U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 1901 through 1925 of 14084 matching records.
Publications Conference Proceedings November 6, 2011
https://csrc.nist.rip/publications/detail/conference-paper/2011/11/06/service-model-driven-variations-in-security-measures-for-cloud-e

Conference: IADIS International Conference Applied Computing 2011 Abstract: With the increasing adoption of cloud computing service models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), proper implementation of adequate and appropriate security protection measures has become a primary area of concern. In an enterprise co...

Publications Journal Article November 3, 2011
https://csrc.nist.rip/publications/detail/journal-article/2011/mean-value-formulas-for-twisted-edwards-curves

Journal: Journal of Combinatorics and Number Theory Abstract: R. Feng and H.Wu recently established a certain mean-value formula for the coordinates of the n-division points on an elliptic curve given inWeierstrass form (A mean value formula for elliptic curves, 2010, available at http://eprint.iacr.org/2009/586.pdf). We prove a similar result for the x and y-...

Publications ITL Bulletin October 25, 2011
https://csrc.nist.rip/publications/detail/itl-bulletin/2011/10/continuous-monitoring-of-information-security-an-essential-comp/final

Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-137, Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations. The guide helps organizations develop an ISCM strategy and implement an ISCM program that provides awarene...

Publications Journal Article October 21, 2011
https://csrc.nist.rip/publications/detail/journal-article/2011/security-automation

Journal: IA Newsletter Abstract: Security automation can harmonize the vast amounts of information technology (IT) data into coherent, comparable information streams that inform timely and active management of diverse IT systems. Through the creation of internationally recognized, flexible, and open standards, security automation c...

Publications SP 800-137 September 30, 2011
https://csrc.nist.rip/publications/detail/sp/800-137/final

Abstract: The purpose of this guideline is to assist organizations in the development of a continuous monitoring strategy and the implementation of a continuous monitoring program providing visibility into organizational assets, awareness of threats and vulnerabilities, and visibility into the effectiveness o...

Publications SP 800-145 September 28, 2011
https://csrc.nist.rip/publications/detail/sp/800-145/final

Abstract: Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider...

Publications ITL Bulletin September 26, 2011
https://csrc.nist.rip/publications/detail/itl-bulletin/2011/09/managing-the-configuration-of-information-systems-with-a-focus-o/final

Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-128, Guide to Security-Focused Configuration Management of Information Systems. The publication was written by Arnold Johnson, Kelley Dempsey, and Ron Ross of NIST, and by Sarbari Gupta and Dennis Bailey of Elec...

Publications NISTIR 7802 September 20, 2011
https://csrc.nist.rip/publications/detail/nistir/7802/final

Abstract: This report defines the Trust Model for Security Automation Data 1.0 (TMSAD), which permits users to establish integrity, authentication, and traceability for security automation data. Since security automation data is primarily stored and exchanged using Extensible Markup Language (XML) documents,...

Publications NISTIR 7806 September 16, 2011
https://csrc.nist.rip/publications/detail/nistir/7806/final

Abstract: The current version of the ANSI/NIST-ITL standard "Data Format for the Interchange of Fingerprint, Facial & Other Biometric Information" is specified in two parts. Part 1, ANSI/NIST-ITL 1-2007, specifies the traditional format, and Part 2, ANSI/NIST-ITL 2-2008, specifies a NIEM-conformant XML fo...

Publications NISTIR 7711 September 15, 2011
https://csrc.nist.rip/publications/detail/nistir/7711/final

Abstract: This document outlines the basic process for the distribution of election material including registration material and blank ballots to UOCAVA voters. It describes the technologies that can be used to support the electronic dissemination of election material along with security techniques ‹ both tec...

Publications NISTIR 7682 September 15, 2011
https://csrc.nist.rip/publications/detail/nistir/7682/final

Abstract: IT systems used to support UOCAVA voting face a variety of threats. If IT systems are not selected, configured and managed using security practices commensurate with the importance of the services they provide and the sensitivity of the data they handle, a security compromise could carry consequence...

Publications Conference Proceedings September 5, 2011
https://csrc.nist.rip/publications/detail/conference-paper/2011/09/05/field-study-of-user-behavior--perception-in-smartcard-authent

Conference: 13th IFIP TC13 Conference on Human-Computer Interaction (INTERACT 2011) Abstract: A field study of 24 participants over 10 weeks explored user behavior and perceptions in a smartcard authentication system. Ethnographic methods used to collect data included diaries, surveys, interviews, and field observations. We observed a number of issues users experienced while they integrated...

Publications ITL Bulletin August 24, 2011
https://csrc.nist.rip/publications/detail/itl-bulletin/2011/08/protecting-industrial-control-systems-–-key-components-of-our-na/final

Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-82, Guide to Industrial Control Systems Security: Recommendations of the National Institute of Standards and Technology. The publication was written by Keith Stouffer and by Joe Falco of NIST, and by Karen Scarfo...

