-
Notifications
You must be signed in to change notification settings - Fork 8
/
Copy pathSP800.html
495 lines (494 loc) · 329 KB
/
SP800.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
<!DOCTYPE HTML><html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>NIST Technical Publications List</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<link rel="stylesheet" type="text/css" href="./css/reset.css">
<link rel="stylesheet" type="text/css" href="./css/techpubs-html2.css">
<link rel="stylesheet" type="text/css" href="./css/accordian.css">
<link rel="stylesheet" type="text/css" href="./css/NISTPages.css">
</head>
<body>
<header class="nist-header">
<h1><a class="nist-logo" target="_blank" href="http://www.nist.gov/" title="Go to nist.gov">National Institute of Standards and Technology</a></h1>
<div class="nist-links"><a class="nist-links-button" target="_blank" href="http://www.nist.gov">NIST Website</a><a class="nist-links-button mobile-hide" target="_blank" href="http://www.nist.gov/public_affairs/nandyou.cfm">About NIST</a><a class="nist-links-button mobile-hide" target="_blank" href="https://github.com/usnistgov">usnistgov on GitHub</a></div>
</header>
<div id="container">
<header id="header">
<h1 id="title">NIST Technical Series Publication List</h1>
</header>
<nav id="menu" class="clearfix">
<ul>
<li><a href="./">Home</a></li>
<li><a href="https://nist.primo.exlibrisgroup.com/discovery/collectionDiscovery?vid=01NIST_INST:01NIST&collectionId=8125129820008106">View All Reports</a></li>
<li><a href="./series.html">Reports by Series</a></li>
<li><a href="https://github.com/usnistgov/NIST-Tech-Pubs/tree/nist-pages/xml">XML</a></li>
<li><a href="#top">Back to Top</a></li>
</ul>
</nav>
<section id="content">
<h2 class="links">List now available on the NIST Research Library's website</h2>
<p><a href="https://nist.primo.exlibrisgroup.com/discovery/collectionDiscovery?vid=01NIST_INST:01NIST&collectionId=8126389600008106">SP 800: Computer Security Series</a></p>
<hr>
<h2 class="outdated">List updated 2024-03-13-04:00</h2>
<h3 class="type-head" id="SP800">SP800</h3>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Secure Development Practices for Generative AI and Dual-Use Foundation AI Models:
An SSDF Community Profile </span><br><span class="publication_date"><label class="label">Date Published: </label>2024</span><br><span class="authors"><label class="label">Authors: </label>Murugiah Souppaya</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-218A ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-218A.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-218A.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-218A.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>High-Performance Computing Security: Architecture, Threat Analysis, and Security Posture</span><br><span class="publication_date"><label class="label">Date Published: </label>2024</span><br><span class="authors"><label class="label">Authors: </label>Yang Guo</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-223</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-223</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-223.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-223.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for Key Derivation Using Pseudorandom Functions </span><br><span class="publication_date"><label class="label">Date Published: </label>2024</span><br><span class="authors"><label class="label">Authors: </label>Lily Chen</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-108r1-upd1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-108r1-upd1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-108r1-upd1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-108r1-upd1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security
Rule: A Cybersecurity Resource Guide</span><br><span class="publication_date"><label class="label">Date Published: </label>2024</span><br><span class="authors"><label class="label">Authors: </label>Jeffrey Marron</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-66r2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-66r2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-66r2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-66r2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide for Mapping Types of Information and Systems to Security Categories </span><br><span class="publication_date"><label class="label">Date Published: </label>2024</span><br><span class="authors"><label class="label">Authors: </label>Gaithersburg MD NIST</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-60r2 iwd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-60r2.iwd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-60r2.iwd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-60r2.iwd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for Additional Parameter Sets for the Stateless Hash-Based Digital
Signature Scheme </span><br><span class="publication_date"><label class="label">Date Published: </label>2024</span><br><span class="authors"><label class="label">Authors: </label>Quynh Dang</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-230 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-230.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-230.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-230.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Measurement Guide for Information Security: Volume 1 — Identifying and Selecting Measures</span><br><span class="publication_date"><label class="label">Date Published: </label>2024</span><br><span class="authors"><label class="label">Authors: </label>Katherine Schroeder</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-55v1 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-55v1.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-55v1.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-55v1.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Measurement Guide for Information Security: Volume 2 — Developing an Information Security Measurement Program</span><br><span class="publication_date"><label class="label">Date Published: </label>2024</span><br><span class="authors"><label class="label">Authors: </label>Katherine Schroeder</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-55v2 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-55v2.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-55v2.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-55v2.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines for the Authorization of PIV Card and Derived PIV Credential Issuers </span><br><span class="publication_date"><label class="label">Date Published: </label>December 2023</span><br><span class="authors"><label class="label">Authors: </label>Hildegard Ferraiolo, Andrew Regenscheid, Sarbari Gupta, Nabil Ghadiali</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-79r3 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-79r3.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-79r3.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-79r3.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations </span><br><span class="publication_date"><label class="label">Date Published: </label>November 2023</span><br><span class="authors"><label class="label">Authors: </label>Ron Ross, Victoria Pillitteri</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-171r3 fpd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-171r3.fpd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171r3.fpd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-171r3.fpd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Assessing Security Requirements for Controlled Unclassified Information </span><br><span class="publication_date"><label class="label">Date Published: </label>November 2023</span><br><span class="authors"><label class="label">Authors: </label>Ron Ross, Victoria Pillitteri</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-171Ar3 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-171Ar3.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171Ar3.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-171Ar3.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Cybersecurity Log Management Planning Guide </span><br><span class="publication_date"><label class="label">Date Published: </label>October 2023</span><br><span class="authors"><label class="label">Authors: </label>Karen Scarfone, Murugiah Souppaya</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-92r1 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-92r1.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-92r1.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-92r1.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Interfaces for Personal Identity Verification: Part 2 – PIV Card Application Card Command Interface</span><br><span class="publication_date"><label class="label">Date Published: </label>September 2023</span><br><span class="authors"><label class="label">Authors: </label>Hildegard Ferraiolo, Ketan Mehta, Salvatore Francomacaro, Ramaswamy Chandramouli, Sarbari Gupta</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-73pt2-5 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-73pt2-5.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-73pt2-5.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-73pt2-5.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Cryptographic Algorithms and Key Sizes for Personal Identity Verification </span><br><span class="publication_date"><label class="label">Date Published: </label>September 2023</span><br><span class="authors"><label class="label">Authors: </label>Hildegard Ferraiolo, Andrew Regenscheid</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-78-5 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-78-5.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-78-5.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-78-5.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Interfaces for Personal Identity Verification: Part 3 – PIV Client Application Programming Interface</span><br><span class="publication_date"><label class="label">Date Published: </label>September 2023</span><br><span class="authors"><label class="label">Authors: </label>Hildegard Ferraiolo, Ketan Mehta, Salvatore Francomacaro, Ramaswamy Chandramouli, Sarbari Gupta</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-73pt3-5 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-73pt3-5.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-73pt3-5.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-73pt3-5.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Interfaces for Personal Identity Verification: Part 1 – PIV Card Application Namespace, Data Model, and Representation</span><br><span class="publication_date"><label class="label">Date Published: </label>September 2023</span><br><span class="authors"><label class="label">Authors: </label>Hildegard Ferraiolo, Ketan Mehta, Salvatore Francomacaro, Sarbari Gupta</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-73pt1-5 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-73pt1-5.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-73pt1-5.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-73pt1-5.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to Operational Technology (OT) Security </span><br><span class="publication_date"><label class="label">Date Published: </label>September 2023</span><br><span class="authors"><label class="label">Authors: </label>Keith Stouffer</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-82r3</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-82r3</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r3.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-82r3.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework
(French translation) </span><br><span class="publication_date"><label class="label">Date Published: </label>August 2017</span><br><span class="authors"><label class="label">Authors: </label>William Newhouse, Stephanie Keith, Benjamin Scribner, Gregory Witte</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-181 fre</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-181.fre</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181.fre.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-181.fre.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Workforce Framework for Cybersecurity (NICE Framework) (French translation) </span><br><span class="publication_date"><label class="label">Date Published: </label>November 2020</span><br><span class="authors"><label class="label">Authors: </label>Rodney Petersen</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-181r1 fre</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-181r1.fre</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181r1.fre.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-181r1.fre.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in
Multi-Location Environments </span><br><span class="publication_date"><label class="label">Date Published: </label>September 2023</span><br><span class="authors"><label class="label">Authors: </label>Ramaswamy Chandramouli</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-207A</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-207A</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207A.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-207A.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>De-Identifying Government Datasets Techniques and Governance</span><br><span class="publication_date"><label class="label">Date Published: </label>September 2023</span><br><span class="authors"><label class="label">Authors: </label>Simson Garfinkel</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-188</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-188</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-188.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-188.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Building a Cybersecurity and Privacy Learning Program </span><br><span class="publication_date"><label class="label">Date Published: </label>August 2023</span><br><span class="authors"><label class="label">Authors: </label>Marian Merritt, Susan Hansche, Brenda Ellis, Kevin Sanchez-Cherry, Julie Snyder, Donald Walden</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-50r1 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-50r1.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-50r1.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-50r1.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Automated secure configuration guidance from the macOS security compliance project: (mSCP)</span><br><span class="publication_date"><label class="label">Date Published: </label>July 2023</span><br><span class="authors"><label class="label">Authors: </label>Mark Trapnell, Eric Trapnell, Murugiah Souppaya, Bob Gendler, Dan Brodjieski, Allen Golbig, Karen Scarfone, Blair Heiserman</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-219r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-219r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-219r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-219r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendations for federal vulnerability disclosure guidelines </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2023</span><br><span class="authors"><label class="label">Authors: </label>Kim B Schaffer, Peter Mell, Hung Trinh, Isabel Van Wyk</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-216</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-216</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-216.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-216.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2023</span><br><span class="authors"><label class="label">Authors: </label>Ron Ross, Victoria Pillitteri</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-171r3 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-171r3.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171r3.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-171r3.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines for managing the security of 34 mobile devices in the enterprise </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2023</span><br><span class="authors"><label class="label">Authors: </label>Gema Howell, Joshua M Franklin, Vincent Sritapan, Murugiah Souppaya, Karen Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-124r2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-124r2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-124r2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-124r2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>CMVP Approved Sensitive Security Parameter Generation and Establishment Methods </span><br><span class="publication_date"><label class="label">Date Published: </label>July 2023</span><br><span class="authors"><label class="label">Authors: </label>Alexander Calis</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-140Dr2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-140Dr2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140Dr2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-140Dr2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>CMVP Approved Security Functions </span><br><span class="publication_date"><label class="label">Date Published: </label>July 2023</span><br><span class="authors"><label class="label">Authors: </label>Alexander Calis</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-140Cr2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-140Cr2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140Cr2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-140Cr2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>2022 cybersecurity & privacy annual report </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2023</span><br><span class="authors"><label class="label">Authors: </label>Patrick D O'Reilly, Kristina Rigopoulos, Larry Feldman, Greg Witte</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-225</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-225</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-225.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-225.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Automated Secure Configuration Guidance from the macOS Security Compliance Project
(mSCP) </span><br><span class="publication_date"><label class="label">Date Published: </label>March 2023</span><br><span class="authors"><label class="label">Authors: </label>Mark Trapnell, Eric Trapnell, Murugiah Souppaya, Bob Gendler, Karen Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-219r1 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-219r1.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-219r1.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-219r1.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>NIST Cloud Computing Forensic Reference Architecture </span><br><span class="publication_date"><label class="label">Date Published: </label>February 2023</span><br><span class="authors"><label class="label">Authors: </label>Martin Herman, Michaela Iorga, Ahsen Michael Salim, Robert Jackson, Mark Hurst, Ross Leo, Anand Kumar Mishra, Nancy Landreville, Yien Wang</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-201 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-201.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-201.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-201.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines for Personal Identity Verification (PIV) Federation </span><br><span class="publication_date"><label class="label">Date Published: </label>January 2023</span><br><span class="authors"><label class="label">Authors: </label>Hildegard Ferraiolo, Andrew Regenscheid, Justin Richer</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-217 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-217.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-217.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-217.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines for Derived Personal Identity Verification (PIV) Credentials </span><br><span class="publication_date"><label class="label">Date Published: </label>January 2023</span><br><span class="authors"><label class="label">Authors: </label>Hildegard Ferraiolo, Andrew Regenscheid, James Fenton</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-157r1 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-157r1.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-157r1.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-157r1.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>De-Identifying Government Data Sets </span><br><span class="publication_date"><label class="label">Date Published: </label>November 2022</span><br><span class="authors"><label class="label">Authors: </label>Simson Garfnkel, </span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-188 3pd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-188.3pd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-188.3pd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-188.3pd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to a secure enterprise network landscape </span><br><span class="publication_date"><label class="label">Date Published: </label>November 2022</span><br><span class="authors"><label class="label">Authors: </label>Ramaswamy Chandramouli</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-215</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-215</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-215.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-215.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Performance Measurement Guide for Information Security </span><br><span class="publication_date"><label class="label">Date Published: </label>November 2022</span><br><span class="authors"><label class="label">Authors: </label>Katherine Schroeder, Hung Trinh</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-055r2 iwd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-55r2.iwd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-55r2.iwd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-55r2.iwd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Engineering trustworthy secure systems </span><br><span class="publication_date"><label class="label">Date Published: </label>November 2022</span><br><span class="authors"><label class="label">Authors: </label>Ron Ross, Mark Winstead, Michael McEvilley</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-160v1r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-160v1r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v1r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-160v1r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Digital Identity Guidelines: Federation and Assertions</span><br><span class="publication_date"><label class="label">Date Published: </label>December 2022</span><br><span class="authors"><label class="label">Authors: </label>David Temoshok, Justin Richer, Yee-Yin Choong, James Fenton, Naomi Lefkovitz, Andrew Regenscheid</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-63C-4 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-63C-4.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63C-4.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-63C-4.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Digital Identity Guidelines: Authentication and Lifecycle Management</span><br><span class="publication_date"><label class="label">Date Published: </label>December 2022</span><br><span class="authors"><label class="label">Authors: </label>David Temoshok, James Fenton, Yee-Yin Choong, Naomi Lefkovitz, Andrew Regenscheid, Justin Richer</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-63B-4 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-63B-4.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63B-4.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-63B-4.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Digital Identity Guidelines </span><br><span class="publication_date"><label class="label">Date Published: </label>December 2022</span><br><span class="authors"><label class="label">Authors: </label>David Temoshok, Diana Proud-Madruga, Yee-Yin Choong, Ryan Galluzzo, Sarbari Gupta, Connie LaSalle, Naomi Lefkovitz, Andrew Regenscheid</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-063-4 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-63-4.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-4.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-63-4.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Digital Identity Guidelines: Enrollment and Identity Proofing</span><br><span class="publication_date"><label class="label">Date Published: </label>December 2022</span><br><span class="authors"><label class="label">Authors: </label>David Temoshok, Christine Abruzzi, Yee-Yin Choong, James Fenton, Ryan Galluzzo, Connie LaSalle, Naomi Lefkovitz, Andrew Regenscheid</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-63A-4 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-63A-4.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63A-4.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-63A-4.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B</span><br><span class="publication_date"><label class="label">Date Published: </label>October 2022</span><br><span class="authors"><label class="label">Authors: </label>David Hawes</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-140Br1 2pd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-140Br1.2pd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140Br1.2pd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-140Br1.2pd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendations for Discrete Logarithm-based Cryptography: Elliptic Curve Domain Parameters</span><br><span class="publication_date"><label class="label">Date Published: </label>February 2023</span><br><span class="authors"><label class="label">Authors: </label>Lily Chen, Dustin Moody, Andrew Regenscheid, Angela Robinson, Karen Randall</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-186</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-186</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-186.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-186.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for Random Bit Generator (RBG) Constructions </span><br><span class="publication_date"><label class="label">Date Published: </label>September 2022</span><br><span class="authors"><label class="label">Authors: </label>Elaine Barker, John Kelsey, Kerry McKay, Allen Roginsky, Meltem Sönmez Turan</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-90C 3pd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-90C.3pd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90C.3pd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-90C.3pd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>2021 cybersecurity and privacy annual report </span><br><span class="publication_date"><label class="label">Date Published: </label>September 2022</span><br><span class="authors"><label class="label">Authors: </label>Patrick O'Reilly, Kristina Rigopoulos, Larry Feldman, Greg Witte</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-220</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-220</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-220.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-220.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for key derivation using pseudorandom functions </span><br><span class="publication_date"><label class="label">Date Published: </label>August 2022</span><br><span class="authors"><label class="label">Authors: </label>Lily Chen</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-108r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-108r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-108r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-108r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to Secure Enterprise Network Access Landscape </span><br><span class="publication_date"><label class="label">Date Published: </label>August 2022</span><br><span class="authors"><label class="label">Authors: </label>Ramaswamy Chandramouli</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-215 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-215.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-215.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-215.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>High Performance Computing (HPC) Security: Architecture and Security Posture</span><br><span class="publication_date"><label class="label">Date Published: </label>February 2023</span><br><span class="authors"><label class="label">Authors: </label>Yang Guo, Ramaswamy Chandramouli, Lowell Wofford, Rickey Gregg, Gary Key, Antwan Clark, Catherine Hinton, Andrew Prout, Albert Reuther, Ryan Adamson, Aron Warren, Purushotham Bangalore, Erik Deumens, Csilla Farkas</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-223 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-223.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-223.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-223.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security
