Try the new CSRC.nist.gov and let us know what you think!
(Note: Beta site content may not be complete.)

View the beta site
NIST Logo and ITL Banner Link to the NIST Homepage Link to the ITL Homepage Link to the NIST Homepage

NIST Internal/Interagency Reports (NISTIR)

NIST Internal or Interagency Reports (NISTIRs) describe research of a technical nature of interest to a specialized audience. The series includes interim or final reports on work performed by NIST for outside sponsors (both government and nongovernment). NISTIRs may also report results of NIST projects of transitory or limited interest, including those that will be published subsequently in more comprehensive form.

This list includes computer/cyber/information security- and privacy- related NISTIRs.

Note: Publications that link to dx.doi.org/... will redirect to another NIST website. See more details about DOIs.

NumberDateTitle
NISTIR 8179 
(Draft)
July 2017DRAFT Criticality Analysis Process Model: Prioritizing Systems and Components
Announcement and Draft Publication
NISTIR 8176 
(Draft)
August 2017DRAFT Security Assurance Challenges for Container Deployment
Announcement and Draft Publication
NISTIR 8170 
(Draft)
May 2017DRAFT The Cybersecurity Framework: Implementation Guidance for Federal Agencies
Announcement and Draft Publication
NISTIR 8151November 2016Dramatically Reducing Software Vulnerabilities: Report to the White House Office of Science and Technology Policy
NISTIR 8151 FAQ
doi:10.6028/NIST.IR.8151 [Direct Link]
NISTIR 8149 
(Draft)
October 2016DRAFT Developing Trust Frameworks to Support Identity Federations
Announcement and Draft Publication
NISTIR 8144 
(Draft)
September 2016DRAFT Assessing Threats to Mobile Devices & Infrastructure: the Mobile Threat Catalogue
Announcement and Draft Publication
NISTIR 8139 
(Draft)
February 2017DRAFT Identifying Uniformity with Entropy and Divergence
Announcement and Draft Publication
NISTIR 8138 
(Draft)
September 2016DRAFT Vulnerability Description Ontology (VDO): a Framework for Characterizing Vulnerabilities
Announcement and Draft Publication
NISTIR 8136January 2017An Overview of Mobile Application Vetting Services for Public Safety
NISTIR 8136 FAQ
doi:10.6028/NIST.IR.8136 [Direct Link]
NISTIR 8135May 2016 Identifying and Categorizing Data Types for Public Safety Mobile Applications: Workshop Report
NISTIR 8135 FAQ
doi:10.6028/NIST.IR.8135 [Direct Link]
NISTIR 8114March 2017Report on Lightweight Cryptography
NISTIR 8114 FAQ
doi:10.6028/NIST.IR.8114 [Direct Link]
Comments received on Draft (Aug. 2016)
NISTIR 8112 
(Draft)
August 2016DRAFT Attribute Metadata
Announcement and Draft Publication
NISTIR 8105April 2016 Report on Post-Quantum Cryptography
NISTIR 8105 FAQ
doi:10.6028/NIST.IR.8105 [Direct Link]
Press Release
Comments received on Draft NISTIR 8105
NISTIR 8103September 2016Advanced Identity Workshop on Applying Measurement Science in the Identity Ecosystem: Summary and Next Steps
NISTIR 8103 FAQ
doi:10.6028/NIST.IR.8103 [Direct Link]
NISTIR 8085 
(Draft)
December 2015 DRAFT Forming Common Platform Enumeration (CPE) Names from Software Identification (SWID) Tags
Announcement and Draft Publication
NISTIR 8080July 2016Usability and Security Considerations for Public Safety Mobile Authentication
NISTIR 8080 FAQ
doi:10.6028/NIST.IR.8080 [Direct Link]
