Andrew Regenscheid, Tim Polk, Christopher Brown, Karen Scarfone, Chelsea Deane
Product integrity and the ability to distinguish trustworthy products is a critical foundation of C-SCRM. Authoritative information regarding the provenance and

Health Assessment Measurements Quality Assurance Program: Exercise 7 Final Report

Author(s)
Chuck Barber, Carolyn Burdette, Hugh Hayes, Monique Johnson, Shaun Kotoski, Jacolin Murray, Melissa M. Phillips, Kate Rimmer, Andrea Yarberry, Laura J. Wood
The Health Assessment Measurements Quality Assurance Program (HAMQAP) was launched in collaboration with the National Institutes of Health (NIH) Office of

Using Business Impact Analysis to Inform Risk Prioritization and Response

Author(s)
Stephen Quinn, Nahla Ivy, Julie Chua, Matthew Barrett, Greg Witte, Larry Feldman, Daniel Topper, Robert Gardner
While business impact analysis (BIA) has historically been used to determine availability requirements for business continuity, the process can be extended to

Guide to a Secure Enterprise Network Landscape

Author(s)
Ramaswamy Chandramouli
Access to multiple cloud services, the geographic spread of enterprise Information Technology (IT) resources (including multiple data centers), and the

Engineering Trustworthy Secure Systems

Author(s)
Ronald S. Ross, Mark Winstead, Michael McEvilley
This publication describes a basis for establishing principles, concepts, activities, and tasks for engineering trustworthy secure systems. Such principles

Measuring the Common Vulnerability Scoring System Base Score Equation

Author(s)
Peter Mell, Jonathan Spring, Dave Dugal, Srividya Ananthakrishna, Francesco Casotto, Troy Fridley, Christopher Ganas, Arkadeep Kundu, Phillip Nordwall, Vijayamurugan Pushpanathan, Daniel Sommerfeld, Matt Tesauro, Christopher Turner
This work evaluates the validity of the Common Vulnerability Scoring System (CVSS) Version 3 ''base score'' equation in capturing the expert opinion of its
Was this page helpful?