Rule: A Cybersecurity Resource Guide</span><br><span class="publication_date"><label class="label">Date Published: </label>July 2022</span><br><span class="authors"><label class="label">Authors: </label>Jeffrey A Marron</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-66r2 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-66r2.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-66r2.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-66r2.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Information and Communications Technology (ICT) Risk Outcomes: A Framework for Integrating ICT Risk Management Programs with the Enterprise Risk
Portfolio</span><br><span class="publication_date"><label class="label">Date Published: </label>July 2022</span><br><span class="authors"><label class="label">Authors: </label>Stephen Quinn, Nahla Ivy, Julie Chua, Karen Scarfone, Matthew Barrett, Larry Feldman, Daniel Topper, Gregory Witte, Robert Gardner</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-221A ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-221A.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-221A.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-221A.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Enterprise Impact of Information and Communications Technology Risk: Governing and Managing ICT Risk Programs Within an Enterprise Risk Portfolio</span><br><span class="publication_date"><label class="label">Date Published: </label>July 2022</span><br><span class="authors"><label class="label">Authors: </label>Stephen Quinn, Nahla Ivy, Julie Chua, Matthew Barrett, Larry Feldman, Daniel Topper, Gregory Witte, Robert Gardner, Karen Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-221 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-221.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-221.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-221.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Engineering Trustworthy Secure Systems </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2022</span><br><span class="authors"><label class="label">Authors: </label>Ron Ross, Mark Winstead, Michael McEvilley</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-160v1r1 fpd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-160v1r1.fpd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v1r1.fpd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-160v1r1.fpd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Automated secure configuration guidance from the macOS Security Compliance Project
(mSCP) </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2022</span><br><span class="authors"><label class="label">Authors: </label>Mark Trapnell, Eric Trapnell, Murugiah Souppaya, Bob Gendler, Karen Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-219</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-219</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-219.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-219.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>CMVP approved security functions : CMVP validation authority updates to ISOIEC 24759</span><br><span class="publication_date"><label class="label">Date Published: </label>May 2022</span><br><span class="authors"><label class="label">Authors: </label>Kim Schaffer, Alexander Calis</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-140Cr1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-140Cr1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140Cr1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-140Cr1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>CMVP approved sensitive security parameter generation and establishment methods : CMVP validation authority updates to ISOIEC 24759</span><br><span class="publication_date"><label class="label">Date Published: </label>May 2022</span><br><span class="authors"><label class="label">Authors: </label>Kim Schaffer, Alexander Calis</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-140Dr1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-140Dr1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140Dr1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-140Dr1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759
and ISO/IEC 19790 Annex B </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2022</span><br><span class="authors"><label class="label">Authors: </label>David Hawes, Alexander Calis, Roy Crombie</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-140Br1 ipd</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-140Br1.ipd</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140Br1.ipd.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-140Br1.ipd.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Workforce framework for cybersecurity (NICE Framework) (Ukranian translation) </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2022</span><br><span class="authors"><label class="label">Authors: </label>Rodney Petersen, Danielle Santos, Matthew C Smith, Karen A Wetzel, Greg Witte</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-181r1.ukr</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-181r1.ukr</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181r1.ukr.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-181r1.ukr.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework
(Ukrainian translation) </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2022</span><br><span class="authors"><label class="label">Authors: </label>William Newhouse, Stephanie Keith, Benjamin Scribner, Greg Witte</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-181.ukr</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-181.ukr</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181.ukr.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-181.ukr.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Workforce framework for cybersecurity (NICE Framework) (Slovak translation) </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2022</span><br><span class="authors"><label class="label">Authors: </label>Rodney Petersen, Danielle Santos, Matthew C Smith, Karen A Wetzel, Greg Witte</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-181r1.slo</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-181r1.slo</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181r1.slo.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-181r1.slo.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Cybersecurity supply chain risk management for systems and organizations </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2022</span><br><span class="authors"><label class="label">Authors: </label>Jon Boyens, Angela Smith, Nadya Bartol, Kris Winkler, Alex Holbrook, Matthew Fallon</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-161r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-161r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-161r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-161r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to enterprise patch management planning : preventive maintenance for technology</span><br><span class="publication_date"><label class="label">Date Published: </label>April 2022</span><br><span class="authors"><label class="label">Authors: </label>Murugiah Souppaya, Karen Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-40r4</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-40r4</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-40r4.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-40r4.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Assessing enhanced security requirements for controlled unclassified information </span><br><span class="publication_date"><label class="label">Date Published: </label>March 2022</span><br><span class="authors"><label class="label">Authors: </label>Ron Ross, Victoria Pillitteri, Kelley Dempsey</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-172A</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-172A</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-172A.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-172A.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Implementation of DevSecOps for a microservices-based application with service mesh </span><br><span class="publication_date"><label class="label">Date Published: </label>March 2022</span><br><span class="authors"><label class="label">Authors: </label>Ramaswamy Chandramouli</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-204C</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-204C</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-204C.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-204C.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Automated Secure Configuration Guidance from the macOS Security Compliance Project
(mSCP) </span><br><span class="publication_date"><label class="label">Date Published: </label>February 2022</span><br><span class="authors"><label class="label">Authors: </label>Mark Trapnell, Eric Trapnell, Murugiah Souppaya, Bob Gendler, Karen Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-219-draft</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-219-draft</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-219-draft.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-219-draft.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Workforce framework for cybersecurity (NICE Framework) (Portuguese translation) </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2022</span><br><span class="authors"><label class="label">Authors: </label>Rodney Petersen, Danielle Santos, Matthew C Smith, Karen A Wetzel, Greg Witte</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-181r1pt</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-181r1pt</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181r1pt.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-181r1pt.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Workforce framework for cybersecurity (NICE Framework) (Spanish translation) </span><br><span class="publication_date"><label class="label">Date Published: </label>February 2022</span><br><span class="authors"><label class="label">Authors: </label>Rodney Petersen, Danielle Santos, Matthew C Smith, Karen A Wetzel, Greg Witte</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-181r1es</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-181r1es</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181r1es.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-181r1es.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework
(Ukrainian translation) </span><br><span class="publication_date"><label class="label">Date Published: </label>February 2022</span><br><span class="authors"><label class="label">Authors: </label>William Newhouse, Stephanie Keith, Benjamin Scribner, Greg Witte</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-181pt</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-181pt</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181pt.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-181pt.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework
(Ukrainian translation) </span><br><span class="publication_date"><label class="label">Date Published: </label>February 2022</span><br><span class="authors"><label class="label">Authors: </label>William Newhouse, Stephanie Keith, Benjamin Scribner, Greg Witte</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-181es</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-181es</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181es.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-181es.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>CMVP Approved Sensitive Security Parameter Generation and Establishment Methods: CMVP
Validation Authority Updates to ISO/IEC 24759 </span><br><span class="publication_date"><label class="label">Date Published: </label>February 2022</span><br><span class="authors"><label class="label">Authors: </label>Kim Schaffer</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-140Dr1-draft2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-140Dr1-draft2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140Dr1-draft2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-140Dr1-draft2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>CMVP Approved Security Functions: CMVP Validation Authority Updates to ISO/IEC 24759 </span><br><span class="publication_date"><label class="label">Date Published: </label>February 2022</span><br><span class="authors"><label class="label">Authors: </label>Kim Schaffer</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-140Cr1-draft2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-140Cr1-draft2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140Cr1-draft2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-140Cr1-draft2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Secure Software Development Framework (SSDF) version 1.1 : recommendations for mitigating the risk of software vulnerabilities</span><br><span class="publication_date"><label class="label">Date Published: </label>February 2022</span><br><span class="authors"><label class="label">Authors: </label>Murugiah Souppaya, Karen Scarfone, Donna Dodson</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-218</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-218</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-218.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-218.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Assessing security and privacy controls in information systems and organizations </span><br><span class="publication_date"><label class="label">Date Published: </label>January 2022</span><br><span class="authors"><label class="label">Authors: </label></span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-53Ar5</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-53Ar5</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53Ar5.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-53Ar5.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Developing cyber-resilient systems : a systems security engineering approach</span><br><span class="publication_date"><label class="label">Date Published: </label>December 2021</span><br><span class="authors"><label class="label">Authors: </label>Ron Ross, Victoria Pillitteri, Richard Graubart, Deborah Bodeau, Rosalie McQuaid</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-160v2r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-160v2r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v2r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-160v2r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>IoT device cybersecurity guidance for the federal government : IoT device cybersecurity requirement catalog</span><br><span class="publication_date"><label class="label">Date Published: </label>November 2021</span><br><span class="authors"><label class="label">Authors: </label>Michael Fagan, Katerina Megas, Jeffrey Marron, Eric Link, Kevin Brady, Barbara Cuthill, Rebecca Herold, David Lemire, Brad Hoehn</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-213A</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-213A</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-213A.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-213A.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>IoT device cybersecurity guidance for the federal government : establishing IoT device cybersecurity requirements</span><br><span class="publication_date"><label class="label">Date Published: </label>November 2021</span><br><span class="authors"><label class="label">Authors: </label>Michael Fagan, Jeffrey Marron, Kevin Brady, Barbara Cuthill, Katerina Megas, Rebecca Herold</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-213</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-213</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-213.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-213.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>2020 cybersecurity and privacy annual report </span><br><span class="publication_date"><label class="label">Date Published: </label>September 2021</span><br><span class="authors"><label class="label">Authors: </label>Patrick O'Reilly, Kristina Rigopoulos, Larry Feldman, Greg Witte</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-214</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-214</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-214.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-214.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Attribute-based access control for microservices-based applications using a service
mesh </span><br><span class="publication_date"><label class="label">Date Published: </label>August 2021</span><br><span class="authors"><label class="label">Authors: </label>Ramaswamy Chandramouli, Zack Butcher, Aradhna Chetal</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-204B</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-204B</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-204B.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-204B.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Enhanced Security Requirements for Protecting Controlled Unclassified Information:
A Supplement to NIST Special Publication 800-171 A Supplement to NIST Special Publication 800-171</span><br><span class="publication_date"><label class="label">Date Published: </label>January 2021</span><br><span class="authors"><label class="label">Authors: </label>RON ROSS, VICTORIA PILLITTERI, GARY GUISSANIE, RYAN WAGNER, RICHARD GRAUBART, DEB BODEAU</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-172</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-172</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-172.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-172.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Workforce Framework for Cybersecurity (NICE Framework) </span><br><span class="publication_date"><label class="label">Date Published: </label>November 2020</span><br><span class="authors"><label class="label">Authors: </label>Rodney Petersen, Danielle Santos, Matthew C. Smith, Karen A. Wetzel, Greg Witte</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-181r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-181r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-181r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Control Baselines for Information Systems and Organizations </span><br><span class="publication_date"><label class="label">Date Published: </label>October 2020</span><br><span class="authors"><label class="label">Authors: </label></span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-53B</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-53B</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53B.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-53B.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for Stateful Hash-Based Signature Schemes </span><br><span class="publication_date"><label class="label">Date Published: </label>October 2020</span><br><span class="authors"><label class="label">Authors: </label>David A. Cooper, Daniel C. Apon, Quynh H. Dang, Michael S. Davidson, Morris J. Dworkin, Carl A. Miller</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-208</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-208</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-208.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-208.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Security Guidelines for Storage Infrastructure </span><br><span class="publication_date"><label class="label">Date Published: </label>October 2020</span><br><span class="authors"><label class="label">Authors: </label>Ramaswamy Chandramouli, Doron Pinhas</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-209</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-209</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-209.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-209.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Security and Privacy Controls for Information Systems and Organizations </span><br><span class="publication_date"><label class="label">Date Published: </label>September 2020</span><br><span class="authors"><label class="label">Authors: </label></span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-53r5</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-53r5</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-53r5.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>2019 NIST/ITL Cybersecurity Program Annual Report </span><br><span class="publication_date"><label class="label">Date Published: </label>August 2020</span><br><span class="authors"><label class="label">Authors: </label>Patrick O’Reilly, Kristina Rigopoulos, Larry Feldman, Greg Witte</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-211</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-211</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-211.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-211.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for Key-Derivation Methods in Key-Establishment Schemes </span><br><span class="publication_date"><label class="label">Date Published: </label>August 2020</span><br><span class="authors"><label class="label">Authors: </label>Elaine Barker, Lily Chen, Richard Davis</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-56Cr2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-56Cr2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-56Cr2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Zero Trust Architecture </span><br><span class="publication_date"><label class="label">Date Published: </label>August 2020</span><br><span class="authors"><label class="label">Authors: </label>Scott Rose, Oliver Borchert, Stu Mitchell, Sean Connelly</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-207</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-207</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-207.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>General access control guidance for cloud systems </span><br><span class="publication_date"><label class="label">Date Published: </label>July 2020</span><br><span class="authors"><label class="label">Authors: </label>Vincent C Hu, Michaela Iorga, Wei Bao, Ang Li, Qinghua Li, Antonios Gouglidis</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-210</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-210</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-210.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-210.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to IPsec VPNs </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2020</span><br><span class="authors"><label class="label">Authors: </label>Elaine Barker, Quynh Dang, Sheila Frankel, Karen Scarfone, Paul Wouters</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-77r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-77r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-77r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-77r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for cryptographic key generation </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2020</span><br><span class="authors"><label class="label">Authors: </label>Elaine Barker, Allen Roginsky, Richard Davis</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-133r2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-133r2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-133r2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-133r2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Building secure microservices-based applications using service-mesh architecture </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2020</span><br><span class="authors"><label class="label">Authors: </label>Ramaswamy Chandramouli, Zack Butcher</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-204A</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-204a</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-204A.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-204a.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an
