NISTIR 8179 (Draft) | July 2017 | DRAFT Criticality Analysis Process Model: Prioritizing Systems and Components Announcement and Draft Publication |
NISTIR 8176 (Draft) | August 2017 | DRAFT Security Assurance Challenges for Container Deployment Announcement and Draft Publication |
NISTIR 8170 (Draft) | May 2017 | DRAFT The Cybersecurity Framework: Implementation Guidance for Federal Agencies Announcement and Draft Publication |
NISTIR 8151 | November 2016 | Dramatically Reducing Software Vulnerabilities: Report to the White House Office of Science and Technology Policy NISTIR 8151 FAQ doi:10.6028/NIST.IR.8151 [Direct Link] |
NISTIR 8149 (Draft) | October 2016 | DRAFT Developing Trust Frameworks to Support Identity Federations Announcement and Draft Publication |
NISTIR 8144 (Draft) | September 2016 | DRAFT Assessing Threats to Mobile Devices & Infrastructure: the Mobile Threat Catalogue Announcement and Draft Publication |
NISTIR 8139 (Draft) | February 2017 | DRAFT Identifying Uniformity with Entropy and Divergence Announcement and Draft Publication |
NISTIR 8138 (Draft) | September 2016 | DRAFT Vulnerability Description Ontology (VDO): a Framework for Characterizing Vulnerabilities Announcement and Draft Publication |
NISTIR 8136 | January 2017 | An Overview of Mobile Application Vetting Services for Public Safety NISTIR 8136 FAQ doi:10.6028/NIST.IR.8136 [Direct Link] |
NISTIR 8135 | May 2016 | Identifying and Categorizing Data Types for Public Safety Mobile Applications: Workshop Report NISTIR 8135 FAQ doi:10.6028/NIST.IR.8135 [Direct Link] |
NISTIR 8114 | March 2017 | Report on Lightweight Cryptography NISTIR 8114 FAQ doi:10.6028/NIST.IR.8114 [Direct Link] |
| | Comments received on Draft (Aug. 2016) |
NISTIR 8112 (Draft) | August 2016 | DRAFT Attribute Metadata Announcement and Draft Publication |
NISTIR 8105 | April 2016 | Report on Post-Quantum Cryptography NISTIR 8105 FAQ doi:10.6028/NIST.IR.8105 [Direct Link] |
| | Press Release |
| | Comments received on Draft NISTIR 8105 |
NISTIR 8103 | September 2016 | Advanced Identity Workshop on Applying Measurement Science in the Identity Ecosystem: Summary and Next Steps NISTIR 8103 FAQ doi:10.6028/NIST.IR.8103 [Direct Link] |
NISTIR 8085 (Draft) | December 2015 | DRAFT Forming Common Platform Enumeration (CPE) Names from Software Identification (SWID) Tags Announcement and Draft Publication |
NISTIR 8080 | July 2016 | Usability and Security Considerations for Public Safety Mobile Authentication NISTIR 8080 FAQ doi:10.6028/NIST.IR.8080 [Direct Link] |
NISTIR 8074 Vol. 2 | December 2015 | Supplemental Information for the Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity NISTIR 8074 Vol. 2 FAQ doi:10.6028/NIST.IR.8074v2 [Direct Link] |
NISTIR 8074 Vol. 1 | December 2015 | Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity NISTIR 8074 Vol. 1 FAQ doi:10.6028/NIST.IR.8074v1 [Direct Link] |
NISTIR 8062 | January 2017 | An Introduction to Privacy Engineering and Risk Management in Federal Systems NISTIR 8062 FAQ doi:10.6028/NIST.IR.8062 [Direct Link] |
| | "Making Privacy Concrete (three words not usually found together)" (blog post) |
NISTIR 8060 | April 2016 | Guidelines for the Creation of Interoperable Software Identification (SWID) Tags NISTIR 8060 FAQ doi:10.6028/NIST.IR.8060 [Direct Link] |
| | Guideline Summary for NISTIR 8060 |
