An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Martial Michel, Edmond J. Golden III, Olivier Serres, Ahmad Anbar, Tarek El-Ghazawi
Due to its availability, Cloud computing is the de facto platform of choice for big data, where Big Data as a Service (BDaaS) is believed to be the next best thing. In this book chapter we will first introduce cloud computing, defining the advantages it
Marc A. Weiss, Alison Silverstein, Francis Tuffner, Ya-Shian Li-Baboud
Today, the principal way that power system owners and operators use precision timing is for fault recording, protection system operation and in synchrophasor applications. Synchrophasor applications have among the most stringent precision time and time
This paper reports on quantification and management of inherent systemic risk/performance tradeoff in the cloud computing model. We view Cloud as a Complex System and associate the systemic risks with a possibility of system phase transition to the
YaShian Li-Baboud, Cuong T. Nguyen, Marc A. Weiss, Dhananjay Anand, Allen R. Goldstein, Jason Allnutt, Bob Noseworthy, Ravi Subramaniam
Correct time and timing is one of the foundational elements in enabling the communication and orchestration of technologies for accurate and optimal wide area monitoring, protection and control in the power industry. NIST and IEEE-SA conducted a workshop
Petru S. Manescu, Young Jong Lee, Charles Camp, Marcus T. Cicerone, Mary C. Brady, Peter Bajcsy
This paper addresses the problem of classifying materials from microspectroscopical images at each pixel. The challenges lie in identifying discriminatory spectral features and obtaining accurate and interpretable models relating spectra and class labels
Sean W. Brooks, Michael E. Garcia, Naomi B. Lefkovitz, Suzanne Lightman, Ellen M. Nadeau
This document provides an introduction to the concepts of privacy engineering and risk management for federal information systems. These concepts establish the basis for a common vocabulary to facilitate better understanding and communication of privacy
Supply chain management is critically dependent on trusted email with authentication systems that work on a global scale. Solutions to date have not adequately addressed the issues of email forgery, confidentiality, and sender authenticity. The IETF DANE
Cloud computing has undergone rapid expansion throughout the last decade. Many companies and organizations have made the transition from traditional data centers to the cloud due to its flexibility and lower cost. However, traditional data centers are
This Recommendation specifies four types of SHA-3-derived functions: cSHAKE, KMAC, TupleHash, and ParallelHash, each defined for a 128- and 256-bit security strength. cSHAKE is a customizable variant of the SHAKE function, as defined in FIPS 202. KMAC (for
This bulletin summarizes the information presented in NIST SP 800-160: Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. The publication addresses the engineering-driven
Passwords are tightly interwoven with the digital fabric of our current society. Unfortunately, passwords that provide better security generally tend to be more complex, both in length and composition. Complex passwords are problematic both cognitively and
A software system under development at NIST, called SHOECALC, will be described. It is designed to help both researchers and footwear examiners in the assessment of metrics or scoring procedures that provide objective characterizations of correspondences
Development of smart city services is presently hindered because the data is too heterogeneous, despite the increasing availability of data in open data initiatives. We determined metadata fields and semantics for our proposed model after a survey of other
The efficiency of the emerging smart power grid infrastructure critically depends on the ability of the communication network to deliver real-time energy prices to the consumers. This papers contribution is twofold. First, it derives the relevant Quality
This paper proposes a framework for systemic risk aware engineering of large-scale networks. Economics drives two major evolutionary trends in networked system design/operation: (a) towards the boundary of the system capacity/operational region, where all
Mylene Simon, Joe Chalfoun, Peter Bajcsy, Mary C. Brady
The paper addresses the problem of traceability and variability of image features used in a plethora of image-based scientific studies. Image features are extracted using software packages that vary in terms of programming languages, theoretical formulas
Yoshikazu Hanatani, Naoki Ogura, Yoshihiro Ohba, Lidong Chen, Subir Das
Controlling a large number of devices such as sensors and smart end points, is always a challenge where scalability and security are indispensa-ble. This is even more critical when it comes to configuration updates to a large number of such devices when
A major problem of the grid system is identifying the source of abnormal behaviors. It is particularly important to identify the areas in which the grid system suffers from power deficiencies due to fault or voltage instability. Phasor Measurement Units
As Additive Manufacturing (AM) matures as a technology, predictive modeling methods have become increasingly sought after as a means for process planning, monitoring and control. For many, predictive modeling offers the potential to complement, and in some
Vladimir V. Marbukh, Martina Barbi, Kamran Sayrafian, Mehdi Alasti
IEEE802.15.6 is a radio interface standard for a wireless connectivity of wearable and implantable sensors and actuators located inside or in close proximity to the human body i.e., Body Area Network (BAN). Medical applications impose stringent
We investigate a hybrid quantum system consisting of spatially separated resonant exchange qubits, defined in three-electron semiconductor triple quantum dots, that are coupled via a super- conducting transmission line resonator. By analyzing three
[Superseded by NIST SP 800-160 (November 2016, including updates as of 01-03-2016)] With the continuing frequency, intensity, and adverse consequences of cyber-attacks, disruptions, hazards, and other threats to federal, state, and local governments, the