ISCM Program Assessment </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2020</span><br><span class="authors"><label class="label">Authors: </label>Kelley Dempsey, Victoria Yan Pillitteri, Chad Baer, Robert Niemeyer, Ron Rudman, Susan Urban</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-137A</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-137A</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-137A.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-137A.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for key management: part 1 - general</span><br><span class="publication_date"><label class="label">Date Published: </label>May 2020</span><br><span class="authors"><label class="label">Authors: </label>Elaine Barker</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-57pt1r5</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-57pt1r5</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-57pt1r5.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guideline for using cryptographic standards in the federal government: cryptographic mechanisms</span><br><span class="publication_date"><label class="label">Date Published: </label>March 2020</span><br><span class="authors"><label class="label">Authors: </label>Elaine Barker</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-175Br1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-175Br1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-175Br1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-175Br1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>FIPS 140-3 derived test requirements (DTR): CMVP validation authority updates to ISOIEC 24759</span><br><span class="publication_date"><label class="label">Date Published: </label>March 2020</span><br><span class="authors"><label class="label">Authors: </label>Kim Schaffer</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-140</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-140</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-140.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>CMVP documentation requirements: CMVP validation authority updates to ISOIEC 24759</span><br><span class="publication_date"><label class="label">Date Published: </label>March 2020</span><br><span class="authors"><label class="label">Authors: </label>Kim Schaffer</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-140A</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-140A</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140A.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-140A.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>CMVP security policy requirements: CMVP validation authority updates to ISOIEC 24759 and ISOIEC 19790 Annex B</span><br><span class="publication_date"><label class="label">Date Published: </label>March 2020</span><br><span class="authors"><label class="label">Authors: </label>Kim Schaffer</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-140B</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-140B</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140B.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-140B.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>CMVP approved authentication mechanisms: CMVP validation authority requirements for ISOIEC 19790:2012 Annex E and ISOIEC 24579:2017</span><br><span class="publication_date"><label class="label">Date Published: </label>March 2020</span><br><span class="authors"><label class="label">Authors: </label>Kim Schaffer</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-140E</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-140E</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140E.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-140E.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>CMVP approved non-invasive attack mitigation test metrics: CMVP validation authority updates to ISOIEC 24759:2014(E)</span><br><span class="publication_date"><label class="label">Date Published: </label>March 2020</span><br><span class="authors"><label class="label">Authors: </label>Kim Schaffer</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-140F</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-140F</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140F.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-140F.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>CMVP approved security functions: CMVP validation authority updates to ISOIEC 24759</span><br><span class="publication_date"><label class="label">Date Published: </label>March 2020</span><br><span class="authors"><label class="label">Authors: </label>Kim Schaffer</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-140C</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-140C</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140C.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-140C.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>CMVP approved sensitive parameter generation and establishment methods: CMVP validation authority updates to ISOIEC 24759:2014(E)</span><br><span class="publication_date"><label class="label">Date Published: </label>March 2020</span><br><span class="authors"><label class="label">Authors: </label>Kim Schaffer</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-140D</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-140D</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140D.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-140D.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>NIST/ITL Cybersecurity Program: Annual Report 2018 </span><br><span class="publication_date"><label class="label">Date Published: </label>March 2020</span><br><span class="authors"><label class="label">Authors: </label>Patrick O'Reilly, Kristina Rigopoulos, Larry Feldman, Greg Witte</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-206</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-206</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-206.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-206.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Protecting controlled unclassified information in nonfederal systems and organizations </span><br><span class="publication_date"><label class="label">Date Published: </label>February 2020</span><br><span class="authors"><label class="label">Authors: </label>Ron Ross, Victoria Pillitteri, Kelley Dempsey, Mark Riddle, Gary Guissanie</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-171r2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-171r2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171r2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-171r2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Resilient interdomain traffic exchange: BGP security and DDos mitigation</span><br><span class="publication_date"><label class="label">Date Published: </label>December 2019</span><br><span class="authors"><label class="label">Authors: </label>Kotikalapudi Sriram, Doug Montgomery</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-189</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-189</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-189.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-189.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Developing cyber resilient systems: a systems security engineering approach</span><br><span class="publication_date"><label class="label">Date Published: </label>November 2019</span><br><span class="authors"><label class="label">Authors: </label>Ron Ross, Victoria Pillitteri, Richard Graubart, Deborah Bodeau, Rosalie McQuaid</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-160v2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-160v2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-160v2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide for security-focused configuration management of information systems </span><br><span class="publication_date"><label class="label">Date Published: </label>August 2011</span><br><span class="authors"><label class="label">Authors: </label>Arnold Johnson, Kelley Dempsey, Ron Ross, Sarbari Gupta, Dennis Bailey</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-128-2011</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-128-2011</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-128-2011.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-128-2011.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines for the selection, configuration, and use of Transport Layer Security (TLS)
implementations </span><br><span class="publication_date"><label class="label">Date Published: </label>August 2019</span><br><span class="authors"><label class="label">Authors: </label>Kerry A McKay, David A Cooper</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-52r2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-52r2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-52r2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Security strategies for microservices-based application systems </span><br><span class="publication_date"><label class="label">Date Published: </label>August 2019</span><br><span class="authors"><label class="label">Authors: </label>Ramaswamy Chandramouli</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-204</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-204</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-204.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-204.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for cryptographic key generation </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2021</span><br><span class="authors"><label class="label">Authors: </label>Elaine Barker, Allen Roginsky</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-133r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-133r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-133r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-133r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Attribute considerations for access control systems </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2019</span><br><span class="authors"><label class="label">Authors: </label>Vincent C Hu, David F Ferraiolo, D Richard Kuhn</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-205</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-205</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-205.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-205.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for key management: part 2 -- best practices for key management organizations</span><br><span class="publication_date"><label class="label">Date Published: </label>May 2019</span><br><span class="authors"><label class="label">Authors: </label>Elaine Barker, William C Barker</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-57pt2r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-57pt2r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt2r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-57pt2r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Vetting the security of mobile applications </span><br><span class="publication_date"><label class="label">Date Published: </label>April 2019</span><br><span class="authors"><label class="label">Authors: </label>Michael Ogata, Josh Franklin, Jeffrey Voas, Vincent Sritapan, Stephen Quirolgico</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-163r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-163r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-163r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-163r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Transitioning the use of cryptographic algorithms and key lengths </span><br><span class="publication_date"><label class="label">Date Published: </label>March 2019</span><br><span class="authors"><label class="label">Authors: </label>Elaine Barker, Allen Roginsky</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-131Ar2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-131Ar2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-131Ar2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for pair-wise key establishment using integer factorization cryptography </span><br><span class="publication_date"><label class="label">Date Published: </label>March 2019</span><br><span class="authors"><label class="label">Authors: </label>Elaine Barker, Lily Chen, Allen Roginsky, Apostol Vassilev, Richard Davis, Scott Simon</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-56Br2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-56Br2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Br2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-56Br2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Trustworthy email </span><br><span class="publication_date"><label class="label">Date Published: </label>February 2019</span><br><span class="authors"><label class="label">Authors: </label>Scott Rose, J Stephen Nightingale, Simson Garfinkel, Ramaswamy Chandramouli</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-177r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-177r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-177r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-177r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Risk management framework for information systems and organizations: a system life cycle approach for security and privacy</span><br><span class="publication_date"><label class="label">Date Published: </label>December 2018</span><br><span class="authors"><label class="label">Authors: </label></span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-37r2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-37r2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-37r2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines for the use of PIV credentials in facility access </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2018</span><br><span class="authors"><label class="label">Authors: </label>Hildegard Ferraiolo, Ketan Mehta, Nabil Ghadiali, Jason Mohler, Vincent Johnson, Steven Brady</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-116r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-116r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-116r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-116r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Security recommendations for server-based hypervisor platforms </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2018</span><br><span class="authors"><label class="label">Authors: </label>Ramaswamy Chandramouli</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-125Ar1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-125Ar1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-125Ar1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-125Ar1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Assessing security requirements for controlled unclassified information </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2018</span><br><span class="authors"><label class="label">Authors: </label>Ross Ron, Demspey Kelley, Pilliterri Victoria</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-171A</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-171A</span><br><a href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171A.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-171A.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Quick start guide for populating mobile test devices </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2018</span><br><span class="authors"><label class="label">Authors: </label>Rick Ayers, Benjamin Livelsberger, Barbara Guttman</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-202</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-202</span><br><a href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-202.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-202.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Platform firmware resiliency guidelines </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2018</span><br><span class="authors"><label class="label">Authors: </label>Andrew Regenscheid</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-193</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-193</span><br><a href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-193.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-193.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Codes for the identification of federal and federally-assisted organizations </span><br><span class="publication_date"><label class="label">Date Published: </label>April 2018</span><br><span class="authors"><label class="label">Authors: </label>Hildegard Ferraiolo</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-87r2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-87r2</span><br><a href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-87r2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-87r2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for pair-wise key-establishment schemes using discrete logarithm cryptography </span><br><span class="publication_date"><label class="label">Date Published: </label>April 2018</span><br><span class="authors"><label class="label">Authors: </label>Elaine Barker, Lily Chen, Allen Roginsky, Apostol Vassilev, Richard Davis</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-56Ar3</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-56Ar3</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-56Ar3.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for key-derivation methods in key-establishment schemes </span><br><span class="publication_date"><label class="label">Date Published: </label>April 2018</span><br><span class="authors"><label class="label">Authors: </label>Elaine Barker, Lily Chen, Richard Davis</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-56Cr1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-56Cr1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-56Cr1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Systems security engineering: considerations for a multidisciplinary approach in the
engineering of trustworthy secure systems, volume 1 </span><br><span class="publication_date"><label class="label">Date Published: </label>March 2018</span><br><span class="authors"><label class="label">Authors: </label>Ron Ross, Michael McEvilley, Janet Carrier Oren</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-160v1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-160v1</span><br><a href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-160v1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>National checklist program for IT products - guidelines for checklist users and developers </span><br><span class="publication_date"><label class="label">Date Published: </label>February 2018</span><br><span class="authors"><label class="label">Authors: </label>Stephen D Quinn, Murugiah Souppaya, Melanie Cook, Karen Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-70r4</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-70r4</span><br><a href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-70r4.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-70r4.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>SCAP 1.3 component specification version updates: an annex to NIST special publication
800-126 revision 3 </span><br><span class="publication_date"><label class="label">Date Published: </label>February 2018</span><br><span class="authors"><label class="label">Authors: </label>Harold Booth, David Waltermire, Lee Badger, Melanie Cook, Stephen D Quinn, Karen Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-126A</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-126A</span><br><a href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-126A.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-126A.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>The technical specification for the security content automation protocol (SCAP) version
1.3 </span><br><span class="publication_date"><label class="label">Date Published: </label>February 2018</span><br><span class="authors"><label class="label">Authors: </label>David Waltermire, Stephen Quinn, Harold Booth, Karen Scarfone, Dragos Prisaca</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-126r3</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-126r3</span><br><a href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-126r3.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-126r3.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Security recommendations for hypervisor deployment on servers </span><br><span class="publication_date"><label class="label">Date Published: </label>January 2018</span><br><span class="authors"><label class="label">Authors: </label>Ramaswamy Chandramouli</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-125A</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-125A</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-125A.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-125A.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for the entropy sources used for random bit generation </span><br><span class="publication_date"><label class="label">Date Published: </label>January 2018</span><br><span class="authors"><label class="label">Authors: </label>Meltem Sönmez Turan, Elaine Barker, John Kelsey, Kerry A McKay, Mary L Baish, Mike Boyle</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-90b</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-90B</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90B.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-90B.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to LTE security </span><br><span class="publication_date"><label class="label">Date Published: </label>December 2017</span><br><span class="authors"><label class="label">Authors: </label>Jeffrey Cichonski, Joshua M Franklin, Michael Bartock</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-187</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-187</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-187.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-187.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher </span><br><span class="publication_date"><label class="label">Date Published: </label>November 2017</span><br><span class="authors"><label class="label">Authors: </label>Elaine Barker, Nicky Mouha</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-67r2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-67r2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-67r2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-67r2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>2016 NIST/ITL cybersecurity program: annual report </span><br><span class="publication_date"><label class="label">Date Published: </label>September 2017</span><br><span class="authors"><label class="label">Authors: </label>Patrick O'Reilly, Kristina Rigopoulos, Larry Feldman, Greg Witte</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-195</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-195</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-195.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-195.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Application container security guide </span><br><span class="publication_date"><label class="label">Date Published: </label>September 2017</span><br><span class="authors"><label class="label">Authors: </label>Murugiah Souppaya, John Morello, Karen Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-190</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-190</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-190.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-190.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework </span><br><span class="publication_date"><label class="label">Date Published: </label>August 2017</span><br><span class="authors"><label class="label">Authors: </label>William Newhouse, Stephanie Keith, Benjamin Scribner, Greg Witte</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-181</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-181</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-181.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Verification and test methods for access control policiesmodels </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2017</span><br><span class="authors"><label class="label">Authors: </label>Vincent C Hu, Rick Kuhn, Dylan Yaga</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-192</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-192</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-192.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-192.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>An introduction to information security </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2017</span><br><span class="authors"><label class="label">Authors: </label>Michael Nieles, Kelley Dempsey, Victoria Yan Pillitteri</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-12r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-12r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-12r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-12r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Digital identity guidelines: revision 3 </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2017</span><br><span class="authors"><label class="label">Authors: </label>Paul A Grassi, Michael E Garcia, James L Fenton</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-63-3</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-63-3</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-3.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-63-3.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Digital identity guidelines: enrollment and identity proofing </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2017</span><br><span class="authors"><label class="label">Authors: </label>Paul A Grassi, James L Fenton, Naomi B Lefkovitz, Jamie M Danker, Yee-Yin Choong, Kristen K Greene, Mary F Theofanos</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-63a</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-63a</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63a.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-63a.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Digital identity guidelines: authentication and lifecycle management </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2017</span><br><span class="authors"><label class="label">Authors: </label>Paul A Grassi, James L Fenton, Elaine M Newton, Ray A Perlner, Andrew R Regenscheid, William E Burr, Justin P Richer, Naomi B Lefkovitz, Jamie M Danker, Yee-Yin Choong, Kristen K Greene, Mary F Theofanos</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-63b</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-63b</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63b.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-63b.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Digital identity guidelines: federation and assertions </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2017</span><br><span class="authors"><label class="label">Authors: </label>Paul A Grassi, Justin P Richer, Sarah K Squire, James L Fenton, Ellen M Nadeau, Naomi B Lefkovitz, Jamie M Danker, Yee-Yin Choong, Kristen K Greene, Mary F Theofanos</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-63c</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-63c</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63c.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-63c.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to bluetooth security </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2017</span><br><span class="authors"><label class="label">Authors: </label>John Padgette, John Bahr, Mayank Batra, Marcel Holtmann, Rhonda Smithbey, Lily Chen, Karen Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-121r2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-121r2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-121r2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-121r2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>SHA-3 derived functions: cSHAKE, KMAC, TupleHash and ParallelHash </span><br><span class="publication_date"><label class="label">Date Published: </label>December 2016</span><br><span class="authors"><label class="label">Authors: </label>John Kelsey, Shu-jen Change, Ray Perlner</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-185</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-185</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-185.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-185.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide for cybersecurity event recovery </span><br><span class="publication_date"><label class="label">Date Published: </label>December 2016</span><br><span class="authors"><label class="label">Authors: </label>Michael Bartock, Jeffrey Cichonski, Murugiah Souppaya, Matthew Smith, Greg Witte, Karen Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-184</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-184</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-184.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-184.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Protecting controlled unclassified information in nonfederal systems and organizations </span><br><span class="publication_date"><label class="label">Date Published: </label>December 2016</span><br><span class="authors"><label class="label">Authors: </label>Ron Ross, Patrick Viscuso, Gary Guissanie, Kelley Dempsey, Mark Riddle</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-171r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-171r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-171r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to securing Apple OS X 10.10 systems for IT professionals: a NIST security configuration