| | Schema Definition for NISTIR 8060 |
NISTIR 8058 (Draft) | May 1, 2015 | DRAFT Security Content Automation Protocol (SCAP) Version 1.2 Content Style Guide: Best Practices for Creating and Maintaining SCAP 1.2 Content Announcement and Draft Publication |
NISTIR 8055 | January 2016 | Derived Personal Identity Verification (PIV) Credentials (DPC) Proof of Concept Research NISTIR 8055 FAQ doi:10.6028/NIST.IR.8055 [Direct Link] |
NISTIR 8054 | April 2015 (Updated 9/20/2015) | NSTIC Pilots: Catalyzing the Identity Ecosystem NISTIR 8054 (including updates as of 09-20-2015) FAQ doi:10.6028/NIST.IR.8054 [Direct Link] |
NISTIR 8053 | October 2015 | De-Identification of Personal Information NISTIR 8053 FAQ doi:10.6028/NIST.IR.8053 [Direct Link] |
NISTIR 8050 (Draft) | April 2, 2015 | DRAFT Executive Technical Workshop on Improving Cybersecurity and Consumer Privacy: Summary and Next Steps Announcement and Draft Publication |
NISTIR 8041 | April 2015 | Proceedings of the Cybersecurity for Direct Digital Manufacturing (DDM) Symposium NISTIR 8041 FAQ doi:10.6028/NIST.IR.8041 [Direct Link] |
NISTIR 8040 | April 2016 | Measuring the Usability and Security of Permuted Passwords on Mobile Platforms NISTIR 8040 FAQ doi:10.6028/NIST.IR.8040 [Direct Link] |
NISTIR 8023 | February 2015 | Risk Management for Replication Devices NISTIR 8023 FAQ doi:10.6028/NIST.IR.8023 [Direct Link] |
NISTIR 8018 | January 2015 | Public Safety Mobile Application Security Requirements Workshop Summary NISTIR 8018 FAQ doi:10.6028/NIST.IR.8018 [Direct Link] |
NISTIR 8014 | March 2015 | Considerations for Identity Management in Public Safety Mobile Networks NISTIR 8014 FAQ doi:10.6028/NIST.IR.8014 [Direct Link] |
| | Press Release |
NISTIR 8011 Vol. 2 | June 2017 | Automation Support for Security Control Assessments: Hardware Asset Management NISTIR 8011 Vol. 2 FAQ doi:10.6028/NIST.IR.8011-2 [Direct Link] |
NISTIR 8011 Vol. 1 | June 2017 | Automation Support for Security Control Assessments: Overview NISTIR 8011 Vol. 1 FAQ doi:10.6028/NIST.IR.8011-1 [Direct Link] |
NISTIR 8006 (Draft) | June 2014 | DRAFT NIST Cloud Computing Forensic Science Challenges Announcement and Draft Publication |
NISTIR 7987 Rev. 1 | October 2015 | Policy Machine: Features, Architecture, and Specification NISTIR 7987 Revision 1 FAQ doi:10.6028/NIST.IR.7987r1 [Direct Link] |
NISTIR 7981 (Draft) | March 2014 | DRAFT Mobile, PIV, and Authentication Announcement and Draft Publication |
NISTIR 7977 | March 2016 | NIST Cryptographic Standards and Guidelines Development Process NISTIR 7977 FAQ doi:10.6028/NIST.IR.7977 [Direct Link] |
| | Press Release |
| | Summary of Second Draft Comments (released Jan. 2016) |
| | Comments received on Second Draft (Jan. 2015) |
| | Second Draft NISTIR 7977 (Jan. 2015) |
| | Summary of First Draft Comments |
| | Comments received on First Draft (Feb. 2014) |
| | First Draft NISTIR 7977 (Feb. 2014) |
NISTIR 7966 | October 2015 | Security of Interactive and Automated Access Management Using Secure Shell (SSH) NISTIR 7966 FAQ doi:10.6028/NIST.IR.7966 [Direct Link] |
NISTIR 7957 | August 2013 | Conformance Test Architecture and Test Suite for ANSI/NIST-ITL 1-2011 NIEM XML Encoded Transactions NISTIR 7957 FAQ doi:10.6028/NIST.IR.7957 [Direct Link] |
NISTIR 7956 | September 2013 | Cryptographic Key Management Issues & Challenges in Cloud Services NISTIR 7956 FAQ doi:10.6028/NIST.IR.7956 [Direct Link] |
