National Institute of Standards and Technology

Displaying 1-33 of 33 results

  • White Papers // Feb 2014

    Single-Shot Security for One-Time Memories in the Isolated Qubits Model

    One-Time Memories (OTM's) are simple, tamper-resistant cryptographic devices, which can be used to implement sophisticated functionalities such as one-time programs. OTM's cannot exist in a fully-classical world, or in a fully-quantum world, but there is evidence that they can be built using \"Isolated qubits\" - qubits that can only be...

    Provided By National Institute of Standards and Technology

  • White Papers // Jun 2013

    RECON - A Controlled English for Business Rules

    Capturing business rules in a formal logic representation supports the enterprise in two important ways: it enables the evaluation of logs and audit records for conformance to, or violation of, the rules; and it enables the conforming automation of some enterprise activities. The problem is that formal logic representations of...

    Provided By National Institute of Standards and Technology

  • White Papers // Nov 2012

    Novel Tree-Search Algorithm Versus Sphere-Decoding-Based Algorithms for MIMO System With Inter-Symbol Interference

    In this paper the authors firstly propose a general model to combat the Inter-Symbol Interference (ISI) caused by frequency selective channels in a Multi-Input Multi-Output (MIMO) system and/or by asynchronous cooperative transmissions. The general model is not only exemplified by the Asynchronous Cooperative Liner Dispersion Codes (ACLDC) scheme, but also...

    Provided By National Institute of Standards and Technology

  • White Papers // Aug 2012

    Security Control Variations Between In-House and Cloud-Based Virtualized Infrastructures

    Virtualization-related components (such as Hypervisor, Virtual Network and Virtual Machines (VMs)) in a virtualized data center infrastructure need effective security controls. However, the differences in scope of control (among stakeholders) over this component set between in-house and cloud-based virtualized infrastructures introduce variations in security control measures that can be deployed...

    Provided By National Institute of Standards and Technology

  • White Papers // Jun 2012

    Improved Indifferentiability Security Bound for the JH Mode

    Indifferentiability security of a hash mode of operation guarantees the mode's resistance against all (meaningful) generic attacks. It is also useful to establish the security of protocols that use hash functions as random functions. The JH hash function is one of the five finalists in the ongoing NIST SHA-3 hash...

    Provided By National Institute of Standards and Technology

  • White Papers // May 2012

    A Low-Complexity Tree-Search Algorithm to Decode Diversity-Oriented Block Codes With Inter-Symbol Interference

    In order to contain a differential propagation delay in a block based cooperative Multiple-Input-Multiple-Output (MIMO) system, a guard interval can be inserted to mitigate the effect of inter-symbol interference. A larger block size could substantially increase the effective symbol rate, although at the expense of decoding complexity. In this paper,...

    Provided By National Institute of Standards and Technology

  • White Papers // Apr 2012

    Adaptive Preimage Resistance Analysis Revisited: Requirements, Subtleties and Implications

    In the last few years, the need to design new cryptographic hash functions has led to the intense study of when desired hash multi-properties are preserved or assured under compositions and domain extensions. In this area, it is important to identify the exact notions and provide often complex proofs of...

    Provided By National Institute of Standards and Technology

  • White Papers // Feb 2012

    On The Nonlinearity of Maximum-Length NFSR Feedbacks

    Linear Feedback Shift Registers (LFSRs) are the main building block of many classical stream ciphers; however due to their inherent linearity, most of the LFSR-based designs do not offer the desired security levels. In the last decade, using Nonlinear Feedback Shift Registers (NFSRs) in stream ciphers became very popular. However,...

    Provided By National Institute of Standards and Technology

  • White Papers // Feb 2012

    New Capabilities for Process Modeling in BPMN 2.0

    This paper introduces new features in processes diagrams in the Business Process Model and Notation (BPMN) Version 2.0. A companion paper introduces new features in interaction diagrams for BPMN 2. BPMN provides a view of processes (how things get done) with flow charts tailored for business processes and interactions. BPMN...

