Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1 - 25 of 2044

Voices of First Responders: How to Facilitate Adoption and Usage of Communication Technology - An Integrated Analysis of Qualitative and Quantitative Findings

November 28, 2022
Author(s)
Yee-Yin Choong, Kerrianne Buchanan, Shanee Dawkins, Sandra Spickard Prettyman
The Nationwide Public Safety Broadband Network (NPSBN) is being developed to provide a dedicated network for the use of first responders during incident response. A wave of new communication technologies compatible with the NPSBN is on the horizon, as

Guide to a Secure Enterprise Network Landscape

November 17, 2022
Author(s)
Ramaswamy Chandramouli
Access to multiple cloud services, the geographic spread of enterprise Information Technology (IT) resources (including multiple data centers), and the emergence of microservices-based applications (as opposed to monolithic ones) have significantly altered

Using Business Impact Analysis to Inform Risk Prioritization and Response

November 17, 2022
Author(s)
Stephen Quinn, Nahla Ivy, Julie Chua, Matthew Barrett, Greg Witte, Larry Feldman, Daniel Topper, Robert Gardner
While business impact analysis (BIA) has historically been used to determine availability requirements for business continuity, the process can be extended to provide a broad understanding of the potential impacts of any type of loss on the enterprise

Engineering Trustworthy Secure Systems

November 16, 2022
Author(s)
Ronald S. Ross, Mark Winstead, Michael McEvilley
This publication describes a basis for establishing principles, concepts, activities, and tasks for engineering trustworthy secure systems. Such principles, concepts, activities, and tasks can be effectively applied within systems engineering efforts to

Intelligent-Fabric Computing: Challenges and Opportunities

November 8, 2022
Author(s)
Min Chen, Jia Liu, Pan Li, Hamid Gharavi, Yixue Hao, Jingyu Ouyang, Long Hu, Chong Hou, Iztok Humar, Lei Wei, Guang-Zhong Yang, Guangming Tao
With the advent of the Internet of Everything, people can easily interact with their environments immersively. The idea of pervasive computing is becoming a reality, but due to the inconvenience of carrying silicon-based entities and a lack of fine-grained

The Industrial Ontologies Foundry (IOF) Core Ontology

September 19, 2022
Author(s)
Boonserm Kulvatunyou, Milos Drobnjakovic, Farhad Ameri, Chris Will, Barry Smith
The Industrial Ontologies Foundry (IOF) has been formed to create a suite of interoperable ontologies that would serve as a foundation for data and information interoperability in all areas of manufacturing. To ensure that the ontologies are developed in a

Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight

September 14, 2022
Author(s)
Stephen Quinn, Nahla Ivy, Greg Witte, Matthew Barrett, Robert Gardner
This document is the third in a series that supplements NIST Interagency/Internal Report (NISTIR) 8286, Integrating Cybersecurity and Enterprise Risk Management (ERM). This series provides additional details regarding the enterprise application of

Digital Evidence Preservation: Considerations for Evidence Handlers

September 8, 2022
Author(s)
Barbara Guttman, Douglas R. White, Shannan Williams, Tracy Walraven
The preservation of digital evidence (DE) presents unique problems beyond traditional evidence preservation. This document addresses considerations related to the preservation of digital evidence. This document is part of a series on evidence management

Measurement Challenges for Scaling Superconductor-based Quantum Computers

June 23, 2022
Author(s)
Pete Hopkins, Manuel Castellanos Beltran, John Biesecker, Paul Dresselhaus, Anna Fox, Logan Howe, David Olaya, Adam Sirois, Dylan Williams, Samuel P. Benz, Alirio De Jesus Soares Boaventura, Justus Brevik
Global investment in the research and development of quantum information systems by industry, government, and academic institutions continues to accelerate and is expected to reach over $16B by 2027 [1]. Systems based on optical photons, atoms or ions

Ordered t-way Combinations for Testing State-based Systems

June 13, 2022
Author(s)
D. Richard Kuhn, M S Raunak, Raghu N. Kacker
Fault detection often depends on the specific order of inputs that establish states which eventually lead to a failure. However, beyond basic structural coverage metrics, it is often difficult to determine if code has been exercised sufficiently to ensure

Measurement-induced quantum phases realized in a trapped-ion quantum computer

June 2, 2022
Author(s)
Michael Gullans, Alexey Gorshkov, David Huse, Christopher Monroe, Crystal Noel, Pradeep Niroula, Daiwei Zhu, Andrew Risinger, Laird Egan, Debopriyo Biswas, Marko Cetina
Many-body open quantum systems balance internal dynamics against decoherence from interactions with an environment. Here, we explore this balance via random quantum circuits implemented on a trapped-ion quantum computer, where the system evolution is

Blockchain for Access Control Systems

May 26, 2022
Author(s)
Vincent C. Hu
The rapid development and wide application of distributed network systems have made network security – especially access control and data privacy – ever more important. Blockchain technology offers features such as decentralization, high confidence, and

A Data Structure for Integrity Protection with Erasure Capability

May 20, 2022
Author(s)
D. Richard Kuhn
This document describes a data structure, referred to as a data block matrix, that supports the ongoing addition of hash-linked records while also allowing for the deletion of arbitrary records, thereby preserving hash-based integrity assurance that other
Displaying 1 - 25 of 2044