NIST IR 7904 | Dec. 21, 2012 | DRAFT Trusted Geolocation in the Cloud: Proof of Concept Implementation draft_nistir_7904.pdf |
NIST IR 7896 | Nov. 2012 | Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition dx.doi.org/10.6028/NIST.IR.7896 |
NIST IR 7878 | Oct. 2012 | Combinatorial Coverage Measurement dx.doi.org/10.6028/NIST.IR.7878 |
NIST IR 7877 | Sept. 2012 | BioCTS 2012: Advanced Conformance Test Architectures and Test Suites for Biometric Data Interchange Formats and Biometric Information Records dx.doi.org/10.6028/NIST.IR.7877 |
NIST IR 7874 | Sept. 2012 | Guidelines for Access Control System Evaluation Metrics dx.doi.org/10.6028/NIST.IR.7874 |
NIST IR 7870 | July 2012 | NIST Test Personal Identity Verification (PIV) Cards dx.doi.org/10.6028/NIST.IR.7870 |
NIST IR 7864 | July 2012 | The Common Misuse Scoring System (CMSS): Metrics for Software Feature Misuse Vulnerabilities dx.doi.org/10.6028/NIST.IR.7864 |
NIST IR 7848 | May 7, 2012 | DRAFT Specification for the Asset Summary Reporting Format 1.0 draft_nistir_7848.pdf |
NIST IR 7831 | Dec. 6, 2011 | DRAFT Common Remediation Enumeration (CRE) Version 1.0 Draft-NISTIR-7831.pdf |
NIST IR 7823 | Jul 10, 2012 | DRAFT Advanced Metering Infrastructure Smart Meter Upgradeability Test Framework draft_nistir-7823.pdf |
| | draft-nistir-7823_comment-form.docx |
NIST IR 7817 | Nov. 2012 | A Credential Reliability and Revocation Model for Federated Identities dx.doi.org/10.6028/NIST.IR.7817 |
NIST IR 7816 | Mar. 2012 | 2011 Computer Security Division Annual Report nistir_7816.pdf |
NIST IR 7815 | July 2011 | Access Control for SAR Systems nistir-7815.pdf |
NIST IR 7806 | Sept. 2011 | ANSI/NIST-ITL 1-2011 Requirements and Conformance Test Assertions nistir-7806.pdf |
NIST IR 7802 | Sept. 2011 | Trust Model for Security Automation Data (TMSAD) Version 1.0 NISTIR-7802.pdf |
NIST IR 7800 | Jan. 20, 2012 | DRAFT Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains Draft-NISTIR-7800.pdf |
NIST IR 7799 | Jan. 6, 2012 | DRAFT Continuous Monitoring Reference Model Workflow, Subsystem, and Interface Specifications Draft-NISTIR-7799.pdf |
NIST IR 7791 | June 2011 | Conformance Test Architecture and Test Suite for ANSI/NIST-ITL 1-2007 nistir-7791.pdf |
NIST IR 7788 | Aug. 2011 | Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs NISTIR-7788.pdf |
NIST IR 7773 | Nov. 2010 | An Application of Combinatorial Methods to Conformance Testing for Document Object Model Events NISTIR-7773.pdf |
NIST IR 7771 | Feb. 2011 | Conformance Test Architecture for Biometric Data Interchange Formats - Version Beta 2.0 NISTIR-7771.pdf |
NIST IR 7764 | Feb. 2011 | Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition nistir-7764.pdf |
NIST IR 7756 | Jan. 6, 2012 | DRAFT CAESARS Framework Extension: An Enterprise Continuous Monitoring Technical Reference Architecture Draft-NISTIR-7756_second-public-draft.pdf |
NIST IR 7751 | May 2011 | 2010 Computer Security Division Annual Report nistir-7751_2010-csd-annual-report.pdf |
NIST IR 7698 | Aug. 2011 | Common Platform Enumeration: Applicability Language Specification Version 2.3 NISTIR-7698-CPE-Language.pdf |
NIST IR 7697 | Aug. 2011 | Common Platform Enumeration: Dictionary Specification Version 2.3 NISTIR-7697-CPE-Dictionary.pdf |
NIST IR 7696 | Aug. 2011 | Common Platform Enumeration : Name Matching Specification Version 2.3 NISTIR-7696-CPE-Matching.pdf |
NIST IR 7695 | Aug. 2011 | Common Platform Enumeration: Naming Specification Version 2.3 NISTIR-7695-CPE-Naming.pdf |
NIST IR 7694 | June 2011 | Specification for the Asset Reporting Format 1.1 NISTIR-7694.pdf |
NIST IR 7693 | June 2011 | Specification for Asset Identification 1.1 NISTIR-7693.pdf |
NIST IR 7692 | April 2011 | Specification for the Open Checklist Interactive Language (OCIL) Version 2.0 nistir-7692.pdf |
NIST IR 7676 | June 2010 | Maintaining and Using Key History on Personal Identity Verification (PIV) Cards nistir-7676.pdf |
NIST IR 7670 | Feb. 10, 2011 | DRAFT Proposed Open Specifications for an Enterprise Remediation Automation Framework Draft-NISTIR-7670_Feb2011.pdf |
