U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 1376 through 1400 of 13539 matching records.
Publications NISTIR 8193 (Draft) November 8, 2017
https://csrc.nist.rip/publications/detail/nistir/8193/draft

Abstract: The national need for a common lexicon to describe and organize the cybersecurity workforce and requisite knowledge, skills, and abilities (KSAs) led to the creation of the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NICE Framework). The NICE Framework d...

Publications Journal Article November 2, 2017
https://csrc.nist.rip/publications/detail/journal-article/2017/rigidity-of-the-magic-pentagram-game

Journal: Quantum Science and Technology Abstract: A game is rigid if a near-optimal score guarantees, under the sole assumption of the validity of quantum mechanics, that the players are using an approximately unique quantum strategy. Rigidity has a vital role in quantum cryptography as it permits a strictly classical user to trust behavior in the...

Publications Journal Article November 2, 2017
https://csrc.nist.rip/publications/detail/journal-article/2017/sard-thousands-of-reference-programs-for-software-assurance

Journal: Journal of Cyber Security and Information Systems Abstract: A corpus of computer programs with known bugs is useful in determining the ability of tools to find bugs. This article describes the content of NIST's Software Assurance Reference Dataset (SARD), which is a publicly available collection of thousands of programs with known weaknesses. SARD has progra...

Publications Journal Article November 1, 2017
https://csrc.nist.rip/publications/detail/journal-article/2017/isosceles-triangle-parallelogram-heron-triangle-rhombus-pairs

Journal: Journal of Number Theory Abstract: In this paper we show that there are infinitely many pairs of integer isosceles triangles and integer parallelograms with a common (integral) area and common perimeter. We also show that there are infinitely many Heron triangles and integer rhombuses with common area and common perimeter. As a corol...

Publications ITL Bulletin October 24, 2017
https://csrc.nist.rip/publications/detail/itl-bulletin/2017/10/application-container-security/final

Abstract: This bulletin summarizes the information found in NIST SP 800-190, Application Container Security Guide and NISTIR 8176, Security Assurance Requirements for Linux Application Container Deployments. The bulletin offers an overview of application container technology and its most notable security chal...

Publications White Paper October 23, 2017
https://csrc.nist.rip/publications/detail/white-paper/2017/10/23/nsrl-kaspersky-dataset-documentation/final

Abstract: The National Institute of Standards and Technology (NIST) National Software Reference Library (NSRL) has created curated releases of the Reference Data Set (RDS) consisting of hashes of Kaspersky products. This is in response to the DHS directive on Kaspersky applications.

Publications White Paper (Draft) October 12, 2017
https://csrc.nist.rip/publications/detail/white-paper/2017/10/12/privileged-account-management-for-the-financial-services-sector/draft

Abstract: Privileged Account Management (PAM) is a domain within Identity and Access Management (IdAM) focusing on monitoring and controlling the use of privileged accounts. Privileged accounts include local and domain administrative accounts, emergency accounts, application management, and service accounts....

Publications NISTIR 8176 October 11, 2017
https://csrc.nist.rip/publications/detail/nistir/8176/final

Abstract: Application Containers are slowly finding adoption in enterprise IT infrastructures. Security guidelines and countermeasures have been proposed to address security concerns associated with the deployment of application container platforms. To assess the effectiveness of the security solutions implem...

Publications Conference Proceedings October 11, 2017
https://csrc.nist.rip/publications/detail/conference-paper/2017/10/11/a-layered-graphical-model-for-mission-attack-impact-analysis

Conference: 2017 IEEE Conference on Communications and Network Security (CNS): The Network Forensics Workshop Abstract: Business or military missions are supported by hardware and software systems. Unanticipated cyber activities occurring in supporting systems can impact such missions. In order to quantify such impact, we describe a layered graphical model as an extension of forensic investigation. Our model has thre...

Publications NISTIR 8194 October 10, 2017
https://csrc.nist.rip/publications/detail/nistir/8194/final

Abstract: Phishing, the transmission of a message spoofing a legitimate sender about a legitimate subject with intent to perform malicious activity, causes a tremendous and rapidly-increasing amount of damage to information systems and users annually. This project implements an exploratory computational model...

Publications Conference Paper October 9, 2017
https://csrc.nist.rip/publications/detail/conference-paper/2017/10/09/organizational-practices-in-crypto-development-and-testing

Conference: 2017 IEEE Conference on Communications and Network Security (CNS) Abstract: Organizations developing cryptographic products face significant challenges, including usability and human factors, that may result in decreased security, increased development time, and missed opportunities to use the technology to its fullest potential. To better identify these challenges, we expl...

Publications Conference Proceedings October 7, 2017
https://csrc.nist.rip/publications/detail/conference-paper/2017/10/07/cryptocurrency-smart-contracts

Conference: International Symposium on Stabilization, Safety, and Security of Distributed Systems Abstract: Most modern electronic devices can produce a random number. However, it is difficult to see how a group of mutually distrusting entities can have confidence in any such hardware-produced stream of random numbers, since the producer could control the output to their gain. In this work, we use public...

