Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.


The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Search Publications by Kevin Stine

Search Title, Abstract, Conference, Citation, Keyword or Author
Displaying 1 - 15 of 15

Guidelines for Media Sanitization

Richard L. Kissel, Andrew R. Regenscheid, Matthew A. Scholl, Kevin M. Stine
Media sanitization refers to a process that renders access to target data on the media infeasible for a given level of effort. This guide will assist

Security Automation from a NIST Perspective

John F. Banghart, Stephen D. Quinn, Kevin M. Stine
Security automation can harmonize the vast amounts of information technology (IT) data into coherent, comparable information streams that inform timely and

Encryption Basics

Kevin M. Stine, Quynh H. Dang
Healthcare and health information technology professionals are entrusted with patient data which, because of its personal nature, requires protection to ensure

E-mail Security: an Overview of Threats and Safeguards

Kevin M. Stine, Matthew A. Scholl
This publication discusses, at a high level, the ubiquitous threats facing email systems today and impresses the need to secure these systems. This article will

Security Considerations in the System Development Life Cycle

Richard L. Kissel, Kevin M. Stine, Matthew A. Scholl, Hart Rossman, J Fahlsing, Jessica Gulick
The purpose of this guideline is to assist agencies in building security into their IT development processes. This should result in more cost-effective, risk

Performance Measurement Guide for Information Security

Elizabeth Chew, Marianne M. Swanson, Kevin M. Stine, N Bartol, Anthony Brown, W Robinson
This document provides guidance on how an organization, through the use of metrics, identifies the adequacy of in-place security controls, policies, and

Computer Security Division 2007 Annual Report

Kevin M. Stine, Mark Wilson
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public

Computer Security Division 2006 Annual Report

Tanya L. Brewer, Kevin M. Stine
This report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during the Fiscal Year 2006. It