The IT Law Wiki
Tag: sourceedit
mNo edit summary
Tag: sourceedit
Line 6: Line 6:
   
 
The following NISTIR reports are organized by number in descending order. Those reports that have already been summarized are in blue; those that have not yet been summarized are in red.
 
The following NISTIR reports are organized by number in descending order. Those reports that have already been summarized are in blue; those that have not yet been summarized are in red.
  +
* [[NISTIR 8023]]: Risk Management for Replication Devices (Feb. 2015).
 
 
* [[NISTIR 8018]]: (Draft) Public Safety Mobile Application Security Requirements Workshop Summary (July 29, 2014) ([http://csrc.nist.gov/publications/drafts/nistir-8018/nistir_8018_draft.pdf full-text]).
 
* [[NISTIR 8018]]: (Draft) Public Safety Mobile Application Security Requirements Workshop Summary (July 29, 2014) ([http://csrc.nist.gov/publications/drafts/nistir-8018/nistir_8018_draft.pdf full-text]).
 
* [[NISTIR 8014]]: (Draft) Considerations for Identity Management in Public Safety Mobile Networks (July 15, 2014) ([http://csrc.nist.gov/publications/drafts/nistir-8014/nistir_8014_draft.pdf full-text])
 
* [[NISTIR 8014]]: (Draft) Considerations for Identity Management in Public Safety Mobile Networks (July 15, 2014) ([http://csrc.nist.gov/publications/drafts/nistir-8014/nistir_8014_draft.pdf full-text])

Revision as of 21:52, 29 March 2015

Definition

A National Institute of Standards and Technology Interagency or Internal Report (NISTIR) is a series of publications that includes interim or final reports on work performed by NIST for outside sponsors (both government and nongovernment). NISTIR’s may also report results of NIST projects of transitory or limited interest, including those that will be published subsequently in more comprehensive form.

NISTIR Reports

The following NISTIR reports are organized by number in descending order. Those reports that have already been summarized are in blue; those that have not yet been summarized are in red.

  • NISTIR 8023: Risk Management for Replication Devices (Feb. 2015).
  • NISTIR 8018: (Draft) Public Safety Mobile Application Security Requirements Workshop Summary (July 29, 2014) (full-text).
  • NISTIR 8014: (Draft) Considerations for Identity Management in Public Safety Mobile Networks (July 15, 2014) (full-text)
  • NISTIR 7981: (Draft) Mobile, PIV, and Authentication (Mar. 7, 2014).
  • NISTIR 7977: (Draft) NIST Cryptographic Standards and Guidelines Development Process (Feb. 18, 2014).
  • NISTIR 7956: Cryptographic Key Management Issues & Challenges in Cloud Services (Sept. 2013).
  • NISTIR 7904: Trusted Geolocation in the Cloud: Proof of Concept Implementation (Dec. 2012).
  • NISTIR 7761: Guidelines for Assessing Wireless Standards for Smart Grid Applications (Feb. 2011).
  • NISTIR 7751: 2010 Computer Security Division Annual Report (May 2011).
  • NISTIR 7653: 2009 Computer Security Division Annual Report (Mar. 2010).
  • NISTIR 7628: Guidelines for Smart Grid Cyber Security (Aug. 2010).
  • NISTIR 7621: Small Business Information Security: The Fundamentals (Oct. 2009).
  • NISTIR 7609: Cryptographic Key Management Workshop Summary - June 8-9, 2009 (Jan. 2010).
  • NISTIR 7581: System and Network Security Acronyms and Abbreviations (Sept. 2009) (full-text).
  • NISTIR 7559: Forensics Web Services (FWS) (June 2010).
  • NISTIR 7536: 2008 Computer Security Division Annual Report (Mar. 2009). (full-text).
  • NISTIR 7497: Security Architecture Design Process for Health Information Exchanges (HIEs) (Sept. 2010) (full-text).
  • NISTIR 7442: 2007 Computer Security Division Annual Report (Apr. 2008) (full-text).
  • NISTIR 7399: 2006 Computer Security Division Annual Report (May 2007).(full-text).
  • NISTIR 7359: Information Security Guide For Government Executives (Jan. 2007) (full-text).
  • NISTIR 7298: Glossary of Key Information Security Terms (Rev. 2) (May 2013).
  • NISTIR 7290: Fingerprint Identification and Mobile Handheld Devices: Overview and Implementation (Mar. 2006) (full-text).
  • NISTIR 7285: 2005 Computer Security Division Annual Report (Feb. 2006) (full-text).
  • NISTIR 7250: Cell Phone Forensic Tools: An Overview and Analysis (Oct. 2005) (full-text).
  • NISTIR 7219: 2004 Computer Security Division Annual Report (Apr. 2005) (full-text).
  • NISTIR 7206: Smart Cards and Mobile Device Authentication: An Overview and Implementation (July 2005) (full-text).
  • NISTIR 7111: 2003 Computer Security Division Annual Report (Apr. 2004) (full-text).
  • NISTIR 7100: PDA Forensic Tools: An Overview and Analysis (Aug. 2004) (full-text).
  • NISTIR 6529A: CBEFF Common Biometric Exchange Formats Framework (Apr. 5, 2004) (full-text).
  • NISTIR 5424: A Study of Federal Agency Needs for Information Technology Security (PB94-193653) (May 1994).
  • NISTIR 4976: Assessing Federal and Commercial Information Security Needs (Nov. 1992) (full-text).
  • NISTIR 4939: Threat Assessment of Malicious Code and External Attacks (Oct. 1992) (full-text).
  • NISTIR 4749: Sample Statements of Work for Federal Computer Security Services: For use In-House or Contracting Out (June 1992) (full-text).

Source