Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1026 - 1050 of 2269

An Empirical Study of a Vulnerability Metric Aggregation Method

August 18, 2011
Author(s)
Su Zhang, Xinming Ou, Anoop Singhal, John Homer
Quantifying security risk is an important and yet difficult task in enterprise network risk management, critical for proactive mission assurance. Even though metrics exist for individual vulnerabilities, there is currently no standard way of aggregating

NIST-SP 500-291, NIST Cloud Computing Standards Roadmap

August 10, 2011
Author(s)
Michael D. Hogan, Fang Liu, Annie W. Sokol, Tong Jin
The NIST Cloud Computing Standards Roadmap Working Group has surveyed the existing standards landscape for security, portability, and interoperability standards/models/studies/use cases, etc., relevant to cloud computing. Using this available information

Smart Clocks Have a Hand in the Smart Grid

July 29, 2011
Author(s)
Jeffrey Fletcher, Dhananjay Anand, Maruthi Chaluvadi, Julien M. Amelot, Ya-Shian Li-Baboud, James Moyne
Clock synchronization is becoming an increasingly important characteristic of modern wide area monitoring and control systems such as the power grid. It provides an opportunity to coordinate control actions and measurement instants across hundreds of miles

A public randomness service

July 21, 2011
Author(s)
Michael J. Fischer, Michaela Iorga, Rene Peralta
We argue for the deployment of sources of randomness on the Internet for promoting and enhancing electronic commerce. We describe, in rough detail, our planned implementation of such a source.

Predicting Failure in Complex Systems by Perturbing Markov Chain Models

July 21, 2011
Author(s)
Christopher E. Dabrowski, Fern Y. Hunt
In recent years, substantial research has been devoted to monitoring and predicting performance degradations in real-world complex systems within large entities such as nuclear power plants, electrical grids, and distributed computing systems. Special

Predicting Macroscopic Dynamics in Large Distributed Systems

July 18, 2011
Author(s)
Kevin L. Mills, James J. Filliben
In this paper, we outline an approach that can be used to predict macroscopic dynamics when new components are deployed in a large distributed system. Our approach combines two main methods: scale reduction and multidimensional data analysis techniques

On the Security of Hash Functions Employing Blockcipher Postprocessing

July 14, 2011
Author(s)
Dong H. Chang, Mridul Nandi, Moti Yung
Analyzing desired generic properties of hash functions is an important current area in cryptography. For example, in Eurocrypt 2009, Dodis, Ristenpart and Shrimpton introduced the elegant notion of "Preimage Awareness" (PrA) of a hash function H^P , and

USABILITY STANDARDS ACROSS THE DEVELOPMENT LIFECYCLE

July 11, 2011
Author(s)
Mary F. Theofanos, Brian C. Stanton
In 2005 the International Standards Organization published ISO/IEC 25062 “Common Industry Format (CIF) for Usability Test Reports”. This standard focused on documenting the results of usability testing in a consistent format in terms of user effectiveness

An Efficient Sensitivity Analysis Method for Large Cloud Simulations

July 4, 2011
Author(s)
Kevin L. Mills
We describe Koala, an infrastructure Cloud simulator inspired by the Amazon Elastic Compute Cloud (EC2). We conduct a sensitivity analysis of Koala, revealing eight behavioral dimensions, which are influenced significantly by six parameters. Our findings

Messaging Work Bench Instructions

July 1, 2011
Author(s)
Ioana Singureanu
Documentation on using the Messaging Workbench (MWB) tool to edit the profile created for the NCPDP SCRIPT Implementation Guide: Version 10.6 NEWRX New Prescription and RXHRES Prescription History Response message structures.

Guidelines for Protecting Basic Input/Output System (BIOS) Firmware

June 28, 2011
Author(s)
Shirley M. Radack
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-147, BIOS Protection Guidelines: Recommendations of the National Institute of Standards and Technology. The publication was written by David Cooper, William Polk

Who wrote What Where: Analyzing the content of human and automatic summaries

June 23, 2011
Author(s)
Karolina K. Owczarzak, Hoa T. Dang
Abstractive summarization has been a long-standing and long-term goal in automatic summarization, because systems that can generate abstracts demonstrate a deeper understanding of language and the meaning of documents than systems that merely extract

Specification for the Asset Reporting Format 1.1

June 21, 2011
Author(s)
David A. Waltermire, Adam Halbardier, Mark Johnson
This specification describes the Asset Reporting Format (ARF), a data model for expressing the transport format of information about assets and the relationships between assets and reports. The standardized data model facilitates the reporting, correlating

Specification for Asset Identification 1.1

June 17, 2011
Author(s)
David A. Waltermire, John Wunder, Adam Halbardier
Asset identification plays an important role in an organization‟s ability to quickly correlate different sets of information about assets. This specification provides the necessary constructs to uniquely identify assets based on known identifiers and/or

Successful Design of Biometric Tests in a Constrained Environment

June 9, 2011
Author(s)
Vladimir N. Dvornychenko
The National Institute of Standards and Technology (NIST), with participation of the biometrics community, conducts evaluations of biometrics-based verification and identification systems. Among the more challenging is testing of automated latent

Cybersecurity, Innovation and the Internet Economy

June 8, 2011
Author(s)
Ari M. Schwartz
The Department of Commerce's Internet Policy Task Force Green Paper on Cybersecurity, Innovation and the Internet Economy recommends consideration of a new framework for addressing internet security issues for companies outside the orbit of critical

Guide to Industrial Control Systems (ICS) Security - Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC)

June 7, 2011
Author(s)
Keith A. Stouffer, Joseph A. Falco, Karen A. Scarfone
NIST Special Publication (SP) 800-82, Guide to Industrial Control Systems (ICS) Security, provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems

Throughput and Delay Analysis of Half-Duplex IEEE 802.11 Mesh Networks

June 6, 2011
Author(s)
Camillo A. Gentile
Emerging technologies for mesh networks can provide users with last-mile service to an access point by forwarding data through wireless relays instead of through expensive wireline infrastructure. While an extensive amount of literature on mesh networks
Displaying 1026 - 1050 of 2269
Was this page helpful?