checklist </span><br><span class="publication_date"><label class="label">Date Published: </label>December 2016</span><br><span class="authors"><label class="label">Authors: </label>Lee Badger, Murugiah Souppaya, Mark Trapnell, Eric Trapnell, Dylan Yaga, Karen Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-179</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-179</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-179.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-179.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Systems Security Engineering: Considerations for a Multidisciplinary Approach in the
Engineering of Trustworthy Secure Systems </span><br><span class="publication_date"><label class="label">Date Published: </label>November 2016</span><br><span class="authors"><label class="label">Authors: </label>Ron Ross, Michael McEvilley, Janet Carrier Oren</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-160</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-160</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-160.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for block cipher modes of operation : the CMAC mode for authentication</span><br><span class="publication_date"><label class="label">Date Published: </label>2005</span><br><span class="authors"><label class="label">Authors: </label>M J Dworkin</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-38b-2005</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-38b-2005</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38b.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-38b-2005.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to Cyber Threat Information Sharing </span><br><span class="publication_date"><label class="label">Date Published: </label>October 2016</span><br><span class="authors"><label class="label">Authors: </label>Christopher S. Johnson, Mark Lee Badger, David A. Waltermire, Julie Snyder, Clem Skorupka</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-150</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-150</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-150.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-150.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>A Comparison of Attribute Based Access Control (ABAC) Standards for Data Service Applications </span><br><span class="publication_date"><label class="label">Date Published: </label>October 2016</span><br><span class="authors"><label class="label">Authors: </label>David F. Ferraiolo, Ramaswamy Chandramouli, Vincent C. Hu, D. Richard R. Kuhn</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-178</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-178</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-178.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-178.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Trustworthy Email </span><br><span class="publication_date"><label class="label">Date Published: </label>September 2016</span><br><span class="authors"><label class="label">Authors: </label>Scott W. Rose, Stephen J. Nightingale, Simson L. Garfinkel, Ramaswamy Chandramouli</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-177</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-177</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-177.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-177.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guideline for Using Cryptographic Standards in the Federal Government: Directives,
Mandates and Policies </span><br><span class="publication_date"><label class="label">Date Published: </label>August 2016</span><br><span class="authors"><label class="label">Authors: </label>Elaine B. Barker, William C. Barker</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-175A</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-175A</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-175A.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-175A.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic
Mechanisms </span><br><span class="publication_date"><label class="label">Date Published: </label>August 2016</span><br><span class="authors"><label class="label">Authors: </label>Elaine B. Barker</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-175B</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-175B</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-175B.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-175B.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Computer Security Division 2015 Annual Report </span><br><span class="publication_date"><label class="label">Date Published: </label>August 2016</span><br><span class="authors"><label class="label">Authors: </label>Patrick D O'Reilly, Greg A Witte, Larry Feldman</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-182</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-182</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-182.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-182.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>User's Guide to Telework and Bring Your Own Device (BYOD) Security </span><br><span class="publication_date"><label class="label">Date Published: </label>July 2016</span><br><span class="authors"><label class="label">Authors: </label>Murugiah P Souppaya, Karen A Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-114r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-114r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-114r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-114r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security </span><br><span class="publication_date"><label class="label">Date Published: </label>July 2016</span><br><span class="authors"><label class="label">Authors: </label>Murugiah P Souppaya, Karen A Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-46r2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-46r2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-46r2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-46r2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Networks of 'things' </span><br><span class="publication_date"><label class="label">Date Published: </label>2016</span><br><span class="authors"><label class="label">Authors: </label>Jeffrey M Voas</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-183</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-183</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-183.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-183.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Derived PIV Application and Data Model Test Guidelines </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2016</span><br><span class="authors"><label class="label">Authors: </label>David Cooper, Hildegard Ferraiolo, Ramaswamy Chandramouli, Nabil Ghadiali, Jason Mohler, Steven Brady</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-166</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-166</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-166.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-166.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Representation of PIV Chain-of-Trust for Import and Export </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2016</span><br><span class="authors"><label class="label">Authors: </label>Hildegard Ferraiolo, Ramaswamy Chandramouli, Ketan Mehta, Jason Mohler, Stephen Skordinski, Steven Brady</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-156</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-156</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-156.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-156.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>PIV Card Application and Middleware Interface Test Guidelines (SP 800-73-4 compliance) </span><br><span class="publication_date"><label class="label">Date Published: </label>April 2016</span><br><span class="authors"><label class="label">Authors: </label>David A. Cooper, Hildegard Ferraiolo, Ramaswamy Chandramouli, Jason Mohler</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-85A-4</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-85A-4</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-85A-4.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-85A-4.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving
Encryption </span><br><span class="publication_date"><label class="label">Date Published: </label>March 2016</span><br><span class="authors"><label class="label">Authors: </label>Morris Dworkin</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-38G</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-38G</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38G.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-38G.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Secure Virtual Network Configuration for Virtual Machine (VM) Protection </span><br><span class="publication_date"><label class="label">Date Published: </label>March 2016</span><br><span class="authors"><label class="label">Authors: </label>Ramaswamy Chandramouli</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-125B</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-125B</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-125B.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-125B.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for Key Management Part 1: General </span><br><span class="publication_date"><label class="label">Date Published: </label>January 2016</span><br><span class="authors"><label class="label">Authors: </label>Elaine Barker</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-57pt1r4</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-57pt1r4</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-57pt1r4.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>National Checklist Program for IT Products – Guidelines for Checklist Users and Developers </span><br><span class="publication_date"><label class="label">Date Published: </label>December 2015</span><br><span class="authors"><label class="label">Authors: </label>Stephen D. Quinn, Murugiah Souppaya, Melanie Cook, Karen A. Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-70r3</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-70r3</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-70r3.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-70r3.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms
and Key Lengths </span><br><span class="publication_date"><label class="label">Date Published: </label>November 2015</span><br><span class="authors"><label class="label">Authors: </label>Elaine B. Barker, Allen L. Roginsky</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-131Ar1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-131Ar1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-131Ar1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>The technical specification for the Security Content Automation Protocol (SCAP) : SCAP version 1.0</span><br><span class="publication_date"><label class="label">Date Published: </label>2009</span><br><span class="authors"><label class="label">Authors: </label>S D Quinn, D A Waltermire, C S Johnson, K A Scarfone, J F Banghart</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-126</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-126</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-126.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-126.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>The technical specification for the Security Content Automation Protocol (SCAP) : SCAP version 1.1</span><br><span class="publication_date"><label class="label">Date Published: </label>2011</span><br><span class="authors"><label class="label">Authors: </label>D A Waltermire, S D Quinn, K A Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-126r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-126r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-126r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-126r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>The technical specification for the Security Content Automation Protocol (SCAP) : SCAP version 1.2</span><br><span class="publication_date"><label class="label">Date Published: </label>2011</span><br><span class="authors"><label class="label">Authors: </label>D A Waltermire, S D Quinn, K A Scarfone, A M Halbardier</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-126r2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-126r2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-126r2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-126r2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to securing WiMAX wireless communications </span><br><span class="publication_date"><label class="label">Date Published: </label>2010</span><br><span class="authors"><label class="label">Authors: </label>K A Scarfone, C Tibbs, M Sexton</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-127</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-127</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-127.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-127.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide for security-focused configuration management of information systems </span><br><span class="publication_date"><label class="label">Date Published: </label>October 2019</span><br><span class="authors"><label class="label">Authors: </label>Arnold Johnson, Kelley Dempsey, Ron Ross, Sarbari Gupta, Dennis Bailey</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-128</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-128</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-128.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-128.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Transitions : recommendation for transitioning the use of cryptographic algorithms and key lengths</span><br><span class="publication_date"><label class="label">Date Published: </label>2011</span><br><span class="authors"><label class="label">Authors: </label>E B Barker, A L Roginsky</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-131a</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-131a</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-131a.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-131a.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for password-based key derivation : part 1: storage applications</span><br><span class="publication_date"><label class="label">Date Published: </label>2010</span><br><span class="authors"><label class="label">Authors: </label>M S Turan, E B Barker, W E Burr, L Chen</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-132</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-132</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-132.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for existing application-specific key derivation functions </span><br><span class="publication_date"><label class="label">Date Published: </label>2010</span><br><span class="authors"><label class="label">Authors: </label>Q H Dang</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-135</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-135</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-135.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-135.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for existing application-specific key derivation functions </span><br><span class="publication_date"><label class="label">Date Published: </label>2011</span><br><span class="authors"><label class="label">Authors: </label>Q H Dang</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-135r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-135r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-135r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-135r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Information Security Continuous Monitoring (ISCM) for federal information systems
and organizations </span><br><span class="publication_date"><label class="label">Date Published: </label>2011</span><br><span class="authors"><label class="label">Authors: </label>K L Dempsey, N S Chawla, L A Johnson, R Johnston, A C Jones, A D Orebaugh, M A Scholl, K M Stine</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-137</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-137</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-137.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-137.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Practical combinatorial testing </span><br><span class="publication_date"><label class="label">Date Published: </label>2010</span><br><span class="authors"><label class="label">Authors: </label>D R Kuhn, R N Kacker, Y Lei</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-142</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-142</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-142.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-142.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines on security and privacy in public cloud computing </span><br><span class="publication_date"><label class="label">Date Published: </label>2011</span><br><span class="authors"><label class="label">Authors: </label>W Jansen, T Grance</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-144</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-144</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-144.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-144.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>The NIST definition of cloud computing </span><br><span class="publication_date"><label class="label">Date Published: </label>2011</span><br><span class="authors"><label class="label">Authors: </label>P M Mell, T Grance</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-145</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-145</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-145.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Cloud computing synopsis and recommendations </span><br><span class="publication_date"><label class="label">Date Published: </label>2012</span><br><span class="authors"><label class="label">Authors: </label>M L Badger, T Grance, R Patt-Corner, J Voas</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-146</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-146</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-146.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-146.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>BIOS protection guidelines </span><br><span class="publication_date"><label class="label">Date Published: </label>2011</span><br><span class="authors"><label class="label">Authors: </label>D A Cooper, W T Polk, A R Regenscheid, M P Souppaya</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-147</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-147</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-147.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-147.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines for securing Wireless Local Area Networks (WLANs) </span><br><span class="publication_date"><label class="label">Date Published: </label>2012</span><br><span class="authors"><label class="label">Authors: </label>M P Souppaya, K A Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-153</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-153</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-153.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-153.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide for developing security plans for federal information systems </span><br><span class="publication_date"><label class="label">Date Published: </label>2006</span><br><span class="authors"><label class="label">Authors: </label>M Swanson, J Hash, P Bowen</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-18r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-18r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-18r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-18r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS)
: requirements and procedures</span><br><span class="publication_date"><label class="label">Date Published: </label>2012</span><br><span class="authors"><label class="label">Authors: </label>S S Keller</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-20</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-20</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-20.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-20.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guideline for implementing cryptography in the federal government </span><br><span class="publication_date"><label class="label">Date Published: </label>2005</span><br><span class="authors"><label class="label">Authors: </label>E B Barker, W C Barker, A Lee</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-21e2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-21e2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-21e2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-21e2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>A statistical test suite for random and pseudorandom number generators for cryptographic
applications </span><br><span class="publication_date"><label class="label">Date Published: </label>2010</span><br><span class="authors"><label class="label">Authors: </label>L E Bassham, A L Rukhin, J Soto, J R Nechvatal, M E Smid, E B Barker, S D Leigh, M Levenson, M Vangel, D L Banks, N A Heckert, J F Dray, S Vo</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-22r1a</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-22r1a</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-22r1a.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-22r1a.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Engineering principles for information technology security (a baseline for achieving
