Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 76 - 100 of 7105

Cryptographic Key Management Issues & Challenges in Cloud Services

September 18, 2013
Author(s)
Ramaswamy Chandramouli, Michaela Iorga, Santosh Chokhani
… To interact with various services in the cloud and to store the data generated/processed by those … Based on a core set of features in the three common cloud services - Infrastructure as a Service (IaaS), Platform … of cryptographic keys takes on an additional complexity in cloud environments compared to enterprise IT environments due …

Guide to Security for Full Virtualization Technologies

January 28, 2011
Author(s)
Murugiah P. Souppaya, Karen Scarfone, Paul Hoffman
… is used for operational efficiency, such as in cloud computing, and for allowing users to run applications for … virtualization, hypervisor, VMM, virtual machine, VM, cloud computing

Forensic Analysis of Advanced Persistent Threat Attacks in Cloud Environments

January 6, 2020
Author(s)
Changwei Liu, Anoop Singhal, Duminda Wijesekera
… cyber-activities and the use of diverse devices offered on cloud environments, post-attack cloud forensic investigations must deal with data in diverse … interfaces. The process of forensic investigation in a cloud environment involves filtering away noisy data and …

ENABLING CONTROL SYSTEM AND CLOUD-BASED SIMULATION SERVICE INTEROPERABILITY

December 12, 2018
Author(s)
Albert W. Jones, Guodong Shao, Frank H. Riddick
… One of those changes involves the use of simulation-based cloud services and the integration of those services with … technology. Moreover, as simulation moves to the cloud, achieving such an integrated process poses new issues. … cognition, cloud service, control, simulation …

OAGi/NIST Workshop on Open Cloud Architecture for Smart Manufacturing

April 20, 2016
Author(s)
Nenad Ivezic, Boonserm Kulvatunyou, Yan Lu, Yunsu Lee, Jaehun Lee, Albert W. Jones, Simon P. Frechette
… summarizes the results from the OAGi/NIST Workshop on Open Cloud Architecture for Smart Manufacturing, which was held at … forum for manufacturers and providers of IoT technologies, cloud platforms, and manufacturing services to share their … and identify and prioritize barriers to adoption of cloud-enabling capabilities and technologies, forming a basis …

Guideline on User Authentication Techniques for Computer Network Access Control

September 29, 1980
Author(s)
Institute for Computer Sciences and Technology National Bureau of Standards
… and practices which can be used to control access to computer resources via remote terminals and networks. A … although such equipment has not yet been interfaced to computer terminals to any great extent. In view of the … Institute for Computer Sciences and Technology National Bureau of Standards …

A Vision of Cyber-Physical Cloud Computing for Smart Networked Systems

August 26, 2013
Author(s)
Eric D. Simmon, Kyoung-sook Kim, Eswaran Subrahmanian, Ryong Lee, Frederic J. de Vaulx, Yohei Murakami, Koji Zettsu, Ram D. Sriram
… wireless sensor/actuator networks, social networks, and cloud computing services. … A Vision of Cyber-Physical Cloud Computing for Smart Networked Systems …

Educating Next-Gen Computer Scientists

January 31, 2018
Author(s)
Jeff Voas, D. Richard Kuhn, Celia Paulsen, Kim B. Schaffer
… design, compiler design, and programming languages were computer science (CS) education's core ingredients in past years. Then, universities led the computer technology revolution by producing the inventors for … question that we pose in this roundtable is: Is university computer science education leading technology forward or are …

Determining Forensic Data Requirements for Detecting Hypervisor Attacks

August 7, 2019
Author(s)
Changwei Liu, Anoop Singhal, Ramaswamy Chandramouli, Duminda Wijesekera
… virtualization is a key feature of data centers used for cloud computing services and enterprise computing that enables ubiquitous access to shared system … Cloud computing, hypervisors, Xen, KVM, vulnerabilities, forensics …

Measurement-Based Prediction of mmWave Channel Parameters Using Deep Learning and Point Cloud

August 2, 2024
Author(s)
Anuraag Bodi, Raied Caromi, Jian Wang, Jelena Senic, Camillo Gentile, Hang Mi, Bo Ai, Ruisi He
… method using deep learning and environment point cloud is proposed. The parameters predicted include path … of the data collected. Second, based on a classic point cloud classification model (PointNet), we propose a novel … channel prediction, deep learning, mmWave channel, point cloud

Task Offloading in Multi-tier Computing Systems towards Next-Generation Wireless Networks

