An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The rapid development and wide application of distributed network systems have made network security – especially access control and data privacy – ever more important. Blockchain technology offers features such as decentralization, high confidence, and
This document describes a data structure, referred to as a data block matrix, that supports the ongoing addition of hash-linked records while also allowing for the deletion of arbitrary records, thereby preserving hash-based integrity assurance that other
The approved sensitive security parameter generation and establishment methods listed in this publication replace the ones listed in ISO/IEC 19790 Annex D and ISO/IEC 24759 paragraph 6.16, within the context of the Cryptographic Module Validation Program
Emanuel Knill, Scott Glancy, Daniel Cole, Shawn Geller
For many quantum systems intended for information processing, one detects the logical state of a qubit by integrating a continuously observed quantity over time. For example, ion and atom qubits are typically measured by driving a cycling transition and
Matthew Jablonwski, Duminda Wijesekera, Anoop Singhal
We describe a formalized systems theoretic method for creating cyber-physical system (CPS) risk overlays that augment existing tree-based models used in CPS risk and threat analysis processes. This top-down approach objectively scopes the system's threat
Siham Khoussi, N. Alan Heckert, Saddek Bensalem, Abdella Battou
Statistical model checking (SMC) is a formal verification method that combines simulations with statistical techniques to provide quantitative answers on whether a stochastic system satisfies some requirements with a controllable accuracy. SMC takes three
Gretchen Greene, Jared Ragland, Zachary Trautt, June W. Lau, Raymond Plante, Joshua Taillon, Adam Abel Creuziger, Chandler A. Becker, Joe Bennett, Niksa Blonder, Lisa Borsuk, Carelyn E. Campbell, Adam Friss, Lucas Hale, Michael Halter, Robert Hanisch, Gary R. Hardin, Lyle E. Levine, Samantha Maragh, Sierra Miller, Chris Muzny, Marcus William Newrock, John Perkins, Anne L. Plant, Bruce D. Ravel, David J. Ross, John Henry J. Scott, Christopher Szakal, Alessandro Tona, Peter Vallone
Instrumentation generates data faster and in higher quantity than ever before, and interlaboratory research is in historic demand domestically and internationally to stimulate economic innovation. Strategic mission needs of the NIST Material Measurement
Keith A. Stouffer, Joshua Lubell, Michael Pease, Evan K. Wallace
As supply chains become more complex and the origins of products become harder to discern, efforts are emerging that improve traceability of goods by exchanging traceability data records using blockchain and related technologies. This NIST NCCoE
Enterprise patch management is the process of identifying, prioritizing, acquiring, installing, and verifying the installation of patches, updates, and upgrades throughout an organization. Patching is more important than ever because of the increasing
Murugiah Souppaya, Alper Kerman, Karen Scarfone, Kevin Stine, Brian E. Johnson, Chris Peloquin, Vanessa Ruffin, Tyler Diamond, Mark Simos, Sean Sweeney
Despite widespread recognition that patching is effective and attackers regularly exploit unpatched software, many organizations do not adequately patch. There are myriad reasons why, not the least of which are that it's resource-intensive and that the act
Augmented Reality (AR) is an enhanced version of reality created by the use of technology to overlay digital information on an image of something being viewed through a device. AR has potential uses in many fields such as education, retail, repair
charles prado, vinay patil, Raghu N. Kacker, D. Richard Kuhn, M S Raunak
Combinatorial coverage measures have been defined and applied to a wide range of problems. These methods have been developed using measures that depend on the inclusion or absence of t-tuples of values in inputs and test cases. We extend these coverage