U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 1826 through 1850 of 13539 matching records.
Publications NISTIR 7756 (Draft) January 6, 2012
https://csrc.nist.rip/publications/detail/nistir/7756/draft

Abstract: [Second Public Draft] This publication presents an enterprise continuous monitoring technical reference architecture that extends the framework provided by the Department of Homeland Security’s CAESARS architecture. The goal is to facilitate enterprise continuous monitoring by presenting a reference...

Publications NISTIR 7799 (Draft) January 6, 2012
https://csrc.nist.rip/publications/detail/nistir/7799/draft

Abstract: This publication provides the technical specifications for the continuous monitoring (CM2) reference model presented in NIST IR 7756. These specifications enable multi-instance CM implementations, hierarchical tiers, multi-instance dynamic querying, sensor tasking, propagation of policy, policy moni...

Publications Conference Proceedings December 27, 2011
https://csrc.nist.rip/publications/detail/conference-paper/2011/12/27/vulnerability-hierarchies-in-access-control-configurations

Conference: 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 2011 Abstract: This paper applies methods for analyzing fault hierarchies to the analysis of relationships among vulnerabilities in misconfigured access control rule structures. Hierarchies have been discovered previously for faults in arbitrary logic formulae, such that a test for one class of fault is guaranteed...

Publications SP 800-135 Rev. 1 December 23, 2011
https://csrc.nist.rip/publications/detail/sp/800-135/rev-1/final

Abstract: Cryptographic keys are vital to the security of internet security applications and protocols. Many widely-used internet security protocols have their own application-specific Key Derivation Functions (KDFs) that are used to generate the cryptographic keys required for their cryptographic functions....

Publications ITL Bulletin December 22, 2011
https://csrc.nist.rip/publications/detail/itl-bulletin/2011/12/revised-guideline-for-electronic-authentication-of-users-helps-o/final

Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-63-1, Electronic Authentication Guideline. This revised guideline, which supersedes an earlier guideline, NIST SP 800-63, updates information about, and recommendations for the secure implementation of electronic...

Publications SP 800-144 December 9, 2011
https://csrc.nist.rip/publications/detail/sp/800-144/final

Abstract: Cloud computing can and does mean different things to different people. The common characteristics most interpretations share are on-demand scalability of highly available and reliable pooled computing resources, secure access to metered services from nearly anywhere, and displacement of data and se...

Publications SP 800-155 (Draft) December 8, 2011
https://csrc.nist.rip/publications/detail/sp/800-155/draft

Abstract: This document outlines the security components and security guidelines needed to establish a secure Basic Input/Output System (BIOS) integrity measurement and reporting chain. BIOS is a critical security component in systems due to its unique and privileged position within the personal computer (PC)...

Publications Journal Article December 8, 2011
https://csrc.nist.rip/publications/detail/journal-article/2011/role-engineering-methods-and-standards

Journal: IT Professional Abstract: This article explains problems and approaches to designing permission structures for role based access control. RBAC and the RBAC standard are summarized, common approaches to role engineering described, and the current status and plans for the INCITS role engineering standard are explained.

Publications Journal Article December 8, 2011
https://csrc.nist.rip/publications/detail/journal-article/2011/mobile-app-addiction-threat-to-security?

Journal: IT Professional Abstract: Giving individuals this kind of information processing power, along with unprecedented connectivity, might be the single most impressive technical achievement of the 21st century. Nobody knows what the full impact of this transformation will be, but it's clear that our embrace of, and reliance on, c...

Publications White Paper December 1, 2011
https://csrc.nist.rip/publications/detail/white-paper/2011/12/01/ict-scrm-community-framework-development-project-final-report/final

Abstract: Under Initiative 11 of the President’s CNCI Program, the National Institute of Standards and Technology (NIST) has been tasked with supporting federal policy development in Supply Chain Risk Management (SCRM) for Information Communications Technology (ICT). To support NIST’s work, the Supply Chain...

Publications Conference Proceedings November 29, 2011
https://csrc.nist.rip/publications/detail/conference-paper/2011/11/29/differential-security-of-multivariate-public-key-cryptosystems

Conference: 4th International Conference on Post-Quantum Cryptography (PQCrypto 2011) Abstract: Since the discovery of an algorithm for factoring and computing discrete logarithms in polynomial time on a quantum computer, the cryptographic community has been searching for an alternative for security in the approaching post-quantum world. One excellent candidate is multivariate public key crypt...

Publications Conference Proceedings November 6, 2011
https://csrc.nist.rip/publications/detail/conference-paper/2011/11/06/service-model-driven-variations-in-security-measures-for-cloud-e

Conference: IADIS International Conference Applied Computing 2011 Abstract: With the increasing adoption of cloud computing service models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), proper implementation of adequate and appropriate security protection measures has become a primary area of concern. In an enterprise co...

