An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Quantifying security risk is an important and yet difficult task in enterprise network risk management, critical for proactive mission assurance. Even though metrics exist for individual vulnerabilities, there is currently no standard way of aggregating
Michael D. Hogan, Fang Liu, Annie W. Sokol, Tong Jin
The NIST Cloud Computing Standards Roadmap Working Group has surveyed the existing standards landscape for security, portability, and interoperability standards/models/studies/use cases, etc., relevant to cloud computing. Using this available information
Today's information systems face sophisticated attackers who combine multiple vulnerabilities to penetrate networks with devastating impact. The overall security of an enterprise network cannot be determined by simply counting the number of vulnerabilities
Jeffrey Fletcher, Dhananjay Anand, Maruthi Chaluvadi, Julien M. Amelot, Ya-Shian Li-Baboud, James Moyne
Clock synchronization is becoming an increasingly important characteristic of modern wide area monitoring and control systems such as the power grid. It provides an opportunity to coordinate control actions and measurement instants across hundreds of miles
We argue for the deployment of sources of randomness on the Internet for promoting and enhancing electronic commerce. We describe, in rough detail, our planned implementation of such a source.
In recent years, substantial research has been devoted to monitoring and predicting performance degradations in real-world complex systems within large entities such as nuclear power plants, electrical grids, and distributed computing systems. Special
With the increasing maturity of various cloud service delivery models (Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS)) and deployment models (Private, Community, Public, Hybrid), the security risk profile of
In this paper, we outline an approach that can be used to predict macroscopic dynamics when new components are deployed in a large distributed system. Our approach combines two main methods: scale reduction and multidimensional data analysis techniques
Analyzing desired generic properties of hash functions is an important current area in cryptography. For example, in Eurocrypt 2009, Dodis, Ristenpart and Shrimpton introduced the elegant notion of "Preimage Awareness" (PrA) of a hash function H^P , and
Conventional approach to cross-layer network optimization assumes elastic users adjusting their bandwidth requirements in response to the resource congestion prices. This assumption leads to the Network Utility Maximization (NUM) framework. However, often
In 2005 the International Standards Organization published ISO/IEC 25062 Common Industry Format (CIF) for Usability Test Reports. This standard focused on documenting the results of usability testing in a consistent format in terms of user effectiveness
AbstractConventional approach to cross-layer network optimization assumes elastic users adjusting their bandwidth requirements in response to the resource congestion prices. This assumption leads to Network Utility Maximization (NUM) framework with
We describe Koala, an infrastructure Cloud simulator inspired by the Amazon Elastic Compute Cloud (EC2). We conduct a sensitivity analysis of Koala, revealing eight behavioral dimensions, which are influenced significantly by six parameters. Our findings
Documentation on using the Messaging Workbench (MWB) tool to edit the profile created for the NCPDP SCRIPT Implementation Guide: Version 10.6 NEWRX New Prescription and RXHRES Prescription History Response message structures.
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-147, BIOS Protection Guidelines: Recommendations of the National Institute of Standards and Technology. The publication was written by David Cooper, William Polk
Abstractive summarization has been a long-standing and long-term goal in automatic summarization, because systems that can generate abstracts demonstrate a deeper understanding of language and the meaning of documents than systems that merely extract
David A. Waltermire, Adam Halbardier, Mark Johnson
This specification describes the Asset Reporting Format (ARF), a data model for expressing the transport format of information about assets and the relationships between assets and reports. The standardized data model facilitates the reporting, correlating
Asset identification plays an important role in an organization‟s ability to quickly correlate different sets of information about assets. This specification provides the necessary constructs to uniquely identify assets based on known identifiers and/or
The National Institute of Standards and Technology (NIST), with participation of the biometrics community, conducts evaluations of biometrics-based verification and identification systems. Among the more challenging is testing of automated latent
The Department of Commerce's Internet Policy Task Force Green Paper on Cybersecurity, Innovation and the Internet Economy recommends consideration of a new framework for addressing internet security issues for companies outside the orbit of critical
Keith A. Stouffer, Joseph A. Falco, Karen A. Scarfone
NIST Special Publication (SP) 800-82, Guide to Industrial Control Systems (ICS) Security, provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems
Emerging technologies for mesh networks can provide users with last-mile service to an access point by forwarding data through wireless relays instead of through expensive wireline infrastructure. While an extensive amount of literature on mesh networks
The linear dispersion structure is employed to accommodate the dynamic topology of cooperative networks, as well as to achieve higher throughput than conventional space-time codes based on orthogonal designs. Asynchronous Cooperative Liner Dispersion Codes
A critical challenge for military personnel when operating in foreign countries is effective communication with the local population. To address this issue, the Defense Advanced Research Projects Agency (DARPA) created the Spoken Language Communication and