Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 2226 through 2250 of 2814 matching records.
Publications Conference Paper (Final) October 6, 2014
https://csrc.nist.gov/pubs/conference/2014/10/06/a-cybersecurity-testbed-for-industrial-control-sys/final

Conference: Process Control and Safety Symposium 2014 Abstract: The National Institute of Standards and Technology (NIST) is developing a cybersecurity testbed for industrial control systems (ICS). The goal of this testbed is to measure the performance of an ICS when instrumented with cybersecurity protections in accordance with practices prescribed by prevailin...

Publications Journal Article (Final) August 6, 2014
https://csrc.nist.gov/pubs/journal/2014/08/it-pro-conference-on-information-systems-governanc/final

Journal: IT Professional Abstract: Approximately 100 IT professionals participated in the 2014 IT Pro Conference on Information Systems Governance, held at the National Institute of Standards and Technology (NIST) on May 22, 2014 (www.computer.org/itproconf). Information systems governance focuses on properly managing IT resources to...

Publications Journal Article (Final) August 1, 2014
https://csrc.nist.gov/pubs/journal/2014/08/elliptic-curves-arising-from-brahmagupta-quadrilat/final

Journal: Bulletin of the Australian Mathematical Society Abstract: A Brahmagupta quadrilateral is a cyclic quadrilateral whose sides, diagonals, and area are all integer values. In this article, we characterize the notions of Brahmagupta, introduced by K. R. S. Sastry, by means of elliptic curves. Motivated by these characterizations, we use Brahmagupta quadrilater...

Publications CSWP 3 (Final) (Withdrawn) June 3, 2014

https://csrc.nist.gov/pubs/cswp/3/ongoing-authorization-transitioning-to-near-realti/final

Abstract: Office of Management and Budget (OMB) Memorandum M-14-03, Enhancing the Security of Federal Information and Information Systems, reminds Federal agencies that, "Our nation's security and economic prosperity depend on ensuring the confidentiality, integrity and availability of Federal information and...

Publications Journal Article (Final) April 4, 2014
https://csrc.nist.gov/pubs/journal/2014/04/nist-and-computer-security/final

Journal: IT Professional Abstract: The US National Institute of Standards and Technology's highly visible work in four key areas--cryptographic standards, role-based access control, identification card standards, and security automation--has and continues to shape computer and information security at both national and global levels....

Publications ITL Bulletin (Final) March 7, 2014
https://csrc.nist.gov/pubs/itlb/2014/03/attribute-based-access-control-abac-definition-and/final

Abstract: Attribute-Based Access Control (ABAC) is a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, in some cases, environment conditions against policy, rules, or rela...

Publications ITL Bulletin (Final) February 19, 2014
https://csrc.nist.gov/pubs/itlb/2014/02/framework-for-improving-critical-infrastructure-cy/final

Abstract: Recognizing that the national and economic security of the United States depends on the resilience of critical infrastructure, President Obama issued Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity, in February 2013. It directed NIST to work with stakeholders to develop a...

Publications Journal Article (Final) February 3, 2014
https://csrc.nist.gov/pubs/journal/2014/02/software-testing/final

Journal: Computer (IEEE Computer) Abstract: This special issue presents papers that focus on important problems within the Software Testing community.

Publications Journal Article (Final) February 3, 2014
https://csrc.nist.gov/pubs/journal/2014/02/the-importance-of-entropy-to-information-security/final

Journal: Computer (IEEE Computer) Abstract: The strength of cryptographic keys is an active challenge in academic research and industrial practice. In this paper we discuss the entropy as fundamentally important concept for generating hard-to-guess, i.e., strong, cryptographic keys and outline the difficulties in generating and estimating the...

Publications Conference Paper (Final) October 16, 2013
https://csrc.nist.gov/pubs/conference/2013/10/16/limitations-to-threshold-random-walk-scan-detectio/final

Conference: 2013 IEEE Conference on Communications and Network Security (CNS) Abstract: This paper discusses limitations in one of the most widely cited single source scan detection algorithms: threshold random walk (TRW). If an attacker knows that TRW is being employed, these limitations enable full circumvention allowing undetectable high speed full horizontal and vertical scanning o...

Publications ITL Bulletin (Final) August 22, 2013
https://csrc.nist.gov/pubs/itlb/2013/08/itl-publishes-guidance-on-preventing-and-handling/final

Abstract: This ITL Bulletin summarizes a new ITL publication, NIST Special Publication 800- 83 Revision 1, Guide to Malware Incident Prevention and Handling for Desktops and Laptops,which gives receommendations for organizations to improve their malware incident prevention procedures.

Publications ITL Bulletin (Final) August 8, 2013
https://csrc.nist.gov/pubs/itlb/2013/08/itl-publishes-guidance-on-enterprise-patch-managem/final

Abstract: This ITL Bulletin summarizes a new ITL publication, NIST Special Publication 800-40 Revision 3, Guide to Enterprise Patch Management Technologies, which gives recommendations for organizations to improve the effectiveness and efficiency of their patch management technologies.

Publications FIPS 186-4 (Final) (Withdrawn) July 19, 2013

https://csrc.nist.gov/pubs/fips/186-4/final

Abstract: The Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital signature as evidence...