NISTIR 7946 | April 2014 | CVSS Implementation Guidance NISTIR 7946 FAQ doi:10.6028/NIST.IR.7946 [Direct Link] |
NISTIR 7933 | May 2013 | Requirements and Conformance Test Assertions for ANSI/NIST-ITL 1-2011 Record Type 18 - DNA Record NISTIR 7933 FAQ doi:10.6028/NIST.IR.7933 [Direct Link] |
NISTIR 7924 (Draft) | May 2014 | DRAFT Reference Certificate Policy Announcement and Draft Publication |
NISTIR 7916 | February 2013 | Proceedings of the Cybersecurity in Cyber-Physical Systems Workshop, April 23-24, 2012 NISTIR 7916 FAQ doi:10.6028/NIST.IR.7916 [Direct Link] |
NISTIR 7904 | December 2015 | Trusted Geolocation in the Cloud: Proof of Concept Implementation NISTIR 7904 FAQ doi:10.6028/NIST.IR.7904 [Direct Link] |
NISTIR 7896 | November 2012 | Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition NISTIR 7896 FAQ doi:10.6028/NIST.IR.7896 [Direct Link] |
NISTIR 7878 | October 2012 | Combinatorial Coverage Measurement NISTIR 7878 FAQ doi:10.6028/NIST.IR.7878 [Direct Link] |
NISTIR 7877 | September 2012 | BioCTS 2012: Advanced Conformance Test Architectures and Test Suites for Biometric Data Interchange Formats and Biometric Information Records NISTIR 7877 FAQ doi:10.6028/NIST.IR.7877 [Direct Link] |
NISTIR 7874 | September 2012 | Guidelines for Access Control System Evaluation Metrics NISTIR 7874 FAQ doi:10.6028/NIST.IR.7874 [Direct Link] |
NISTIR 7870 | July 2012 | NIST Test Personal Identity Verification (PIV) Cards NISTIR 7870 FAQ doi:10.6028/NIST.IR.7870 [Direct Link] |
NISTIR 7864 | July 2012 | The Common Misuse Scoring System (CMSS): Metrics for Software Feature Misuse Vulnerabilities NISTIR 7864 FAQ doi:10.6028/NIST.IR.7864 [Direct Link] |
| | Press Release |
NISTIR 7863 | June 2015 | Cardholder Authentication for the PIV Digital Signature Key NISTIR 7863 FAQ doi:10.6028/NIST.IR.7863 [Direct Link] |
NISTIR 7849 | March 2014 | A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification NISTIR 7849 FAQ doi:10.6028/NIST.IR.7849 [Direct Link] |
NISTIR 7848 (Draft) | May 2012 | DRAFT Specification for the Asset Summary Reporting Format 1.0 Announcement and Draft Publication |
NISTIR 7823 | March 2015 | Advanced Metering Infrastructure Smart Meter Upgradeability Test Framework NISTIR 7823 FAQ doi:10.6028/NIST.IR.7823 [Direct Link] |
NISTIR 7817 | November 2012 | A Credential Reliability and Revocation Model for Federated Identities NISTIR 7817 FAQ doi:10.6028/NIST.IR.7817 [Direct Link] |
NISTIR 7816 | May 2012 | Computer Security Division 2011 Annual Report NISTIR 7816 FAQ doi:10.6028/NIST.IR.7816 [Direct Link] |
NISTIR 7815 | July 2011 | Access Control for SAR Systems NISTIR 7815 FAQ doi:10.6028/NIST.IR.7815 [Direct Link] |
NISTIR 7806 | September 2011 | ANSI/NIST-ITL 1-2011 Requirements and Conformance Test Assertions NISTIR 7806 FAQ doi:10.6028/NIST.IR.7806 [Direct Link] |
NISTIR 7802 | September 2011 | Trust Model for Security Automation Data 1.0 (TMSAD) NISTIR 7802 FAQ doi:10.6028/NIST.IR.7802 [Direct Link] |
NISTIR 7800 (Draft) | January 2012 | DRAFT Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains Announcement and Draft Publication |
NISTIR 7799 (Draft) | January 2012 | DRAFT Continuous Monitoring Reference Model Workflow, Subsystem, and Interface Specifications Announcement and Draft Publication |
