Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 51 - 75 of 7102

Inferring the Stealthy Bridges between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks

October 29, 2015
Author(s)
Anoop Singhal, Xiaoyan Sun, Jun Dai, Peng Liu
… Enterprise networks are migrating to the public cloud to acquire computing resources for a number of … some public services, the enterpise network islands in cloud are expected to be absolutely isolated from each other. … to break such isolation due to two features of public cloud: virtual machine image sharing and virtual machine …

The Path to Cloud Federation through Standardization

November 25, 2022
Author(s)
Robert B. Bohn
… This paper describes the efforts of the NIST Cloud Computing Program in the development of understanding the federated cloud concept through the creation of a reference … Interoperability and Federation (SIIF). Standards for cloud federation continue to show their growing importance …

US Government Cloud Computing Technology Roadmap Volume I: High-Priority Requirements to Further USG Agency Cloud Computing Adoption; and Volume II: Useful Information for Cloud Adopters

October 21, 2014
Author(s)
Robert B. Bohn
… Government (USG) secure and effective adoption of the Cloud Computing model to reduce costs and improve services. This role is described in the 2011 Federal Cloud Computing Strategy as “... a central one in defining … US Government Cloud Computing Technology Roadmap Volume I: High-Priority …

Cloud Test Data Creation and Population Document

June 7, 2023
Author(s)
Richard Ayers
… population and documentation of artifacts created for cloud-based applications specified in Version 1 of Cloud & Remotely Stored Data Extraction (CDX) Using Account … Digital Forensics, Computer Forensics, Cloud Data Extraction, Computer Forensics Tool Testing …

Practical Challenges When Implementing a Distributed Population of Cloud-Computing Simulators Controlled by a Genetic Algorithm

June 4, 2013
Author(s)
Kevin L. Mills, Christopher E. Dabrowski, Darrin J. Santay
… applied a genetic algorithm to steer a population of cloud-computing simulators toward low-probability, costly failure … Computational steering, cloud computing, cluster computing, discrete event simulation, … Challenges When Implementing a Distributed Population of Cloud-Computing Simulators Controlled by a Genetic Algorithm …

Threat Modeling for Cloud Data Center Infrastructures

December 29, 2016
Author(s)
Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal
Cloud computing has undergone rapid expansion throughout the … made the transition from traditional data centers to the cloud due to its flexibility and lower cost. However, … upon by those who are less certain about the security of cloud. This problem is highlighted by the fact that there …

Analysis of Network Segmentation Techniques in Cloud Data Centers

July 30, 2015
Author(s)
Ramaswamy Chandramouli
Cloud Data centers are predominantly made up of Virtualized hosts. The networking infrastructure in a cloud (virtualized) data center, therefore, consists of the … The 11th International Conference on Grid & Cloud Computing and Applications … Analysis of Network Segmentation Techniques in Cloud Data Centers …

NIST Cloud Computing Forensic Reference Architecture

July 30, 2024
Author(s)
Martin Herman, Michaela Iorga, Ahsen Michael Salim, Robert H. Jackson, Mark R. Hurst, Ross A. Leo, Anand Kumar Mishra, Nancy M. Landreville, Yien Wang
… This document summarizes the research performed by the NIST Cloud Computing Forensic Science Working Group and presents the NIST Cloud Computing Forensic Reference Architecture (CC FRA or … NIST Cloud Computing Forensic Reference Architecture …

Intelligent Task Caching in Edge Cloud via Bandit Learning

March 19, 2021
Author(s)
Hamid Gharavi
… Task caching, based on edge cloud, aims to meet the latency requirements of computation- … Edge Caching, Task Caching, Edge Cloud Computing, Machine learning … Intelligent Task Caching in Edge Cloud via Bandit Learning …

Cloud-based Accessibility for Voting Applications

December 22, 2015
Author(s)
Shanee T. Dawkins, Sharon J. Laskowski
… on work supported by NIDRR, is creating technology for cloud-based accessibility. Using this new technology, users … new technology for two key applications: in voting, and in cloud computing applications being developed by federal … with enhanced accessibility capabilities, based on the cloud-based accessibility work of the GPII. This prototype, …

