Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications by: Nelson Hastings (Fed)

Search Title, Abstract, Conference, Citation, Keyword or Author
Displaying 1 - 14 of 14

Distributed Energy Resource Security: Potential Guidelines and Research Topics

October 6, 2021
Author(s)
Avi Gopstein, Nelson Hastings, Larry Feldman, Ravi Agarwal, Nadya Bartol
This paper describes an effort to validate the applicability of cybersecurity controls from the 2014 National Institute of Standards and Technology (NIST) Interagency Report 7628 Revision 1 (NISTIR 7628 r1) Guidelines for Smart Grid Cybersecurity to High

NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 4.0

February 18, 2021
Author(s)
Avi Gopstein, Cuong Nguyen, Cheyney O'Fallon, Nelson Hastings, David A. Wollman
NIST's fourth framework informing America's development of the smart grid includes updates to the Smart Grid Conceptual Model, introduces new Communication Pathways Scenarios and an Ontology for the smart grid, provides guidance on cybersecurity practices

Authentication Considerations for Public Safety Mobile Networks

May 14, 2015
Author(s)
Nelson Hastings, Joshua M. Franklin, Larry Feldman, Greg Witte
This bulletin summarizes the information presented in NISTIR 8014, Considerations for Identity Management in Public Safety Mobile Networks, written by Nelson Hastings and Joshua Franklin. The publication analyzes approaches to identity management for

Considerations for Identity Management in Public Safety Networks

March 30, 2015
Author(s)
Nelson Hastings, Joshua M. Franklin
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use. These considerations are scoped into the context of their

Public Safety Mobile Application Security Requirements Workshop Summary

January 22, 2015
Author(s)
Michael Ogata, Barbara Guttman, Nelson Hastings
This document captures the input received from the half-day workshop titled "Public Safety Mobile Application Security Requirements" organized by the Association of Public-Safety Communications Officials (APCO) International, in cooperation with FirstNet

Security Considerations for Remote Electronic UOCAVA Voting

February 21, 2011
Author(s)
Nelson Hastings, Rene Peralta, Stefan Popoveniuc, Andrew Regenscheid
This whitepaper for the Technical Guidelines Development Committee (TGDC) identifies desirable security properties of remote electronic voting systems, potential benefits and threats to these systems, and current and emerging technical approaches for

A Threat Analysis on UOCAVA Voting Systems

December 19, 2008
Author(s)
Andrew R. Regenscheid, Nelson E. Hastings
This report contains the results of NIST s research into technologies to improve the voting process for United States citizens living overseas. It splits the overseas voting process into three stages: voter registration and ballot request, blank ballot

5th Annual PKI R&D Workshop "Making PKI Easy to Use" Proceedings

July 18, 2006
Author(s)
William T. Polk, Nelson E. Hastings, Kent Seamons
NIST hosted the fifth annual Public Key Infrastructure (PKI) Research Workshop on April 4-6, 2006. The two and a half day event brought together PKI experts from academia, industry, and government to explore the remaining challenges in deploying public key

4th Annual PKI R&D Workshop "Multiple Paths to Trust" Proceedings

August 1, 2005
Author(s)
Clifford Neuman, William Polk, Nelson Hastings
NIST hosted the fourth annual Public Key Infrastructure (PKI) Research Workshop on April 19-21, 2005. The two and a half day event brought together PKI experts from academia, industry, and government to explore the remaining challenges in deploying public

3rd Annual PKI R&D Workshop Proceedings

September 8, 2004
Author(s)
K I. Sankar, William Polk, Nelson Hastings
NIST hosted the third annual Public Key Infrastructure (PKI) Research Workshop on April 12-14, 2004. The two and a half day event brought together PKI experts from academia, industry, and government to explore the remaining challenges in deploying public

Quantifying Assurance of Knowledge Based Authentication

June 1, 2004
Author(s)
Nelson E. Hastings, Donna F. Dodson
Understanding the principles of knowledge based authentication (KBA) and developing metrics that can be applied to KBA systems will improve information system security. This paper reviews the basics of KBA systems including some environments that KBA can

2nd Annual PKI Research Workshop Proceedings

April 1, 2004
Author(s)
Carl M. Ellison, William Polk, Nelson Hastings, Sean W. Smith
NIST hosted the second annual Public Key Infrastructure (PKI) Research Workshop on April 28-29, 2003. The two-day event brought together PKI experts from academia, industry, and government to explore the remaining challenges in deploying public key

1st Annual PKI Research Workshop Proceedings

November 12, 2003
Author(s)
Sean W. Smith, William Polk, Nelson Hastings
NIST hosted the first annual Public Key Infrastructure (PKI) Research Workshop on April 24-25, 2002. The two-day event brought together PKI experts from academia, industry, and government to explore the remaining challenges in deploying public key

Public Key Infrastructures That Safisfy Security Goals

July 1, 2003
Author(s)
William T. Polk, Nelson E. Hastings, A Malpani
This article describes the features of different PKI architectures, and the motivations behind their use. While some PKI architectures (e.g., hierarchies) are very simple, political and social realities encourage deployment of more complex (e.g., mesh)