NISTIR 7791 | June 2011 | Conformance Test Architecture and Test Suite for ANSI/NIST-ITL 1-2007 NISTIR 7791 FAQ doi:10.6028/NIST.IR.7791 [Direct Link] |
NISTIR 7788 | August 2011 | Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs NISTIR 7788 FAQ doi:10.6028/NIST.IR.7788 [Direct Link] |
NISTIR 7773 | November 2010 | An Application of Combinatorial Methods to Conformance Testing for Document Object Model Events NISTIR 7773 FAQ doi:10.6028/NIST.IR.7773 [Direct Link] |
NISTIR 7771 | February 2011 | Conformance Test Architecture for Biometric Data Interchange Formats - Version Beta 2.0 NISTIR 7771 FAQ doi:10.6028/NIST.IR.7771 [Direct Link] |
NISTIR 7770 | February 2011 | Security Considerations for Remote Electronic UOCAVA Voting NISTIR 7770 FAQ doi:10.6028/NIST.IR.7770 [Direct Link] |
NISTIR 7764 | February 2011 | Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition NISTIR 7764 FAQ doi:10.6028/NIST.IR.7764 [Direct Link] |
NISTIR 7756 (Draft) | January 2012 | DRAFT CAESARS Framework Extension: An Enterprise Continuous Monitoring Technical Reference Architecture Announcement and Draft Publication |
NISTIR 7751 | May 2011 | Computer Security Division 2010 Annual Report NISTIR 7751 FAQ doi:10.6028/NIST.IR.7751 [Direct Link] |
NISTIR 7711 | September 2011 | Security Best Practices for the Electronic Transmission of Election Materials for UOCAVA Voters NISTIR 7711 FAQ doi:10.6028/NIST.IR.7711 [Direct Link] |
NISTIR 7698 | August 2011 | Common Platform Enumeration: Applicability Language Specification Version 2.3 NISTIR 7698 FAQ doi:10.6028/NIST.IR.7698 [Direct Link] |
| | Press Release (for NISTIRs 7695-7698) |
NISTIR 7697 | August 2011 | Common Platform Enumeration: Dictionary Specification Version 2.3 NISTIR 7697 FAQ doi:10.6028/NIST.IR.7697 [Direct Link] |
| | Press Release (for NISTIRs 7695-7698) |
NISTIR 7696 | August 2011 | Common Platform Enumeration: Name Matching Specification Version 2.3 NISTIR 7696 FAQ doi:10.6028/NIST.IR.7696 [Direct Link] |
| | Press Release (for NISTIRs 7695-7698) |
NISTIR 7695 | August 2011 | Common Platform Enumeration: Naming Specification Version 2.3 NISTIR 7695 FAQ doi:10.6028/NIST.IR.7695 [Direct Link] |
| | Press Release (for NISTIRs 7695-7698) |
NISTIR 7694 | June 2011 | Specification for Asset Reporting Format 1.1 NISTIR 7694 FAQ doi:10.6028/NIST.IR.7694 [Direct Link] |
NISTIR 7693 | June 2011 | Specification for Asset Identification 1.1 NISTIR 7693 FAQ doi:10.6028/NIST.IR.7693 [Direct Link] |
NISTIR 7692 | April 2011 | Specification for the Open Checklist Interactive Language (OCIL) Version 2.0 NISTIR 7692 FAQ doi:10.6028/NIST.IR.7692 [Direct Link] |
NISTIR 7682 | September 2011 | Information System Security Best Practices for UOCAVA-Supporting Systems NISTIR 7682 FAQ doi:10.6028/NIST.IR.7682 [Direct Link] |
NISTIR 7676 | June 2010 | Maintaining and Using Key History on Personal Identity Verification (PIV) Cards NISTIR 7676 FAQ doi:10.6028/NIST.IR.7676 [Direct Link] |
NISTIR 7665 | January 2010 | Proceedings of the Privilege Management Workshop, September 1-3, 2009 NISTIR 7665 FAQ doi:10.6028/NIST.IR.7665 [Direct Link] |
NISTIR 7658 | February 2010 | Guide to SIMfill Use and Development NISTIR 7658 FAQ doi:10.6028/NIST.IR.7658 [Direct Link] |
NISTIR 7657 | March 2010 | A Report on the Privilege (Access) Management Workshop NISTIR 7657 FAQ doi:10.6028/NIST.IR.7657 [Direct Link] |