    Provided By National Institute of Standards and Technology

  • White Papers // Jan 2012

    Determining Authentication Strength for Smart Card-based Authentication Use Cases

    Smart cards are now being extensively deployed for identity verification (smart identity tokens) for controlling access to Information Technology (IT) resources as well as physical resources. Depending upon the sensitivity of the resources and the risk of wrong identification, different authentication use cases are being deployed. Assignment of authentication strength...

    Provided By National Institute of Standards and Technology

  • White Papers // Dec 2011

    Guidelines on Security and Privacy in Public Cloud Computing

    Cloud computing can and does mean different things to different people. The common characteristics most interpretations share are on-demand scalability of highly available and reliable pooled computing resources, secure access to metered services from nearly anywhere, and displacement of data and services from inside to outside the organization. While aspects...

    Provided By National Institute of Standards and Technology

  • White Papers // Nov 2011

    Indifferentiability of the Hash Algorithm BLAKE

    BLAKE, designed by Aumasson, Henzen, Meier, and Phan, is the one of the five SHA-3 finalists. Indifferentiability is one of well known security notions of hash functions, because it shows how close a hash function behave as a random oracle, under the assumption that its underlying function such as a...

    Provided By National Institute of Standards and Technology

  • White Papers // Aug 2011

    Interference Mitigation for Body Area Networks

    Due to very low power communication, wireless body area networks are potentially susceptible to interference from other coexisting wireless systems including other BANs that might exist in their vicinity. Using power control to combat this interference might not be efficient. It could also lead to situations with higher levels of...

    Provided By National Institute of Standards and Technology

  • White Papers // Jul 2011

    Robust Cross-Layer Network Optimization for Diverse QoS Requirements: Work in Progress

    Conventional approach to cross-layer network optimization assumes elastic users adjusting their bandwidth requirements in response to the resource congestion prices. This assumption leads to Network Utility Maximization (NUM) framework with Lagrange multipliers associated with resource capacity constraints playing role of the congestion prices. However, often users can more naturally quantify...

    Provided By National Institute of Standards and Technology

  • White Papers // May 2011

    A Taxonomic Analysis of Cloud Computing

    The cloud computing field had many advances in the last years and new classifications proliferated in a discretionary way. Despite some attempts, there is still no agreed taxonomy. This paper analysis the related literature and practical implementations describing the diverse identified classifications. The analyzed information is structured into a new...

    Provided By National Institute of Standards and Technology

  • White Papers // Apr 2011

    Full Virtualization Technologies: Guidelines for Secure Implementation and Management

    Virtualization is a technique for simulating the software and the hardware upon which other software runs. Organizations adopting virtualization technologies can operate their information systems more efficiently, reduce their energy, operations and maintenance costs, and spend less on hardware and space for hardware. Federal organizations, in particular, are alert to...

    Provided By National Institute of Standards and Technology

  • White Papers // Feb 2011

    A Joint Vehicle-Vehicle/Vehicle-Roadside Communication Protocol for Highway Traffic Safety

    In this paper, a joint vehicle-vehicle/vehicle-roadside communication protocol is proposed for cooperative collision avoiding in Vehicular Ad Hoc NEtworks (VANETs). In this protocol, emergency warning messages are simultaneously transmitted via Vehicle-to-Vehicle (V2V) and Vehicle-to-Roadside (V2R) communications in order to achieve multipath diversity routing. In addition, to further improve communication reliability...

    Provided By National Institute of Standards and Technology

  • White Papers // Jan 2011

    Power Control in Multihop CSMA

    This paper aims at improving the power efficiency of the CSMA/CA protocol for transmission of multimedia information over multi-hop wireless channels. Using a distance dependent propagation model, the authors present a power control scheme, which is based on the receiver sensitivity adjustment mechanism. The receiver sensitivity approach aims at exploiting...