security), revision a </span><br><span class="publication_date"><label class="label">Date Published: </label>2004</span><br><span class="authors"><label class="label">Authors: </label>G Stoneburner, C Hayden, A Feringa</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-27ra</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-27ra</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-27ra.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-27ra.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines on active content and mobile code </span><br><span class="publication_date"><label class="label">Date Published: </label>2001</span><br><span class="authors"><label class="label">Authors: </label>W Jansen</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-28</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-28</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-28.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-28.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines on active content and mobile code </span><br><span class="publication_date"><label class="label">Date Published: </label>2008</span><br><span class="authors"><label class="label">Authors: </label>W Jansen, T Winograd, K A Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-28ver2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-28ver2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-28ver2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-28ver2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide for conducting risk assessments </span><br><span class="publication_date"><label class="label">Date Published: </label>2012</span><br><span class="authors"><label class="label">Authors: </label></span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-30r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-30r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-30r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Introduction to public key technology and the federal PKI infrastructure </span><br><span class="publication_date"><label class="label">Date Published: </label>2001</span><br><span class="authors"><label class="label">Authors: </label>D R Kuhn, V Hu, W T Polk, Shu-Jen H Chang</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-32</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-32</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-32.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-32.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Contingency planning guide for federal information systems </span><br><span class="publication_date"><label class="label">Date Published: </label>2010</span><br><span class="authors"><label class="label">Authors: </label>M Swanson, P Bowen, A W Phillips, D Gallup, D Lynes</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-34r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-34r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-34r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-34r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to information technology security services </span><br><span class="publication_date"><label class="label">Date Published: </label>2003</span><br><span class="authors"><label class="label">Authors: </label>T Grance, J Hash, M Stevens, K O'Neal, N Bartol</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-35</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-35</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-35.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-35.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to selecting information technology security products </span><br><span class="publication_date"><label class="label">Date Published: </label>2003</span><br><span class="authors"><label class="label">Authors: </label>T Grance, M Stevens, M Myers</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-36</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-36</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-36.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-36.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide for the security certification and accreditation of federal information systems </span><br><span class="publication_date"><label class="label">Date Published: </label>2004</span><br><span class="authors"><label class="label">Authors: </label>R Ross, M Swanson, G Stoneburner, S Katzke, L A Johnson</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-37</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-37</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-37.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-37.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for block cipher modes of operation : methods and techniques</span><br><span class="publication_date"><label class="label">Date Published: </label>2001</span><br><span class="authors"><label class="label">Authors: </label>M J Dworkin</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-38a</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-38a</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-38a.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for block cipher modes of operation : three variants of ciphertext stealing for CBC mode</span><br><span class="publication_date"><label class="label">Date Published: </label>2010</span><br><span class="authors"><label class="label">Authors: </label>M J Dworkin</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-38a-add</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-38a-add</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a-add.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-38a-add.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for block cipher modes of operation : the CMAC mode for authentication</span><br><span class="publication_date"><label class="label">Date Published: </label>2016</span><br><span class="authors"><label class="label">Authors: </label>M J Dworkin</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-38b</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-38b</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38b.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-38b.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for block cipher modes of operation : the CCM mode for authentication and confidentiality</span><br><span class="publication_date"><label class="label">Date Published: </label>2007</span><br><span class="authors"><label class="label">Authors: </label>M J Dworkin</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-38c</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-38c</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-38c.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for block cipher modes of operation : GaloisCounter Mode (GCM) and GMAC</span><br><span class="publication_date"><label class="label">Date Published: </label>2007</span><br><span class="authors"><label class="label">Authors: </label>M J Dworkin</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-38d</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-38d</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-38d.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for block cipher modes of operation : the XTS-AES mode for confidentiality on storage devices</span><br><span class="publication_date"><label class="label">Date Published: </label>2010</span><br><span class="authors"><label class="label">Authors: </label>M J Dworkin</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-38e</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-38e</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-38e.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Managing information security risk : organization, mission, and information system view</span><br><span class="publication_date"><label class="label">Date Published: </label>2011</span><br><span class="authors"><label class="label">Authors: </label></span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-39</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-39</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-39.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-39.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Procedures for handling security patches </span><br><span class="publication_date"><label class="label">Date Published: </label>2002</span><br><span class="authors"><label class="label">Authors: </label>P M Mell, M C Tracy</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-40</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-40</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-40.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-40.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Creating a patch and vulnerability management program </span><br><span class="publication_date"><label class="label">Date Published: </label>2005</span><br><span class="authors"><label class="label">Authors: </label>P M Mell, T Bergeron, D Henning</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-40ver2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-40ver2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-40ver2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-40ver2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines on firewalls and firewall policy </span><br><span class="publication_date"><label class="label">Date Published: </label>2009</span><br><span class="authors"><label class="label">Authors: </label>K A Scarfone, P Hoffman</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-41r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-41r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-41r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-41r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guideline on network security testing </span><br><span class="publication_date"><label class="label">Date Published: </label>2003</span><br><span class="authors"><label class="label">Authors: </label>J P Wack, M C Tracy, M P Souppaya</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-42</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-42</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-42.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-42.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Systems administration guidance for securing Windows 2000 Professional system </span><br><span class="publication_date"><label class="label">Date Published: </label>2002</span><br><span class="authors"><label class="label">Authors: </label>M P Souppaya, A B Harris, M McLarnon, N Selimis</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-43</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-43</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-43.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-43.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines on securing public web servers </span><br><span class="publication_date"><label class="label">Date Published: </label>2002</span><br><span class="authors"><label class="label">Authors: </label>M C Tracy, W Jansen, M McLarnon</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-44</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-44</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-44.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-44.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Volume I : guide for mapping types of information and information systems to security categories</span><br><span class="publication_date"><label class="label">Date Published: </label>2008</span><br><span class="authors"><label class="label">Authors: </label>Kevin Stine, Rich Kissel, William C Barker, Jim Fahlsing, Jessica Gulick</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-60v1r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-60v1r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-60v1r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-60v1r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Volume II : appendices to guide for mapping types of information and information systems to security
categories</span><br><span class="publication_date"><label class="label">Date Published: </label>2008</span><br><span class="authors"><label class="label">Authors: </label>Kevin Stine, Rich Kissel, William C Barker, Annabelle Lee, Jim Fahlsing</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-60v2r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-60v2r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-60v2r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-60v2r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for the triple data encryption algorithm (TDEA) block cipher </span><br><span class="publication_date"><label class="label">Date Published: </label>2004</span><br><span class="authors"><label class="label">Authors: </label>W C Barker</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-67ver1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-67ver1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-67ver1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-67ver1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Interfaces for personal identity verification : end-point PIV card application namespace, data model and representation</span><br><span class="publication_date"><label class="label">Date Published: </label>2010</span><br><span class="authors"><label class="label">Authors: </label>R Chandramouli, D A Cooper, J F Dray, H Ferraiolo, S B Guthery, W I MacGregor, K Mehta</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-73-3</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-73-3</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-73-3.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-73-3.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for random number generation using deterministic random bit generators
(revised) </span><br><span class="publication_date"><label class="label">Date Published: </label>2007</span><br><span class="authors"><label class="label">Authors: </label>E B Barker, J M Kelsey</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-90r</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-90r</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-90r.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-90r.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to Application Whitelisting </span><br><span class="publication_date"><label class="label">Date Published: </label>October 2015</span><br><span class="authors"><label class="label">Authors: </label>Adam Sedgewick, Murugiah P. Souppaya, Karen A. Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-167</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-167</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-167.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-167.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>A Profile for U. S. Federal Cryptographic Key Management Systems </span><br><span class="publication_date"><label class="label">Date Published: </label>October 2015</span><br><span class="authors"><label class="label">Authors: </label>Elaine B. Barker, Miles Smid, Dennis Branstad</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-152</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-152</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-152.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-152.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Computer Security Division 2014 Annual Report </span><br><span class="publication_date"><label class="label">Date Published: </label>April 2015</span><br><span class="authors"><label class="label">Authors: </label>Patrick D. O'Reilly, Gregory A. Witte, Larry Feldman</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-176</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-176</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-176.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-176.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI)
and Derived PIV Credential Issuers (DPCI) </span><br><span class="publication_date"><label class="label">Date Published: </label>July 2015</span><br><span class="authors"><label class="label">Authors: </label>Hildegard Ferraiolo, Ramaswamy Chandramouli, Nabil Ghadiali, Jason Mohler, Scott Shorter</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-79-2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-79-2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-79-2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-79-2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for Random Number Generation Using Deterministic Random Bit Generators </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2015</span><br><span class="authors"><label class="label">Authors: </label>Elaine B. Barker, John M. Kelsey</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-90Ar1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-90Ar1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-90Ar1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Protecting Controlled Unclassified Information in Nonfederal Information Systems and
Organizations </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2015</span><br><span class="authors"><label class="label">Authors: </label>Ronald S. Ross, Kelley L. Dempsey, Patrick Viscuso, Mark Riddle, Gary Guissanie</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-171</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-171</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-171.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Bibliography of selected computer security publications : January 1980-October 1989</span><br><span class="publication_date"><label class="label">Date Published: </label>1990</span><br><span class="authors"><label class="label">Authors: </label>Lawrence E, III Bassham</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Keeping your site comfortably secure : an introduction to Internet firewalls</span><br><span class="publication_date"><label class="label">Date Published: </label>1994</span><br><span class="authors"><label class="label">Authors: </label>John P Wack, Lisa J Carnahan</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-10</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-10</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-10.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-10.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Information security handbook : a guide for managers</span><br><span class="publication_date"><label class="label">Date Published: </label>2006</span><br><span class="authors"><label class="label">Authors: </label>P Bowen, J Hash, M Wilson</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-100</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-100</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-100.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-100.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines on cell phone forensics </span><br><span class="publication_date"><label class="label">Date Published: </label>2007</span><br><span class="authors"><label class="label">Authors: </label>W Jansen, R P Ayers</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-101</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-101</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-101.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-101.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for digital signature timeliness </span><br><span class="publication_date"><label class="label">Date Published: </label>2009</span><br><span class="authors"><label class="label">Authors: </label>E B Barker</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-102</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-102</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-102.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-102.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>A scheme for PIV visual card topography </span><br><span class="publication_date"><label class="label">Date Published: </label>2007</span><br><span class="authors"><label class="label">Authors: </label>W I MacGregor, T Schwarzhoff, K Mehta</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-104</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-104</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-104.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-104.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Randomized hashing for digital signatures </span><br><span class="publication_date"><label class="label">Date Published: </label>2009</span><br><span class="authors"><label class="label">Authors: </label>Q H Dang</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-106</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-106</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-106.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-106.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for applications using approved hash algorithms </span><br><span class="publication_date"><label class="label">Date Published: </label>2009</span><br><span class="authors"><label class="label">Authors: </label>Q H Dang</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-107</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-107</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-107.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-107.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for applications using approved hash algorithms </span><br><span class="publication_date"><label class="label">Date Published: </label>2012</span><br><span class="authors"><label class="label">Authors: </label>Q H Dang</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-107r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-107r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-107r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-107r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>The impact of the FCC's Open Network Architecture on NSNP telecommunications security </span><br><span class="publication_date"><label class="label">Date Published: </label>1995</span><br><span class="authors"><label class="label">Authors: </label>Karen Olsen, John Tebbutt</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-11</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-11</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-11.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-11.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to storage encryption technologies for end user devices </span><br><span class="publication_date"><label class="label">Date Published: </label>2007</span><br><span class="authors"><label class="label">Authors: </label>K A Scarfone, M P Souppaya, M Sexton</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-111</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-111</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-111.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to SSL VPNs </span><br><span class="publication_date"><label class="label">Date Published: </label>2008</span><br><span class="authors"><label class="label">Authors: </label>S E Frankel, P Hoffman, A D Orebaugh, R Park</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-113</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-113</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-113.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-113.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>User's guide to securing external devices for telework and remote access </span><br><span class="publication_date"><label class="label">Date Published: </label>2007</span><br><span class="authors"><label class="label">Authors: </label>K A Scarfone, M P Souppaya</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-114</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-114</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-114.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-114.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Technical guide to information security testing and assessment. </span><br><span class="publication_date"><label class="label">Date Published: </label>2008</span><br><span class="authors"><label class="label">Authors: </label>K A Scarfone, M P Souppaya, A Cody, A D Orebaugh</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-115</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-115</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-115.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-115.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>A recommendation for the use of PIV credentials in Physical Access Control Systems
(PACS) </span><br><span class="publication_date"><label class="label">Date Published: </label>2008</span><br><span class="authors"><label class="label">Authors: </label>W I MacGregor, K Mehta, D A Cooper, K A Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-116</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-116</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-116.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-116.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to adopting and using the Security Content Automation Protocol (SCAP) version
1.0 </span><br><span class="publication_date"><label class="label">Date Published: </label>2010</span><br><span class="authors"><label class="label">Authors: </label>S D Quinn, K A Scarfone, M Barrett, C S Johnson</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-117</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-117</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-117.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-117.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines for the secure deployment of IPv6 </span><br><span class="publication_date"><label class="label">Date Published: </label>2010</span><br><span class="authors"><label class="label">Authors: </label>S E Frankel, R Graveman, J Pearce, M Rooks</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-119</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-119</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-119.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-119.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>An introduction to computer security : the NIST handbook</span><br><span class="publication_date"><label class="label">Date Published: </label>1995</span><br><span class="authors"><label class="label">Authors: </label>Barbara Guttman, Edward Roback</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-12</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-12</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-12.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-12.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for EAP methods used in wireless network access authentication </span><br><span class="publication_date"><label class="label">Date Published: </label>2009</span><br><span class="authors"><label class="label">Authors: </label>K Hoeper, L Chen</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-120</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-120</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-120.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-120.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to bluetooth security </span><br><span class="publication_date"><label class="label">Date Published: </label>2008</span><br><span class="authors"><label class="label">Authors: </label>K A Scarfone, J Padgette</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-121</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-121</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-121.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-121.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to bluetooth security </span><br><span class="publication_date"><label class="label">Date Published: </label>2012</span><br><span class="authors"><label class="label">Authors: </label>J Padgette, K A Scarfone, L Chen</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-121r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-121r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-121r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-121r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to protecting the confidentiality of Personally Identifiable Information (PII) </span><br><span class="publication_date"><label class="label">Date Published: </label>2010</span><br><span class="authors"><label class="label">Authors: </label>E McCallister, T Grance, K A Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-122</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-122</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-122.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-122.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to general server security </span><br><span class="publication_date"><label class="label">Date Published: </label>2008</span><br><span class="authors"><label class="label">Authors: </label>K A Scarfone, W Jansen, M Tracy</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-123</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-123</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-123.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-123.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to security for full virtualization technologies </span><br><span class="publication_date"><label class="label">Date Published: </label>2011</span><br><span class="authors"><label class="label">Authors: </label>K A Scarfone, M P Souppaya, P Hoffman</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-125</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-125</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-125.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-125.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Telecommunications security guidelines for telecommunications management network </span><br><span class="publication_date"><label class="label">Date Published: </label>1995</span><br><span class="authors"><label class="label">Authors: </label>John Kimmins, Charles Dinkel, Dale Walters</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-13</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-13</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-13.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-13.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Generally accepted principles and practices for securing information technology systems </span><br><span class="publication_date"><label class="label">Date Published: </label>1996</span><br><span class="authors"><label class="label">Authors: </label>Marianne Swanson, Barbara Guttman</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-14</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-14</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-14.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-14.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Minimum interoperability specification for PKI components (MISPC) </span><br><span class="publication_date"><label class="label">Date Published: </label>1998</span><br><span class="authors"><label class="label">Authors: </label>William Burr, Donna Dodson, Noel Nazario, Timothy Polk</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-15</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-15</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-15.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-15.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Information technology security training requirements : a role- and performance-based model</span><br><span class="publication_date"><label class="label">Date Published: </label>1998</span><br><span class="authors"><label class="label">Authors: </label>Mark Wilson, Dorothea E de Zafra, Sadie I Pitcher, John D Tressler, John B Ippolito</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-16</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-16</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-16.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-16.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Modes of Operation Validation System (MOVS) : requirements and procedures</span><br><span class="publication_date"><label class="label">Date Published: </label>1998</span><br><span class="authors"><label class="label">Authors: </label>Sharon Keller, Miles Smid</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-17</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-17</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-17.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-17.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide for developing security plans for information technology systems </span><br><span class="publication_date"><label class="label">Date Published: </label>1998</span><br><span class="authors"><label class="label">Authors: </label>Marianne Swanson</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-18</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-18</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-18.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-18.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Mobile agent security </span><br><span class="publication_date"><label class="label">Date Published: </label>1999</span><br><span class="authors"><label class="label">Authors: </label>Wayne Jansen, Tom Karygiannis</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-19</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-19</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-19.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-19.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Public-key cryptography </span><br><span class="publication_date"><label class="label">Date Published: </label>1991</span><br><span class="authors"><label class="label">Authors: </label>James Nechvatal</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guideline for implementing cryptography in the federal government </span><br><span class="publication_date"><label class="label">Date Published: </label>1999</span><br><span class="authors"><label class="label">Authors: </label>Annabelle Lee</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-21</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-21</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-21.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-21.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>A statistical test suite for random and pseudorandom number generators for cryptographic
