NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This manual is a users manual for the NIST DMIS Test Suite, version 2.2.1. DMIS (Dimensional Measuring Interface Standard) is a language for writing programs for coordinate measuring machines and other dimensional measurement equipment. The manual
Combinatorial testing can help detect problems like this early in the testing life cycle. The key insight underlying t-way combinatorial testing is that not every parameter contributes to every fault and most faults are caused by interactions between a
This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2009. It discusses all projects and programs within the Division, staff highlights, and publications.
Because they enable true interoperability, information exchange standards can help manufacturers reduce cost and improve product quality, but only if the standards are developed and implemented correctly. We will answer questions manufacturers and
With the proliferation of computers to process, store, and transfer information, manufacturers are suffering increasing costs due to information incompatibilities. The information incompatibility problem in manufacturing quality is costly to everyone
The NIST DMIS Test Suite, version 2.1.5, is described. The test suite is intended to serve two purposes, 1) to help users and vendors use version 5.1 of DMIS (the Dimensional Measuring Interface Standard) and 2) to provide utilities and test files for
David R. Kuhn, Raghu N. Kacker, Yu Lei, Justin Hunter
Developers of large data-intensive software often notice an interesting - though not surprising - phenomenon: when usage of an application jumps dramatically, components that have operated for months without trouble suddenly develop previously undetected
Robert D. Snelick, Leonard E. Gebase, Gavin W. O'Brien
We present an architectural framework for supporting conformance and interoperability testing among distributed healthcare systems. Healthcare organizations such as hospitals employ information systems that are composed of multiple, distributed
We examine several methods for testing disparate, heterogeneous systems that intercommunicate through message exchanges governed by a set of well defined message exchange rules. Rather than basing our assessment on a set of abstract applications, we will
David W. Flater, Philippe A. Martin, Michelle L. Crane
We describe a modification of the Petri Net Linear Form notation to support the rendering of Unified Modeling Language (UML) Activity Diagrams as human-readable text. This new notation, called the Activity Diagram Linear Form, allows UML Activity Diagrams
Correct data exchange is critical for ensuring reliable healthcare systems. Standards based systems are the foundation for achieving this goal. However, standards alone are not enough to ensure this promise; conformance and interoperability testing are
There are three digital forensic science projects: National Software Reference Library (NSRL), Computer Forensic Tool Testing (CFTT), Computer Forensic Reference Data Sets (CFReDS) currently providing resources for the digital investigator underway at the
Paul E. Black, Elizabeth N. Fong, Vadim Okun, Romain Gaucher
Software assurance tools are a fundamental resource for providing an assurance argument for today's software applications throughout the software development lifecycle (SDLC). Software requirements, design models, source code, and executable code are
John J. Garguilo, Sandra I. Martinez, Richard M. Rivello, Maria Cherkaoui
NIST researchers are collaborating with medical device experts to facilitate the development and adoption of standards for medical device communications throughout the healthcare enterprise as well as integrating it into the electronic health record. NIST
The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. This publication seeks to assist
Ramaswamy Chandramouli, Ketan Mehta, Pius A. Uzamere, Davie Simon, Nabil Ghadiali, Andrew P. Founds
In order to build the necessary PIV infrastructure to support common unified processes and government-wide use of identity credentials, NIST developed this test guidance document that ensures interoperability of PIV data. This document provides test
This bulletin provides information about testing and validation of personal identity verification (PIV) components and subsystems for conformance to Federal Information Processing Standard 201, Personal Identification Verification of Federal Employees and
The National Software Reference Library (NSRL) of the U.S. National Institute of Standards and Technology (NIST) collects software from various sources and publishes file profiles computed from this software (such as MD5 and SHA-1 hashes) as a Reference
The National Software Reference Library (NSRL) of the U.S. National Institute of Standards and Technology (NIST) collects software from various sources and publishes file profiles computed from this software (such as MD5 and SHA-1 hashes) as a Reference
The National Software Reference Library (NSRL) of the U.S. National Institute of Standards and Technology (NIST) collects software from various sources and publishes file profiles computed from this software (such as MD5 and SHA-1 hashes) as a Reference
The National Software Reference Library (NSRL) of the U.S. National Institute of Standards and Technology (NIST) collects software from various sources and publishes file profiles computed from this software (such as MD5 and SHA-1 hashes) as a Reference
This report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2004. It discusses all projects and programs within the Division, staff highlights, and publications. For many
The National Software Reference Library (NSRL) of the U.S. National Institute of Standards and Technology (NIST) collects software from various sources and publishes file profiles computed from this software (such as MD5 and SHA-1 hashes) as a Reference