NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Attribute-based access control systems rely upon attributes to not only define access control policy rules but also enforce the access control. Attributes need
Lisa Ng, Stephen M. Zimmerman, Jeremy Good, Brian Tool, Steven Emmerich, Andrew Persily
Minimum outdoor air ventilation rates specified in standards such as ASHRAE Standard 62.2 are generally based on envelope airtightness, building floor area
For homes to become active participants in a smart grid, intelligent control algorithms are needed to facilitate autonomous interactions that take homeowner
Ramaswamy Chandramouli, Anoop Singhal, Duminda Wijesekera, Changwei Liu
Hardware/Server Virtualization is a key feature of data centers used for cloud computing services and enterprise computing that enables ubiquitous access to
Albert N. Link, Zachary T. Oliver, Gretchen B. Jordan, Christopher Hayter
The purpose of this report is to present a series of analyses of technology transfer activities across federal agencies and their research laboratories.
Alan C. O’Connor, Michael P. Gallaher, Kyle Clark-Sutton, Daniel Lapidus, Zack T. Oliver, Troy J. Scott, Dallas W. Wood, Manuel A. Gonzalez, Elizabeth G. Brown
The focus of our analysis was on the estimation of the economic benefits of GPS to the U.S. private sector. We provide estimates from two perspectives. First
Matthew P. Barrett, Nicole D. Keller, Stephen Quinn, Matthew Smith
This document provides instructions and definitions for completing the Cybersecurity Framework (CSF) Online Informative References (OLIR) spreadsheet template
This report summarizes recent technical work of the Applied and Computational Sciences Division of the Information Technology Laboratory at the National
This publication contains standard operating procedures for calibrations that were not previously published in other NIST Office of Weights and Measures
NIST Special Publication (SP) 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best
The National Institute of Standards and Technology has constructed a testbed to measure the performance impact of cybersecurity technologies on Industrial
The National Institute of Standards and Technology has constructed a testbed to measure the performance impact of cybersecurity defenses on Industrial Control
Zachary H. Levine, Timothy Blattner, Adele Peskin, Adam L. Pintar
Fundamental limits for the calculation of scattering corrections within X-ray computed tomography (CT) are found within the independent atom approximation from
Kenneth E. Kimble, Richard Candell, Kamel S. Saidi
Emergency and disaster situations are unavoidable. Earthquakes, severe weather, bomb threats, and war are an unfortunate reality. Firefighters, bomb technicians
Charles A. Barber, Jeanice M. Brown Thomas, Carolyn Q. Burdette, Johanna Camara, Stephen E. Long, Melissa M. Phillips, Benjamin J. Place, Catherine A. Rimmer, Laura J. Wood, Lee L. Yu
The NIST Health Assessment Measurements Quality Assurance Program (HAMQAP) was launched in collaboration with the National Institutes of Health (NIH) Office of
Keith A. Stouffer, Timothy A. Zimmerman, CheeYee Tang, Joshua Lubell, Jeffrey A. Cichonski, John McCarthy
This document provides the Cybersecurity Framework (CSF) implementation details developed for the manufacturing environment. The "Manufacturing Profile" of the
This bulletin summarizes the information found in FIPS 140-3: Security Requirements for Cryptographic Modules which is applicable to all federal agencies that
These specifications and tolerances establish the minimum requirements for Field Standards used by State and local weights and measures officials and others in
These specifications and tolerances are recommended as minimum requirements for standards used by state and local weights and measures officials and others in