NISTIR 7653 | March 2010 | Computer Security Division 2009 Annual Report NISTIR 7653 FAQ doi:10.6028/NIST.IR.7653 [Direct Link] |
NISTIR 7628 Rev. 1 | September 2014 | Guidelines for Smart Grid Cybersecurity NISTIR 7628 Rev. 1, (Volumes 1-3) FAQ doi:10.6028/NIST.IR.7628r1 [Direct Link] |
NISTIR 7622 | October 2012 | Notional Supply Chain Risk Management Practices for Federal Information Systems NISTIR 7622 FAQ doi:10.6028/NIST.IR.7622 [Direct Link] |
| | Press Release |
NISTIR 7621 Rev. 1 | November 2016 | Small Business Information Security: the Fundamentals NISTIR 7621 Rev. 1 FAQ doi:10.6028/NIST.IR.7621r1 [Direct Link] |
| | Press Release |
| | "Ignoring Cybersecurity is Risky Business" (blog post) |
NISTIR 7620 | September 2009 | Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition NISTIR 7620 FAQ doi:10.6028/NIST.IR.7620 [Direct Link] |
NISTIR 7617 | October 2009 | Mobile Forensic Reference Materials: a Methodology and Reification NISTIR 7617 FAQ doi:10.6028/NIST.IR.7617 [Direct Link] |
NISTIR 7611 | August 2009 | Use of ISO/IEC 24727 NISTIR 7611 FAQ doi:10.6028/NIST.IR.7611 [Direct Link] |
NISTIR 7609 | January 2010 | Cryptographic Key Management Workshop Summary -- June 8-9, 2009 NISTIR 7609 FAQ doi:10.6028/NIST.IR.7609 [Direct Link] |
NISTIR 7601 | August 2010 | Framework for Emergency Response Officials (ERO): Authentication and Authorization Infrastructure NISTIR 7601 FAQ doi:10.6028/NIST.IR.7601 [Direct Link] |
NISTIR 7581 | September 2009 | System and Network Security Acronyms and Abbreviations NISTIR 7581 FAQ doi:10.6028/NIST.IR.7581 [Direct Link] |
NISTIR 7564 | April 2009 | Directions in Security Metrics Research NISTIR 7564 FAQ doi:10.6028/NIST.IR.7564 [Direct Link] |
NISTIR 7559 | June 2010 | Forensics Web Services (FWS) NISTIR 7559 FAQ doi:10.6028/NIST.IR.7559 [Direct Link] |
NISTIR 7551 | December 2008 | A Threat Analysis on UOCAVA Voting Systems NISTIR 7551 FAQ doi:10.6028/NIST.IR.7551 [Direct Link] |
NISTIR 7539 | December 2009 | Symmetric Key Injection onto Smart Cards NISTIR 7539 FAQ doi:10.6028/NIST.IR.7539 [Direct Link] |
NISTIR 7536 | March 2009 | Computer Security Division 2008 Annual Report NISTIR 7536 FAQ doi:10.6028/NIST.IR.7536 [Direct Link] |
NISTIR 7516 | August 2008 | Forensic Filtering of Cell Phone Protocols NISTIR 7516 FAQ doi:10.6028/NIST.IR.7516 [Direct Link] |
NISTIR 7511 Rev. 4 | January 2016 | Security Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements NISTIR 7511 Rev. 4 FAQ doi:10.6028/NIST.IR.7511r4 [Direct Link] |
NISTIR 7502 | December 2010 | The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities NISTIR 7502 FAQ doi:10.6028/NIST.IR.7502 [Direct Link] |
NISTIR 7497 | September 2010 | Security Architecture Design Process for Health Information Exchanges (HIEs) NISTIR 7497 FAQ doi:10.6028/NIST.IR.7497 [Direct Link] |
NISTIR 7452 | November 2007 | Secure Biometric Match-on-Card Feasibility Report NISTIR 7452 FAQ doi:10.6028/NIST.IR.7452 [Direct Link] |
NISTIR 7442 | April 2008 | Computer Security Division 2007 Annual Report NISTIR 7442 FAQ doi:10.6028/NIST.IR.7442 [Direct Link] |
NISTIR 7435 | August 2007 | The Common Vulnerability Scoring System (CVSS) and its Applicability to Federal Agency Systems NISTIR 7435 FAQ doi:10.6028/NIST.IR.7435 [Direct Link] |
NISTIR 7427 | September 2007 | 6th Annual PKI R&D Workshop "Applications-Driven PKI" Proceedings NISTIR 7427 FAQ doi:10.6028/NIST.IR.7427 [Direct Link] |