applications </span><br><span class="publication_date"><label class="label">Date Published: </label>2000</span><br><span class="authors"><label class="label">Authors: </label>Andrew Rukhin, Juan Sota, James Nechvatal, Miles Smid, Elaine Barker, Stefan Leigh, Mark Levenson, Mark Vangel, David Banks, Alan Heckert, James Dray, San Vo</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-22</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-22</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-22.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-22.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines to federal organizations on security assurance and acquisitionuse of testedevaluated
products </span><br><span class="publication_date"><label class="label">Date Published: </label>2000</span><br><span class="authors"><label class="label">Authors: </label>Edward A Roback</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-23</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-23</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-23.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-23.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>PBX vulnerability analysis : finding holes in your PBX before someone else does</span><br><span class="publication_date"><label class="label">Date Published: </label>2001</span><br><span class="authors"><label class="label">Authors: </label>D Richard Kuhn</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-24</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-24</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-24.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-24.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Federal agency use of public key technology for digital signatures and authentication </span><br><span class="publication_date"><label class="label">Date Published: </label>2000</span><br><span class="authors"><label class="label">Authors: </label>Kathy Lyons-Burke</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-25</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-25</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-25.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-25.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Security self-assessment guide for information technology systems </span><br><span class="publication_date"><label class="label">Date Published: </label>2001</span><br><span class="authors"><label class="label">Authors: </label>Marianne Swanson</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-26</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-26</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-26.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-26.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Engineering principles for information technology security (a baseline for achieving
security) : recommendations of the National Institute of Standards and Technology</span><br><span class="publication_date"><label class="label">Date Published: </label>2001</span><br><span class="authors"><label class="label">Authors: </label>Gary Stoneburner, Clark Hayden, Alexis Feringa</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-27</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-27</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-27.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-27.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>A comparison of the security requirements for cryptographic modules in FIPS 140-1
and FIPS 140-2 </span><br><span class="publication_date"><label class="label">Date Published: </label>2001</span><br><span class="authors"><label class="label">Authors: </label>Ray Snouffer, Annabelle Lee, Arch Oldehoeft</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-29</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-29</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-29.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-29.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Establishing a computer security incident response capability (CSIRC) </span><br><span class="publication_date"><label class="label">Date Published: </label>1991</span><br><span class="authors"><label class="label">Authors: </label>John P Wack</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-3</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-3</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-3.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-3.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Risk management guide for information technology systems : recommendations of the National Institute of Standards and Technology</span><br><span class="publication_date"><label class="label">Date Published: </label>2002</span><br><span class="authors"><label class="label">Authors: </label>Gary Stoneburner, Alice Goguen, Alexis Feringa</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-30</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-30</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-30.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Intrusion detection systems </span><br><span class="publication_date"><label class="label">Date Published: </label>2001</span><br><span class="authors"><label class="label">Authors: </label>Rebecca Bace, Peter Mell</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-31</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-31</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-31.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-31.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Underlying technical models for information technology security : recommendations of the National Institute of Standards and Technology</span><br><span class="publication_date"><label class="label">Date Published: </label>2001</span><br><span class="authors"><label class="label">Authors: </label>Gary Stoneburner</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-33</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-33</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-33.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-33.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Contingency planning guide for information technology systems : recommendations of the National Institute of Standards and Technology</span><br><span class="publication_date"><label class="label">Date Published: </label>2002</span><br><span class="authors"><label class="label">Authors: </label>Marianne Swanson, Amy Wohl, Lucinda Pope, Tim Grance, Joan Hash, Ray Thomas</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-34</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-34</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-34.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-34.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Computer security considerations in federal procurements : a guide for procurement initiators, contracting officers, and computer security officials</span><br><span class="publication_date"><label class="label">Date Published: </label>1992</span><br><span class="authors"><label class="label">Authors: </label>Barbara Guttman</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-4</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-4</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-4.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-4.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines on firewalls and firewall policy : recommendations of the National Institute of Standards and Technology</span><br><span class="publication_date"><label class="label">Date Published: </label>2002</span><br><span class="authors"><label class="label">Authors: </label>John Wack, Ken Cutler, Jamie Pole</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-41</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-41</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-41.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-41.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines on securing public web servers </span><br><span class="publication_date"><label class="label">Date Published: </label>2007</span><br><span class="authors"><label class="label">Authors: </label>M C Tracy, W Jansen, K A Scarfone, T Winograd</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-44ver2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-44ver2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-44ver2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-44ver2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines on electronic mail security </span><br><span class="publication_date"><label class="label">Date Published: </label>2002</span><br><span class="authors"><label class="label">Authors: </label>M C Tracy, W Jansen, S Bisker</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-45</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-45</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-45.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-45.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines on electronic mail security </span><br><span class="publication_date"><label class="label">Date Published: </label>2007</span><br><span class="authors"><label class="label">Authors: </label>M C Tracy, W Jansen, K A Scarfone, J Butterfield</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-45ver2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-45ver2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-45ver2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-45ver2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Security for telecommuting and broadband communications : recommendations of the National Institute of Standards and Technology</span><br><span class="publication_date"><label class="label">Date Published: </label>2002</span><br><span class="authors"><label class="label">Authors: </label>D Richard Kuhn, Miles C Tracy, Sheila E Frankel</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-46</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-46</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-46.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-46.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to enterprise telework and remote access security </span><br><span class="publication_date"><label class="label">Date Published: </label>2009</span><br><span class="authors"><label class="label">Authors: </label>K A Scarfone, P Hoffman, M P Souppaya</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-46r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-46r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-46r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-46r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Security guide for interconnecting information technology systems </span><br><span class="publication_date"><label class="label">Date Published: </label>2002</span><br><span class="authors"><label class="label">Authors: </label>T Grance, J Hash, S Peck, J Smith, K Korow-Diks</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-47</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-47</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-47.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-47.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Wireless security : 802.11, bluetooth and handheld devices</span><br><span class="publication_date"><label class="label">Date Published: </label>2002</span><br><span class="authors"><label class="label">Authors: </label>A T Karygiannis, L Owens</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-48</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-48</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-48.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-48.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to securing legacy IEEE 802.11 wireless networks </span><br><span class="publication_date"><label class="label">Date Published: </label>2008</span><br><span class="authors"><label class="label">Authors: </label>K A Scarfone, D Dicoi, M Sexton, C Tibbs</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-48r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-48r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-48r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-48r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Federal SMIME V3 client profile </span><br><span class="publication_date"><label class="label">Date Published: </label>2002</span><br><span class="authors"><label class="label">Authors: </label>C M Chernick</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-49</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-49</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-49.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-49.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>A guide to the selection of anti-virus tools and techniques </span><br><span class="publication_date"><label class="label">Date Published: </label>1992</span><br><span class="authors"><label class="label">Authors: </label>W Timothy Polk, Lawrence E, III Bassham</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-5</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-5</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-5.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-5.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Building an Information Technology Security Awareness and Training Program </span><br><span class="publication_date"><label class="label">Date Published: </label>2003</span><br><span class="authors"><label class="label">Authors: </label>M Wilson, J Hash</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-50</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-50</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-50.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-50.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Use of the Common Vulnerabilities and Exposures (CVE) vulnerability naming scheme </span><br><span class="publication_date"><label class="label">Date Published: </label>2002</span><br><span class="authors"><label class="label">Authors: </label>P Mell, T Grance</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-51</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-51</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-51.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-51.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to using vulnerability naming schemes </span><br><span class="publication_date"><label class="label">Date Published: </label>2011</span><br><span class="authors"><label class="label">Authors: </label>D A Waltermire, K A Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-51r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-51r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-51r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-51r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines for the selection, configuration, and use of Transport Layer Security (TLS)
implementations </span><br><span class="publication_date"><label class="label">Date Published: </label>2005</span><br><span class="authors"><label class="label">Authors: </label>C M Chernick, C, III Edington, M J Fanto, R Rosenthal</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-52</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-52</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-52.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-52.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommended security controls for federal information systems and organizations </span><br><span class="publication_date"><label class="label">Date Published: </label>2005</span><br><span class="authors"><label class="label">Authors: </label>R Ross, S Katzke, L A Johnson, M Swanson, G Stoneburner, G Rogers, A Lee</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-53</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-53</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-53.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-53.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide for assessing the security controls in federal information systems and organizations
: building effective security assessment plans</span><br><span class="publication_date"><label class="label">Date Published: </label>2008</span><br><span class="authors"><label class="label">Authors: </label>R Ross, L A Johnson, S Katzke, P Toth, G Stoneburner, G Rogers</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-53a</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-53a</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-53a.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-53a.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide for assessing the security controls in federal information systems and organizations
: building effective security assessment plans</span><br><span class="publication_date"><label class="label">Date Published: </label>2010</span><br><span class="authors"><label class="label">Authors: </label></span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-53ar1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-53ar1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-53ar1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-53ar1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommended security controls for federal information systems and organizations </span><br><span class="publication_date"><label class="label">Date Published: </label>2006</span><br><span class="authors"><label class="label">Authors: </label>R Ross, S Katzke, L A Johnson, M Swanson, G Stoneburner, G Rogers</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-53r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-53r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-53r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-53r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommended security controls for federal information systems and organizations </span><br><span class="publication_date"><label class="label">Date Published: </label>2007</span><br><span class="authors"><label class="label">Authors: </label>R Ross, S Katzke, L A Johnson, M Swanson, G Stoneburner, G Rogers</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-53r2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-53r2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-53r2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-53r2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommended security controls for federal information systems and organizations </span><br><span class="publication_date"><label class="label">Date Published: </label>2009</span><br><span class="authors"><label class="label">Authors: </label></span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-53r3</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-53r3</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-53r3.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-53r3.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Border gateway protocol security </span><br><span class="publication_date"><label class="label">Date Published: </label>2007</span><br><span class="authors"><label class="label">Authors: </label>D R Kuhn, K Sriram, D C Montgomery</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-54</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-54</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-54.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-54.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Security metrics guide for information technology systems </span><br><span class="publication_date"><label class="label">Date Published: </label>2003</span><br><span class="authors"><label class="label">Authors: </label>M Swanson, N Bartol, J Sabato, J Hash, L Graffo</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-55</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-55</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-55.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-55.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Performance measurement guide for information security </span><br><span class="publication_date"><label class="label">Date Published: </label>2008</span><br><span class="authors"><label class="label">Authors: </label>E Chew, M Swanson, K M Stine, N Bartol, A Brown, W Robinson</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-55r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-55r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-55r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-55r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography </span><br><span class="publication_date"><label class="label">Date Published: </label>2006</span><br><span class="authors"><label class="label">Authors: </label></span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-56a</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-56a</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-56a.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-56a.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography </span><br><span class="publication_date"><label class="label">Date Published: </label>2007</span><br><span class="authors"><label class="label">Authors: </label>E B Barker, D Johnson, M E Smid</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-56ar</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-56ar</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-56ar.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-56ar.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography </span><br><span class="publication_date"><label class="label">Date Published: </label>2009</span><br><span class="authors"><label class="label">Authors: </label>E B Barker, L Chen, A R Regenscheid, M E Smid</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-56b</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-56b</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-56b.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-56b.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for key derivation through extraction-then-expansion </span><br><span class="publication_date"><label class="label">Date Published: </label>2011</span><br><span class="authors"><label class="label">Authors: </label>L Chen</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-56c</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-56c</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-56c.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-56c.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for key management, part 1 : general</span><br><span class="publication_date"><label class="label">Date Published: </label>2005</span><br><span class="authors"><label class="label">Authors: </label>E B Barker, W C Barker, W E Burr, W T Polk, M E Smid</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-57p1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-57p1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-57p1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-57p1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for key management, part 1 : general (revised)</span><br><span class="publication_date"><label class="label">Date Published: </label>2006</span><br><span class="authors"><label class="label">Authors: </label>E B Barker, W C Barker, W E Burr, W T Polk, M E Smid</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-57p1r2006</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-57p1r2006</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-57p1r2006.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-57p1r2006.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for key management, part 1 : general (revised)</span><br><span class="publication_date"><label class="label">Date Published: </label>2007</span><br><span class="authors"><label class="label">Authors: </label>E B Barker, W C Barker, W E Burr, W T Polk, M E Smid</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-57p1r2007</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-57p1r2007</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-57p1r2007.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-57p1r2007.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for key management, part 1 : general (revision 3)</span><br><span class="publication_date"><label class="label">Date Published: </label>2012</span><br><span class="authors"><label class="label">Authors: </label>E B Barker, W C Barker, W E Burr, W T Polk, M E Smid</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-57p1r3</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-57p1r3</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-57p1r3.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-57p1r3.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for key management, part 2 : best practices for key management organization</span><br><span class="publication_date"><label class="label">Date Published: </label>2005</span><br><span class="authors"><label class="label">Authors: </label>E B Barker, W C Barker, W E Burr, W T Polk, M E Smid</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-57p2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-57p2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-57p2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-57p2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for key management, part 3 : application-specific key management guidance</span><br><span class="publication_date"><label class="label">Date Published: </label>2009</span><br><span class="authors"><label class="label">Authors: </label>E B Barker, W E Burr, A C Jones, W T Polk, S W Rose, M E Smid, Q H Dang</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-57p3</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-57p3</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-57p3.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-57p3.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Security considerations for Voice Over IP Systems </span><br><span class="publication_date"><label class="label">Date Published: </label>2005</span><br><span class="authors"><label class="label">Authors: </label>D R Kuhn, T J Walsh, S Fries</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-58</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-58</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-58.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-58.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guideline for identifying an information system as a national security system </span><br><span class="publication_date"><label class="label">Date Published: </label>2003</span><br><span class="authors"><label class="label">Authors: </label>W C Barker</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-59</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-59</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-59.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-59.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Automated tools for testing computer system vulnerability </span><br><span class="publication_date"><label class="label">Date Published: </label>1992</span><br><span class="authors"><label class="label">Authors: </label>W Timothy Polk</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-6</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-6</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-6.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-6.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Volume I : guide for mapping types of information and information systems to security categories</span><br><span class="publication_date"><label class="label">Date Published: </label>2004</span><br><span class="authors"><label class="label">Authors: </label>William C Barker</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-60ver2v1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-60ver2v1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-60ver2v1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-60ver2v1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Volume II : appendices to guide for mapping types of information and information systems to security
