An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Iris recognition has the potential to be extremely accurate, but it is highly dependent on the quality of the input data. Iris occlusion, off-axis gaze, blurred images, and iris rotation are common problems that can make recognizing individuals more
In the last few years, the need to design new cryptographic hash functions has led to the intense study of when desired hash multi-properties are preserved or assured under compositions and domain extensions. In this area, it is important to identify the
Allowing selfish agents to acquire and exploit system information has both positive and negative effects on the overall performance of resource allocation systems. The positive effect results from reduction in the uncertainty inherently present in large
This paper reports on work in progress on modeling of the effect of packet-level TCP congestion avoidance dynamics on flow-level Internet performance and management including buffer sizing under arriving/departing flows. The proposed model accounts for the
Patrick J. Grother, George W. Quinn, James R. Matey, Mei L. Ngan, Wayne J. Salamon, Gregory P. Fiumara, Craig I. Watson
Iris recognition has long been held as an accurate and fast biometric. In the first public evaluation of one-to-many iris identification technologies, this third activity in the Iris Exchange (IREX) program has measured the core algorithmic efficacy and
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-144, Guidelines on Security and Privacy in Public Cloud Computing. These new guidelines, which were written by Wayne Jansen of Booz Allen Hamilton and Tim Grance of
David F. Ferraiolo, Jeffrey M. Voas, George Hurlburt
This paper discusses system security policies. System policies are the set of rules that when implemented afford a strategy for the protection of information. The policy objectives are diverse and span the social-economic spectrum. System policies govern
Julien M. Amelot, YaShian Li-Baboud, Clement Vasseur, Jeffrey Fletcher, Dhananjay Anand, James Moyne
The numerous time synchronization performance requirements in the Smart Grid entails the need for a set of common metrics and test methods to verify the ability of the network system and its components to meet the power industry�s accuracy, reliability and
As the usage of 3D models increases, so does the importance of developing accurate 3D shape retrieval algorithms. Most prominently, shape descriptors are used to describe the geometric and topological properties of objects and compared to determine two
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-153, Guidelines for Securing Wireless Local Area Networks (WLANs): Recommendations of the National Institute of Standards and Technology. The publication was written by
George W. Arnold, Gerald FitzPatrick, David A. Wollman, Thomas L. Nelson, Paul A. Boynton, Galen H. Koepke, Allen R. Hefner Jr., Cuong Nguyen, Jeffrey A. Mazer, Dean Prochaska, Marianne M. Swanson, Tanya L. Brewer, Victoria Yan Pillitteri, David H. Su, Nada T. Golmie, Eric D. Simmon, Allan C. Eustis, David Holmberg, Steven T. Bushby, Michael D. Janezic, Ajitkumar Jillavenkatesa
The Energy Independence and Security Act (EISA) of 2007 requires that NIST develop a framework of standards for the Smart Grid. This document is the second release of the framework first published in January, 2010. It covers the activities and outputs of
Angelos Stavrou, Jeff Voas, Tom T. Karygiannis, Stephen Quirolgico
Recent advancements in hardware have increased the computing power, memory, storage, and wireless connectivity of handheld mobile devices. Smart-phone devices are used for everyday activities that range from Maps and Geo-location tagging to banking. Indeed
Smart cards are now being extensively deployed for identity verification(smart identity tokens) for controlling access to Information Technology (IT) as well as physical resources. Depending upon the sensitivity of the resources and the risk of wrong
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-126 Rev. 2, The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2. This publication was written by David Waltermire and
This brochure describes the Information Technology Laboratory (ITL) at the National Institute of Standards and Technology, its mission, highlights, and research programs.
The value of information exchange standards development is described and defended against other data exchange interoperability options in the context of dimensional metrology in manufacturing.
Frederic J. de Vaulx, Paul Khouri Saba, Marcus W. Newrock, Bertrand C. Stivalet
As mobile devices capabilities keep on improving, todays mobile software ecosystem evolves at an unprecedented speed. This evolution makes mobile software development more common and critical. Moreover, the ever-increasing number of new development
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-63-1, Electronic Authentication Guideline. This revised guideline, which supersedes an earlier guideline, NIST SP 800-63, updates information about, and recommendations
We study the problem of reconstructing an unknown matrix M of rank r and dimension d using O(rd poly log d) Pauli measurements. This has applications in quantum state tomography, and is a non- commutative analogue of a well-known problem in compressed
Cloud computing can and does mean different things to different people. The common characteristics most interpretations share are on-demand scalability of highly available and reliable pooled computing resources, secure access to metered services from
This article explains problems and approaches to designing permission structures for role based access control. RBAC and the RBAC standard are summarized, common approaches to role engineering described, and the current status and plans for the INCITS role
Efficient deployment strategies are proposed for a mobile sensor network, where the coverage priority of different points in the field is specified by a prescribed weight function. According to these strategies, each sensor detects coverage holes within
In this paper, we present a multi-gate mesh network architecture that has been developed to ensure high performance and reliability under emergency conditions when a system expects to receive power outage notifications and exchanges. In order to handle the
Francine K. Amon, Dennis D. Leber, Nicholas Paulter
We describe a method by which the evaluation and characterization of the performance of an imager can be done objectively and scientifically, that is, without routine operator interpretation. Although this method is demonstrated herein for passive long