Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1926 - 1950 of 2846

Guide to Securing Legacy IEEE 802.11 Wireless Networks

July 25, 2008
Author(s)
Karen A. Scarfone, Derrick Dicoi, Matt Sexton, Cyrus Tibbs
The purpose of this document is to provide guidance to organizations in securing their legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 wireless local area networks (WLAN) that cannot use IEEE 802.11i. The document provides an

Forensic Protocol Filtering of Phone Managers

July 24, 2008
Author(s)
Wayne Jansen, Aurelien M. Delaitre
Phone managers are non-forensic tools sometimes used by forensic investigators to recover data from a cell phone when no suitable forensic tool is available for the device. While precautions can be taken to preserve the integrity of data on a cell phone

Web Services Security: Techniques and Challenges (Extended Abstract)

July 21, 2008
Author(s)
Anoop Singhal
Web services-based computing is currently an important driver for the software industry. While several standards bodies (such as W3C and OASIS) are laying the foundation for Web services security, several research problems must be solved to make secure Web

An Attack Graph Based Probabilistic Security Metric

July 16, 2008
Author(s)
Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia
To protect critical resources in today's networked environments, it is desirable to quantify the likelihood of potential multi-step attacks that combine multiple vulnerabilities. This now becomes feasible due to a model of causal relationships between

Performance Measurement Guide for Information Security

July 16, 2008
Author(s)
Elizabeth Chew, Marianne M. Swanson, Kevin M. Stine, N Bartol, Anthony Brown, W Robinson
This document provides guidance on how an organization, through the use of metrics, identifies the adequacy of in-place security controls, policies, and procedures. It provides an approach to help management decide where to invest in additional security

The Keyed-Hash Message Authentication Code (HMAC)

July 16, 2008
Author(s)
National Institute of Standards and Technology (NIST), Quynh Dang
This Standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combination with a shared

Dynamic Routing and Congestion Control Through Random Assignment of Routes

July 15, 2008
Author(s)
Fern Y. Hunt, Vladimir V. Marbukh
We introduce an algorithm for maximizing utility through congestion control and random allocation of routes to users. The allocation is defined by a probability distribution whose degree of randomness as measured by its entropy, is controlled. We seek to

A Framework for Measuring the Vulnerability of Hosts

June 30, 2008
Author(s)
Karen A. Scarfone, Timothy Grance
This paper proposes a framework for measuring the vulnerability of individual hosts based on current and historical operational data for vulnerabilities and attacks. Previous approaches have not been scalable because they relied on complex manually

Policy Specification and Enforcement for Smart ID Cards Deployment

June 3, 2008
Author(s)
Ramaswamy Chandramouli
Deployment of Smart Cards for Identity Verification requires collection of credentials and provisioning of credentials from and to heterogeneous and sometimes legacy systems. To facilitate this process, a centralized identity store called Identity
Displaying 1926 - 1950 of 2846
Was this page helpful?