U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 1776 through 1800 of 13539 matching records.
Publications NISTIR 7877 September 14, 2012
https://csrc.nist.rip/publications/detail/nistir/7877/final

Abstract: The Computer Security Division of NIST/ITL supports the development of biometric conformance testing methodology standards and other conformity assessment efforts through active technical participation in the development of these standards and the associated conformance test architectures and test s...

Publications NISTIR 7874 September 14, 2012
https://csrc.nist.rip/publications/detail/nistir/7874/final

Abstract: The purpose of this document is to provide Federal agencies with background information on access control (AC) properties, and to help access control experts improve their evaluation of the highest security AC systems. This document discusses the administration, enforcement, performance, and support...

Publications Conference Paper September 13, 2012
https://csrc.nist.rip/publications/detail/conference-paper/2012/09/13/measuring-combinatorial-coverage-of-system-state-space-for-ivv

Conference: Annual NASA IV&V Workshop Abstract: This report describes some measures of combinatorial coverage that can be helpful in estimating this risk that we have applied to tests for spacecraft software but have general application to any combinatorial coverage problem. This method will be illustrated through a prior application to NASA spac...

Publications Conference Proceedings August 27, 2012
https://csrc.nist.rip/publications/detail/conference-paper/2012/08/27/the-triton-transformation

Conference: Third Workshop on Mathematical Cryptology (WMC 2012) Abstract: Many new systems have been proposed which hide an easily invertible multivariate quadratic map in a larger structure by adding more variables and introducing some mixing of a random component to the structured system. While many systems which have been formed by attempting to hide the hidden structu...

Publications SP 800-107 Rev. 1 August 24, 2012
https://csrc.nist.rip/publications/detail/sp/800-107/rev-1/final

Abstract: Hash functions that compute a fixed-length message digest from arbitrary length messages are widely used for many purposes in information security. This document provides security guidelines for achieving the required or desired security strengths when using cryptographic applications that employ th...

Publications White Paper August 23, 2012
https://csrc.nist.rip/publications/detail/white-paper/2012/08/23/the-role-of-nist-in-mobile-security/final

Abstract: This paper will present an overview of the work of the National Institute of Standards and Technology (NIST) in security and privacy for mobile technology as well as an overview on how NIST standards and guidelines can be applied in the mobile environment.

Publications Journal Article August 14, 2012
https://csrc.nist.rip/publications/detail/journal-article/2012/on-the-nonlinearity-of-maximum-length-nfsr-feedbacks

Journal: Cryptography and Communications Abstract: Linear Feedback Shift Registers (LFSRs) are the main building block of many classical stream ciphers; however due to their inherent linearity, most of the LFSR-based designs do not offer the desired security levels. In the last decade, using Nonlinear Feedback Shift Registers (NFSRs) in stream ciphe...

Publications ITL Bulletin August 13, 2012
https://csrc.nist.rip/publications/detail/itl-bulletin/2012/08/security-of-bluetooth-systems-and-devices-updated-guide-issued-/final

Abstract: This bulletin summarizes the information that is included in NIST Special Publication (SP) 121, Revision 1, Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology. This guide was revised by John Padgette of Accenture, Karen Scarfone of Scarfone Cybersecuri...

Publications SP 800-61 Rev. 2 August 6, 2012
https://csrc.nist.rip/publications/detail/sp/800-61/rev-2/final

Abstract: Computer security incident response has become an important component of information technology (IT) programs. Because performing incident response effectively is a complex undertaking, establishing a successful incident response capability requires substantial planning and resources. This publicati...

Publications NISTIR 7867 Rev. 2012 August 1, 2012
https://csrc.nist.rip/publications/detail/nistir/7867/rev-2012/final

Abstract: This paper presents the findings of a PIV usability pilot study conducted at NIST during the summer of 2010. The study focused on factors that affected users' perceptions and adoption of PIV smartcards. Based on observation of the study participants, the researchers present recommendations that can...

Publications Journal Article July 31, 2012
https://csrc.nist.rip/publications/detail/journal-article/2012/efficient-methods-for-interoperability-testing-using-event-seque

Journal: Crosstalk (Hill AFB): the Journal of Defense Software Engineering Abstract: Many software testing problems involve sequences of events. The methods described in this paper were motivated by testing needs of mission critical systems that may accept multiple communication or sensor inputs and generate output to several communication links and other interfaces, where it is imp...

Publications Conference Proceedings July 31, 2012
https://csrc.nist.rip/publications/detail/conference-paper/2012/07/31/mobile-application-and-device-power-usage-measurements

Conference: 6th IEEE International Conference on Software Security and Reliability (SERE'12) Abstract: Reducing power consumption has become a crucial design tenet for both mobile and other small computing devices that are not constantly connected to a power source. However, unlike devices that have a limited and predefined set of functionality, recent mobile smart phone devices have a very rich set...

Publications Journal Article July 24, 2012
https://csrc.nist.rip/publications/detail/journal-article/2012/what-continuous-monitoring-really-means

Journal: FedTech Magazine Abstract: Recently, NIST completed a fundamental transformation of the traditional certification and accreditation process into a comprehensive, near real-time, security life cycle process as part of a Risk Management Framework (RMF). The RMF, described in NIST Special Publication 800-37, provides a dynamic,...

