Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 976 - 1000 of 2282

IREX III - Performance of Iris Identification Algorithms

April 3, 2012
Author(s)
Patrick J. Grother, George W. Quinn, James R. Matey, Mei L. Ngan, Wayne J. Salamon, Gregory P. Fiumara, Craig I. Watson
Iris recognition has long been held as an accurate and fast biometric. In the first public evaluation of one-to-many iris identification technologies, this third activity in the Iris Exchange (IREX) program has measured the core algorithmic efficacy and

Guidelines for Improving Security and Privacy in Public Cloud Computing

March 28, 2012
Author(s)
Shirley M. Radack
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-144, Guidelines on Security and Privacy in Public Cloud Computing. These new guidelines, which were written by Wayne Jansen of Booz Allen Hamilton and Tim Grance of

A Matter of Policy

March 26, 2012
Author(s)
David F. Ferraiolo, Jeffrey M. Voas, George Hurlburt
This paper discusses system security policies. System policies are the set of rules that when implemented afford a strategy for the protection of information. The policy objectives are diverse and span the social-economic spectrum. System policies govern

An IEEE 1588 Performance Testing Dashboard for Power Industry Requirements

March 22, 2012
Author(s)
Julien M. Amelot, YaShian Li-Baboud, Clement Vasseur, Jeffrey Fletcher, Dhananjay Anand, James Moyne
The numerous time synchronization performance requirements in the Smart Grid entails the need for a set of common metrics and test methods to verify the ability of the network system and its components to meet the power industry�s accuracy, reliability and

An Evaluation of Local Shape Descriptors for 3D Shape Retrieval

March 8, 2012
Author(s)
Sarah Y. Tang
As the usage of 3D models increases, so does the importance of developing accurate 3D shape retrieval algorithms. Most prominently, shape descriptors are used to describe the geometric and topological properties of objects and compared to determine two

Guidelines for Securing Wireless Local Area Networks (WLANs)

February 27, 2012
Author(s)
Shirley M. Radack
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-153, Guidelines for Securing Wireless Local Area Networks (WLANs): Recommendations of the National Institute of Standards and Technology. The publication was written by

NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 2.0

February 16, 2012
Author(s)
George W. Arnold, Gerald FitzPatrick, David A. Wollman, Thomas L. Nelson, Paul A. Boynton, Galen H. Koepke, Allen R. Hefner Jr., Cuong Nguyen, Jeffrey A. Mazer, Dean Prochaska, Marianne M. Swanson, Tanya L. Brewer, Victoria Yan Pillitteri, David H. Su, Nada T. Golmie, Eric D. Simmon, Allan C. Eustis, David Holmberg, Steven T. Bushby, Michael D. Janezic, Ajitkumar Jillavenkatesa
The Energy Independence and Security Act (EISA) of 2007 requires that NIST develop a framework of standards for the Smart Grid. This document is the second release of the framework first published in January, 2010. It covers the activities and outputs of

Building Security into Off-the-Shelf Smartphones

February 1, 2012
Author(s)
Angelos Stavrou, Jeff Voas, Tom T. Karygiannis, Stephen Quirolgico
Recent advancements in hardware have increased the computing power, memory, storage, and wireless connectivity of handheld mobile devices. Smart-phone devices are used for everyday activities that range from Maps and Geo-location tagging to banking. Indeed

Information Technology Laboratory Brochure

January 24, 2012
Author(s)
Elizabeth B. Lennon
This brochure describes the Information Technology Laboratory (ITL) at the National Institute of Standards and Technology, its mission, highlights, and research programs.

Initiating Mobile Software Development - Lessons Learned From a 12-Month Project

December 30, 2011
Author(s)
Frederic J. de Vaulx, Paul Khouri Saba, Marcus W. Newrock, Bertrand C. Stivalet
As mobile devices’ capabilities keep on improving, today’s mobile software ecosystem evolves at an unprecedented speed. This evolution makes mobile software development more common and critical. Moreover, the ever-increasing number of new development

Universal Low-rank Matrix Recovery from Pauli Measurements

December 12, 2011
Author(s)
Yi-Kai Liu
We study the problem of reconstructing an unknown matrix M of rank r and dimension d using O(rd poly log d) Pauli measurements. This has applications in quantum state tomography, and is a non- commutative analogue of a well-known problem in compressed

Guidelines on Security and Privacy in Public Cloud Computing

December 9, 2011
Author(s)
Timothy Grance, Wayne Jansen
Cloud computing can and does mean different things to different people. The common characteristics most interpretations share are on-demand scalability of highly available and reliable pooled computing resources, secure access to metered services from

Role Engineering: Methods and Standards

December 8, 2011
Author(s)
Edward Coyne, Timothy Weil, D. Richard Kuhn
This article explains problems and approaches to designing permission structures for role based access control. RBAC and the RBAC standard are summarized, common approaches to role engineering described, and the current status and plans for the INCITS role

Objective Evaluation of Imager Performance

December 1, 2011
Author(s)
Francine K. Amon, Dennis D. Leber, Nicholas Paulter
We describe a method by which the evaluation and characterization of the performance of an imager can be done objectively and scientifically, that is, without routine operator interpretation. Although this method is demonstrated herein for passive long

QCMA with One-sided Error Equals QCMA with Two-sided Error

November 30, 2011
Author(s)
Stephen P. Jordan, Daniel Nagaj
QCMA is the set of decision problems such that if the answer is yes, there exists a classical bitstring, or proof, that can be efficiently verified by a quantum computer. The verifier is allowed a small probability of rejecting a valid proof or accepting

Comparing VM-Placement Algorithms for On-Demand Clouds

November 29, 2011
Author(s)
Kevin L. Mills, James J. Filliben, Christopher E. Dabrowski
Much recent research has been devoted to investigating algorithms for allocating virtual machines (VMs) to physical machines (PMs) in infrastructure clouds. Many such algorithms address distinct problems, such as initial placement, consolidation, or
Displaying 976 - 1000 of 2282
Was this page helpful?