Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 801 - 825 of 4390

Digital Identity Guidelines: Authentication and Lifecycle Management [including updates as of 12- 01-2017]

December 1, 2017
Author(s)
Paul A. Grassi, Ray A. Perlner, Elaine M. Newton, Andrew R. Regenscheid, William E. Burr, Justin P. Richer, Naomi B. Lefkovitz, Jamie M. Danker, Mary F. Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. These guidelines focus on the authentication of

Digital Identity Guidelines: Enrollment and Identity Proofing Requirements [including updates as of 12-01-2017]

December 1, 2017
Author(s)
Paul A. Grassi, Naomi B. Lefkovitz, James L. Fenton, Jamie M. Danker, Yee-Yin Choong, Kristen Greene, Mary F. Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. This guideline focuses on the enrollment and

Digital Identity Guidelines: Federation and Assertions [including updates as of 12-01-2017]

December 1, 2017
Author(s)
Paul A. Grassi, Ellen M. Nadeau, Justin P. Richer, Sarah K. Squire, James L. Fenton, Naomi B. Lefkovitz, Jamie M. Danker
This document and its companion documents, SP 800-63, SP 800-63A, and SP 800-63B, provide technical and procedural guidelines to agencies for the implementation of federated identity systems and for assertions used by federations. This publication

Overview of the NIST 2016 LoReHLT Evaluation

November 13, 2017
Author(s)
Audrey N. Tong, Lukasz L. Diduch, Jonathan G. Fiscus, Yasaman Haghpanah, Shudong Huang, David M. Joy, Kay Peterson, Ian M. Soboroff
Initiated in conjunction with DARPA's Low Resource Languages for Emergent Incidents (LORELEI) Program, the NIST LoReHLT (Low Re-source Human Language Technology) evaluation series seeks to incubate research on fundamental natural language processing tasks

A Design Methodology for Developing Resilient Cloud Services (RCS)

November 1, 2017
Author(s)
Abdella Battou, Salim Hariri
Cloud Computing is emerging as a new paradigm that aims at delivering computing as a utility. For the cloud computing paradigm to be fully adopted and effectively used, it is critical that the security mechanisms are robust and resilient to malicious

Using realistic factors to simulate catastrophic congestion events in a network

November 1, 2017
Author(s)
Kevin L. Mills, Christopher E. Dabrowski
With the rapid growth of the Internet, there has been increased interest in the use of computer models to study the dynamics of communication networks in the research literature. An important example of this has been the study of dramatic, but relatively

2016 NIST/ITL Cybersecurity Program: Annual Report

October 23, 2017
Author(s)
Patrick D. O'Reilly, Kristina G. Rigopoulos, Gregory A. Witte, Larry Feldman
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to carry

Exploratory Lens Model of Decision-Making in a Potential Phishing Attack Scenario

October 10, 2017
Author(s)
Franklin Tamborello, Kristen K. Greene
Phishing, the transmission of a message spoofing a legitimate sender about a legitimate subject with intent to perform malicious activity, causes a tremendous and rapidly-increasing amount of damage to American information systems and users annually. This

vPROM: vSwitch Enhanced Programmable Measurement in SDN

October 10, 2017
Author(s)
An Wang, Yang Guo, Songqing Chen, Fang Hao, T.V. Lakshman, Douglas C. Montgomery, Kotikalapudi Sriram
Network programmability is a salient feature of Software Defined Networking (SDN), which allows users to program network applications with the perception that the underlying network is a single device. While still at an early stage of development, SDN

Alexa, Can I Trust You?

September 29, 2017
Author(s)
Judy Chung, Michaela Iorga, Jeff Voas, Sangjin Lee
Security diagnostics expose vulnerabilities and privacy threats that exist in commercial Intelligent Virtual Assistants (IVA)-- diagnostics offer the possibility of securer IVA ecosystems. This paper explores security and privacy concerns with these
Displaying 801 - 825 of 4390
Was this page helpful?