U.S. flag   An unofficial archive of your favorite United States government website
This is an archive
(replace .gov by .rip)

Events

December 2, 2009 - December 3, 2009
(All presentations in .pdf format.) Federal Register Notice (None Provided for this Meeting) Minutes (None Provided) Wednesday, December 2, 2009 Cloud Computing and the US Government Trusted Internet Connection (TIC)...
December 1, 2009 - December 3, 2009
The purpose of the 3-day workshop is to provide a high-level tutorial of the six part standard, ISO/IEC 24727 - Identification cards – Integrated circuit card programming interfaces, a multi-part standard for interoperable...
December 1, 2009
Presentations & Speakers at a Glance: Measure More, Spend Less on the Way to Better Security – John Streufert, U.S. Department of State. NOTE:  FORUM MEETINGS ARE OPEN TO ONLY FEDERAL/STATE EMPLOYEES, HIGHER EDUCATION...
October 13, 2009 - October 14, 2009
On October 13-14, NIST sponsored an End-to-End Voting System Workshop designed to bring together researchers in cryptography, security, and usability and election practitioners including election officials and voting system...
October 7, 2009
Information Security and Privacy Advisory Board (ISPAB) October 2009 Meeting
September 1, 2009 - September 3, 2009
NIST and the National Security Agency (NSA) co-hosted the Privilege Management Workshop at NIST in Gaithersburg, Maryland, on September 1-3, 2009. Workshop Results NISTIR 7665, Proceedings of the Privilege Management...
July 29, 2009 - July 31, 2009
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Wednesday, July 29 TIC External Connections Sean Donelan, Program Manager, Network and Infrastructure Security, DHS Data.Gov Panel...
June 8, 2009 - June 9, 2009
A CKM Workshop was held at NIST on June 8-9, 2009. Approximately 100 people participated in the Workshop at NIST on-site and approximately 90 people participated via a Webcast service. The program consisted of five keynote...
May 18, 2009 - May 19, 2009
To discuss challenges, tips, and techniques for implementing the requirements of the HIPAA Security Rule, with particular focus on strategies for assessing the effectiveness of implemented security controls to support...
April 1, 2009 - April 3, 2009
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Wednesday, April 1 Consensus Audit Guidelines John Gilligan, Gilligan Group, Inc. DNS Sec Report Fiona Alexander, NTIA Tim Polk, NIST...
February 25, 2009 - February 28, 2009
The purpose of the SHA-3 Conference was to allow the submitters of the first round candidates to present their algorithms, and for NIST to discuss the way forward with the competition. Selected NIST Presentations: System...

* "Relevance" merely indicates the search engine's score for a document. It is based on the search parameters and information in the document's detailed record.