NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-119, Guidelines for the Secure Deployment of IPv6. Written by Sheila Frankel of NIST, Richard Graveman of RFG Security, John Pearce of Booz Allen Hamilton and Mark
The increasing number of intelligent software components is accompanied by an increase of proprietary information exchange languages between components. One of the challenges for the smart technology worker is to achieve intelligent system component
Murugiah P. Souppaya, Karen Scarfone, Paul Hoffman
The purpose of SP 800-125 is to discuss the security concerns associated with full virtualization technologies for server and desktop virtualization, and to provide recommendations for addressing these concerns. Full virtualization technologies run one or
The advent of new imaging technologies has allowed faster and higher-resolution cellular image acquisition by light microscopy. This has directly aided clinical research by allowing doctors and other researchers to better visualize cells and cellular
Biometric technologies establish or verify the personal identity of previously enrolled individuals based on biological or behavioural characteristics. Over the past several years the marketplace for biometric-based applications has widened significantly
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-127, Guide to Securing WiMAX Wireless Communications: Recommendations of the National Institute of Standards and Technology. The publication, which was written by Karen
The Common Configuration Scoring System (CCSS) is a set of measures of the severity of software security configuration issues. CCSS is derived from the Common Vulnerability Scoring System (CVSS), which was developed to measure the severity of
Helin Dutagaci, Chun Pan (Benny) Cheung, Afzal A. Godil
The best view selection corresponds to the task of automatically selecting the most representative view of a 3D model. In this paper, we describe a benchmark for evaluation of best view selection algorithms. The benchmark consists of the preferred views of
Benchmarking of 3D Shape retrieval allows developers and researchers to compare the strengths of different algorithms on a standard dataset. Here we discuss the different steps involved in developing a benchmark and some of the issues involved. We then
In large-scale distributed systems, the interactions of many independent components may lead to emergent global behaviors with unforeseen, often detrimental, outcomes. The increasing importance of distributed systems such as clouds and computing grids will
Matching non-rigid shapes is a challenging research field in content-based 3D object retrieval. In this paper, we present an image-based method to effectively address this problem. Multidimensional Scaling (MDS) and Principal Component Analysis (PCA) are
In this paper, free and open source software are discussed. Open source is an intellectual property destroyer. Nothing could be worse than this for the software business and the intellectual-property business. Microsoft has an official open source presence
Using the analogy of an existing smart car, this paper explores Power to the Edge , where the edge is commercial mobile computing. The world is poised for a 5th Cycle of computer capability, this time focused on the burgeoning phenomena of mobile computing
In this paper we propose a new sequential mode of operation the Fast wide pipe or FWP for short - to hash messages of arbitrary length. The mode is shown to be (1) preimage-resistance preserving, (2) collision-resistance-preserving and, most importantly
Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven Noel
The security risk of a network against unknown zero day attacks has been considered as something unmeasurable since software flaws are less predictable than hardware faults and the process of finding such flaws and developing exploits seems to be chaotic
Technical standards offer a new ability to support the important public policy goal of better protecting privacy. To do so most effectively, we must begin to move from the privacy standards based on subjective and procedural efforts to a series of
Simulation models for data communications networks encompass numerous parameters that can each take on millions of values, presenting experimenters with a vast space of potential parameter combinations. To apply such simulation models experimenters face a
Most simulation models for data communication networks encompass hundreds of parameters that can each take on millions of values. Such models are difficult to understand, parameterize and investigate. This paper explains how to model a modern data
This bulletin summarizes the information presented in NISTIR 7497, Security Architecture Design Process for Health Information Exchanges (HIEs). The publication describes a systematic approach to designing a technical security architecture for the exchange
This document provides a template for the modified version of Software engineering Software product Quality Requirements and Evaluation(SQuaRE) Common Industry Format (CIF) for usability test reports (ISO/IEC 25062:2006(E)), the Common Industry Format (CIF
Michael Grasso, Ronil Mokashi , Alden A. Dima, Antonio Cardone, Kiran Bhadriraju, Anne L. Plant, Mary C. Brady, Yaacov Yesha, Yelena Yesha
The traditional method of cell microscopy can be subjective, due to observer variability, a lack of standardization, and a limited feature set. To address this challenge, we developed an image classifier using a machine learning approach. Our system was
David W. Griffith, Michael R. Souryal, Camillo A. Gentile, Nada T. Golmie
This paper introduces an IEEE 802.11 analytical model that examines uplink and downlink communications between non-saturated stations and a non-saturated access point. The model integrates channel effects and collisions into a single expression for the
Call admission control between heterogeneous networks,such as an integrated 3GPP LTE and WLAN network, plays an important role to utilize the system resources in a more efficient way. In this paper, we propose that the preference to the WLAN is determined