Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1 - 25 of 5420

Zero Trust Architecture

August 10, 2020
Author(s)
Scott W. Rose, Oliver Borchert, Stuart Mitchell, Sean Connelly
Zero trust (ZT) is the term for an evolving set of … perimeters to focus on users, assets, and resources. A zero trust architecture (ZTA) uses zero trust principles to plan industrial and enterprise … architecture, cybersecurity, enterprise, network security, zero trust

A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Location Environments

September 13, 2023
Author(s)
Ramaswamy Chandramouli, Zack Butcher
… One of the basic tenets of zero trust is to remove the implicit trust in users, … Publication 800-207 has laid out a comprehensive set of zero trust principles and referenced zero trust architectures (ZTA) for turning those concepts … service mesh, sidecar proxy, SPIFFE, transit gateway, zero trust, zero trust architecture. …

Planning a Zero Trust Architecture: A Starting Guide for Federal Administrators

May 6, 2022
Author(s)
Scott Rose
… NIST Special Publication 800-207 defines zero trust is a set of cybersecurity principles used when … stakeholders in an enterprise is needed in order for a zero trust architecture to succeed in improving the … NIST RMF can be applied when developing and implementing a zero trust architecture. …

Implementing a Zero Trust Architecture: High-Level Document

June 10, 2025
Author(s)
Alper Kerman, Oliver Borchert, Gema Howell, Scott Rose, Murugiah Souppaya, Jason Ajmo, Yemi Fashina, Parisa Grayeli, Joseph Hunt, Jason Hurlburt, Nedu Irrechukwu, Joshua Klosterman, Oksana Slivina, Susan Symington, Allen Tan, Karen Scarfone, William Barker, Peter Gallagher, Aaron Palermo, Madhu Balaji, Adam Cerini, Rajarshi Das, Jacob Barosin, Kyle Black, Scott Gordon, Jerry Haskins, Keith Luck, Dale McKay, Sunjeet Randhawa, Brian Butler, Mike Delaguardia, Matthew Hyatt, Randy Martin, Peter Romness, Corey Bonnell, Dean Coclin, Ryan Johnson, Dung Lam, Darwin Tolbert, Tim Jones, Tom May, Christopher Altman, Alex Bauer, Marco Genovese, Andrew Campagna, John Dombroski, Adam Frank, Nalini Kannan, Priti Patil, Harmeet Singh, Mike Spisak, Krishna Yellepeddy, Nicholas Herrmann, Corey Lund, Farhan Saifudin, Madhu Dodda, Tim LeMaster, Ken Durbin, James Elliott, Earl Matthews, David Pricer, Joey Cruz, Tarek Dawoud, Carmichael Patton, Alex Pavlovsky, Brandon Stephenson, Clay Taylor, Bob Lyons, Vinu Panicker, Peter Bjork, Hans Drolshagen, Imran Bashir, Ali Haider, Nishit Kothari, Sean Morgan, Seetal Patel, Norman Wong, Zack Austin, Shawn Higgins, Rob Woodworth, Mitchell Lewars, Bryan Rosensteel, Don Coltrain, Wade Ellery, Deborah McGinn, Frank Briguglio, Ryan Tighe, Chris Jensen, Joshua Moll, Jason White, Joe Brown, Gary Bradt, Jeffrey Adorno, Syed Ali, Bob Smith
… A zero trust architecture (ZTA) enables secure authorized … outlined in NIST Special Publication (SP) 800-207, Zero Trust Architecture. The NCCoE worked with 24 … service edge (SASE), software-defined perimeter (SDP), zero trust, zero trust architecture (ZTA). … Implementing a Zero Trust Architecture: High-Level Document …

AI Assurance for the Public -- Trust but Verify, Continuously

October 3, 2022
Author(s)
Phillip Laplante, D. Richard Kuhn
… intelligence (AI) systems are increasingly seen in many public facing applications such as self-driving land … or unfair decisions in these systems, how do we assure the public that these systems work as intended and will not cause harm? In this paper we discuss AI trust and assurance and related concepts, that is, assured …

In Trust we Trust

October 14, 2010
Author(s)
Keith Miller, Jeff Voas, Phillip Laplante
… The term trust has had a well understood definition for centuries. However after e-trust came along, and then cloud, where e-trust is not sufficient due to the non-touchability of a … cloud computing, trust, e-trust, security and privacy … In Trust we Trust

Trusted Cloud: Security Practice Guide for VMware Hybrid Cloud Infrastructure as a Service (IaaS) Environments

April 20, 2022
Author(s)
Murugiah Souppaya, Michael Bartock, Karen Scarfone, Donna Dodson, Daniel Carroll, Gina Scinta, Hemma Prafullchandra, Harmeet Singh, Raghuram Yeluri, Tim Shea, Carlos Phoenix, Robert Masten, Paul Massis, Jason Malnar, Michael Dalton, Anthony Dukes, Brenda Swarts, Rajeev Ghandi, Laura Storey, Rocky Weber, Jeff Haskins
… automated way. The goal of this project is to develop a trusted cloud solution that will demonstrate how trusted compute pools leveraging hardware roots of trust can … only provide assurance that cloud workloads are running on trusted hardware and in a trusted geolocation or logical …

Implementing Trusted Geolocation Services in the Cloud

February 17, 2016
Author(s)
Michael J. Bartock, Karen Scarfone, Larry Feldman
… summarizes the information presented in NISTIR 7904, "Trusted Geolocation in the Cloud: Proof of Concept … Implementing Trusted Geolocation Services in the Cloud …

Public-Key Cryptography

April 1, 1991
Author(s)
James R. Nechvatal
… This publication presents a state-of-the-art survey of public-key cryptography, circa 1988-1990, and covers the following topics: 1) the theory of public-key cryptography; 2) comparisons to conventional … of relevant mathematics; 4) a survey of major existing public-key systems; 5) an exploration of digital signatures …