    Provided By National Institute of Standards and Technology

  • White Papers // Jan 2011

    Multi-path Multi-Channel Routing Protocol

    In this paper, the authors present a DSR-based multi-path Routing protocol, which has been developed for transmission of Multiple Description Coded (MDC) packets in wireless ad-hoc network environments. The protocol is designed to eliminate co-channel interference between multiple routes from source to destination by assigning a different frequency band to...

    Provided By National Institute of Standards and Technology

  • White Papers // Jan 2011

    Multiple Description Video Coding Over Multiple Path Routing Networks

    This paper presents a Multiple Description (MD) video-coding scheme, which uses interlaced High Signal to Noise Ratio (H-SNR) and Low Signal to Noise Ratio (L-SNR) coded frames to produce two bit-streams. At the decoder, when both bit-streams are received a high quality video will be reconstructed. If either one is...

    Provided By National Institute of Standards and Technology

  • White Papers // Jan 2011

    Adaptive Channel Scanning for IEEE 802.16e

    In this paper, the authors propose an adaptive algorithm that determines the duration and frequency of channel scanning in order to facilitate the discovery of neighboring base stations and handovers across multiple IEEE 802.16 networks. The proposed algorithm supports application quality of service requirements and can be generalized to multiple...

    Provided By National Institute of Standards and Technology

  • White Papers // Dec 2010

    Securing Wimax Wireless Communications

    Many government and business organizations are using wireless networks, enabling their employees and contractors with wireless-enabled devices, such as smart phones, to connect to the Internet and the organization's networks. Wireless networks support increased flexibility for organizations, and easier and less costly installations than wired technologies. Wireless technologies use radio...

    Provided By National Institute of Standards and Technology

  • White Papers // Nov 2010

    Modeling Affiliations in Networks

    One way to help understand the structure of certain networks is to examine what common group memberships the actors in the network share. Linking actors to their common affiliations gives an alternative type of network commonly called an affiliation network. Recently, there have been several studies examining the problem of...

    Provided By National Institute of Standards and Technology

  • White Papers // Oct 2010

    Cloud Computing-Driving Security, Performance and Quality

    Ubiquitous adoption of Internet technology has swung the pendulum of enterprise software design and usage back to the client-server model first introduced by terminals connected to mainframes half a century ago. What has shifted quite a bit from that era though, is the business and physical relationship between consumers and...

    Provided By National Institute of Standards and Technology

  • White Papers // Apr 2010

    Manufacturing And Bio-manufacturing: Materials Advances And Critical Processes

    The Technology Innovation Program (TIP) at the National Institute of Standards and Technology (NIST) was established for the purpose of assisting United States businesses and institutions of higher education or other organizations, such as national laboratories and non-profit research institutions, to support, promote, and accelerate innovation in the U.S. through...

    Provided By National Institute of Standards and Technology

  • White Papers // Sep 2009

    System and Network Security Acronyms and Abbreviations

    This paper contains a list of selected acronyms and abbreviations for system and network security terms with their generally accepted or preferred definitions. It is intended as a resource for federal agencies and other users of system and network security publications. The capitalization, spelling, and definitions of acronyms and abbreviations...

    Provided By National Institute of Standards and Technology

  • White Papers // Jul 2009

    Windows Server 2008 Boot Manager (bootmgr) Security Policy

    The Windows Server 2008 Boot Manager (BOOTMGR, versions 6.0.6001.18000 and 6.0.6002.18005) is the system boot manager, called by the bootstrapping code that resides in the boot sector. BOOTMGR is responsible for loading and verifying the integrity of the Windows OS Loader, Winload.exe. The Windows Server 2008 Boot Manager consists of...

    Provided By National Institute of Standards and Technology

  • White Papers // Jul 2009

    The Transitioning of Cryptographic Algorithms and Key Sizes

    At the beginning of the century, NIST began the task of providing cryptographic key management guidance. This included lessons learned over many years of dealing with key management issues, and attempts to encourage the definition and implementation of appropriate key management procedures, to use algorithms that adequately protect sensitive information,...

