Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1 - 25 of 68

Environmental Protection Agency Blind Audit 2018

May 17, 2021
Author(s)
Christina Cecelski, Cassie Goodman, Jennifer Carney
… Environmental Protection Agency (EPA) conducted a blind audit of EPA protocol calibration gas mixtures produced by … the producers' certificates. The mixtures included in this audit consisted of carbon dioxide (CO2) at 8 % mol/mol to 18 … PGVP Audit Results …

Audit and Evaluation of Computer Security

October 1, 1977
Author(s)
Zella G. Ruthberg, Robert G. McKenzie
… Accounting Office, sponsored an invitational workshop on "Audit and Evaluation of Computer Security," held in Miami … subjects for future research. Leading experts in the audit and computer communities were invited to discuss the … Proceedings. The ten topics reported on are: Internal Audit Standards, Qualifications and Training, Security …

Audit Trail Device Security [Product Storyboard]

October 16, 2008
Author(s)
Juana Williams
… weighing and measuring device manufacturers choose the audit trail as the form of security for their equipment. … community to become familiar with how to access and use audit trail information. … Audit Trail Device Security [Product Storyboard] … access, audit trail, category of device, electronic record, event, …

Security Auditing of Internet of Things Devices in a Smart Home

October 15, 2021
Author(s)
Suryadipta Mazumdar, Daniel Bostos, Anoop Singhal
… missing or implemented in a questionable manner. Security auditing is a promising solution that has been applied with success in other domains. However, security auditing of Internet of Things devices is challenging because … standards and best practices are not readily applicable to auditing low-level device data such as sensor readings, logs …

Guide to Auditing for Controls and Security: A System Development Life Cycle Approach

April 1, 1988
Author(s)
Zella G. Ruthberg, Bonnie T. Fisher, William E. Perry, John W. Lainhart, James G. Cox, Mark Gillen, Douglas B. Hunt
… This guide addresses auditing the system development life cycle (SDLC) process for … auditors having a minimum of two years experience in ADP auditing, but can also be used by security reviewers, quality … Guide to Auditing for Controls and Security: A System Development Life …

Audit and Evaluation of Computer Security II: System Vulnerabilities and Controls

April 1, 1980
Author(s)
Zella G. Ruthberg
… a second invitational workshop on computer security audit, entitled "Audit and Evaluation of Computer Security II: System … of highly qualified people In the computer science and EDP audit fields was assembled to develop material that would be … base controls, data base management systems controls, EDP audit, internal audit, operating system controls, system …

Comparison of ISO/IEC 17025 with the NUPIC Audit Checklist

May 1, 2003
Author(s)
C D. Faison
… competence of testing and calibration laboratories and the audit requirements of the Nuclear Utilities Procurement … audit requirements, calibration services, gap analysis, … Comparison of ISO/IEC 17025 with the NUPIC Audit Checklist …

Desirable Properties of Voting Systems

September 25, 2009
Author(s)
Svetlana Z. Lowry, Poorvi Vora
This paper provides definitions for some desirable properties of voting systems, including auditability, ballot secrecy, incoercibility, usability and accessibility. In the context of these desirable properties, it defines the class of end-to-end

Security of Personal Computer Systems: A Management Guide

January 1, 1985
Author(s)
Dennis D. Steinauer
The use of personal computer systems (often called desktop or professional computers) in the office and home environment has placed increasingly powerful information system technology in the hands of growing numbers of users. While providing many benefits

National Institute of Standards and Technology (Handbook Chapter)

May 15, 2003
Author(s)
Joan Hash
The submission is a chapter describing NIST security standards (FIPS and Special Publication series 800). The author's instructions were that NIST prepare chapter summarizing standards indicating title, dates, publications, and brief summaries.

Cast Vote Records Common Data Format Specification Version 1.0

November 19, 2019
Author(s)
John P. Wack
This document is a specification for a common data format for cast vote records (CVR) produced by vote-capture devices such as ballot scanners. It supports the interoperable export of CVRs from these devices and the interoperable import and export of CVRs

Fifty years of AAPM Involvement in Radiation Dosimetry

April 30, 2008
Author(s)
Geoffrey S. Ibbott, C-M Ma, D W O Rogers, Stephen M. Seltzer, J Williamson
This paper reviews the involvement of the AAPM in various aspects of radiation dosimetry over its fifty year history, emphasizing the especially important role that external beam dosimetry played in the early formation of the organization. Topics covered
Displaying 1 - 25 of 68
Was this page helpful?