NISTIR 8074 Vol. 2December 2015 Supplemental Information for the Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity
NISTIR 8074 Vol. 2 FAQ
doi:10.6028/NIST.IR.8074v2 [Direct Link]
NISTIR 8074 Vol. 1December 2015 Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity
NISTIR 8074 Vol. 1 FAQ
doi:10.6028/NIST.IR.8074v1 [Direct Link]
NISTIR 8062January 2017An Introduction to Privacy Engineering and Risk Management in Federal Systems
NISTIR 8062 FAQ
doi:10.6028/NIST.IR.8062 [Direct Link]
"Making Privacy Concrete (three words not usually found together)" (blog post)
NISTIR 8060April 2016 Guidelines for the Creation of Interoperable Software Identification (SWID) Tags
NISTIR 8060 FAQ
doi:10.6028/NIST.IR.8060 [Direct Link]
Guideline Summary for NISTIR 8060
Schema Definition for NISTIR 8060
NISTIR 8058 
(Draft)
May 1, 2015 DRAFT Security Content Automation Protocol (SCAP) Version 1.2 Content Style Guide: Best Practices for Creating and Maintaining SCAP 1.2 Content
Announcement and Draft Publication
NISTIR 8055January 2016 Derived Personal Identity Verification (PIV) Credentials (DPC) Proof of Concept Research
NISTIR 8055 FAQ
doi:10.6028/NIST.IR.8055 [Direct Link]
NISTIR 8054April 2015 (Updated 9/20/2015)NSTIC Pilots: Catalyzing the Identity Ecosystem
NISTIR 8054 (including updates as of 09-20-2015) FAQ
doi:10.6028/NIST.IR.8054 [Direct Link]
NISTIR 8053October 2015 De-Identification of Personal Information
NISTIR 8053 FAQ
doi:10.6028/NIST.IR.8053 [Direct Link]
NISTIR 8050 
(Draft)
April 2, 2015 DRAFT Executive Technical Workshop on Improving Cybersecurity and Consumer Privacy: Summary and Next Steps
Announcement and Draft Publication
NISTIR 8041April 2015 Proceedings of the Cybersecurity for Direct Digital Manufacturing (DDM) Symposium
NISTIR 8041 FAQ
doi:10.6028/NIST.IR.8041 [Direct Link]
NISTIR 8040April 2016 Measuring the Usability and Security of Permuted Passwords on Mobile Platforms
NISTIR 8040 FAQ
doi:10.6028/NIST.IR.8040 [Direct Link]
NISTIR 8023February 2015 Risk Management for Replication Devices
NISTIR 8023 FAQ
doi:10.6028/NIST.IR.8023 [Direct Link]
NISTIR 8018January 2015 Public Safety Mobile Application Security Requirements Workshop Summary
NISTIR 8018 FAQ
doi:10.6028/NIST.IR.8018 [Direct Link]
NISTIR 8014March 2015 Considerations for Identity Management in Public Safety Mobile Networks
NISTIR 8014 FAQ
doi:10.6028/NIST.IR.8014 [Direct Link]
Press Release
NISTIR 8011 Vol. 2June 2017Automation Support for Security Control Assessments: Hardware Asset Management
NISTIR 8011 Vol. 2 FAQ
doi:10.6028/NIST.IR.8011-2 [Direct Link]
NISTIR 8011 Vol. 1June 2017Automation Support for Security Control Assessments: Overview
NISTIR 8011 Vol. 1 FAQ
doi:10.6028/NIST.IR.8011-1 [Direct Link]
NISTIR 8006 
(Draft)
June 2014 DRAFT NIST Cloud Computing Forensic Science Challenges
Announcement and Draft Publication
NISTIR 7987 Rev. 1October 2015 Policy Machine: Features, Architecture, and Specification
NISTIR 7987 Revision 1 FAQ
doi:10.6028/NIST.IR.7987r1 [Direct Link]
NISTIR 7981 
(Draft)
March 2014 DRAFT Mobile, PIV, and Authentication
Announcement and Draft Publication
NISTIR 7977March 2016 NIST Cryptographic Standards and Guidelines Development Process
NISTIR 7977 FAQ
doi:10.6028/NIST.IR.7977 [Direct Link]
Press Release
Summary of Second Draft Comments (released Jan. 2016)