Publications Journal Article November 3, 2011
https://csrc.nist.rip/publications/detail/journal-article/2011/mean-value-formulas-for-twisted-edwards-curves

Journal: Journal of Combinatorics and Number Theory Abstract: R. Feng and H.Wu recently established a certain mean-value formula for the coordinates of the n-division points on an elliptic curve given inWeierstrass form (A mean value formula for elliptic curves, 2010, available at http://eprint.iacr.org/2009/586.pdf). We prove a similar result for the x and y-...

Publications ITL Bulletin October 25, 2011
https://csrc.nist.rip/publications/detail/itl-bulletin/2011/10/continuous-monitoring-of-information-security-an-essential-comp/final

Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-137, Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations. The guide helps organizations develop an ISCM strategy and implement an ISCM program that provides awarene...

Publications Journal Article October 21, 2011
https://csrc.nist.rip/publications/detail/journal-article/2011/security-automation

Journal: IA Newsletter Abstract: Security automation can harmonize the vast amounts of information technology (IT) data into coherent, comparable information streams that inform timely and active management of diverse IT systems. Through the creation of internationally recognized, flexible, and open standards, security automation c...

Publications SP 800-137 September 30, 2011
https://csrc.nist.rip/publications/detail/sp/800-137/final

Abstract: The purpose of this guideline is to assist organizations in the development of a continuous monitoring strategy and the implementation of a continuous monitoring program providing visibility into organizational assets, awareness of threats and vulnerabilities, and visibility into the effectiveness o...

Publications SP 800-145 September 28, 2011
https://csrc.nist.rip/publications/detail/sp/800-145/final

Abstract: Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider...

Publications ITL Bulletin September 26, 2011
https://csrc.nist.rip/publications/detail/itl-bulletin/2011/09/managing-the-configuration-of-information-systems-with-a-focus-o/final

Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-128, Guide to Security-Focused Configuration Management of Information Systems. The publication was written by Arnold Johnson, Kelley Dempsey, and Ron Ross of NIST, and by Sarbari Gupta and Dennis Bailey of Elec...

Publications NISTIR 7802 September 20, 2011
https://csrc.nist.rip/publications/detail/nistir/7802/final

Abstract: This report defines the Trust Model for Security Automation Data 1.0 (TMSAD), which permits users to establish integrity, authentication, and traceability for security automation data. Since security automation data is primarily stored and exchanged using Extensible Markup Language (XML) documents,...

Publications NISTIR 7806 September 16, 2011
https://csrc.nist.rip/publications/detail/nistir/7806/final

Abstract: The current version of the ANSI/NIST-ITL standard "Data Format for the Interchange of Fingerprint, Facial & Other Biometric Information" is specified in two parts. Part 1, ANSI/NIST-ITL 1-2007, specifies the traditional format, and Part 2, ANSI/NIST-ITL 2-2008, specifies a NIEM-conformant XML fo...

Publications NISTIR 7711 September 15, 2011
https://csrc.nist.rip/publications/detail/nistir/7711/final

Abstract: This document outlines the basic process for the distribution of election material including registration material and blank ballots to UOCAVA voters. It describes the technologies that can be used to support the electronic dissemination of election material along with security techniques ‹ both tec...

Publications NISTIR 7682 September 15, 2011
https://csrc.nist.rip/publications/detail/nistir/7682/final

Abstract: IT systems used to support UOCAVA voting face a variety of threats. If IT systems are not selected, configured and managed using security practices commensurate with the importance of the services they provide and the sensitivity of the data they handle, a security compromise could carry consequence...

Publications Conference Proceedings September 5, 2011
https://csrc.nist.rip/publications/detail/conference-paper/2011/09/05/field-study-of-user-behavior--perception-in-smartcard-authent

Conference: 13th IFIP TC13 Conference on Human-Computer Interaction (INTERACT 2011) Abstract: A field study of 24 participants over 10 weeks explored user behavior and perceptions in a smartcard authentication system. Ethnographic methods used to collect data included diaries, surveys, interviews, and field observations. We observed a number of issues users experienced while they integrated...

Publications ITL Bulletin August 24, 2011
https://csrc.nist.rip/publications/detail/itl-bulletin/2011/08/protecting-industrial-control-systems-–-key-components-of-our-na/final

Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-82, Guide to Industrial Control Systems Security: Recommendations of the National Institute of Standards and Technology. The publication was written by Keith Stouffer and by Joe Falco of NIST, and by Karen Scarfo...

Publications NISTIR 7696 August 19, 2011
https://csrc.nist.rip/publications/detail/nistir/7696/final

Abstract: This report defines the Common Platform Enumeration (CPE) Name Matching version 2.3 specification. The CPE Name Matching specification is part of a stack of CPE specifications that support a variety of use cases relating to IT product description and naming. The CPE Name Matching specification provi...

<< first   < previous   62     63     64     65     66     67     68     69     70     71     72     73     74     75     76     77     78     79     80     81     82     83     84     85     86  next >  last >>