Publications Book July 24, 2012
https://csrc.nist.rip/publications/detail/book/2012/security-automation-essentials

Abstract: Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP lays out comprehensive technical, administrative, and operational strategies for security management. Discover how to define baseline requirements, automatically confirm patches and updates, id...

Publications Journal Article July 23, 2012
https://csrc.nist.rip/publications/detail/journal-article/2012/arithmetic-progressions-on-huff-curves

Journal: Annales Mathematicae et Informaticae Abstract: We look at arithmetic progressions on elliptic curves known as Huff curves. By an arithmetic progression on an elliptic curve, we mean that either the x or y-coordinates of a sequence of rational points on the curve form an arithmetic progression. Previous work has found arithmetic progressions on W...

Publications Conference Proceedings July 20, 2012
https://csrc.nist.rip/publications/detail/conference-paper/2012/07/20/evolutionary-construction-of-de-bruijn-sequences

Conference: 4th ACM Workshop on Security and Artificial Intelligence (AISec '11) Abstract: A binary de Bruijn sequence of order n is a cyclic sequence of period 2^n, in which each n-bit pattern appears exactly once. These sequences are commonly used in applications such as stream cipher design, pseudo-random number generation, 3-D pattern recognition, network modeling, mainly due to their...

Publications Journal Article July 16, 2012
https://csrc.nist.rip/publications/detail/journal-article/2012/what's-special-about-cloud-security?

Journal: IT Professional Abstract: Although cloud security concerns have consistently ranked as one of the top challenges to cloud adoption, it's not clear what security issues are particular to cloud computing. To approach this question, the author attempts to derive cloud security issues from various cloud definitions and a referen...

Publications NISTIR 7870 July 12, 2012
https://csrc.nist.rip/publications/detail/nistir/7870/final

Abstract: In order to facilitate the development of applications and middleware that support the Personal Identity Verification (PIV) Card, NIST has developed a set of test PIV Cards and a supporting public key infrastructure. This set of test cards includes not only examples that are similar to cards that ar...

Publications ITL Bulletin July 10, 2012
https://csrc.nist.rip/publications/detail/itl-bulletin/2012/07/preparing-for-and-responding-to-certification-authority-compromi/final

Abstract: As the use of Public Key Infrastructure (PKI) and digital certificates (e.g., the use of Transport Layer Security [TLS] and Secure Sockets Layer [SSL]) for the security of systems has increased, the certification authorities (CAs) that issue certificates have increasingly become targets for sophisti...

Publications NISTIR 7864 July 10, 2012
https://csrc.nist.rip/publications/detail/nistir/7864/final

Abstract: The Common Misuse Scoring System (CMSS) is a set of measures of the severity of software feature misuse vulnerabilities. A software feature is a functional capability provided by software. A software feature misuse vulnerability is a vulnerability in which the feature also provides an avenue to comp...

Publications ITL Bulletin June 27, 2012
https://csrc.nist.rip/publications/detail/itl-bulletin/2012/06/cloud-computing-a-review-of-features-benefits-and-risks-and-/final

Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-146, Cloud Computing Synopsis and Recommendations: Recommendations of the National Institute of Standards and Technology. The publication explains the different cloud computing technologies and configurations, an...

Publications Encyclopedia Entry June 25, 2012
https://csrc.nist.rip/publications/detail/book/2012/combinatorial-testing

In: Encyclopedia of Software Engineering (2012) Abstract: Combinatorial testing is a method that can reduce cost and improve test effectiveness significantly for many applications. The key insight underlying this form of testing is that not every parameter contributes to every failure, and empirical data suggest that nearly all software failures are caused...

Publications Journal Article June 11, 2012
https://csrc.nist.rip/publications/detail/journal-article/2012/the-internet-of-things-a-reality-check

Journal: IT Professional Abstract: Today, a new Internet player is rowing more important: things-that is, inanimate objects that can be programmed to communicate, sense, and interact with other things. But will an increasingly fragile ecosystem be able to sustain the amount of power necessary to run all these gadgets? And what other...

Publications Conference Paper June 11, 2012
https://csrc.nist.rip/publications/detail/conference-paper/2012/06/11/simulation-based-approaches-to-studying-effectiveness-of-moving-

Conference: National Symposium on Moving Target Research Abstract: Moving-target defense has been hypothesized as a potential game changer in cyber defense, including that for computer networks. However there has been little work to study how much proactively changing a network’s configuration can increase the difficulty for attackers and thus improve the resilienc...

Publications Journal Article June 4, 2012
https://csrc.nist.rip/publications/detail/journal-article/2012/nice-creating-a-cybersecurity-workforce-and-aware-public

Journal: IEEE Security & Privacy Abstract: The National Initiative for Cybersecurity Education (NICE) aims to create an operational, sustainable, and continually improving program for cybersecurity awareness, education, training, and workforce development. As part of the initiative, the NICE Cybersecurity Workforce Framework aims to codify c...

<< first   < previous   60     61     62     63     64     65     66     67     68     69     70     71     72     73     74     75     76     77     78     79     80     81     82     83     84  next >  last >>