Comments received on Second Draft (Jan. 2015)
Second Draft NISTIR 7977 (Jan. 2015)
Summary of First Draft Comments
Comments received on First Draft (Feb. 2014)
First Draft NISTIR 7977 (Feb. 2014)
NISTIR 7966October 2015 Security of Interactive and Automated Access Management Using Secure Shell (SSH)
NISTIR 7966 FAQ
doi:10.6028/NIST.IR.7966 [Direct Link]
NISTIR 7957August 2013 Conformance Test Architecture and Test Suite for ANSI/NIST-ITL 1-2011 NIEM XML Encoded Transactions
NISTIR 7957 FAQ
doi:10.6028/NIST.IR.7957 [Direct Link]
NISTIR 7956September 2013 Cryptographic Key Management Issues & Challenges in Cloud Services
NISTIR 7956 FAQ
doi:10.6028/NIST.IR.7956 [Direct Link]
NISTIR 7946April 2014 CVSS Implementation Guidance
NISTIR 7946 FAQ
doi:10.6028/NIST.IR.7946 [Direct Link]
NISTIR 7933May 2013 Requirements and Conformance Test Assertions for ANSI/NIST-ITL 1-2011 Record Type 18 - DNA Record
NISTIR 7933 FAQ
doi:10.6028/NIST.IR.7933 [Direct Link]
NISTIR 7924 
(Draft)
May 2014 DRAFT Reference Certificate Policy
Announcement and Draft Publication
NISTIR 7916February 2013 Proceedings of the Cybersecurity in Cyber-Physical Systems Workshop, April 23-24, 2012
NISTIR 7916 FAQ
doi:10.6028/NIST.IR.7916 [Direct Link]
NISTIR 7904December 2015 Trusted Geolocation in the Cloud: Proof of Concept Implementation
NISTIR 7904 FAQ
doi:10.6028/NIST.IR.7904 [Direct Link]
NISTIR 7896November 2012 Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
NISTIR 7896 FAQ
doi:10.6028/NIST.IR.7896 [Direct Link]
NISTIR 7878October 2012 Combinatorial Coverage Measurement
NISTIR 7878 FAQ
doi:10.6028/NIST.IR.7878 [Direct Link]
NISTIR 7877September 2012 BioCTS 2012: Advanced Conformance Test Architectures and Test Suites for Biometric Data Interchange Formats and Biometric Information Records
NISTIR 7877 FAQ
doi:10.6028/NIST.IR.7877 [Direct Link]
NISTIR 7874September 2012 Guidelines for Access Control System Evaluation Metrics
NISTIR 7874 FAQ
doi:10.6028/NIST.IR.7874 [Direct Link]
NISTIR 7870July 2012 NIST Test Personal Identity Verification (PIV) Cards
NISTIR 7870 FAQ
doi:10.6028/NIST.IR.7870 [Direct Link]
NISTIR 7864July 2012 The Common Misuse Scoring System (CMSS): Metrics for Software Feature Misuse Vulnerabilities
NISTIR 7864 FAQ
doi:10.6028/NIST.IR.7864 [Direct Link]
Press Release
NISTIR 7863June 2015 Cardholder Authentication for the PIV Digital Signature Key
NISTIR 7863 FAQ
doi:10.6028/NIST.IR.7863 [Direct Link]
NISTIR 7849March 2014 A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification
NISTIR 7849 FAQ
doi:10.6028/NIST.IR.7849 [Direct Link]
NISTIR 7848 
(Draft)
May 2012 DRAFT Specification for the Asset Summary Reporting Format 1.0
Announcement and Draft Publication
NISTIR 7823March 2015 Advanced Metering Infrastructure Smart Meter Upgradeability Test Framework
NISTIR 7823 FAQ
doi:10.6028/NIST.IR.7823 [Direct Link]
NISTIR 7817November 2012 A Credential Reliability and Revocation Model for Federated Identities
NISTIR 7817 FAQ
doi:10.6028/NIST.IR.7817 [Direct Link]
NISTIR 7816May 2012 Computer Security Division 2011 Annual Report
NISTIR 7816 FAQ
doi:10.6028/NIST.IR.7816 [Direct Link]
NISTIR 7815July 2011 Access Control for SAR Systems
NISTIR 7815 FAQ
doi:10.6028/NIST.IR.7815 [Direct Link]
NISTIR 7806September 2011 ANSI/NIST-ITL 1-2011 Requirements and Conformance Test Assertions
