An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Paul A. Grassi, James L. Fenton, Michael E. Garcia
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. The guidelines cover identity proofing and
Paul A. Grassi, Ray A. Perlner, Elaine M. Newton, Andrew R. Regenscheid, William E. Burr, Justin P. Richer, Naomi B. Lefkovitz, Jamie M. Danker, Mary F. Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. These guidelines focus on the authentication of
Paul A. Grassi, Naomi B. Lefkovitz, James L. Fenton, Jamie M. Danker, Yee-Yin Choong, Kristen Greene, Mary F. Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. This guideline focuses on the enrollment and
Paul A. Grassi, Ellen M. Nadeau, Justin P. Richer, Sarah K. Squire, James L. Fenton, Naomi B. Lefkovitz, Jamie M. Danker
This document and its companion documents, SP 800-63, SP 800-63A, and SP 800-63B, provide technical and procedural guidelines to agencies for the implementation of federated identity systems and for assertions used by federations. This publication
Traffic Lights are used to control traffic at road intersections. Typically, the employed traffic light control mechanism on the road operates according to a periodic schedule to change the light/color (red/yellow/green). In some places, a different
Audrey N. Tong, Lukasz L. Diduch, Jonathan G. Fiscus, Yasaman Haghpanah, Shudong Huang, David M. Joy, Kay Peterson, Ian M. Soboroff
Initiated in conjunction with DARPA's Low Resource Languages for Emergent Incidents (LORELEI) Program, the NIST LoReHLT (Low Re-source Human Language Technology) evaluation series seeks to incubate research on fundamental natural language processing tasks
Cloud Computing is emerging as a new paradigm that aims at delivering computing as a utility. For the cloud computing paradigm to be fully adopted and effectively used, it is critical that the security mechanisms are robust and resilient to malicious
With the rapid growth of the Internet, there has been increased interest in the use of computer models to study the dynamics of communication networks in the research literature. An important example of this has been the study of dramatic, but relatively
Patrick D. O'Reilly, Kristina G. Rigopoulos, Gregory A. Witte, Larry Feldman
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to carry
Olivera Kotevska, Aaron Gilad Kusne, Daniel Samarov, Ahmed Lbath, Abdella Battou
Today's cities generate tremendous amounts of data thanks to a boom in affordable smart devices and sensors. The resulting big data creates opportunities to develop diverse sets of context- aware services and systems, ensuring smart city services are
Phishing, the transmission of a message spoofing a legitimate sender about a legitimate subject with intent to perform malicious activity, causes a tremendous and rapidly-increasing amount of damage to American information systems and users annually. This
An Wang, Yang Guo, Songqing Chen, Fang Hao, T.V. Lakshman, Douglas C. Montgomery, Kotikalapudi Sriram
Network programmability is a salient feature of Software Defined Networking (SDN), which allows users to program network applications with the perception that the underlying network is a single device. While still at an early stage of development, SDN