Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 576 - 600 of 5421

Electronic Health Record Design Considerations in Responding to Incidences of Highly Infectious Diseases: Clinical Workflows and Exception Handling

December 10, 2015
Author(s)
Svetlana Z. Lowry, Mala Ramaiah, Emily S. Patterson, Latkany A. Paul, Debora Simmons, David Brick, Michael C. Gibbons
Adoption of Electronic Health Record systems in all care settings has become widespread. EHRs can support and revolutionize the way that public health is protected in the event of an outbreak of a highly infectious disease. In particular, EHRs can support

Trusted Geolocation in the Cloud: Proof of Concept Implementation:

December 1, 2015
Author(s)
Michael J. Bartock, Murugiah Souppaya, Raghuram Yeluri, Uttam Shetty, James Greene, Steve Orrin, Hemma Prafullchandra, John McLeese, Jason Mills, Daniel Carayiannis, Tarik Williams, Karen A. Scarfone
Trusted Geolocation in the Cloud: Proof of Concept …

Household Weights and Measures (NIST SP 430) 2004

October 16, 2008
Author(s)
Kenneth S. Butcher
The purpose of this publication is to present in a convenient form the weights and measures tables most useful for household purposes, together with associated weights and measures information of general household interest. It also provides basic metric

Digital Signature Standard (DSS)

July 19, 2013
Author(s)
National Institute of Standards and Technology (NIST), Elaine Barker
This Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed

Ultraviolet Radiation Technologies and Healthcare Associated Infections: Standards and Metrology Needs

August 20, 2021
Author(s)
Dianne L. Poster, C Cameron Miller, Richard Martinello, Norman Horn, Michael T. Postek, Troy Cowan, Yaw S. Obeng, John J. Kasianowicz
The National Institute of Standards and Technology (NIST) hosted an international workshop on ultraviolet-C (UV-C) disinfection technologies on January 14 – 15, 2020 in Gaithersburg, Maryland in collaboration with the International Ultraviolet Association

Guide to Computer Security Log Management

September 13, 2006
Author(s)
Karen A. Scarfone, Murugiah Souppaya
The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information security Management Act (FISMA) of 2002, Public Law 107-347. This publication seeks to assist

Definitions of Terms and Modes Used at NIST for Value-Assignment of Reference Materials for Chemical Measurements

January 1, 2000
Author(s)
Willie E. May, Reenie M. Parris, C M. Beck, John D. Fassett, Robert R. Greenberg, Franklin R. Guenther, Gary W. Kramer, Stephen Wise, T E. Gills, Jennifer C. Colbert, R J. Gettings, Bruce S. MacDonald
… The NIST Special Publication 260 Series is a series of publications used to provide details of the procedures, … at NIST to produce, certify and use SRMs. A list of these publications can be assessed through the Internet, …

Guide to Intrusion Detection and Prevention Systems (IDPS)

February 20, 2007
Author(s)
Karen A. Scarfone, Peter M. Mell
The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. This publication seeks to assist

Control Baselines for Information Systems and Organizations

December 11, 2020
Author(s)
Ronald S. Ross, Victoria Y. Pillitteri
This publication provides security and privacy control baselines for the Federal Government. There are three security control baselines (one for each system impact level: low-impact, moderate- impact, and high-impact), as well as a privacy baseline that is

Control Baselines for Information Systems and Organizations

October 29, 2020
Author(s)
Ronald S. Ross, Victoria Y. Pillitteri
This publication provides security and privacy control baselines for the Federal Government. There are three security control baselines (one for each system impact level: low-impact, moderate-impact, and high-impact), as well as a privacy baseline that is

Rapidly-Deployable Mesh Network Testbed

November 30, 2009
Author(s)
Michael R. Souryal, Nader Moayeri, Andreas Wapf
This paper describes a wireless mesh network testbed for research in rapid deployment and auto-configuration of mesh nodes. Motivated by the needs of first responders and military personnel arriving to an incident area, we developed and tested an automated
Displaying 576 - 600 of 5421
Was this page helpful?