    Provided By National Institute of Standards and Technology

  • White Papers // Jul 2009

    Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration

    The authors present an overview of Quantum Key Distribution (QKD), a secure key exchange method based on the quantum laws of physics rather than computational complexity. They also provide an overview of the two most widely used commodity security protocols, IPsec and TLS. Pursuing a key exchange model, they propose...

    Provided By National Institute of Standards and Technology

  • White Papers // Jun 2009

    Access Specification and Validation Framework for Secure Smart ID Cards Deployment

    Deployment of smart cards as identity tokens (Smart ID Cards) requires the support of an enterprise system called IDentity Management System (IDMS) for collection, storage, processing and distribution of personal identity credentials. Secure configuration of IDMS for Smart id Card deployment (IDMS-SCD) requires an access specification and validation framework that...

    Provided By National Institute of Standards and Technology

  • White Papers // May 2009

    Small Business Information Security: The Fundamentals

    For some small businesses, the security of their information, systems, and networks might not be a high priority, but for their customers, employees, and trading partners it is very important. The term Small Enterprise (or Small Organization) is sometimes used for this same category of business or organization. A small...

    Provided By National Institute of Standards and Technology

  • White Papers // Apr 2009

    Measuring Indoor Mobile Wireless Link Quality

    This paper investigates methods for link quality measurement of an indoor, time-varying wireless link. Link quality estimates are used for a number of higher-layer functions, including rate adaptation, routing, and topology control. The objective is to rapidly and efficiently estimate the current reliability of an RF link in terms of...

    Provided By National Institute of Standards and Technology

  • White Papers // Mar 2009

    Fast and Secure CBC-Type MAC Algorithms

    In cryptography, a common trend is to design fast and secure algorithms. In this paper, the authors propose two fast and secure block cipher-based message authentication codes. A Message Authentication Code (MAC), is useful in those applications where data integrity and authenticity are essential. The CBC-MAC or cipher block chaining...

    Provided By National Institute of Standards and Technology

  • White Papers // Nov 2011

    Indifferentiability of the Hash Algorithm BLAKE

    BLAKE, designed by Aumasson, Henzen, Meier, and Phan, is the one of the five SHA-3 finalists. Indifferentiability is one of well known security notions of hash functions, because it shows how close a hash function behave as a random oracle, under the assumption that its underlying function such as a...

    Provided By National Institute of Standards and Technology

  • White Papers // Feb 2012

    On The Nonlinearity of Maximum-Length NFSR Feedbacks

    Linear Feedback Shift Registers (LFSRs) are the main building block of many classical stream ciphers; however due to their inherent linearity, most of the LFSR-based designs do not offer the desired security levels. In the last decade, using Nonlinear Feedback Shift Registers (NFSRs) in stream ciphers became very popular. However,...

    Provided By National Institute of Standards and Technology

  • White Papers // Jul 2011

    Robust Cross-Layer Network Optimization for Diverse QoS Requirements: Work in Progress

    Conventional approach to cross-layer network optimization assumes elastic users adjusting their bandwidth requirements in response to the resource congestion prices. This assumption leads to Network Utility Maximization (NUM) framework with Lagrange multipliers associated with resource capacity constraints playing role of the congestion prices. However, often users can more naturally quantify...

    Provided By National Institute of Standards and Technology

  • White Papers // Nov 2010

    Modeling Affiliations in Networks

    One way to help understand the structure of certain networks is to examine what common group memberships the actors in the network share. Linking actors to their common affiliations gives an alternative type of network commonly called an affiliation network. Recently, there have been several studies examining the problem of...

    Provided By National Institute of Standards and Technology

  • White Papers // May 2012

    A Low-Complexity Tree-Search Algorithm to Decode Diversity-Oriented Block Codes With Inter-Symbol Interference

    In order to contain a differential propagation delay in a block based cooperative Multiple-Input-Multiple-Output (MIMO) system, a guard interval can be inserted to mitigate the effect of inter-symbol interference. A larger block size could substantially increase the effective symbol rate, although at the expense of decoding complexity. In this paper,...