December 1, 2022
Author(s)
Kunlun Wang, Jiong Jin, Yang Yang, Arumugam Nallanathan, Chintha Tellambura, Bijan Jabbari, Tao Zhang
… to heterogeneous users in the emerging iIoT, multi-tier computing was proposed by effectively combining edge computing and fog computing. More specifically, multitier computing systems … task offloading, multi-tier computing, resource allocation … Task Offloading in Multi-tier Computing Systems towards Next-Generation Wireless Networks …

Hardware-Enabled Security: Policy-Based Governance in Trusted Container Platforms

April 20, 2022
Author(s)
Michael Bartock, Murugiah Souppaya, Haidong Xia, Raghu Yeluri, Uttam Shetty, Brandon Lum, Mariusz Sabath, Harmeet Singh, Alaa Youssef, Gosia Steinder, Yu Cao, Jayashree Ramanathan
… In today's cloud data centers and edge computing, attack surfaces have significantly increased, … for safeguarding container deployments in multi-tenant cloud environments. It also describes a prototype … cloud, container, hardware-enabled security, hardware root of …

Quantum Computing and Communication

June 28, 2002
Author(s)
Paul E. Black, David R. Kuhn, Carl J. Williams
… problems remain to be solved. Yet the theory of quantum computing has advanced significantly in the past decade, and … quantum computing, error correcting codes, entanglement, … Quantum Computing and Communication …

A Design Methodology for Developing Resilient Cloud Services (RCS)

November 1, 2017
Author(s)
Abdella Battou, Salim Hariri
Cloud Computing is emerging as a new paradigm that aims at delivering computing as a utility. For the cloud computing paradigm to be fully adopted and effectively … and resilient to malicious faults and attacks. Security in cloud computing is of major concern [1] and a challenging …

Spatial Computations over Terabyte-Sized Images on Hadoop Platforms

October 27, 2014
Author(s)
Peter Bajcsy, Antoine Vandecreme, Mary C. Brady, Phuong Nguyen
… is to lower the barrier of executing spatial image computations in a computer cluster/cloud environment instead … problems encountered during an execution of spatial computations over terabyte-sized images using Apache Hadoop … The two problems address (a) detection of spatial computations and their parameter estimation from a library of …

Direct Imaging of Static and Dynamic Ion Cloud Distributions in an Electron Beam Ion Trap

February 1, 2000
Author(s)
James V. Porto
… have the capability to measure both static and dynamic ion cloud distributions. The technique provides information about … the degree of overlap between the electron beam and ion cloud. Dynamic images are sensitive to electron-ion heating … and improve detailed models of ionization balance and ion cloud dynamics within the EBIT. Combined with improved …

Automated Symbolic and Numerical Testing of DLMF Formulae using Computer Algebra Systems

July 18, 2018
Author(s)
Howard S. Cohl, Moritz Schubotz, Andre Greiner Petter
… developed conversion tools from semantic L A TEX to the Computer Algebra System (CAS) MAPLE which relies on … 11th Conference on Intelligent Computer Mathematics … Computer Algebra Systems, Mathematical Knowledge Management … Lecture Notes in Computer Science; Intelligent Computer Mathematics …

BUSINESS PROCESS MODEL LIFE-CYCLE MANAGEMENT IN CLOUD MANUFACTURING

June 4, 2017
Author(s)
Miroslav Ljubicic, Nenad Ivezic, Boonserm Kulvatunyou, Scott Nieman, Nenad Anicic, Zoran Marjanovic
… address this contextual information is an area where the cloud manufacturing community can contribute new and valuable … Business Process Model, Life Cycle Management, Cloud Manufacturing, Catalog, Standards … BUSINESS PROCESS MODEL LIFE-CYCLE MANAGEMENT IN CLOUD MANUFACTURING …

The Case for Simulation-Based Evaluation of Ubiquitous Computing Environments

January 25, 2000
Author(s)
Alden A. Dima, L P. Clarletta
… Ubiquitous computing (a.k.a. pervasive computing) is ill-defined due to its novelty and the … \existential issues during the evaluation of ubiquitous computing technologies. Use-case driven simulations can … Workshop on Evaluation Methodologies for Ubiquitous Computing

Exploration of the viability of TiN/TiOX ReRAM in Computational Random-Access Memory (CRAM)

March 27, 2025
Author(s)
Brandon Zink, Advait Madhavan, William Borders, Jabez McClelland
… for solving the Von-Neumann bottleneck. In particular, computational random-access memory (CRAM) is a promising form … In-Memory Computing, Computational Random-Access Memory, Resistive Random-Access … Exploration of the viability of TiN/TiOX ReRAM in Computational Random-Access Memory (CRAM) …
Displaying 76 - 100 of 7105
Was this page helpful?