Trust and Artificial Intelligence (Draft)

March 2, 2021
Author(s)
Brian Stanton, Theodore Jensen
… the human affected by, the AI who ultimately places their trust in the system. The study of trust in automated systems has been a topic of psychological … Intelligence (AI) systems pose unique challenges for user trust. AI systems operate using patterns in massive amounts …

Decentralized Trust Domain Management in Multiple Grid Environments

November 25, 2007
Author(s)
Chung Tong Hu, Karen A. Scarfone, David F. Ferraiolo
Trust domain management for the global access of a grid is … out. In this paper, we present a schema that enables trust domain management in a dynamic multi-grid environment. … access control, access control policy, grid computing, trust domain … Decentralized Trust Domain Management in Multiple Grid Environments …

Representation of PIV Chain-of-Trust for Import and Export

May 20, 2016
Author(s)
Hildegard Ferraiolo, Ramaswamy Chandramouli, Ketan L. Mehta, Jason Mohler, Stephen Skordinski, Steven Brady
… a common XML-based data representation of a chain-of-trust record to facilitate the exchange of PIV Card … (PIV), PIV Architecture, PIV Card, PIV chain-of-trust, XML information sharing … Representation of PIV Chain-of-Trust for Import and Export …

Quantum Resistant Public Key Cryptography: A Survey

April 14, 2009
Author(s)
Ray A. Perlner, David A. Cooper
Public key cryptography is widely used to secure transactions … the security assumptions upon which currently used public key cryptographic algorithms are based. In this paper, we provide a survey of some of the public key cryptographic algorithms that have been developed …

Trust Based Multi-Agent Filtering for Increased Smart Grid Security

October 24, 2011
Author(s)
Ion Matei, Vijay Srinivasan
… agents. We combine the multi-agent filtering scheme with a trust-based mechanism under which each agent associates a trust metric to each of its neighbors. These trust metrics are taken into account in the filtering scheme … Data Acquisition (SCADA), multi-agent filtering scheme, trust-based mechanism …

Trust-Based Multi-Agent Filtering for Increased Smart Grid Security

August 22, 2011
Author(s)
Ion Matei, John S. Baras, Vijay Srinivasan
… agents. We combine the multi-agent filtering scheme with a trust-based mechanism under which each agent associates a trust metric to each of its neighbors. These trust metrics are taken into account in the filtering scheme … Data Acquisition (SCADA), multi-agent filtering scheme, trust-based mechanism …

Federal Agency Use of Public Key Technology for Digital Signatures and Authentication

October 1, 2000
Author(s)
K L. Lyons-Burke, FPKIS Committee
… This guidance document was developed by the Federal Public Key Infrastructure Steering Committee to assist Federal agencies that are considering the use of public key technology for digital signatures or … Federal or non-Federal entities, such as members of the public, private firms, citizen groups, and state and local …

A Matrix-Free Algorithm for the Large-Scale Constrained Trust-Region Subproblem

April 28, 2006
Author(s)
Anthony J. Kearsley
… the solution of linear inequality constrained, large-scale trust-region sub-problems is presented. The matrix-free … quadratic optimization, lanczos method, regularization, trust region … A Matrix-Free Algorithm for the Large-Scale Constrained Trust-Region Subproblem …

Hardware-Enabled Security: Policy-Based Governance in Trusted Container Platforms

April 20, 2022
Author(s)
Michael Bartock, Murugiah Souppaya, Haidong Xia, Raghu Yeluri, Uttam Shetty, Brandon Lum, Mariusz Sabath, Harmeet Singh, Alaa Youssef, Gosia Steinder, Yu Cao, Jayashree Ramanathan
… to help ensure that higher-layer security controls can be trusted. This report explains an approach based on … security, hardware root of trust, platform security, trusted compute pool, virtualization. … Hardware-Enabled Security: Policy-Based Governance in Trusted Container Platforms …

Minimum Interoperability Specification for PKI Components (MISPC), Version 1

January 1, 1998
Author(s)
William E. Burr, Donna F. Dodson, William T. Polk, N Nazario
… and CRLs.The MISPC supports both hierarchical and network trust models. In hierarchical models, trust is delegated by a CA when it certifies a subordinate CA. Trust delegation starts at a root CA that is trusted by every …

A Federal Public Key Infrastructure With Multiple Digital Signature Algorithms

April 22, 1998
Author(s)
William E. Burr, William T. Polk
… different digital signature algorithms are used in one Public Key Infrastructure. The key to interoperability is … Public-Key Solution Conference … signature algorithms, digital signature certificate, PKI, public key cryptography, public key infrastructure … A Federal Public Key Infrastructure With Multiple Digital Signature …

The Emergence of DANE Trusted Email for Supply Chain Management

January 3, 2017
Author(s)
Scott Rose, Joseph Gersch, Daniel Massey
… Supply chain management is critically dependent on trusted email with authentication systems that work on a … as a means to enable and accelerate deployment of a trusted email environment. … The Emergence of DANE Trusted Email for Supply Chain Management …

Public Safety Communication User Needs: Voices of First Responders

September 25, 2018
Author(s)
Shanee T. Dawkins, Kristen Greene, Michelle P. Steves, Mary F. Theofanos, Yee-Yin Choong, Susanne M. Furman, Sandra S. Prettyman
… The public safety community is transitioning from land mobile … of user-centered design principles. During this shift in public safety communications technology, the time is now to … factors expertise to influence emerging technology for public safety. … Public Safety, Usability, Human Factors, Communication, PSCR …
Displaying 1 - 25 of 5420
Was this page helpful?