NIST IR 7669 | Mar. 10, 2010 | DRAFT Open Vulnerability Assessment Language (OVAL) Validation Program Derived Test Requirements draft-nistir-7669.pdf |
NIST IR 7665 | Mar. 2010 | Proceedings of the Privilege Management Workshop, September 1-3, 2009 nistir-7665.pdf |
NIST IR 7658 | Feb. 2010 | Guide to SIMfill Use and Development nistir-7658_SIMfill-users-guide.pdf |
NIST IR 7657 | Mar. 2010 | A Report on the Privilege (Access) Management Workshop nistir-7657.pdf |
NIST IR 7653 | Mar. 2010 | 2009 Computer Security Division Annual Report nistir-7653_2009-CSD-annual-report.pdf |
NIST IR 7628 | Aug. 2010 | Guidelines for Smart Grid Cyber Security introduction-to-nistir-7628.pdf |
| | nistir-7628_vol1.pdf |
| | nistir-7628_vol2.pdf |
| | nistir-7628_vol3.pdf |
NIST IR 7622 | Oct. 2012 | Notional Supply Chain Risk Management Practices for Federal Information Systems dx.doi.org/10.6028/NIST.IR.7622 |
NIST IR 7621 | Oct. 2009 | Small Business Information Security: The Fundamentals nistir-7621.pdf |
NIST IR 7620 | Sept. 2009 | Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition nistir_7620.pdf |
NIST IR 7617 | Oct. 2009 | Mobile Forensic Reference Materials: A Methodology and Reification nistir-7617.pdf |
NIST IR 7611 | Aug. 2009 | Use of ISO/IEC 24727 -- Service Access Layer Interface for Identity (SALII): Support for Development and use of Interoperable Identity Credentials nistir7611_use-of-isoiec24727.pdf |
NIST IR 7609 | Jan. 2010 | Cryptographic Key Management Workshop Summary nistir-7609.pdf |
NIST IR 7601 | Aug. 2010 | Framework for Emergency Response Officials (ERO) nistir-7601_framework-ERO.pdf |
NIST IR 7581 | Sept. 2009 | System and Network Security Acronyms and Abbreviations nistir-7581.pdf |
NIST IR 7564 | Apr. 2009 | Directions in Security Metrics Research nistir-7564_metrics-research.pdf |
NIST IR 7559 | Jun. 2010 | Forensics Web Services (FWS) nistir-7559_forensics-web-services.pdf |
NIST IR 7539 | Dec. 2008 | Symmetric Key Injection onto Smart Cards nistir-7539-Symmetric_key_injection_final.pdf |
NIST IR 7536 | Mar. 2009 | 2008 Computer Security Division Annual Report NISTIR-7536_2008-CSD-Annual-Report.pdf |
NIST IR 7516 | Aug 2008 | Forensic Filtering of Cell Phone Protocols nistir-7516_forensic-filter.pdf |
NIST IR 7511 Rev. 3 | Jan. 2013 | Security Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements dx.doi.org/10.6028/NIST.IR.7511 |
NIST IR 7502 | Dec. 2010 | The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities nistir-7502_CCSS.pdf |
NIST IR 7497 | Sept. 2010 | Security Architecture Design Process for Health Information Exchanges (HIEs) nistir-7497.pdf |
NIST IR 7452 | Nov 2007 | Secure Biometric Match-on-Card Feasibility Report NISTIR-7452.pdf |
NIST IR 7442 | Apr 2008 | 2007 Computer Security Division Annual Report NIST-IR-7442_2007CSDAnnualReport.pdf |
NIST IR 7435 | Aug 2007 | The Common Vulnerability Scoring System (CVSS) and Its Applicability to Federal Agency Systems NISTIR-7435.pdf |
NIST IR 7427 | Sep 2007 | 6th Annual PKI R&D Workshop "Applications-Driven PKI" Proceedings NISTIR7427_PKI_2007.pdf |
NIST IR 7399 | Mar 2007 | 2006 Computer Security Division Annual Report NISTIR7399_CSDAnnualReport2006.pdf |
NIST IR 7387 | Mar 2007 | Cell Phone Forensic Tools: An Overview and Analysis Update, nistir-7387.pdf |
NIST IR 7359 | Jan 2007 | Information Security Guide For Government Executives NISTIR-7359.pdf |
| | CSD_ExecGuide-booklet.pdf |
NIST IR 7358 | Jan 2007 | Program Review for Information Security Management Assistance (PRISMA) NISTIR-7358.pdf |
NIST IR 7337 | Aug 2006 | Personal Identity Verification Demonstration Summary NISTIR-7337_CRADA_082006.pdf |
NIST IR 7328 | Sep 29, 2007 | DRAFT Security Assessment Provider Requirements and Customer Responsibilities: Building a Security Assessment Credentialing Program for Federal Information Systems NISTIR_7328-ipdraft.pdf |
NIST IR 7316 | Sep 2006 | Assessment of Access Control Systems NISTIR-7316.pdf |