Publications NISTIR 7696 August 19, 2011
https://csrc.nist.rip/publications/detail/nistir/7696/final

Abstract: This report defines the Common Platform Enumeration (CPE) Name Matching version 2.3 specification. The CPE Name Matching specification is part of a stack of CPE specifications that support a variety of use cases relating to IT product description and naming. The CPE Name Matching specification provi...

Publications NISTIR 7697 August 19, 2011
https://csrc.nist.rip/publications/detail/nistir/7697/final

Abstract: This report defines the Common Platform Enumeration (CPE) Dictionary version 2.3 specification. The CPE Dictionary Specification is a part of a stack of CPE specifications that support a variety of use cases relating to IT product description and naming. An individual CPE dictionary is a repository...

Publications NISTIR 7698 August 19, 2011
https://csrc.nist.rip/publications/detail/nistir/7698/final

Abstract: This report defines the Common Platform Enumeration (CPE) Applicability Language version 2.3 specification. The CPE Applicability Language specification is part of a stack of CPE specifications that support a variety of use cases relating to IT product description and naming. The CPE Applicability L...

Publications NISTIR 7695 August 19, 2011
https://csrc.nist.rip/publications/detail/nistir/7695/final

Abstract: This report defines the Common Platform Enumeration (CPE) Naming version 2.3 specification. The CPE Naming specification is a part of a stack of CPE specifications that support a variety of use cases relating to IT product description and naming. The CPE Naming specification defines the logical stru...

Publications Conference Proceedings August 18, 2011
https://csrc.nist.rip/publications/detail/conference-paper/2011/08/18/an-empirical-study-of-a-vulnerability-metric-aggregation-method

Conference: 2011 International Conference on Security & Management (SAM 2011), WORLDCOMP'11 Abstract: Quantifying security risk is an important and yet difficult task in enterprise network risk management, critical for proactive mission assurance. Even though metrics exist for individual vulnerabilities, there is currently no standard way of aggregating such metrics. We developed a quantitative mode...

Publications NISTIR 7788 August 1, 2011
https://csrc.nist.rip/publications/detail/nistir/7788/final

Abstract: Today’s information systems face sophisticated attackers who combine multiple vulnerabilities to penetrate networks with devastating impact. The overall security of an enterprise network cannot be determined by simply counting the number of vulnerabilities. To more accurately assess the security of...

Publications Journal Article July 21, 2011
https://csrc.nist.rip/publications/detail/journal-article/2011/vetting-mobile-apps

Journal: IT Professional Abstract: Billions of copies of apps for mobile devices have been purchased in recent years. With this growth, however, comes an increase in the spread of potentially dangerous security vulnerabilities. Because of an app's low cost and high proliferation, the threat of these vulnerabilities could be far great...

Publications Conference Proceedings July 21, 2011
https://csrc.nist.rip/publications/detail/conference-paper/2011/07/21/a-public-randomness-service

Conference: International Conference on Security and Cryptography (SECRYPT 2011) Abstract: We argue that it is time to design, implement, and deploy a trusted public randomness server on the Internet. NIST plans to deploy a prototype during 2011. We discuss some of the engineering choices that have been made as well as some of the issues currently under discussion.

Publications Conference Proceedings July 19, 2011
https://csrc.nist.rip/publications/detail/conference-paper/2011/07/19/cloud-service-feature-driven-security-policies-for-virtualized-i

Conference: World Multi-Conference on Systemics, Cybernetics and Informatics 2011 (WMSCI 2011) Abstract: With the increasing maturity of various cloud service delivery models (Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS)) and deployment models (Private, Community, Public, Hybrid), the security risk profile of each cloud service configuration is coming i...

Publications Conference Proceedings July 14, 2011
https://csrc.nist.rip/publications/detail/conference-paper/2011/07/14/on-the-security-of-hash-functions-employing-blockcipher-postproc

Conference: Fast Software Encryption 2011 (FSE 2011) Abstract: Analyzing desired generic properties of hash functions is an important current area in cryptography. For example, in Eurocrypt 2009, Dodis, Ristenpart and Shrimpton introduced the elegant notion of "Preimage Awareness" (PrA) of a hash function H^P , and they showed that a PrA hash function followed...

Publications NISTIR 7815 July 1, 2011
https://csrc.nist.rip/publications/detail/nistir/7815/final

Abstract: The Access Control for SAR Systems (ACSS) project focused on developing a prototype privilege management system used to express and enforce policies for controlling access to Suspicious Activity Report (SAR) data within the law enforcement domain. This report details the work conducted for the ACSS...

Publications ITL Bulletin June 28, 2011
https://csrc.nist.rip/publications/detail/itl-bulletin/2011/06/guidelines-for-protecting-bios-firmware/final

Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-147, BIOS Protection Guidelines: Recommendations of the National Institute of Standards and Technology. The publication was written by David Cooper, William Polk, Andrew Regenscheid, and Murugiah Souppaya of NIST...

<< first   < previous   65     66     67     68     69     70     71     72     73     74     75     76     77     78     79     80     81     82     83     84     85     86     87     88     89  next >  last >>