NISTIR 7806 FAQ
doi:10.6028/NIST.IR.7806 [Direct Link]
NISTIR 7802September 2011 Trust Model for Security Automation Data 1.0 (TMSAD)
NISTIR 7802 FAQ
doi:10.6028/NIST.IR.7802 [Direct Link]
NISTIR 7800 
(Draft)
January 2012 DRAFT Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains
Announcement and Draft Publication
NISTIR 7799 
(Draft)
January 2012 DRAFT Continuous Monitoring Reference Model Workflow, Subsystem, and Interface Specifications
Announcement and Draft Publication
NISTIR 7791June 2011 Conformance Test Architecture and Test Suite for ANSI/NIST-ITL 1-2007
NISTIR 7791 FAQ
doi:10.6028/NIST.IR.7791 [Direct Link]
NISTIR 7788August 2011 Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs
NISTIR 7788 FAQ
doi:10.6028/NIST.IR.7788 [Direct Link]
NISTIR 7773November 2010 An Application of Combinatorial Methods to Conformance Testing for Document Object Model Events
NISTIR 7773 FAQ
doi:10.6028/NIST.IR.7773 [Direct Link]
NISTIR 7771February 2011 Conformance Test Architecture for Biometric Data Interchange Formats - Version Beta 2.0
NISTIR 7771 FAQ
doi:10.6028/NIST.IR.7771 [Direct Link]
NISTIR 7770February 2011 Security Considerations for Remote Electronic UOCAVA Voting
NISTIR 7770 FAQ
doi:10.6028/NIST.IR.7770 [Direct Link]
NISTIR 7764February 2011 Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition
NISTIR 7764 FAQ
doi:10.6028/NIST.IR.7764 [Direct Link]
NISTIR 7756 
(Draft)
January 2012 DRAFT CAESARS Framework Extension: An Enterprise Continuous Monitoring Technical Reference Architecture
Announcement and Draft Publication
NISTIR 7751May 2011 Computer Security Division 2010 Annual Report
NISTIR 7751 FAQ
doi:10.6028/NIST.IR.7751 [Direct Link]
NISTIR 7711September 2011 Security Best Practices for the Electronic Transmission of Election Materials for UOCAVA Voters
NISTIR 7711 FAQ
doi:10.6028/NIST.IR.7711 [Direct Link]
NISTIR 7698August 2011 Common Platform Enumeration: Applicability Language Specification Version 2.3
NISTIR 7698 FAQ
doi:10.6028/NIST.IR.7698 [Direct Link]
Press Release (for NISTIRs 7695-7698)
NISTIR 7697August 2011 Common Platform Enumeration: Dictionary Specification Version 2.3
NISTIR 7697 FAQ
doi:10.6028/NIST.IR.7697 [Direct Link]
Press Release (for NISTIRs 7695-7698)
NISTIR 7696August 2011 Common Platform Enumeration: Name Matching Specification Version 2.3
NISTIR 7696 FAQ
doi:10.6028/NIST.IR.7696 [Direct Link]
Press Release (for NISTIRs 7695-7698)
NISTIR 7695August 2011 Common Platform Enumeration: Naming Specification Version 2.3
NISTIR 7695 FAQ
doi:10.6028/NIST.IR.7695 [Direct Link]
Press Release (for NISTIRs 7695-7698)
NISTIR 7694June 2011 Specification for Asset Reporting Format 1.1
NISTIR 7694 FAQ
doi:10.6028/NIST.IR.7694 [Direct Link]
NISTIR 7693June 2011 Specification for Asset Identification 1.1
NISTIR 7693 FAQ
doi:10.6028/NIST.IR.7693 [Direct Link]
NISTIR 7692April 2011 Specification for the Open Checklist Interactive Language (OCIL) Version 2.0
NISTIR 7692 FAQ
doi:10.6028/NIST.IR.7692 [Direct Link]
NISTIR 7682September 2011 Information System Security Best Practices for UOCAVA-Supporting Systems
NISTIR 7682 FAQ
doi:10.6028/NIST.IR.7682 [Direct Link]
NISTIR 7676June 2010 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards
NISTIR 7676 FAQ
doi:10.6028/NIST.IR.7676 [Direct Link]