NISTIR 7399 | March 2007 | Computer Security Division 2006 Annual Report NISTIR 7399 FAQ doi:10.6028/NIST.IR.7399 [Direct Link] |
NISTIR 7387 | March 2007 | Cell Phone Forensic Tools: an Overview and Analysis Update NISTIR 7387 FAQ doi:10.6028/NIST.IR.7387 [Direct Link] |
NISTIR 7359 | January 2007 | Information Security Guide for Government Executives NISTIR 7359 FAQ doi:10.6028/NIST.IR.7359 [Direct Link] |
| | Booklet |
NISTIR 7358 | January 2007 | Program Review for Information Security Management Assistance (PRISMA) NISTIR 7358 FAQ doi:10.6028/NIST.IR.7358 [Direct Link] |
NISTIR 7337 | August 2006 | Personal Identity Verification Demonstration Summary NISTIR 7337 FAQ doi:10.6028/NIST.IR.7337 [Direct Link] |
NISTIR 7316 | September 2006 | Assessment of Access Control Systems NISTIR 7316 FAQ doi:10.6028/NIST.IR.7316 [Direct Link] |
NISTIR 7313 | July 2006 | 5th Annual PKI R&D Workshop "Making PKI Easy to Use" Proceedings NISTIR 7313 FAQ doi:10.6028/NIST.IR.7313 [Direct Link] |
NISTIR 7298 Rev. 2 | May 2013 | Glossary of Key Information Security Terms NISTIR 7298 Rev. 2 FAQ doi:10.6028/NIST.IR.7298r2 [Direct Link] |
NISTIR 7290 | March 2006 | Fingerprint Identification and Mobile Handheld Devices: An Overview and Implementation NISTIR 7290 FAQ doi:10.6028/NIST.IR.7290 [Direct Link] |
NISTIR 7285 | February 2006 | Computer Security Division 2005 Annual Report NISTIR 7285 FAQ doi:10.6028/NIST.IR.7285 [Direct Link] |
NISTIR 7284 | January 2006 | Personal Identity Verification Card Management Report NISTIR 7284 FAQ doi:10.6028/NIST.IR.7284 [Direct Link] |
NISTIR 7275 Rev. 4 | March 2012 | Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.2 NISTIR 7275 Rev. 4 |
| | NISTIR 7275 Rev. 4 (markup) |
NISTIR 7275 Rev. 3 | January 2008 | Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.1.4 NISTIR 7275 Rev. 3 FAQ doi:10.6028/NIST.IR.7275r3 [Direct Link] |
NISTIR 7275 | January 2006 | Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.1 NISTIR 7275 FAQ doi:10.6028/NIST.IR.7275 [Direct Link] |
NISTIR 7250 | October 2005 | Cell Phone Forensic Tools: an Overview and Analysis NISTIR 7250 FAQ doi:10.6028/NIST.IR.7250 [Direct Link] |
NISTIR 7224 | August 2005 | 4th Annual PKI R&D Workshop "Multiple Paths to Trust" Proceedings NISTIR 7224 FAQ doi:10.6028/NIST.IR.7224 [Direct Link] |
NISTIR 7219 | April 2005 | Computer Security Division 2004 Annual Report NISTIR 7219 FAQ doi:10.6028/NIST.IR.7219 [Direct Link] |
NISTIR 7206 | July 2005 | Smart Cards and Mobile Device Authentication: an Overview and Implementation NISTIR 7206 FAQ doi:10.6028/NIST.IR.7206 [Direct Link] |
NISTIR 7200 | June 2005 | Proximity Beacons and Mobile Device Authentication: an Overview and Implementation NISTIR 7200 FAQ doi:10.6028/NIST.IR.7200 [Direct Link] |
NISTIR 7188 | January 2005 | Specification for the Extensible Configuration Checklist Description Format (XCCDF) NISTIR 7188 FAQ doi:10.6028/NIST.IR.7188 [Direct Link] |
NISTIR 7111 | April 2004 | Computer Security Division 2003 Annual Report NISTIR 7111 FAQ doi:10.6028/NIST.IR.7111 [Direct Link] |
NISTIR 7100 | August 2004 | PDA Forensic Tools: an Overview and Analysis NISTIR 7100 FAQ doi:10.6028/NIST.IR.7100 [Direct Link] |
NISTIR 7085 | April 2004 | 2nd Annual PKI Research Workshop Proceedings NISTIR 7085 FAQ doi:10.6028/NIST.IR.7085 [Direct Link] |
