An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Hildegard Ferraiolo, Larry Feldman, Gregory A. Witte
NIST has recently released Special Publication (SP) 800-157, Guidelines for Derived Personal Identity Verification (PIV) Credentials. Itto provide the technical details for a system by which mobile devices such as smart phones and tables are provisioned
Virtualized Infrastructures are increasingly deployed in many data centers. One of the key components of this virtualized infrastructure is the virtual network - a software-defined communication fabric that links together the various Virtual Machines (VMs)
Hildegard Ferraiolo, David A. Cooper, Salvatore Francomacaro, Andrew R. Regenscheid, Jason Mohler, Sarbari Gupta, William E. Burr
This recommendation provides technical guidelines for the implementation of standards-based, secure, reliable, interoperable PKI-based identity credentials that are issued by Federal departments and agencies to individuals who possess and prove control
Yi Cheng, Julia Deng, Jason Li, Scott DeLoach, Anoop Singhal, Xinming Ou
Discussion of challenges and ways of improving Cyber Situational Awareness dominated our previous chapters. However, we have not yet touched on how to quantify any improvement we might achieve. Indeed, to get an accurate assessment of network security and
Nicholas G. Paulter Jr., Todd R. Goodall, Alan C. Bovik
Natural Scene Statistics (NSS) produces powerful perceptually relevant tools that have been highly successful in image quality analysis of visible light images. These NSS capture statistical regularities in the physical world and thus can be applicable to
[Superseded by SP 800-53A Rev. 5 (January 2022): https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=933932] This publication provides a set of procedures for conducting assessments of security controls and privacy controls employed within federal
Knowing what makes a software systems vulnerable to attacks is critical, as software vulnerabilities hurt security, reliability, and availability of the system as a whole. In addition, understanding how an adversary operates is essential to effective cyber
Kevin L. Mills, James J. Filliben, Junfei Xie, Yan Wan, Yi Zhou, Yu Lei
Effective uncertainty evaluation is a critical step toward real-time and robust decision-making for complex systems in uncertain environments. A Multivariate Probabilistic Collocation Method (M-PCM) was developed to effectively evaluate system uncertainty
Apostol T. Vassilev, Larry Feldman, Gregory A. Witte
The Cryptographic Module Validation Program (CMVP) validates cryptographic modules for compliance with Federal Information Processing Standard (FIPS) Publication 140-2, Security Requirements for Cryptographic Modules, and other cryptography based standards
Peter Ott, Mohammed H. Al Shakhs, Henri Lezec, Kenneth J. Chau
It is sometimes possible to image using a flat lens consisting of planar, uniform media. There is conceptual division between theoretical flat lens proposals, which require exotic properties such as negative index or counter-intuitive behavior such as
Static analysis testing of software source code is necessary but not sufficient. Over 40 percent of the Common Weakness Enumeration (CWE) are likely to be introduced in the architecture and design phase of the development life cycle. By their very nature
Jennifer R. Bergstrom, Kristen K. Greene, David C. Hawkins, Christian Gonzalez
While measuring physiological responses is a common practice in the field of neuroscience, it is rare in the usability arena and in password usability studies, in particular. This is unfortunate, as the use of such implicit measures could complement more
A unitary operator that satisfies the constant Yang-Baxter equation immediately yields a unitary representation of the braid group Bn for every n ≥ 2. If we view such an operator as a quantum-computational gate, then topological braiding corresponds to a
This report provides an example application of screening techniques in experimental computer science, including validation and selection of metrics and measures, the screening experiment itself, and supporting statistical methods. Together with related
Sungseob Lee, SuKyoung Lee, Kim KyungSoo, David W. Griffith, Nada T. Golmie
As data traffic demand in cellular networks grows exponentially, operators need to add new cell sites to keep up; unfortunately, it is costly to build and operate macrocells. Moreover, it may not be possible to obtain the needed approvals for additional
Peter Bajcsy, Antoine Vandecreme, Mary C. Brady, Phuong Nguyen
Our objective is to lower the barrier of executing spatial image computations in a computer cluster/cloud environment instead of in a desktop/laptop computing environment. We research two related problems encountered during an execution of spatial
The major benefits of the emerging cloud computing infrastructure include elimination of the fixed cost and reduction in the marginal cost for the users due to the economy of scale and dynamic resource sharing. This paper argues that these unquestionable
The National Institute of Standards and Technology (NIST), consistent with its mission, has a technology leadership role in support of United States Government (USG) secure and effective adoption of the Cloud Computing model to reduce costs and improve
Kristen Greene, Melissa A. Gallagher, Franklin Tamborello
Given the high propensity of users motoric errors with smaller touchscreen usa-buttons, knowing the endpoint distributions for finger- based pointing and tapping is especially important for higher-fidelity predictive modeling of tasks on such devices. One
Xing Chen, Wei Yu, David W. Griffith, Nada T. Golmie, Guobin Xu, Chao Lu
Recently, there are growing concerns about smart grid security and resilience. The performance of smart grid may suffer from component failures or targeted attacks. A sophisticated adversary may target critical components in a smart grid, leading to
Wei Yu, Dou An, David W. Griffith, Qingyu Yang, Guobin Xu
Developing effective energy resource management in the smart grid is challenging because the entities in both the demand and supply sides experience various uncertainties. This paper addresses the issue of quantifying uncertainties on the energy demand
Performance is an important facet of software quality, and application profiling tools are the instruments used to measure software performance at the function and application levels. The most powerful measurement method available in application profiling
The most important drawback to code-based cryptography has historically been its large key sizes. Recently, several promising approaches have been proposed to reduce keysizes. In particular, significant keysize reduction has been achieved by using