NISTIR 7665January 2010 Proceedings of the Privilege Management Workshop, September 1-3, 2009
NISTIR 7665 FAQ
doi:10.6028/NIST.IR.7665 [Direct Link]
NISTIR 7658February 2010 Guide to SIMfill Use and Development
NISTIR 7658 FAQ
doi:10.6028/NIST.IR.7658 [Direct Link]
NISTIR 7657March 2010 A Report on the Privilege (Access) Management Workshop
NISTIR 7657 FAQ
doi:10.6028/NIST.IR.7657 [Direct Link]
NISTIR 7653March 2010 Computer Security Division 2009 Annual Report
NISTIR 7653 FAQ
doi:10.6028/NIST.IR.7653 [Direct Link]
NISTIR 7628 Rev. 1September 2014 Guidelines for Smart Grid Cybersecurity
NISTIR 7628 Rev. 1, (Volumes 1-3) FAQ
doi:10.6028/NIST.IR.7628r1 [Direct Link]
NISTIR 7622October 2012 Notional Supply Chain Risk Management Practices for Federal Information Systems
NISTIR 7622 FAQ
doi:10.6028/NIST.IR.7622 [Direct Link]
Press Release
NISTIR 7621 Rev. 1November 2016Small Business Information Security: the Fundamentals
NISTIR 7621 Rev. 1 FAQ
doi:10.6028/NIST.IR.7621r1 [Direct Link]
Press Release
"Ignoring Cybersecurity is Risky Business" (blog post)
NISTIR 7620September 2009 Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition
NISTIR 7620 FAQ
doi:10.6028/NIST.IR.7620 [Direct Link]
NISTIR 7617October 2009 Mobile Forensic Reference Materials: a Methodology and Reification
NISTIR 7617 FAQ
doi:10.6028/NIST.IR.7617 [Direct Link]
NISTIR 7611August 2009 Use of ISO/IEC 24727
NISTIR 7611 FAQ
doi:10.6028/NIST.IR.7611 [Direct Link]
NISTIR 7609January 2010 Cryptographic Key Management Workshop Summary -- June 8-9, 2009
NISTIR 7609 FAQ
doi:10.6028/NIST.IR.7609 [Direct Link]
NISTIR 7601August 2010 Framework for Emergency Response Officials (ERO): Authentication and Authorization Infrastructure
NISTIR 7601 FAQ
doi:10.6028/NIST.IR.7601 [Direct Link]
NISTIR 7581September 2009 System and Network Security Acronyms and Abbreviations
NISTIR 7581 FAQ
doi:10.6028/NIST.IR.7581 [Direct Link]
NISTIR 7564April 2009 Directions in Security Metrics Research
NISTIR 7564 FAQ
doi:10.6028/NIST.IR.7564 [Direct Link]
NISTIR 7559June 2010 Forensics Web Services (FWS)
NISTIR 7559 FAQ
doi:10.6028/NIST.IR.7559 [Direct Link]
NISTIR 7551December 2008 A Threat Analysis on UOCAVA Voting Systems
NISTIR 7551 FAQ
doi:10.6028/NIST.IR.7551 [Direct Link]
NISTIR 7539December 2009 Symmetric Key Injection onto Smart Cards
NISTIR 7539 FAQ
doi:10.6028/NIST.IR.7539 [Direct Link]
NISTIR 7536March 2009 Computer Security Division 2008 Annual Report
NISTIR 7536 FAQ
doi:10.6028/NIST.IR.7536 [Direct Link]
NISTIR 7516August 2008 Forensic Filtering of Cell Phone Protocols
NISTIR 7516 FAQ
doi:10.6028/NIST.IR.7516 [Direct Link]
NISTIR 7511 Rev. 4January 2016 Security Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements
NISTIR 7511 Rev. 4 FAQ
doi:10.6028/NIST.IR.7511r4 [Direct Link]
NISTIR 7502December 2010 The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities
NISTIR 7502 FAQ
doi:10.6028/NIST.IR.7502 [Direct Link]
NISTIR 7497September 2010 Security Architecture Design Process for Health Information Exchanges (HIEs)
NISTIR 7497 FAQ
doi:10.6028/NIST.IR.7497 [Direct Link]
NISTIR 7452November 2007 Secure Biometric Match-on-Card Feasibility Report
NISTIR 7452 FAQ
doi:10.6028/NIST.IR.7452 [Direct Link]
NISTIR 7442April 2008 Computer Security Division 2007 Annual Report
NISTIR 7442 FAQ
doi:10.6028/NIST.IR.7442 [Direct Link]