    Provided By National Institute of Standards and Technology

  • White Papers // Jan 2011

    Power Control in Multihop CSMA

    This paper aims at improving the power efficiency of the CSMA/CA protocol for transmission of multimedia information over multi-hop wireless channels. Using a distance dependent propagation model, the authors present a power control scheme, which is based on the receiver sensitivity adjustment mechanism. The receiver sensitivity approach aims at exploiting...

    Provided By National Institute of Standards and Technology

  • White Papers // Jan 2011

    Multi-path Multi-Channel Routing Protocol

    In this paper, the authors present a DSR-based multi-path Routing protocol, which has been developed for transmission of Multiple Description Coded (MDC) packets in wireless ad-hoc network environments. The protocol is designed to eliminate co-channel interference between multiple routes from source to destination by assigning a different frequency band to...

    Provided By National Institute of Standards and Technology

  • White Papers // Aug 2011

    Interference Mitigation for Body Area Networks

    Due to very low power communication, wireless body area networks are potentially susceptible to interference from other coexisting wireless systems including other BANs that might exist in their vicinity. Using power control to combat this interference might not be efficient. It could also lead to situations with higher levels of...

    Provided By National Institute of Standards and Technology

  • White Papers // Feb 2011

    A Joint Vehicle-Vehicle/Vehicle-Roadside Communication Protocol for Highway Traffic Safety

    In this paper, a joint vehicle-vehicle/vehicle-roadside communication protocol is proposed for cooperative collision avoiding in Vehicular Ad Hoc NEtworks (VANETs). In this protocol, emergency warning messages are simultaneously transmitted via Vehicle-to-Vehicle (V2V) and Vehicle-to-Roadside (V2R) communications in order to achieve multipath diversity routing. In addition, to further improve communication reliability...

    Provided By National Institute of Standards and Technology

  • White Papers // Dec 2010

    Securing Wimax Wireless Communications

    Many government and business organizations are using wireless networks, enabling their employees and contractors with wireless-enabled devices, such as smart phones, to connect to the Internet and the organization's networks. Wireless networks support increased flexibility for organizations, and easier and less costly installations than wired technologies. Wireless technologies use radio...

    Provided By National Institute of Standards and Technology

  • White Papers // Apr 2011

    Full Virtualization Technologies: Guidelines for Secure Implementation and Management

    Virtualization is a technique for simulating the software and the hardware upon which other software runs. Organizations adopting virtualization technologies can operate their information systems more efficiently, reduce their energy, operations and maintenance costs, and spend less on hardware and space for hardware. Federal organizations, in particular, are alert to...

    Provided By National Institute of Standards and Technology

  • White Papers // May 2011

    A Taxonomic Analysis of Cloud Computing

    The cloud computing field had many advances in the last years and new classifications proliferated in a discretionary way. Despite some attempts, there is still no agreed taxonomy. This paper analysis the related literature and practical implementations describing the diverse identified classifications. The analyzed information is structured into a new...

    Provided By National Institute of Standards and Technology

  • White Papers // Dec 2011

    Guidelines on Security and Privacy in Public Cloud Computing

    Cloud computing can and does mean different things to different people. The common characteristics most interpretations share are on-demand scalability of highly available and reliable pooled computing resources, secure access to metered services from nearly anywhere, and displacement of data and services from inside to outside the organization. While aspects...

    Provided By National Institute of Standards and Technology

  • White Papers // Jun 2012

    Improved Indifferentiability Security Bound for the JH Mode

    Indifferentiability security of a hash mode of operation guarantees the mode's resistance against all (meaningful) generic attacks. It is also useful to establish the security of protocols that use hash functions as random functions. The JH hash function is one of the five finalists in the ongoing NIST SHA-3 hash...

