NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This document analyzes the suitability of the ASTM Continuity of Care Record (CCR) specification to support the US Department of Health and Human Services (HHS) Meaningful Use. It is part of the Healthcare Information Technology (HIT) Standards Analysis
This document analyzes the suitability of the Health Level Seven (HL7) Continuity of Care Document (CCD) specification to support the US Department of Health and Human Services (HHS) Meaningful Use. It is part of the Healthcare Information Technology (HIT
This document is the action plan to improve the suitability of ASTM Continuity of Care Record (CCR) to support the Department of Health and Human Services Stage 1 Meaningful Use. Lantana Consulting Group prepared this report for the National Institute of
Julien M. Amelot, Ya-Shian Li-Baboud, Clement Vasseur, Jeffrey Fletcher, Dhananjay Anand, James Moyne
The numerous time synchronization performance requirements in the Smart Grid entails the need for a set of common metrics and test methods to verify the ability of the network system and its components to meet the power industry's accuracy, reliability and
Due to ultra-low power communication, BAN is most likely a victim system. Interference from other BANs or other coexisting wireless communication systems may be significant. Power control is usually inefficient and may even cause more interference in an
The term "lights-out" for AFIS ten-print fingerprint operations has been around for many years and is generally understood to mean "no human intervention is involved." But is this term appropriate for AFIS latent print operations? This IR examines seven
Fang Liu, Jin Tong, Jian Mao, Robert B. Bohn, John V. Messina, Mark L. Badger, Dawn M. Leaf
The adoption of cloud computing into the Federal Government and its implementation depend upon a variety of technical and non-technical factors. A fundamental reference point, based on the NIST definition of Cloud Computing, is needed to describe an
In this paper, an energy-efficient strategy is proposed for tracking a moving target in a mobile sensor network. The energy expenditure of the sensors in the network is assumed to be due to communication, sensing and movement. First, the target area is
This document completes the review of the NCPDP SCRIPT standard by reporting on several aspects related to its suitability as a standard to support Meaningful Use, including: completeness, correctness and internal consistency of the standard, ease of
This document summarizes the major testability issues raised by the NCPDP SCRIPT Implementation Guide Version 10.6. The ELR Implementation Guide is intended as a means of testing and certifying Electronic Health System (EHRS) for Meaningful Use.
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-82, Guide to Industrial Control Systems Security: Recommendations of the National Institute of Standards and Technology. The publication was written by Keith Stouffer
Vladimir V. Marbukh, Kamran Sayrafian, Hamid Mahboubi, Ahmadreza Momeni, Amir G. Aghdam
Collaborative sensor relocation has potential to improve Mobile Sensor Network (MSN) performance while prolonging its life span by conserving sensor battery energy. However, lack of centralized control, variety of performance criteria, numerous
Quantifying security risk is an important and yet difficult task in enterprise network risk management, critical for proactive mission assurance. Even though metrics exist for individual vulnerabilities, there is currently no standard way of aggregating
Michael D. Hogan, Fang Liu, Annie W. Sokol, Tong Jin
The NIST Cloud Computing Standards Roadmap Working Group has surveyed the existing standards landscape for security, portability, and interoperability standards/models/studies/use cases, etc., relevant to cloud computing. Using this available information
Today's information systems face sophisticated attackers who combine multiple vulnerabilities to penetrate networks with devastating impact. The overall security of an enterprise network cannot be determined by simply counting the number of vulnerabilities
Jeffrey Fletcher, Dhananjay Anand, Maruthi Chaluvadi, Julien M. Amelot, Ya-Shian Li-Baboud, James Moyne
Clock synchronization is becoming an increasingly important characteristic of modern wide area monitoring and control systems such as the power grid. It provides an opportunity to coordinate control actions and measurement instants across hundreds of miles
We argue for the deployment of sources of randomness on the Internet for promoting and enhancing electronic commerce. We describe, in rough detail, our planned implementation of such a source.
In recent years, substantial research has been devoted to monitoring and predicting performance degradations in real-world complex systems within large entities such as nuclear power plants, electrical grids, and distributed computing systems. Special
With the increasing maturity of various cloud service delivery models (Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS)) and deployment models (Private, Community, Public, Hybrid), the security risk profile of
In this paper, we outline an approach that can be used to predict macroscopic dynamics when new components are deployed in a large distributed system. Our approach combines two main methods: scale reduction and multidimensional data analysis techniques
Analyzing desired generic properties of hash functions is an important current area in cryptography. For example, in Eurocrypt 2009, Dodis, Ristenpart and Shrimpton introduced the elegant notion of "Preimage Awareness" (PrA) of a hash function H^P , and
Conventional approach to cross-layer network optimization assumes elastic users adjusting their bandwidth requirements in response to the resource congestion prices. This assumption leads to the Network Utility Maximization (NUM) framework. However, often
In 2005 the International Standards Organization published ISO/IEC 25062 Common Industry Format (CIF) for Usability Test Reports. This standard focused on documenting the results of usability testing in a consistent format in terms of user effectiveness
AbstractConventional approach to cross-layer network optimization assumes elastic users adjusting their bandwidth requirements in response to the resource congestion prices. This assumption leads to Network Utility Maximization (NUM) framework with