NISTIR 7435August 2007 The Common Vulnerability Scoring System (CVSS) and its Applicability to Federal Agency Systems
NISTIR 7435 FAQ
doi:10.6028/NIST.IR.7435 [Direct Link]
NISTIR 7427September 2007 6th Annual PKI R&D Workshop "Applications-Driven PKI" Proceedings
NISTIR 7427 FAQ
doi:10.6028/NIST.IR.7427 [Direct Link]
NISTIR 7399March 2007 Computer Security Division 2006 Annual Report
NISTIR 7399 FAQ
doi:10.6028/NIST.IR.7399 [Direct Link]
NISTIR 7387March 2007 Cell Phone Forensic Tools: an Overview and Analysis Update
NISTIR 7387 FAQ
doi:10.6028/NIST.IR.7387 [Direct Link]
NISTIR 7359January 2007 Information Security Guide for Government Executives
NISTIR 7359 FAQ
doi:10.6028/NIST.IR.7359 [Direct Link]
Booklet
NISTIR 7358January 2007 Program Review for Information Security Management Assistance (PRISMA)
NISTIR 7358 FAQ
doi:10.6028/NIST.IR.7358 [Direct Link]
NISTIR 7337August 2006 Personal Identity Verification Demonstration Summary
NISTIR 7337 FAQ
doi:10.6028/NIST.IR.7337 [Direct Link]
NISTIR 7316September 2006 Assessment of Access Control Systems
NISTIR 7316 FAQ
doi:10.6028/NIST.IR.7316 [Direct Link]
NISTIR 7313July 2006 5th Annual PKI R&D Workshop "Making PKI Easy to Use" Proceedings
NISTIR 7313 FAQ
doi:10.6028/NIST.IR.7313 [Direct Link]
NISTIR 7298 Rev. 2May 2013 Glossary of Key Information Security Terms
NISTIR 7298 Rev. 2 FAQ
doi:10.6028/NIST.IR.7298r2 [Direct Link]
NISTIR 7290March 2006 Fingerprint Identification and Mobile Handheld Devices: An Overview and Implementation
NISTIR 7290 FAQ
doi:10.6028/NIST.IR.7290 [Direct Link]
NISTIR 7285February 2006 Computer Security Division 2005 Annual Report
NISTIR 7285 FAQ
doi:10.6028/NIST.IR.7285 [Direct Link]
NISTIR 7284January 2006 Personal Identity Verification Card Management Report
NISTIR 7284 FAQ
doi:10.6028/NIST.IR.7284 [Direct Link]
NISTIR 7275 Rev. 4March 2012Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.2
NISTIR 7275 Rev. 4
NISTIR 7275 Rev. 4 (markup)
NISTIR 7275 Rev. 3January 2008 Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.1.4
NISTIR 7275 Rev. 3 FAQ
doi:10.6028/NIST.IR.7275r3 [Direct Link]
NISTIR 7275January 2006 Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.1
NISTIR 7275 FAQ
doi:10.6028/NIST.IR.7275 [Direct Link]
NISTIR 7250October 2005 Cell Phone Forensic Tools: an Overview and Analysis
NISTIR 7250 FAQ
doi:10.6028/NIST.IR.7250 [Direct Link]
NISTIR 7224August 2005 4th Annual PKI R&D Workshop "Multiple Paths to Trust" Proceedings
NISTIR 7224 FAQ
doi:10.6028/NIST.IR.7224 [Direct Link]
NISTIR 7219April 2005 Computer Security Division 2004 Annual Report
NISTIR 7219 FAQ
doi:10.6028/NIST.IR.7219 [Direct Link]
NISTIR 7206July 2005 Smart Cards and Mobile Device Authentication: an Overview and Implementation
NISTIR 7206 FAQ
doi:10.6028/NIST.IR.7206 [Direct Link]
NISTIR 7200June 2005 Proximity Beacons and Mobile Device Authentication: an Overview and Implementation
NISTIR 7200 FAQ
doi:10.6028/NIST.IR.7200 [Direct Link]
NISTIR 7188January 2005 Specification for the Extensible Configuration Checklist Description Format (XCCDF)
NISTIR 7188 FAQ
doi:10.6028/NIST.IR.7188 [Direct Link]
NISTIR 7111April 2004 Computer Security Division 2003 Annual Report
NISTIR 7111 FAQ
doi:10.6028/NIST.IR.7111 [Direct Link]
NISTIR 7100August 2004 PDA Forensic Tools: an Overview and Analysis
