Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1276 - 1300 of 1521

Authenticating Mobile Device Users Through Image Selection

May 19, 2004
Author(s)
Wayne Jansen
Adequate user authentication is a persistent problem, particularly with mobile devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization's influence. Yet these devices are being used

Computer Security Division 2003 Annual Report

April 30, 2004
Author(s)
Tanya L. Brewer
This report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during the Fiscal Year 2003. It discusses all projects and programs within the Division, staff highlights, and publications. For

Selecting Information Technology Security Products

April 28, 2004
Author(s)
Shirley M. Radack
This bulletin summarizes NIST Special Publication 800-36, "Guide to Selecting Information Technology Security Products." The selection of IT security products is an integral part of the design, development and maintenance of an IT security infrastructure

2nd Annual PKI Research Workshop Proceedings

April 1, 2004
Author(s)
Carl M. Ellison, William Polk, Nelson Hastings, Sean W. Smith
NIST hosted the second annual Public Key Infrastructure (PKI) Research Workshop on April 28-29, 2003. The two-day event brought together PKI experts from academia, industry, and government to explore the remaining challenges in deploying public key

Card Technology Developments and Gap Analysis Interagency Report

March 1, 2004
Author(s)
William C. Barker, Deborah Howard, Timothy Grance, Levent Eyuboglu
This Card Technology Developments and Gap Analysis Interagency Report (IR) provides information regarding current technical capabilities and limitations of storage and processor cards, current user requirements for individual and integrated technologies

Federal Information Processing Standard (FIPS) 199, Standards for Security

March 1, 2004
Author(s)
Shirley M. Radack
This ITL Bulletin describes FIPS 199, Standards for Security Categorization of Federal Information and Information Systems, which is an important component of a suite of standards and guidelines that NIST is developing to improve the security in federal

Standards for Security Categorization of Federal Information and Information Systems

February 1, 2004
Author(s)
National Institute of Standards and Technology (NIST), Ronald S. Ross, Marianne M. Swanson
The purpose of this document is to provide a standard for categorizing federal information and information systems according to an agency's level of concern for confidentiality, integrity, and availability and the potential impact on agency assets and

1st Annual PKI Research Workshop Proceedings

November 12, 2003
Author(s)
Sean W. Smith, William Polk, Nelson Hastings
NIST hosted the first annual Public Key Infrastructure (PKI) Research Workshop on April 24-25, 2002. The two-day event brought together PKI experts from academia, industry, and government to explore the remaining challenges in deploying public key

Network Security Testing

November 1, 2003
Author(s)
Shirley M. Radack
This ITL Bulletin summarizes NIST Special Publication 800-42, Guideline on Network Security Testing, by John Wack, Miles Tracy, and Murugiah Souppaya, which assists organizations in testing their Internet-connected and operational systems. The guide

Guide to Information Technology Security Services

October 13, 2003
Author(s)
Timothy Grance, Joan Hash, Marc Stevens, K O'Neal, N Bartol
Organizations frequently must evaluate and select a variety of information technology (IT) security services in order to maintain and improve their overall IT security program and enterprise architecture. IT security services, which range from security

Guide to Information Technology Security Services

October 9, 2003
Author(s)
Timothy Grance, Joan Hash, Marc Stevens, Kristofor O'Neal, Nadya Bartol
Organizations frequently must evaluate and select a variety of information technology (IT) security services in order to maintain and improve their overall IT security program and enterprise architecture. IT security services, which range from security

Guide to Selecting Information Technology Security Products

October 9, 2003
Author(s)
Timothy Grance, Marc Stevens, Marissa Myers
The selection of IT security products is an integral part of the design, development and maintenance of an IT security infrastructure that ensures confidentiality, integrity, and availability of mission critical information. The guide seeks to assist in

Building an Information Technology Security Awareness and Training Program

October 1, 2003
Author(s)
Mark Wilson, Joan Hash
NIST Special Publication 800-50, Building An Information Technology Security Awareness and Training Program, provides guidance for building an effective information technology (IT) security program and supports requirements specified in the Federal

IT Security Metrics (ITL Bulletin)

August 4, 2003
Author(s)
Elizabeth B. Lennon
This ITL Bulletin summarizes the recently published NIST Special Publication (SP) 800-55, Security Metrics Guide for Information Technology Systems, by Marianne Swanson, Nadya Bartol, John Sabato, Joan Hash, and Laurie Graffo. NIST SP 800-55 provides

A Framework for Multi-mode Authentication: Overview and Implementation Guide

August 1, 2003
Author(s)
Wayne Jansen, Vladimir Korolev, Serban I. Gavrila, T Heute, Clement Seveillac
The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but have instead become indispensable tools that offer competitive business advantages for
Displaying 1276 - 1300 of 1521
Was this page helpful?