categories</span><br><span class="publication_date"><label class="label">Date Published: </label>2004</span><br><span class="authors"><label class="label">Authors: </label>William C Barker, Annabelle Lee</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-60ver2v2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-60ver2v2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-60ver2v2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-60ver2v2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Computer security incident handling guide </span><br><span class="publication_date"><label class="label">Date Published: </label>2004</span><br><span class="authors"><label class="label">Authors: </label>T Grance, K A Scarfone, B Kim</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-61</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-61</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-61.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-61.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Computer security incident handling guide </span><br><span class="publication_date"><label class="label">Date Published: </label>2008</span><br><span class="authors"><label class="label">Authors: </label>K A Scarfone, T Grance, K Masone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-61r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-61r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-61r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-61r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Electronic authentication guideline </span><br><span class="publication_date"><label class="label">Date Published: </label>2011</span><br><span class="authors"><label class="label">Authors: </label>W E Burr, D F Dodson, E M Newton, R A Perlner, W T Polk, S Gupta, E A Nabbus</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-63-1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-63-1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-63-1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-63-1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Electronic authentication guideline </span><br><span class="publication_date"><label class="label">Date Published: </label>2004</span><br><span class="authors"><label class="label">Authors: </label>W E Burr, D F Dodson, W T Polk</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-63v1.0.1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-63v1.0.1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-63ver1.0.1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-63v1.0.1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Electronic authentication guideline </span><br><span class="publication_date"><label class="label">Date Published: </label>2006</span><br><span class="authors"><label class="label">Authors: </label>W E Burr, D F Dodson, W T Polk</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-63v1.0.2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-63v1.0.2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-63ver1.0.2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-63v1.0.2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Security considerations in the information system development life cycle </span><br><span class="publication_date"><label class="label">Date Published: </label>2003</span><br><span class="authors"><label class="label">Authors: </label>T Grance, J Hash, M Stevens</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-64</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-64</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-64.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-64.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Security considerations in the information system development life cycle </span><br><span class="publication_date"><label class="label">Date Published: </label>2004</span><br><span class="authors"><label class="label">Authors: </label>T Grance, J Hash, M Stevens</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-64r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-64r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-64r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-64r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Security considerations in the system development life cycle </span><br><span class="publication_date"><label class="label">Date Published: </label>2008</span><br><span class="authors"><label class="label">Authors: </label>R Kissel, K M Stine, M A Scholl, H Rossman, J Fahlsing, J Gulick</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-64r2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-64r2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-64r2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-64r2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Integrating IT Security into the Capital Planning and Investment Control Process </span><br><span class="publication_date"><label class="label">Date Published: </label>2005</span><br><span class="authors"><label class="label">Authors: </label>J Hash, N Bartol, H Rollins, W Robinson, J Abeles, S Batdorff</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-65</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-65</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-65.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-65.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>An introductory resource guide for implementing the Health Insurance Portability and
Accountability Act (HIPAA) security rule </span><br><span class="publication_date"><label class="label">Date Published: </label>2005</span><br><span class="authors"><label class="label">Authors: </label>J Hash, P Bowen, L A Johnson, C D Smith, D I Steingberg</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-66</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-66</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-66.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-66.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>An introductory resource guide for implementing the Health Insurance Portability and
Accountability Act (HIPAA) security rule </span><br><span class="publication_date"><label class="label">Date Published: </label>2008</span><br><span class="authors"><label class="label">Authors: </label>M A Scholl, K M Stine, J Hash, P Bowen, L A Johnson, C D Smith, D I Steinberg</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-66r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-66r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-66r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-66r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for the triple data encryption algorithm (TDEA) block cipher </span><br><span class="publication_date"><label class="label">Date Published: </label>2012</span><br><span class="authors"><label class="label">Authors: </label>W C Barker, E B Barker</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-67r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-67r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-67r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-67r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidance for securing Microsoft Windows XP for IT Professionals : a NIST security configuration checklist : recommendations of the National Institute
of Standards and Technology</span><br><span class="publication_date"><label class="label">Date Published: </label>2005</span><br><span class="authors"><label class="label">Authors: </label>Murugia Souppaya, Karen Scarfone, Paul M Johnson</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-68</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-68</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-68.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-68.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to securing Microsoft Windows XP Systems for IT Professionals : a NIST security configuration checklist</span><br><span class="publication_date"><label class="label">Date Published: </label>2008</span><br><span class="authors"><label class="label">Authors: </label>K A Scarfone, M P Souppaya, P M Johnson</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-68r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-68r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-68r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-68r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidance for securing Microsoft Windows XP Home Edition : a NIST security configuration checklist</span><br><span class="publication_date"><label class="label">Date Published: </label>2006</span><br><span class="authors"><label class="label">Authors: </label>K Scarfone, M P Souppaya, J Connor</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-69</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-69</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-69.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-69.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Security in open systems </span><br><span class="publication_date"><label class="label">Date Published: </label>1994</span><br><span class="authors"><label class="label">Authors: </label>John Barkley</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-7</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-7</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-7.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-7.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Security configuration checklists program for IT products : guidance for checklists users and developers</span><br><span class="publication_date"><label class="label">Date Published: </label>2005</span><br><span class="authors"><label class="label">Authors: </label>Murugiah Souppaya, John P Wack, Karen Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-70</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-70</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-70.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-70.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>National checklist program for IT products : guidelines for checklist users and developers</span><br><span class="publication_date"><label class="label">Date Published: </label>2009</span><br><span class="authors"><label class="label">Authors: </label>S D Quinn, K A Scarfone, M P Souppaya</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-70r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-70r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-70r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-70r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>National checklist program for IT products : guidelines for checklist users and developers</span><br><span class="publication_date"><label class="label">Date Published: </label>2011</span><br><span class="authors"><label class="label">Authors: </label>S D Quinn, M P Souppaya, M Cook, K A Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-70r2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-70r2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-70r2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-70r2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines on PDA forensics </span><br><span class="publication_date"><label class="label">Date Published: </label>2004</span><br><span class="authors"><label class="label">Authors: </label>W Jansen, R P Ayers</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-72</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-72</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-72.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-72.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Interfaces for personal identity verification </span><br><span class="publication_date"><label class="label">Date Published: </label>2005</span><br><span class="authors"><label class="label">Authors: </label>J F Dray, S Guthery, T Schwarzhoff</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-73</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-73</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-73.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-73.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Interfaces for personal identity verification </span><br><span class="publication_date"><label class="label">Date Published: </label>2006</span><br><span class="authors"><label class="label">Authors: </label>J F Dray, S Guthery, T Schwarzhoff</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-73-1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-73-1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-73-1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-73-1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Interfaces for personal identity verification </span><br><span class="publication_date"><label class="label">Date Published: </label>2008</span><br><span class="authors"><label class="label">Authors: </label>R Chandramouli, J F Dray, H Ferraiolo, S B Guthery, W I MacGregor, K Mehta</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-73-2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-73-2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-73-2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-73-2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Biometric data specification for personal identity verification </span><br><span class="publication_date"><label class="label">Date Published: </label>2005</span><br><span class="authors"><label class="label">Authors: </label>C L Wilson, P J Grother, R Chandramouli</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-76</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-76</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-76.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-76.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Biometric data specification for personal identity verification </span><br><span class="publication_date"><label class="label">Date Published: </label>2007</span><br><span class="authors"><label class="label">Authors: </label>C L Wilson, P J Grother, R Chandramouli</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-76-1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-76-1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-76-1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-76-1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to IPsec VPNs </span><br><span class="publication_date"><label class="label">Date Published: </label>2005</span><br><span class="authors"><label class="label">Authors: </label>S E Frankel, K Scarfone, R Lewkowski, A D Orebaugh, R W Ritchey, S R Sharma</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-77</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-77</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-77.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-77.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Cryptographic algorithms and key sizes for personal identity verification </span><br><span class="publication_date"><label class="label">Date Published: </label>2005</span><br><span class="authors"><label class="label">Authors: </label>W T Polk, D F Dodson, W E Burr</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-78</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-78</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-78.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-78.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Cryptographic algorithms and key sizes for personal identity verification </span><br><span class="publication_date"><label class="label">Date Published: </label>2007</span><br><span class="authors"><label class="label">Authors: </label>W T Polk, D F Dodson, W E Burr</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-78-1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-78-1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-78-1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-78-1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Cryptographic algorithms and key sizes for personal identity verification </span><br><span class="publication_date"><label class="label">Date Published: </label>2010</span><br><span class="authors"><label class="label">Authors: </label>W T Polk, D F Dodson, W E Burr</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-78-2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-78-2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-78-2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-78-2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Cryptographic algorithms and key sizes for personal identity verification </span><br><span class="publication_date"><label class="label">Date Published: </label>2010</span><br><span class="authors"><label class="label">Authors: </label>W T Polk, D F Dodson, W E Burr, H Ferraiolo, D A Cooper</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-78-3</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-78-3</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-78-3.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-78-3.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines for the certification and accreditation of PIV card issuing organizations </span><br><span class="publication_date"><label class="label">Date Published: </label>2005</span><br><span class="authors"><label class="label">Authors: </label>D K Branstad, A Clay, J Hash</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-79</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-79</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-79.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-79.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI)
and Derived PIV Credential Issuers (DPCI) </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2008</span><br><span class="authors"><label class="label">Authors: </label>Ramaswamy Chandramouli, Dennis Bailey, Nabil Ghadiali, Dennis Branstad</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-79-1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-79-1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-79-1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-79-1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Security issues in the database language SQL </span><br><span class="publication_date"><label class="label">Date Published: </label>1993</span><br><span class="authors"><label class="label">Authors: </label>W Timothy Polk, Lawrence E, III Bassham</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-8</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-8</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-8.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-8.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Secure Domain Name System (DNS) deployment guide </span><br><span class="publication_date"><label class="label">Date Published: </label>2006</span><br><span class="authors"><label class="label">Authors: </label>R Chandramouli, S W Rose</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-81</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-81</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-81.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-81.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Secure Domain Name System (DNS) deployment guide </span><br><span class="publication_date"><label class="label">Date Published: </label>2010</span><br><span class="authors"><label class="label">Authors: </label>R Chandramouli, S W Rose</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-81r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-81r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-81r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-81r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to malware incident prevention and handling </span><br><span class="publication_date"><label class="label">Date Published: </label>2005</span><br><span class="authors"><label class="label">Authors: </label>P Mell, K A Scarfone, J Nusbaum</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-83</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-83</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-83.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-83.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to test, training, and exercise programs for IT plans and capabilities </span><br><span class="publication_date"><label class="label">Date Published: </label>2006</span><br><span class="authors"><label class="label">Authors: </label>T Grance, T Nolan, K Burke, R Dudley, G White, T Good</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-84</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-84</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-84.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-84.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>PIV middleware and on-card application conformance test guidance (SP 800-73 compliance) </span><br><span class="publication_date"><label class="label">Date Published: </label>2005</span><br><span class="authors"><label class="label">Authors: </label>R Chandramouli, L Eyuboglu, K Mehta</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-85</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-85</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-85.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-85.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>PIV card application and middleware interface test guidelines (SP800-73 compliance) </span><br><span class="publication_date"><label class="label">Date Published: </label>2006</span><br><span class="authors"><label class="label">Authors: </label>R Chandramouli, L Eyuboglu, K Mehta</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-85a</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-85a</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-85a.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-85a.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>PIV card application and middleware interface test guidelines (SP800-73-2 compliance) </span><br><span class="publication_date"><label class="label">Date Published: </label>2009</span><br><span class="authors"><label class="label">Authors: </label></span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-85a-1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-85a-1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-85a-1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-85a-1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>PIV card application and middleware interface test guidelines (SP800-73-3 compliance) </span><br><span class="publication_date"><label class="label">Date Published: </label>2010</span><br><span class="authors"><label class="label">Authors: </label>R Chandramouli, H Ferraiolo, K Mehta</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-85a-2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-85a-2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-85a-2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-85a-2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>PIV data model test guidelines </span><br><span class="publication_date"><label class="label">Date Published: </label>2006</span><br><span class="authors"><label class="label">Authors: </label>R Chandramouli, K Mehta, P A Uzamere II, D Simon, N Ghadiali, A P Founds</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-85b</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-85b</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-85b.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-85b.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to integrating forensic techniques into incident response </span><br><span class="publication_date"><label class="label">Date Published: </label>2006</span><br><span class="authors"><label class="label">Authors: </label>K Scarfone, S Chevalier, T Grance, H Dang</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-86</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-86</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-86.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-86.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Codes for identification of federal and federally-assisted organizations </span><br><span class="publication_date"><label class="label">Date Published: </label>2008</span><br><span class="authors"><label class="label">Authors: </label>W C Barker, H Ferraiolo</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-87r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-87r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-87r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-87r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Codes for the identification of federal and federally assisted organizations version