    Provided By National Institute of Standards and Technology

  • White Papers // Apr 2012

    Adaptive Preimage Resistance Analysis Revisited: Requirements, Subtleties and Implications

    In the last few years, the need to design new cryptographic hash functions has led to the intense study of when desired hash multi-properties are preserved or assured under compositions and domain extensions. In this area, it is important to identify the exact notions and provide often complex proofs of...

    Provided By National Institute of Standards and Technology

  • White Papers // Nov 2012

    Novel Tree-Search Algorithm Versus Sphere-Decoding-Based Algorithms for MIMO System With Inter-Symbol Interference

    In this paper the authors firstly propose a general model to combat the Inter-Symbol Interference (ISI) caused by frequency selective channels in a Multi-Input Multi-Output (MIMO) system and/or by asynchronous cooperative transmissions. The general model is not only exemplified by the Asynchronous Cooperative Liner Dispersion Codes (ACLDC) scheme, but also...

    Provided By National Institute of Standards and Technology

  • White Papers // Aug 2012

    Security Control Variations Between In-House and Cloud-Based Virtualized Infrastructures

    Virtualization-related components (such as Hypervisor, Virtual Network and Virtual Machines (VMs)) in a virtualized data center infrastructure need effective security controls. However, the differences in scope of control (among stakeholders) over this component set between in-house and cloud-based virtualized infrastructures introduce variations in security control measures that can be deployed...

    Provided By National Institute of Standards and Technology

  • White Papers // Jul 2009

    The Transitioning of Cryptographic Algorithms and Key Sizes

    At the beginning of the century, NIST began the task of providing cryptographic key management guidance. This included lessons learned over many years of dealing with key management issues, and attempts to encourage the definition and implementation of appropriate key management procedures, to use algorithms that adequately protect sensitive information,...

    Provided By National Institute of Standards and Technology

  • White Papers // Apr 2009

    Measuring Indoor Mobile Wireless Link Quality

    This paper investigates methods for link quality measurement of an indoor, time-varying wireless link. Link quality estimates are used for a number of higher-layer functions, including rate adaptation, routing, and topology control. The objective is to rapidly and efficiently estimate the current reliability of an RF link in terms of...

    Provided By National Institute of Standards and Technology

  • White Papers // Jul 2009

    Windows Server 2008 Boot Manager (bootmgr) Security Policy

    The Windows Server 2008 Boot Manager (BOOTMGR, versions 6.0.6001.18000 and 6.0.6002.18005) is the system boot manager, called by the bootstrapping code that resides in the boot sector. BOOTMGR is responsible for loading and verifying the integrity of the Windows OS Loader, Winload.exe. The Windows Server 2008 Boot Manager consists of...

    Provided By National Institute of Standards and Technology

  • White Papers // May 2009

    Small Business Information Security: The Fundamentals

    For some small businesses, the security of their information, systems, and networks might not be a high priority, but for their customers, employees, and trading partners it is very important. The term Small Enterprise (or Small Organization) is sometimes used for this same category of business or organization. A small...

    Provided By National Institute of Standards and Technology

  • White Papers // Sep 2009

    System and Network Security Acronyms and Abbreviations

    This paper contains a list of selected acronyms and abbreviations for system and network security terms with their generally accepted or preferred definitions. It is intended as a resource for federal agencies and other users of system and network security publications. The capitalization, spelling, and definitions of acronyms and abbreviations...

    Provided By National Institute of Standards and Technology

  • White Papers // Apr 2010

    Manufacturing And Bio-manufacturing: Materials Advances And Critical Processes

    The Technology Innovation Program (TIP) at the National Institute of Standards and Technology (NIST) was established for the purpose of assisting United States businesses and institutions of higher education or other organizations, such as national laboratories and non-profit research institutions, to support, promote, and accelerate innovation in the U.S. through...

    Provided By National Institute of Standards and Technology

  • White Papers // Jul 2009

    Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration

    The authors present an overview of Quantum Key Distribution (QKD), a secure key exchange method based on the quantum laws of physics rather than computational complexity. They also provide an overview of the two most widely used commodity security protocols, IPsec and TLS. Pursuing a key exchange model, they propose...