Service Mesh Proxy Models for Cloud-Native Applications

October 16, 2024
Author(s)
Ramaswamy Chandramouli, Zack Butcher, James Callaghan
… the de facto application services infrastructure for cloud-native applications. It enables the various runtime … to make recommendations on their applicability for cloud-native applications with different security risk … cloud-native application, data plane architecture, proxy …

Threat Modeling for Cloud Infrastructures

December 21, 2018
Author(s)
Nawaf Alhebaishi, Lingyu Wang, Anoop Singhal
… Today's businesses are increasingly relying on the cloud as an alternative IT solution due to its flexibility … lower cost. Compared to traditional enterprise networks, a cloud infrastructure is typically much larger and more … fact that there are limited efforts on threat modeling for cloud infrastructures. In this paper, we conduct …

Hardware-Enabled Security: Enabling a Layered Approach to Platform Security for Cloud and Edge Computing Use Cases

May 4, 2022
Author(s)
Murugiah Souppaya, Michael Bartock, Karen Scarfone, Ryan Savino, Tim Knoll, Uttam Shetty, Mourad Cherfaoui, Raghu Yeluri, Don Banks, Akash Malhotra, Michael Jordan, Dimitrios Pendarakis, Peter Romness
… In today's cloud data centers and edge computing, attack surfaces have shifted and, in some cases, … that can improve platform security and data protection for cloud data centers and edge computing. … confidential computing, container, hardware-enabled security, hardware …

General Access Control Guidance for Cloud Systems

July 31, 2020
Author(s)
Chung Tong Hu, Michaela Iorga, Wei Bao, Ang Li, Qinghua Li, Antonios Gouglidis
… This document presents cloud access control characteristics and a set of general access control guidance for cloud service models: IaaS (Infrastructure as a Service), … access control, access control mechanism, Cloud, cloud systems, policy, authorization ABAC, RBAC …

Guidelines for Security of Computer Applications

June 30, 1980
Author(s)
Institute for Computer Sciences and Technology National Bureau of Standards
… of the entire planning, development, and operation of a computer application. This guideline describes the technical … that adequate controls are included in new and existing computer applications to protect them from natural and … with no harmful side effects. The multifaceted nature of computer security is described, and differences in security …

Deep Reinforcement Learning-based Task Assignment for Cooperative Mobile Edge Computing

April 25, 2022
Author(s)
Li-Tse Hsieh, Hang Liu, Yang Guo, Robert Gazda
… Mobile edge computing (MEC) integrates computing resources in wireless access networks to process … into consideration dynamic network states, uncertain node computing capabilities and task arrivals, as well as the … IEEE Transactions on Mobile Computing … Mobile edge computing (MEC), edge server cooperation, task assignment, …

SHREC'17 Track: Point-Cloud Shape Retrieval of Non-Rigid Toys

December 14, 2017
Author(s)
Afzal A. Godil
… paper, we present the results of the SHREC'17 Track: Point-Cloud Shape Retrieval of Non-Rigid Toys. The aim of this … the performance of methods on the non-rigid point- cloud shape retrieval problem. The database used in this task contains 100 3D point-cloud models which are classified into 10 different …

Water droplet calibration of the Cloud Droplet Probe (CDP) and in-flight performance in liquid, ice and mixed-phase clouds during ARCPAC

December 14, 2010
Author(s)
Sara Lance, Charles Brock, Dave Rogers, Josh Gordon
… and measured LWC observed in liquid and mixed-phase clouds during the Aerosol, Radiation and Cloud Processes Affecting Arctic Climate (ARCPAC) study. The … clouds, aerosol, droplet, climate … Water droplet calibration of the Cloud Droplet Probe (CDP) and in-flight performance in …

Towards Efficient Offloading in Fog/Edge Computing by Approximating Effect of Externalities

July 9, 2018
Author(s)
Vladimir V. Marbukh
… Fog/Edge computing is an emerging architecture, which extends the Cloud computing paradigm to the edge of the network, enabling new … by the aggregate utility. Optimization of the system computing and communication resources requires accounting for … Fog/Edge computing, offloading, utility, resource management, …
Displaying 51 - 75 of 7102
Was this page helpful?