Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 2526 - 2550 of 5421

ASSET: Security Assessment Tool for Federal Agencies

June 1, 2003
Author(s)
Elizabeth B. Lennon
This ITL Bulletin describes the features and capabilities of the Automated Security Self-Evaluation Tool (ASSET), ITL's governmentwide IT security assessment tool. ASSET automates the completion of the security questionnaire in NIST Special Publication 800

Development of the Web-Based NIST X-Ray Photoelectron Spectroscopy (XPS) Database

January 1, 2002
Author(s)
Angela Y. Lee, D M. Blakeslee, Cedric J. Powell, J R. Rumble
The first web-based version of the NIST X-ray Photoelectron Spectroscopy Database (XPSDB) is described. The current database, built from a relational database management system (RDBMS), contains critically evaluated data with over 19,000 line positions

Guest Editorial

April 1, 1999
Author(s)
Barry A. Bell
The National Institute of Standards and Technology hosted the 1998 Conference on Precision Electromagnetic Measurements (CPEM >98) in the Washington Renaissance hotel during the Week of July 6-10, 1998. The Technical Program included 344 papers given in 32

Human Engineering Design Criteria Standards Part 3: Interim Steps

April 1, 2014
Author(s)
Susanne M. Furman, Mary Theofanos, Hannah Wald
The Department of Homeland Security (DHS) requires general human systems integration (HSI) criteria for the design and development of human-machine interfaces for the technology, systems, equipment, and facilities employed by its user population. HSI is

Ciao: Developing an Architecture for User Profile Management

October 16, 2008
Author(s)
K Broun
… Services is responsible for NIST's research library and publications program. In the course of developing new electronic and print versions of one of those publications, the Technicalendar, we realized we had an …

NIST Industrial Control System Security Activities

June 26, 2006
Author(s)
Keith A. Stouffer
The National Institute of Standards and Technology (NIST) has several ongoing efforts to address industrial control system security. This paper will present an overview of two of these efforts, the Process Control Security Requirements Forum (PCSRF) and

Fire Dynamics Simulator (Version 3): Users Guide (NISTIR 6748)

November 1, 2002
Author(s)
Kevin B. McGrattan, Glenn P. Forney, J E. Floyd, Simo A. Hostikka, Kuldeep R. Prasad
Fire Dynamics Simulator (FDS) is a computational fluid dynamics (CFD) model of fire-driven fluid flow. The software described in this document solves numerically a form of the Navier-Stokes equations appropriate for low-speed, thermally-driven flow with an

New Standard Provides Framework for Smart Grid Testing and Certification

July 31, 2016
Author(s)
Cuong T. Nguyen, Khaled Masri
In May 2016, the National Electrical Manufacturers Association (NEMA) published a new standard, Smart Grid Interoperability Process Reference Manual, ANSI/NEMA SG-IPRM 1-2016 (IPRM). The standard codifies a 40-page publication, the Interoperability Process

NIST Test Personal Identity Verification (PIV) Cards

July 12, 2012
Author(s)
David A. Cooper
In order to facilitate the development of applications and middleware that support the Personal Identity Verification (PIV) Card, NIST has developed a set of test PIV Cards and a supporting public key infrastructure. This set of test cards includes not

Toward Secure Routing Infrastructures

January 1, 2006
Author(s)
Douglas C. Montgomery, Sandra Murphy
Routing infrastructures are possibly the most vital, complex, and fragile components in the global information infrastructure. They are also the least protected from attack. In the public Internet, for example, the IP routing infrastructure comprises tens

Uncertainty Analysis for Vector Measurands Using Fiducial Inference

January 1, 2006
Author(s)
Chih-Ming Wang, Hariharan K. Iyer
This paper presents a method for constructing uncertainty regions for a vector measurand in the presence of both type-A and type-B errors. The method is based on the principle of fiducial inference and generally requires a Monte Carlo approach for

Resource Records for the DNS Security Extensions, RFC 4034

March 1, 2005
Author(s)
R Arends, R Austein, M Larson, Daniel Massey, Scott W. Rose
This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document

Stateless Hash-Based Digital Signature Standard

August 13, 2024
Author(s)
National Institute of Standards and Technology (NIST), David Cooper
This standard specifies the stateless hash-based digital signature algorithm (SLH-DSA). Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data
Displaying 2526 - 2550 of 5421
Was this page helpful?