NISTIR 7100 FAQ
doi:10.6028/NIST.IR.7100 [Direct Link]
NISTIR 7085April 2004 2nd Annual PKI Research Workshop Proceedings
NISTIR 7085 FAQ
doi:10.6028/NIST.IR.7085 [Direct Link]
NISTIR 7059November 2003 1st Annual PKI Research Workshop Proceedings
Proceedings from Dartmouth (August 2002)
NISTIR 7056March 2004 Card Technology Developments and Gap Analysis Interagency Report
NISTIR 7056 FAQ
doi:10.6028/NIST.IR.7056 [Direct Link]
NISTIR 7046August 2003 A Framework for Multi-mode Authentication: Overview and Implementation Guide
NISTIR 7046 FAQ
doi:10.6028/NIST.IR.7046 [Direct Link]
NISTIR 7030July 2003 Picture Password: A Visual Login Technique for Mobile Devices
NISTIR 7030 FAQ
doi:10.6028/NIST.IR.7030 [Direct Link]
NISTIR 7007July 11, 2003 An Overview of Issues in Testing Intrusion Detection Systems
NISTIR 7007 FAQ
doi:10.6028/NIST.IR.7007 [Direct Link]
NISTIR 6985April 2003 COTS Security Protection Profile - Operating Systems (CSPP-OS) (Worked Example Applying Guidance of NISTIR-6462, CSPP) Version 1.0
NISTIR 6985 FAQ
doi:10.6028/nist.ir.6985 [Direct Link]
NISTIR 6981April 2003 Policy Expression and Enforcement for Handheld Devices
NISTIR 6981 FAQ
doi:10.6028/NIST.IR.6981 [Direct Link]
NISTIR 6887 2003 EditionJuly 16, 2003 Government Smart Card Interoperability Specification, Version 2.1
NISTIR 6887
NISTIR 6529-AApril 5, 2004Common Biometric Exchange Formats Framework (CBEFF)
NISTIR 6529A
NISTIR 6483April 2000 Randomness Testing of the Advanced Encryption Standard Finalist Candidates
NISTIR 6483
NISTIR 6462December 1999 CSPP - Guidance for COTS Security Protection Profiles (Formerly: CS2 - Protection Profile Guidance for Near-Term COTS) Version 1.0
NISTIR 6462
NISTIR 6416October 1999 Applying Mobile Agents to Intrusion Detection and Response
NISTIR 6416
NISTIR 6390September 1999 Randomness Testing of the Advanced Encryption Standard Candidate Algorithms
NISTIR 6390
NISTIR 6192July 9, 1998 A Revised Model for Role Based Access Control
NISTIR 6192
Citation Page for NISTIR 6192
NISTIR 5820April 1, 1996 Distributed Communication Methods and Role-Based Access Control for Use in Health Care Applications
NISTIR 5820
NISTIR 5495September 1994 Computer Security Training & Awareness Course Compendium
NISTIR 5495
NISTIR 5472March 1994 A Head Start on Assurance: Proceedings of an Invitational Workshop on Information Technology (IT) Assurance and Trustworthiness, March 21-23, 1994
NISTIR 5472
NISTIR 5308December 1993 General Procedures for Registering Computer Security Objects
NISTIR 5308
NISTIR 5153March 1993 Minimum Security Requirements for Multi-User Operating Systems
NISTIR 5153
NISTIR 4976November 1992 Assessing Federal and Commercial Information Security Needs
NISTIR 4976
NISTIR 4939October 1992 Threat Assessment of Malicious Code and External Attacks
NISTIR 4939 (HTML)
NISTIR 4939 (TXT)
NISTIR 4749December 1991 Sample Statement of Work for Federal Computer Security Services: For use In-House or Contracting Out
NISTIR 4749
NISTIR 4734February 1992 Foundations of a Security Policy for Use of the National Research and Educational Network
NISTIR 4734
NISTIR 4545April 1991 Computer Security: Selected Articles
NISTIR 4545
NISTIR 4228January 1990 Prototyping SP4: a Secure Data Network System Transport Protocol Interoperability Demonstration Project
NISTIR 4228
Back to Top