Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 26 - 50 of 68

Residential Home Performance Contracting Round Robin Guidelines

April 17, 2014
Author(s)
Michael Lubliner, Rick Kunkle, David Hales, Melinda Spencer
These guidelines describe the important considerations for planning, conducting, analyzing, and disseminating the results of a Home Performance Contactor (HPC) round robin study of a specific aspect of the HPC industry services. The round robin study

Blockchain for Access Control Systems

May 26, 2022
Author(s)
Vincent C. Hu
The rapid development and wide application of distributed network systems have made network security – especially access control and data privacy – ever more important. Blockchain technology offers features such as decentralization, high confidence, and

Cyber Security Metrics and Measures

March 2, 2009
Author(s)
Paul E. Black, Karen A. Scarfone, Murugiah P. Souppaya
Metrics are tools to facilitate decision making and improve performance and accountability. Measures are quantifiable, observable, and objective data supporting metrics. Operators can use metrics to apply corrective actions and improve performance

RECON -- A Controlled English for Business Rules

July 13, 2013
Author(s)
Fabian M. Neuhaus, Edward J. Barkmeyer Jr.
Capturing business rules in a formal logic representation supports the enterprise in two important ways: it enables the evaluation of logs and audit records for conformance to, or violation of, the rules; and it enables the conforming automation of some

Toward a reference architecture for archival systems

July 10, 2013
Author(s)
Raphael Barbau, Joshua Lubell, Sudarsan Rachuri, Sebti Foufou
Long-term preservation of product data is imperative for many organizations. A product data archive should be designed to ensure information accessibility and understanding over time. Approaches such as the Open Archival Information System (OAIS) Reference

Effective Use of Computing Technology in Vote-Tallying

April 1, 1978
Author(s)
Roy Saltman
The results of a systems analysis and evaluation conducted on the role of automatic digital processing in vote-tallying are presented. Included in the report are descriptions of hardware, software, and administrative problems encountered in fourteen

Reactor Health Physics Operations at the NIST Center for Neutron Research

January 27, 2015
Author(s)
Thomas P Johnston
Performing health physics and radiation safety functions under a special nuclear material license and a research and test reactor license at a major government research and development laboratory encompasses many elements not encountered by industrial

Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events

December 8, 2020
Author(s)
Jennifer L. Cawthra, Michael R. Ekstrom, Lauren N. Lusty, Julian T. Sexton, John E. Sweetnam, Anne R. Townsend
Ransomware, destructive malware, insider threats, and even honest user mistakes present ongoing threats to organizations. Organizations' data, such as database records, system files, configurations, user files, applications, and customer data, are all

ZKASP: ZKP-based Attestation of Software Possession for Measuring Instruments

March 9, 2022
Author(s)
Luis Brandao, Carlos Eduardo Cardoso Galhardo, Rene Peralta
Software-controlled measuring instruments used in commercial transactions, such as fuel dispensers and smart meters, are sometimes subject to "memory replacement" attacks. Cybercriminals replace the approved software by a malicious one that then tampers

"The devil's in the detail": Release of an expanded, enhanced and dynamically revised forensic STR Sequence Guide

February 21, 2018
Author(s)
Christopher Phillips, Katherine Gettings, Jonathan King, David Ballard, Martin Bodner, Lisa Borsuk, Walther Parson
The STR sequence template file published in 2016 as part of the considerations from the DNA Commission of theInternational Society for Forensic Genetics on minimal STR sequence nomenclature requirements, has been comprehensively revised and audited using

Automated Tools for Testing Computer System Vulnerability

December 1, 1992
Author(s)
William T. Polk
Computer security "incidents" occur with alarming frequency. The incidents range from direct attacks by both hackers and insiders to automated attacks such as network worms. Weak system controls are frequently cited as the cause, but many of these

Revision of the SNPforID 34-plex forensic ancestry test: Assay enhancements, standard reference sample genotypes and extended population studies

January 1, 2013
Author(s)
John Butler, Manuel Fondevila, Carla Santos, Ana Freire, Christopher Phillips, M Lareu, Peter Vallone, A. Carracedo
A revision of an established 34 SNP forensic ancestry test has been made by swapping the under- performing rs727811 component SNP with the highly informative rs3827760 that shows a near-fixed East Asian specific allele. We collated SNP variability data for

Faster, More Accurate, Stack-Flow Measurements

February 25, 2020
Author(s)
Aaron N. Johnson, Iosif I. Shinder, Bernard J. Filla, Joey T. Boyd, Rodney A. Bryant, Michael R. Moldover, Thomaa D. Martz, Matthew Gentry
Exhaust flows from coal-fired electricity-generating-plants are determined by measuring the flue gas velocity at prescribed points in the stack cross section. These velocity measurements are made using EPA-approved differential pressure probes such as the
Displaying 26 - 50 of 68
Was this page helpful?