    Provided By National Institute of Standards and Technology

  • White Papers // Oct 2010

    Cloud Computing-Driving Security, Performance and Quality

    Ubiquitous adoption of Internet technology has swung the pendulum of enterprise software design and usage back to the client-server model first introduced by terminals connected to mainframes half a century ago. What has shifted quite a bit from that era though, is the business and physical relationship between consumers and...

    Provided By National Institute of Standards and Technology

  • White Papers // Jan 2011

    Multiple Description Video Coding Over Multiple Path Routing Networks

    This paper presents a Multiple Description (MD) video-coding scheme, which uses interlaced High Signal to Noise Ratio (H-SNR) and Low Signal to Noise Ratio (L-SNR) coded frames to produce two bit-streams. At the decoder, when both bit-streams are received a high quality video will be reconstructed. If either one is...

    Provided By National Institute of Standards and Technology

  • White Papers // Jan 2011

    Adaptive Channel Scanning for IEEE 802.16e

    In this paper, the authors propose an adaptive algorithm that determines the duration and frequency of channel scanning in order to facilitate the discovery of neighboring base stations and handovers across multiple IEEE 802.16 networks. The proposed algorithm supports application quality of service requirements and can be generalized to multiple...

    Provided By National Institute of Standards and Technology

  • White Papers // Mar 2009

    Fast and Secure CBC-Type MAC Algorithms

    In cryptography, a common trend is to design fast and secure algorithms. In this paper, the authors propose two fast and secure block cipher-based message authentication codes. A Message Authentication Code (MAC), is useful in those applications where data integrity and authenticity are essential. The CBC-MAC or cipher block chaining...

    Provided By National Institute of Standards and Technology

  • White Papers // Jan 2012

    Determining Authentication Strength for Smart Card-based Authentication Use Cases

    Smart cards are now being extensively deployed for identity verification (smart identity tokens) for controlling access to Information Technology (IT) resources as well as physical resources. Depending upon the sensitivity of the resources and the risk of wrong identification, different authentication use cases are being deployed. Assignment of authentication strength...

    Provided By National Institute of Standards and Technology

  • White Papers // Jun 2009

    Access Specification and Validation Framework for Secure Smart ID Cards Deployment

    Deployment of smart cards as identity tokens (Smart ID Cards) requires the support of an enterprise system called IDentity Management System (IDMS) for collection, storage, processing and distribution of personal identity credentials. Secure configuration of IDMS for Smart id Card deployment (IDMS-SCD) requires an access specification and validation framework that...

    Provided By National Institute of Standards and Technology

  • White Papers // Feb 2014

    Single-Shot Security for One-Time Memories in the Isolated Qubits Model

    One-Time Memories (OTM's) are simple, tamper-resistant cryptographic devices, which can be used to implement sophisticated functionalities such as one-time programs. OTM's cannot exist in a fully-classical world, or in a fully-quantum world, but there is evidence that they can be built using \"Isolated qubits\" - qubits that can only be...

    Provided By National Institute of Standards and Technology

  • White Papers // Feb 2012

    New Capabilities for Process Modeling in BPMN 2.0

    This paper introduces new features in processes diagrams in the Business Process Model and Notation (BPMN) Version 2.0. A companion paper introduces new features in interaction diagrams for BPMN 2. BPMN provides a view of processes (how things get done) with flow charts tailored for business processes and interactions. BPMN...

    Provided By National Institute of Standards and Technology

  • White Papers // Jun 2013

    RECON - A Controlled English for Business Rules

    Capturing business rules in a formal logic representation supports the enterprise in two important ways: it enables the evaluation of logs and audit records for conformance to, or violation of, the rules; and it enables the conforming automation of some enterprise activities. The problem is that formal logic representations of...

    Provided By National Institute of Standards and Technology