NISTIR 7059 | November 2003 | 1st Annual PKI Research Workshop Proceedings Proceedings from Dartmouth (August 2002) |
NISTIR 7056 | March 2004 | Card Technology Developments and Gap Analysis Interagency Report NISTIR 7056 FAQ doi:10.6028/NIST.IR.7056 [Direct Link] |
NISTIR 7046 | August 2003 | A Framework for Multi-mode Authentication: Overview and Implementation Guide NISTIR 7046 FAQ doi:10.6028/NIST.IR.7046 [Direct Link] |
NISTIR 7030 | July 2003 | Picture Password: A Visual Login Technique for Mobile Devices NISTIR 7030 FAQ doi:10.6028/NIST.IR.7030 [Direct Link] |
NISTIR 7007 | July 11, 2003 | An Overview of Issues in Testing Intrusion Detection Systems NISTIR 7007 FAQ doi:10.6028/NIST.IR.7007 [Direct Link] |
NISTIR 6985 | April 2003 | COTS Security Protection Profile - Operating Systems (CSPP-OS) (Worked Example Applying Guidance of NISTIR-6462, CSPP) Version 1.0 NISTIR 6985 FAQ doi:10.6028/nist.ir.6985 [Direct Link] |
NISTIR 6981 | April 2003 | Policy Expression and Enforcement for Handheld Devices NISTIR 6981 FAQ doi:10.6028/NIST.IR.6981 [Direct Link] |
NISTIR 6887 2003 Edition | July 16, 2003 | Government Smart Card Interoperability Specification, Version 2.1 NISTIR 6887 |
NISTIR 6529-A | April 5, 2004 | Common Biometric Exchange Formats Framework (CBEFF) NISTIR 6529A |
NISTIR 6483 | April 2000 | Randomness Testing of the Advanced Encryption Standard Finalist Candidates NISTIR 6483 |
NISTIR 6462 | December 1999 | CSPP - Guidance for COTS Security Protection Profiles (Formerly: CS2 - Protection Profile Guidance for Near-Term COTS) Version 1.0 NISTIR 6462 |
NISTIR 6416 | October 1999 | Applying Mobile Agents to Intrusion Detection and Response NISTIR 6416 |
NISTIR 6390 | September 1999 | Randomness Testing of the Advanced Encryption Standard Candidate Algorithms NISTIR 6390 |
NISTIR 6192 | July 9, 1998 | A Revised Model for Role Based Access Control NISTIR 6192 |
| | Citation Page for NISTIR 6192 |
NISTIR 5820 | April 1, 1996 | Distributed Communication Methods and Role-Based Access Control for Use in Health Care Applications NISTIR 5820 |
NISTIR 5495 | September 1994 | Computer Security Training & Awareness Course Compendium NISTIR 5495 |
NISTIR 5472 | March 1994 | A Head Start on Assurance: Proceedings of an Invitational Workshop on Information Technology (IT) Assurance and Trustworthiness, March 21-23, 1994 NISTIR 5472 |
NISTIR 5308 | December 1993 | General Procedures for Registering Computer Security Objects NISTIR 5308 |
NISTIR 5153 | March 1993 | Minimum Security Requirements for Multi-User Operating Systems NISTIR 5153 |
NISTIR 4976 | November 1992 | Assessing Federal and Commercial Information Security Needs NISTIR 4976 |
NISTIR 4939 | October 1992 | Threat Assessment of Malicious Code and External Attacks NISTIR 4939 (HTML) |
| | NISTIR 4939 (TXT) |
NISTIR 4749 | December 1991 | Sample Statement of Work for Federal Computer Security Services: For use In-House or Contracting Out NISTIR 4749 |
NISTIR 4734 | February 1992 | Foundations of a Security Policy for Use of the National Research and Educational Network NISTIR 4734 |
NISTIR 4545 | April 1991 | Computer Security: Selected Articles NISTIR 4545 |
NISTIR 4228 | January 1990 | Prototyping SP4: a Secure Data Network System Transport Protocol Interoperability Demonstration Project NISTIR 4228 |