Publications Book October 1, 2017
https://csrc.nist.rip/publications/detail/book/2017/attribute-based-access-control

Abstract: Until now, ABAC research has been documented in hundreds of research papers, but not consolidated in book form. This book explains ABAC's history and model, related standards, verification and assurance, applications, and deployment challenges; Specialized topics-including formal ABAC history, ABAC'...

Publications SP 800-195 September 28, 2017
https://csrc.nist.rip/publications/detail/sp/800-195/final

Abstract: Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to carry out responsibilities under this law. The prim...

Publications ITL Bulletin September 27, 2017
https://csrc.nist.rip/publications/detail/itl-bulletin/2017/09/updating-keys-for-dns-security/final

Abstract: To help maintain the reliability and integrity of the Internet's Domain Name System (DNS), NIST is working with specialists from around the world to update the keys used by the DNS Security Extensions (DNSSEC) protocol to authenticate DNS data and avoid integrity issues such as domain name hijacking...

Publications SP 800-190 September 25, 2017
https://csrc.nist.rip/publications/detail/sp/800-190/final

Abstract: Application container technologies, also known as containers, are a form of operating system virtualization combined with application software packaging. Containers provide a portable, reusable, and automatable way to package and run applications. This publication explains the potential security con...

Publications Journal Article September 22, 2017
https://csrc.nist.rip/publications/detail/journal-article/2017/alexa-can-i-trust-you?

Journal: Computer (IEEE Computer) Abstract: Several recent incidents highlight significant security and privacy risks associated with intelligent virtual assistants (IVAs). Better diagnostic testing of IVA ecosystems can reveal such vulnerabilities and lead to more trustworthy systems.

Publications Conference Proceedings September 18, 2017
https://csrc.nist.rip/publications/detail/conference-paper/2017/09/18/evaluating-the-effects-of-cyber-attacks-on-cps

Conference: 2017 Resilience Week (RWS) Abstract: Cyber-Physical Systems (CPS) consist of embedded computers with sensing and actuation capability, and are integrated into and tightly coupled with a physical system. Because the physical and cyber components of the system are tightly coupled, cyber-security is important for ensuring the system funct...

Publications Conference Proceedings September 18, 2017
https://csrc.nist.rip/publications/detail/conference-paper/2017/09/18/cloud-security-automation-framework

Conference: 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W) Abstract: Cloud services have gained tremendous attention as a utility paradigm and have been deployed extensively across a wide range of fields. However, Cloud security is not catching up to the fast adoption of its services and remains one of the biggest challenges for Cloud Service Providers (CSPs) and Clo...

Publications NISTIR 8192 September 18, 2017
https://csrc.nist.rip/publications/detail/nistir/8192/final

Abstract: These proceedings document the July 11-12, 2017 "Enhancing Resilience of the Internet and Communications Ecosystem" workshop led by the National Institute of Standards and Technology. Executive Order 13800, "Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure” required th...

Publications White Paper September 13, 2017
https://csrc.nist.rip/publications/detail/white-paper/2017/09/13/securing-property-management-systems/final

Abstract: Hospitality organizations rely on Property Management Systems (PMS) for daily tasks, planning, and record keeping. As the operations hub, the PMS interfaces with several services and components within a hotel’s IT system, such as Point-of-Sale (POS) systems, door locks, Wi-Fi networks, and other gue...

Publications Journal Article September 1, 2017
https://csrc.nist.rip/publications/detail/journal-article/2017/advancing-coordinated-cyber-investigations

Journal: Digital Investigation Abstract: Any investigation can have a digital dimension, often involving information from multiple data sources, organizations and jurisdictions. Existing approaches to representing and exchanging cyber-investigation information are inadequate, particularly when combining data sources from numerous organizat...

Publications Conference Proceedings August 31, 2017
https://csrc.nist.rip/publications/detail/conference-paper/2017/08/31/identifying-evidence-for-cloud-forensic-analysis

Conference: IFIP WG 11.3 International Conference on Digital Forensics Abstract: Cloud computing provides benefits such as increased flexibility, scalability and cost savings to enterprises. However, it introduces several challenges to digital forensic investigations. Current forensic analysis frameworks and tools are largely intended for off-line investigations and it is assume...

Publications ITL Bulletin August 29, 2017
https://csrc.nist.rip/publications/detail/itl-bulletin/2017/08/update-nist-sp-800-63-digital-identity-guidelines/final

Abstract: This bulletin outlines the updates NIST recently made in its four-volume Special Publication (SP) 800-63, Digital Identity Guidelines, which provide agencies with technical guidelines regarding the digital authentication of users to federal networked systems.

Publications Conference Proceedings August 18, 2017
https://csrc.nist.rip/publications/detail/conference-paper/2017/08/18/total-break-of-the-srp-encryption-scheme

Conference: 24th International Conference, Selected Areas in Cryptography (SAC 2017) Abstract: Multivariate Public Key Cryptography (MPKC) is one of the main candidates for secure communication in a post-quantum era. Recently, Yasuda and Sakurai proposed in [7] a new multivariate encryption scheme called SRP, which combines the Square encryption scheme with the Rainbow signature scheme and th...

<< first   < previous   44     45     46     47     48     49     50     51     52     53     54     55     56     57     58     59     60     61     62     63     64     65     66     67     68  next >  last >>