NIST IR 7313 | Jul 2006 | 5th Annual PKI R&D Workshop "Making PKI Easy to Use" Proceedings NIST-IR-7313_Final.pdf |
NIST IR 7298 Rev. 2 | Dec. 6, 2012 | DRAFT Glossary of Key Information Security Terms nistir7298_r2_draft.pdf |
NIST IR 7298 Rev. 1 | Feb. 2011 | Glossary of Key Information Security Terms nistir-7298-revision1.pdf |
NIST IR 7290 | Mar 2006 | Fingerprint Identification and Mobile Handheld Devices: Overview and Implementation NIST-IR-7290-pp-mobileFprint-final.pdf |
NIST IR 7285 | Feb 2006 | 2005 Computer Security Division Annual Report nistir-7285-CSD-2005-Annual-Report.pdf |
NIST IR 7284 | Jan 2006 | Personal Identity Verification Card Management Report nistir-7284.pdf |
NIST IR 7275 Rev. 4 | Sept. 2011 | Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.2 NISTIR-7275r4.pdf |
| | nistir-7275r4_updated-march-2012_markup.pdf |
| | nistir-7275r4_updated-march-2012_clean.pdf |
NIST IR 7275 Rev. 3 | Jan 2008 | Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.1.4 NISTIR-7275r3.pdf |
NIST IR 7250 | Oct 2005 | Cell Phone Forensic Tools: An Overview and Analysis nistir-7250.pdf |
NIST IR 7224 | Aug 2005 | 4th Annual PKI R&D Workshop: Multiple Paths to Trust Proceedings NISTIR-7224.pdf |
NIST IR 7219 | Apr 2005 | 2004 Computer Security Division Annual Report NISTIR7219-CSD-2004-Annual-Report.pdf |
NIST IR 7206 | Jul 2005 | Smart Cards and Mobile Device Authentication: An Overview and Implementation nist-IR-7206.pdf |
NIST IR 7200 | Jun 2005 | Proximity Beacons and Mobile Handheld Devices: Overview and Implementation NIST-IR-7200.pdf |
NIST IR 7111 | Apr 2004 | 2003 Computer Security Division Annual Report IR7111-CSDAnnualReport.pdf |
NIST IR 7100 | Aug 2004 | PDA Forensic Tools: An Overview and Analysis nistir-7100-PDAForensics.pdf |
NIST IR 7056 | Mar 2004 | Card Technology Development and Gap Analysis Interagency Report nistir-7056.pdf |
NIST IR 7046 | Aug 2003 | A Framework for Multi-Mode Authentication: Overview and Implementation Guide nistir-7046.pdf |
NIST IR 7030 | Jul 2003 | Picture Password: A Visual Login Technique for Mobile Devices nistir-7030.pdf |
NIST IR 7007 | Jun 2003 | An Overview of Issues in Testing Intrusion Detection Systems nistir-7007.pdf |
NIST IR 6985 | Apr 2003 | COTS Security Protection Profile - Operating Systems (CSPP-OS) (Worked Example Applying Guidance of NISTIR-6462, CSPP) nistir-6985.pdf |
NIST IR 6981 | Apr 2003 | Policy Expression and Enforcement for Handheld Devices nistir-6981.pdf |
NIST IR 6887 | Jul 2003 | Government Smart Card Interoperability Specification nistir-6887.pdf |
NIST IR 6529 A | Apr 2004 | Common Biometric Exchange Formats Framework (CBEFF) NISTIR6529A.pdf |
NIST IR 6483 | Mar 2000 | Randomness Testing of the Advanced Encryption Standard Finalist Candidates ir6483.pdf |
NIST IR 6462 | Dec 1999 | CSPP - Guidance for COTS Security Protection Profiles ir6462.pdf |
NIST IR 6416 | Oct 1999 | Applying Mobile Agents to Intrusion Detection and Response ir6416.pdf |
NIST IR 6390 | Sep 1999 | Randomness Testing of the Advanced Encryption Standard Candidate Algorithms ir6390.pdf |
NIST IR 5495 | 1994 | Computer Security Training & Awareness Course Compendium ir5495.txt |
NIST IR 5472 | Mar 1994 | A Head Start on Assurance Proceedings of an Invitational Workshop on Information Technology (IT) Assurance and Trustworthiness ir5472.txt |
NIST IR 5308 | Dec 1993 | General Procedures for Registering Computer Security Objects ir5308.txt |
NIST IR 5153 | Mar 1993 | Minimum Security Requirements for Multi-User Operating Systems ir5153.txt |
NIST IR 4976 | Nov 1992 | Assessing Federal and Commercial Information Security Needs ir4976.txt |
NIST IR 4939 | Oct 1992 | Threat Assessment of Malicious Code and External Attacks index.html |
| | ir4939.txt |
NIST IR 4749 | Jun 1992 | Sample Statements of Work for Federal Computer Security Services: For use In-House or Contracting Out ir4749.txt |
NIST IR 4734 | Feb 1992 | Foundations of a Security Policy for use of the National Research and Educational Network NISTIR-4734.pdf |