Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Pubs

Assessment of Access Control Systems

Author(s)
Chung Tong Hu, David F. Ferraiolo, David R. Kuhn
Access control is perhaps the most basic aspect of computer security. Nearly all applications that deal with financial, privacy, safety, or defense include some...

Focus 3D Telemodeling Tool: GUI Design for Iteration 1

Author(s)
Matthew L. Aronoff, John V. Messina, Eric D. Simmon
The Focus 3D Telemodeling Tool was designed as a novel graphical interface to data modeling for standards development. This paper describes the design intent...

Ideal Gas Database, version 2.0

Author(s)
Vladimir Diky, Michael D. Frenkel
The NIST TRC Ideal Gas Database provides information on the most important thermodynamic properties (heat capacities, entropies, enthalpies, Gibbs free energies...

Guide to Computer Security Log Management

Author(s)
Karen A. Scarfone, Murugiah Souppaya
The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information...

Guidelines for Media Sanitization

Author(s)
Richard L. Kissel, Matthew A. Scholl, Steven Skolochenko, Xiang Li
Information systems capture, process, and store information using a wide variety of media. This information is located not only on the intended storage media...

Message Validation with a Semantic Reasoning Tools

Author(s)
Peter O. Denno, Nenad Ivezic
This paper describes challenges encountered in the development of a tool to validate OASIS UBL-based (Universal Business Language) messages. The software tool...

Guide to Integrating Forensic Techniques into Incident Response

Author(s)
Timothy Grance, Suzanne Chevalier, Karen A. Scarfone, Hung Dang
This publication is intended to help organizations in investigating computer security incidents and troubleshooting some information technology (IT) operational...

Personal Identity Verification Demonstration Summary

Author(s)
Erika McCallister, Hildegard Ferraiolo
This paper provides a summary of the NIST Personal Identity Verification (PIV) Demonstration. The PIV Demonstration took place from May 15 to June 14, 2006...
Was this page helpful?