Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Pubs

Single-photon Sources and Detectors Dictionary

Author(s)
Joshua Bienfang, Thomas Gerrits, Paulina Kuo, Alan Migdall, Sergey Polyakov, Oliver Slattery
The intention of this dictionary is to define relevant terms and metrics used in the characterization of single-photon detectors and sources with the goal to...

NIST SP 800-63-4: Digital Identity Guidelines

Author(s)
David Temoshok, Yee-Yin Choong, Ryan Galluzzo, Marie LaSalle, Andrew Regenscheid, Diana Proud-Madruga, Sarbari Gupta, Naomi Lefkovitz
These guidelines cover identity proofing, authentication, and federation of users (such as employees, contractors, or private individuals) interacting with...

NIST SP 800-63C-4:Digital Identity Guidelines - Federation and Assertions

Author(s)
Justin Richer, James L. Fenton, Naomi Lefkovitz, David Temoshok, Ryan Galluzzo, Andrew Regenscheid, Yee-Yin Choong
This guideline focuses on the use of federated identity and the use of assertions to implement identity federations. Federation allows a given credential...

NIST Handbook HB-150-3 2025 Edition

Author(s)
Derek Ho, Shelby Williamson, Hazel Richmond
NIST Handbook 150-3 presents the technical requirements and guidance for the accreditation of laboratories under the National Voluntary Laboratory Accreditation...

Estimating How Big: The Metric Estimation Game

Author(s)
Elizabeth Benham, Kristen Dill, Dinelka Jagoda, Maryanne Amanze, Yoon Thwel
The metric system (International System of Units, SI) is easy to use and learn. The Metric System Estimation Game is a fun, hands-on activity that helps...

Priming Additively Manufactured Cobalt-free Maraging Steels for Improved Properties via Changes to As-Built Microstructure

Author(s)
Alec Saville, Jake Benzing, Fan Zhang, Joseph Aroh, Jordan Weaver, Russell Evans, Nicholas Derimow, Samantha Webster, Nikolas Hrabe, Cassidy Allen, Newell Moser, May Martin, Jason Holm, Christin Aumayr, Tilman Seifert, Michael Hirtler
Supply chain challenges and health concerns have spurred the development of new Co-free, Cr-containing maraging steels with several new alloys already...

Analyzing Collusion Threats in the Semiconductor Supply Chain

Author(s)
Sanjay Rekhi, Kostas Amberiadis, Abir Ahsan Akib, Ankur Srivastava
In this work, we propose a comprehensive framework to analyze threats related to semiconductor supply chain. The framework introduces a metric which quantifies...

Guidelines for API Protection for Cloud-Native Systems

Author(s)
Ramaswamy Chandramouli, Zack Butcher
Modern enterprise IT systems rely on a family of application programming interfaces (APIs) for integration to support organizational business processes. Hence...

Eave and Vent Experiments (EaVE) Phase A

Author(s)
Christopher Brown, Alexander Maranghides, Giovanni Di Cristina Torres, Diana Bailey, Lucy Fox, Eric Link, Selvarajah Ramesh, Monica Flores, Shonali Nazare, J. Houston Miller, Erin McCaughey
This report documents a series of full-scale fire experiments conducted at the National Institute of Standards and Technology (NIST) to characterize the...

Implementing a Zero Trust Architecture: High-Level Document

Author(s)
Alper Kerman, Oliver Borchert, Gema Howell, Scott Rose, Murugiah Souppaya, Jason Ajmo, Yemi Fashina, Parisa Grayeli, Joseph Hunt, Jason Hurlburt, Nedu Irrechukwu, Joshua Klosterman, Oksana Slivina, Susan Symington, Allen Tan, Karen Scarfone, William Barker, Peter Gallagher, Aaron Palermo, Madhu Balaji, Adam Cerini, Rajarshi Das, Jacob Barosin, Kyle Black, Scott Gordon, Jerry Haskins, Keith Luck, Dale McKay, Sunjeet Randhawa, Brian Butler, Mike Delaguardia, Matthew Hyatt, Randy Martin, Peter Romness, Corey Bonnell, Dean Coclin, Ryan Johnson, Dung Lam, Darwin Tolbert, Tim Jones, Tom May, Christopher Altman, Alex Bauer, Marco Genovese, Andrew Campagna, John Dombroski, Adam Frank, Nalini Kannan, Priti Patil, Harmeet Singh, Mike Spisak, Krishna Yellepeddy, Nicholas Herrmann, Corey Lund, Farhan Saifudin, Madhu Dodda, Tim LeMaster, Ken Durbin, James Elliott, Earl Matthews, David Pricer, Joey Cruz, Tarek Dawoud, Carmichael Patton, Alex Pavlovsky, Brandon Stephenson, Clay Taylor, Bob Lyons, Vinu Panicker, Peter Bjork, Hans Drolshagen, Imran Bashir, Ali Haider, Nishit Kothari, Sean Morgan, Seetal Patel, Norman Wong, Zack Austin, Shawn Higgins, Rob Woodworth, Mitchell Lewars, Bryan Rosensteel, Don Coltrain, Wade Ellery, Deborah McGinn, Frank Briguglio, Ryan Tighe, Chris Jensen, Joshua Moll, Jason White, Joe Brown, Gary Bradt, Jeffrey Adorno, Syed Ali, Bob Smith
A zero trust architecture (ZTA) enables secure authorized access to enterprise resources that are distributed across on-premises and multiple cloud environments...
Was this page helpful?