NIST Logo and ITL Banner Link to the NIST Homepage Link to the ITL Homepage Link to the NIST Homepage
Search CSRC:

groups

Publications

more publications

To receive email notification(s) when new security publications are released, subscribe to the CSRC Publications Mailing List. To learn more, Click Here.


Website Survey:

Please take a moment to fill out our CSRC website survey. Your input on how to improve the site will allow us to improve our services to you.

Click Here to go directly to the on-line survey form. Thank you for taking a moment for filling out the survey NOTE: The survey has been taken off-line so it can be updated..

News

  • NIST Issues Call for a New "Hash" Algorithm. NIST has opened a public competition to develop a new cryptographic “hash” algorithm, which converts a .........

    read more >

  • [September 30, 2008] -- NIST announces the release of 3 publications -- the final release of SP 800-121, Guide to Bluetooth Security; SP 800-115, Technical Guide to Information Security Testing and Assessment; and Draft Special Publication 800-82 Guide to Industrial Control Systems (ICS) Security.

    read more >

  • [September 24, 2008] -- NIST Special Publication 800-73-2, Interfaces for Personal Identity Verification has been released. This document has been...

    read more >

  • [September 19, 2008] -- NIST is proud to release Draft SP 800-70 Revision 1

    read more >

  • [September 10, 2008] -- The National Institute of Standards and Technology (NIST) is pleased to announce a 2nd draft publication SP 800-116, A Recommendation for the Use of PIV Credentials in Physical Access Control Systems. This draft provides.....

    read more >

  • [August 22, 2008] -- NIST Computer Security Division is proud to announce the release of NIST Interagency Report (IR) 7516, Forensic Filtering of Cell Phone Protocols

    read more >

  • [August 19, 2008] -- The initial public draft of NIST Special Publication 800-37, Revision 1, Guide for Security Authorization of Federal Information Systems: A Security Lifecycle Approach, is now available for a six-week public comment period.

    read more >

  • [August 14, 2008] -- NIST announces the release of the initial public draft (IPD) of exemplary Assessment Cases for the security control assessment procedures described in Appendix F of SP 800-53A Guide for Assessing the Security Controls in Federal Information Systems.....

    read more >

more news

NIST Security Events

8th Symposium on Identity and Trust on the Internet (IDtrust 2009)
April 14-16, 2009

National Institute of Standards and Technology; Administration Building, Green Auditorium

IDtrust is devoted to research and deployment experience related to making good security decisions based on identity information, especially when public key cryptography is used and the human elements of usability are considered. The success of any collaborative strategy depends on having the right people gain access to the right information at the right time. This implies that an IT infrastructure has - among other things - an authorization framework in place that can respond to dynamic security conditions and regulatory requirements quickly, flexibly and securely. What are the authorization strategies that will succeed in the next decade? What technologies exist to address complex requirements today? What research is academia and industry pursuing to solve the problems likely to show up in the next few years?
Conference Website: http://middleware.internet2.edu/idtrust
Technical Contact: Tim Polk [william.polk@nist.gov]

more events