Published: April 4, 2014
Citation: IT Professional vol. 16, no. 2, (March-April 2014) pp. 31-37
Author(s)
William Burr, Hildegard Ferraiolo, David Waltermire
The US National Institute of Standards and Technology's highly visible work in four key areas--cryptographic standards, role-based access control, identification card standards, and security automation--has and continues to shape computer and information security at both national and global levels. This article is part of a special issue on NIST contributions to IT.
The US National Institute of Standards and Technology's highly visible work in four key areas--cryptographic standards, role-based access control, identification card standards, and security automation--has and continues to shape computer and information security at both national and global levels....
See full abstract
The US National Institute of Standards and Technology's highly visible work in four key areas--cryptographic standards, role-based access control, identification card standards, and security automation--has and continues to shape computer and information security at both national and global levels. This article is part of a special issue on NIST contributions to IT.
Hide full abstract
Keywords
authentication; cryptographic competition; e-commerce; hash function; identity; mobile device authentication; Security Content Automation; smart card
Control Families
None selected