Publications ITL Bulletin (Final) July 15, 2013
https://csrc.nist.gov/pubs/itlb/2013/07/itl-issues-guidelines-for-managing-the-security-of/final

Abstract: This ITL Bulletin announces the publication of NIST Special Publication 800-124 Revision 1, Guidelines for Managing the Security of Movile Devices in the Enterprise. The revised guidelines will assist organizations in managing the security of mobile devices such as smart phones and tablets.

Publications IR 7298 Rev. 2 (Final) (Withdrawn) June 5, 2013

https://csrc.nist.gov/pubs/ir/7298/r2/final

Abstract: The National Institute of Standards and Technology (NIST) has received numerous requests to provide a summary glossary for our publications and other relevant sources, and to make the glossary available to practitioners. As a result of these requests, this glossary of common security terms has been...

Publications ITL Bulletin (Final) May 1, 2013
https://csrc.nist.gov/pubs/itlb/2013/05/itl-publishes-security-and-privacy-controls-for-fe/final

Abstract: This ITL Bulletin for May 2013 announces the publication of NIST Special Publication 800-53, Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations. Developed by the Joint Task Force Transformation Initiative Interagency Working Group, the publication is part of...

Publications Journal Article (Final) April 1, 2013
https://csrc.nist.gov/pubs/journal/2013/04/logic-minimization-techniques-with-applications-to/final

Journal: Journal of Cryptology Abstract: A new technique for combinational logic optimization is described. The technique is a two-step process. In the rst step, the non-linearity of a circuit { as measured by the number of non-linear gates it contains { is reduced. The second step reduces the number of gates in the linear components of th...

Publications Conference Paper (Final) March 22, 2013
https://csrc.nist.gov/pubs/conference/2013/03/22/combinatorial-coverage-measurement-concepts-and-ap/final

Conference: Second International Workshop on Combinatorial Testing 2013 (IWCT 2013) Abstract: Combinatorial testing applies factor covering arrays to test all t-way combinations of input or configuration state space. In some testing situations, it is not practical to use covering arrays, but any set of tests covers at least some portion of t-way combinations up to t <= n. This report desc...

Publications IR 7916 (Final) February 15, 2013
https://csrc.nist.gov/pubs/ir/7916/final

Abstract: Proceedings of the Cybersecurity in Cyber-Physical Workshop, April 23 – 24, 2012, complete with abstracts and slides from presenters. Some of the cyber-physical systems covered during the first day of the workshop included networked automotive vehicles, networked medical devices, semi-conductor manu...

Publications Journal Article (Final) January 11, 2013
https://csrc.nist.gov/pubs/journal/2013/01/changes-in-federal-information-processing-standard/final

Journal: Cryptologia Abstract: This paper describes the changes between FIPS 180-3 and FIPS 180-4. FIPS 180-4 specifies two new secure cryptographic hash algorithms: SHA-512/224 and SHA-512/256; it also includes a method for determining initial value(s) for any future SHA-512-based hash algorithm(s). FIPS 180-4 also removes a req...

Publications Journal Article (Final) January 1, 2013
https://csrc.nist.gov/pubs/journal/2013/01/advances-in-biometric-standardisation/final

Journal: International Journal of Biometrics Abstract: The paper discusses the current status of biometric standards development activities, with a focus on international standards developments. Published standards, as well as standards under development or planned for the near future, are addressed. The work of Joint Technical Committee 1 of ISO and IE...

Publications ITL Bulletin (Final) December 19, 2012
https://csrc.nist.gov/pubs/itlb/2012/12/generating-secure-cryptographic-keys-a-critical-co/final

Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-133, Recommendation for Cryptographic Key Generation. The publication helps federal government organizations generate the cryptographic keys that are to be used with approved cryptographic algorithms to protect i...

Publications Other (Final) December 1, 2012
https://csrc.nist.gov/pubs/other/2012/12/01/proof-of-concept-for-an-ict-scrm-enterprise-assess/final

Abstract: The Supply Chain Management Center of The RH Smith School Of Business, University Of Maryland has completed a third phase of research for NIST ITL built upon its prior activities; and developed an Enterprise ICT SCRM Assessment Package as a proof of concept. This Package is delivered through an...

Publications Other (Final) November 19, 2012
https://csrc.nist.gov/pubs/other/2012/11/19/challenging-security-requirements-for-usg-cloud-ad/final

Abstract: The Federal Cloud Strategy, February 8, 2010, outlines a federal cloud computing program that identifies program objectives aimed at accelerating the adoption of cloud computing across the federal government. NIST, along with other agencies, was tasked with a key role and specific activities in supp...

Publications IR 7878 (Final) October 26, 2012
https://csrc.nist.gov/pubs/ir/7878/final

Abstract: Combinatorial testing applies factor covering arrays to test all t-way combinations of input or configuration state space. In some testing situations, it is not practical to use covering arrays, but any set of tests covers at least some portion of t-way combinations up to t [less than or equal to] n...

<< first   < previous   78     79     80     81     82     83     84     85     86     87     88     89     90     91     92     93     94     95     96     97     98     99     100     101     102  next >  last >>