1.0 </span><br><span class="publication_date"><label class="label">Date Published: </label>2005</span><br><span class="authors"><label class="label">Authors: </label>W C Barker, H Ferraiolo</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-87ver1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-87ver1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-87ver1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-87ver1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Codes for the identification of federal and federally assisted organizations </span><br><span class="publication_date"><label class="label">Date Published: </label>2006</span><br><span class="authors"><label class="label">Authors: </label>W C Barker, H Ferraiolo</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-87ver1e2006</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-87ver1e2006</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-87ver1e2006.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-87ver1e2006.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Codes for the identification of federal and federally assisted organizations </span><br><span class="publication_date"><label class="label">Date Published: </label>2007</span><br><span class="authors"><label class="label">Authors: </label>W C Barker, H Ferraiolo</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-87ver1e2007</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-87ver1e2007</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-87ver1e2007.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-87ver1e2007.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines for media sanitization </span><br><span class="publication_date"><label class="label">Date Published: </label>2006</span><br><span class="authors"><label class="label">Authors: </label>R Kissel, M A Scholl, S Skolochenko, X Li</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-88</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-88</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-88.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-88.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for obtaining assurances for digital signature applications </span><br><span class="publication_date"><label class="label">Date Published: </label>2006</span><br><span class="authors"><label class="label">Authors: </label>E B Barker</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-89</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-89</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-89.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-89.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Good security practices for electronic commerce, including electronic data interchange </span><br><span class="publication_date"><label class="label">Date Published: </label>1993</span><br><span class="authors"><label class="label">Authors: </label>Roy G Saltman</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-9</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-9</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-9.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-9.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for random number generation using deterministic random bit generators
(revised) </span><br><span class="publication_date"><label class="label">Date Published: </label>2007</span><br><span class="authors"><label class="label">Authors: </label>E B Barker, J M Kelsey</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-90</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-90</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-90.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-90.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for random number generation using deterministic random bit generators </span><br><span class="publication_date"><label class="label">Date Published: </label>2012</span><br><span class="authors"><label class="label">Authors: </label>E B Barker, J M Kelsey</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-90a</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-90a</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-90a.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-90a.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to computer security log management </span><br><span class="publication_date"><label class="label">Date Published: </label>2006</span><br><span class="authors"><label class="label">Authors: </label>K Scarfone, M P Souppaya</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-92</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-92</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-92.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-92.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to Intrusion Detection and Prevention Systems (IDPS) </span><br><span class="publication_date"><label class="label">Date Published: </label>2007</span><br><span class="authors"><label class="label">Authors: </label>K A Scarfone, P M Mell</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-94</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-94</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-94.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-94.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to secure web services </span><br><span class="publication_date"><label class="label">Date Published: </label>2007</span><br><span class="authors"><label class="label">Authors: </label>A Singhal, T Winograd, K A Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-95</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-95</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-95.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-95.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>PIV card to reader interoperability guidelines </span><br><span class="publication_date"><label class="label">Date Published: </label>2006</span><br><span class="authors"><label class="label">Authors: </label>J F Dray, A Giles, M Kelley, R Chandramouli</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-96</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-96</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-96.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-96.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Establishing wireless robust security networks : a guide to IEEE 802.11i</span><br><span class="publication_date"><label class="label">Date Published: </label>2007</span><br><span class="authors"><label class="label">Authors: </label>S E Frankel, B Eydt, L Owens, K A Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-97</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-97</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-97.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-97.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines for securing Radio Frequency Identification (RFID) systems </span><br><span class="publication_date"><label class="label">Date Published: </label>2007</span><br><span class="authors"><label class="label">Authors: </label>A T Karygiannis, B Eydt, G Barber, L Bunn, T Phillips</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-98</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-98</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-98.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-98.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for key derivation using pseudorandom functions (revised) </span><br><span class="publication_date"><label class="label">Date Published: </label>2009</span><br><span class="authors"><label class="label">Authors: </label>L Chen</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-108</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-108</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-108.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-108.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to Industrial Control Systems (ICS) Security </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2015</span><br><span class="authors"><label class="label">Authors: </label>Keith Stouffer, Victoria Pillitteri, Suzanne Lightman, Marshall Abrams, Adam Hahn</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-82r2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-82r2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-82r2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Interfaces for Personal Identity Verification </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2015</span><br><span class="authors"><label class="label">Authors: </label>David A. Cooper, Hildegard Ferraiolo, Ketan L. Mehta, Salvatore Francomacaro, Ramaswamy Chandramouli, Jason Mohler</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-73-4</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-73-4</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-73-4.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-73-4.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Cryptographic Algorithms and Key Sizes for Personal Identity Verification </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2015</span><br><span class="authors"><label class="label">Authors: </label>William T. Polk, Donna F. Dodson, William Burr, Salvatore Francomacaro, David A. Cooper</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-78-4</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-78-4</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-78-4.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-78-4.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Supply Chain Risk Management Practices for Federal Information Systems and Organizations </span><br><span class="publication_date"><label class="label">Date Published: </label>April 2015</span><br><span class="authors"><label class="label">Authors: </label>Jon M. Boyens, Celia Paulsen, Rama Moorthy, Nadya Bartol</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-161</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-161</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-161.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-161.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Vetting the Security of Mobile Applications </span><br><span class="publication_date"><label class="label">Date Published: </label>January 2015</span><br><span class="authors"><label class="label">Authors: </label>Steve Quirolgico, Jeffrey Voas, Tom Karygiannis, Christoph Michael, Karen Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-163</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-163</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-163.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-163.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for Key Management Part 3: Application-Specific Key Management Guidance </span><br><span class="publication_date"><label class="label">Date Published: </label>January 2015</span><br><span class="authors"><label class="label">Authors: </label>Elaine B. Barker, Quynh H. Dang</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-57Pt3r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-57Pt3r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57Pt3r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-57Pt3r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines for Derived Personal Identity Verification (PIV) Credentials </span><br><span class="publication_date"><label class="label">Date Published: </label>December 2014</span><br><span class="authors"><label class="label">Authors: </label>Hildegard Ferraiolo, David Cooper, Salvatore Francomacaro, Andrew Regenscheid, Jason Mohler, Sarbari Gupta, William Burr</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-157</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-157</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-157.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-157.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines for Media Sanitization </span><br><span class="publication_date"><label class="label">Date Published: </label>December 2014</span><br><span class="authors"><label class="label">Authors: </label>Richard Kissel, Andrew Regenscheid, Matthew Scholl, Kevin Stine</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-88r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-88r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-88r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans</span><br><span class="publication_date"><label class="label">Date Published: </label>December 2014</span><br><span class="authors"><label class="label">Authors: </label>Ronald S. Ross</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-53Ar4</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-53Ar4</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53Ar4.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-53Ar4.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization
Cryptography </span><br><span class="publication_date"><label class="label">Date Published: </label>October 2014</span><br><span class="authors"><label class="label">Authors: </label>Elaine Barker, Lily Chen, Dustin Moody</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-56Br1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-56Br1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Br1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-56Br1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>A Framework for Designing Cryptographic Key Management Systems </span><br><span class="publication_date"><label class="label">Date Published: </label>August 2013</span><br><span class="authors"><label class="label">Authors: </label>Elaine Barker, Miles Smid, Dennis Branstad, Santosh Chokhani</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-130</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-130</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-130.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-130.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Computer Security Division 2013 annual report </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2014</span><br><span class="authors"><label class="label">Authors: </label>Patrick O'Reilly, Lorie Richards</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-170</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-170</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-170.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-170.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>BIOS Protection Guidelines for Servers </span><br><span class="publication_date"><label class="label">Date Published: </label>January 2008</span><br><span class="authors"><label class="label">Authors: </label>Andrew Regenscheid</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-147B</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-147B</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-147B.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-147B.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines on Cell Phone and PDA Security </span><br><span class="publication_date"><label class="label">Date Published: </label>October 2008</span><br><span class="authors"><label class="label">Authors: </label>Wayne Jansen, Karen Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-124</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-124</span><br><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-124.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-124.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to Attribute Based Access Control (ABAC) Definition and Considerations </span><br><span class="publication_date"><label class="label">Date Published: </label>January 2014</span><br><span class="authors"><label class="label">Authors: </label>Vincent C. Hu, David Ferraiolo, Rick Kuhn, Adam Schnitzer, Kenneth Sandlin, Robert Miller, Karen Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-162</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-162</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-162.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-162.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Computer Security Division 2012 Annual Report </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2013</span><br><span class="authors"><label class="label">Authors: </label>Patrick O'Reilly, Lorie Richards</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-165</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-165</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-165.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-165.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2013</span><br><span class="authors"><label class="label">Authors: </label>Elaine Barker, Lily Chen, Allen Roginsky, Miles Smid</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-56Ar2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-56Ar2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-56Ar2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Biometric Specifications for Personal Identity Verification </span><br><span class="publication_date"><label class="label">Date Published: </label>July 2013</span><br><span class="authors"><label class="label">Authors: </label>Patrick Grother, Wayne Salamon, Ramaswamy Chandramouli</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-76-2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-76-2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-76-2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-76-2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to Malware Incident Prevention and Handling for Desktops and Laptops </span><br><span class="publication_date"><label class="label">Date Published: </label>July 2013</span><br><span class="authors"><label class="label">Authors: </label>Murugiah Souppaya, Karen Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-83r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-83r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-83r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-83r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to Enterprise Patch Management Technologies </span><br><span class="publication_date"><label class="label">Date Published: </label>July 2013</span><br><span class="authors"><label class="label">Authors: </label>Murugiah Souppaya, Karen Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-40r3</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-40r3</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-40r3.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-40r3.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Approximate matching : definition and terminology </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2014</span><br><span class="authors"><label class="label">Authors: </label>Frank Breitinger, Barbara Guttman, Michael McCarrin, Vassil Roussev, Douglas White</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-168</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-168</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-168.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-168.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines for Managing the Security of Mobile Devices in the Enterprise </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2013</span><br><span class="authors"><label class="label">Authors: </label>Murugiah Souppaya, Karen Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-124r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-124r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-124r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-124r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide for applying the risk management framework to federal information systems :
a security life cycle approach </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2014</span><br><span class="authors"><label class="label">Authors: </label></span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-37r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-37r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-37r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines on mobile device forensics </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2014</span><br><span class="authors"><label class="label">Authors: </label>Rick Ayers, Sam Brothers, Wayne Jansen</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-101r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-101r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-101r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-101r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guidelines for the selection, configuration, and use of transport layer security (TLS)
implementations </span><br><span class="publication_date"><label class="label">Date Published: </label>April 2014</span><br><span class="authors"><label class="label">Authors: </label>Tim Polk, Kerry McKay, Santosh Chokhani</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-52r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-52r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-52r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Computer Security Incident Handling Guide : Recommendations of the National Institute
of Standards and Technology </span><br><span class="publication_date"><label class="label">Date Published: </label>August 2012</span><br><span class="authors"><label class="label">Authors: </label>Paul Cichonski, Tom Millar, Tim Grance, Karen Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-61r2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-61r2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-61r2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Electronic Authentication Guideline </span><br><span class="publication_date"><label class="label">Date Published: </label>November 2013</span><br><span class="authors"><label class="label">Authors: </label>William E. Burr, Donna F. Dodson, Elaine M. Newton, Ray A. Perlner, W. Timothy Polk, Sarbari Gupta, Ebad A. Nabbus</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-63-2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-63-2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-63-2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Secure Domain Name System (DNS) Deployment Guide </span><br><span class="publication_date"><label class="label">Date Published: </label>September 2013</span><br><span class="authors"><label class="label">Authors: </label>Ramaswamy Chandramouli, Scott Rose</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-81-2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-81-2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-81-2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-81-2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data
Acquisition (SCADA) systems, Distributed Control systems (DCS), and other control
system configurations such as Programmable Logic Controllers (PLC) : recommendations
of the National Institute of Standards and Technology, Computer security </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2011</span><br><span class="authors"><label class="label">Authors: </label>Keith Stouffer, Joe Falco, Karen Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-82</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-82</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-82.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Guide to Industrial Control Systems (ICS) Security : Supervisory Control and Data
Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control
System Configurations such as Programmable Logic Controllers (PLC) </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2013</span><br><span class="authors"><label class="label">Authors: </label>Keith Stouffer, Joe Falco, Karen Scarfone</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-82r1</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-82r1</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r1.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-82r1.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Security and Privacy Controls for Federal Information Systems and Organizations </span><br><span class="publication_date"><label class="label">Date Published: </label>April 2013</span><br><span class="authors"><label class="label">Authors: </label></span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-53r4</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-53r4</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-53r4.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for Cryptographic Key Generation </span><br><span class="publication_date"><label class="label">Date Published: </label>December 2012</span><br><span class="authors"><label class="label">Authors: </label>Elaine Barker, Allen Roginsky</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-133</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-133</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-133.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-133.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping (SP 800-38F)</span><br><span class="publication_date"><label class="label">Date Published: </label>December 2012</span><br><span class="authors"><label class="label">Authors: </label>Morris J. Dworkin</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 800-38F</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.800-38F</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf">Download PDF</a> | <a href="./bib/NIST.SP.800-38F.ris" download="">Download Citation</a><br></div>
</section>
<footer id="footer" class="clearfix"><a target="_blank" href="https://www.nist.gov/privacy-policy">Privacy Policy</a> | <a target="_blank" href="https://www.nist.gov/privacy-policy#secnot">Security Notice</a> | <a href="https://www.nist.gov/oism/accessibility">Accessibility Statement</a></footer>
</div>
</body>
</html>