Search results
Series: SP. Showing 210 matching records. View All Publications.
- Search Search
Current Publications . NIST Series Pubs . Final Pubs; Drafts...
- View All Publications
Current Publications . NIST Series Pubs . Final Pubs; Drafts...
- SP 1800
Control Family (800-53) Match ANY: Match ALL: Search Reset....
- SP 800: Computer Security Series
NIST Technical Series Publication List. Home. View All...
- Publications Expand or Collapse
This catalog includes the following NIST technical...
- Search Search
21 maj 2018 · Publications in NIST’s Special Publication (SP) 800 series present information of interest to the computer security community. The series comprises guidelines, recommendations, technical specifications, and annual reports of NIST’s cybersecurity activities.
NIST Technical Series Publication List. Home. View All Reports. Reports by Series. XML. Back to Top. List now available on the NIST Research Library's website. SP 800: Computer Security Series. List updated 2024-03-13-04:00. SP800. Title: Secure Development Practices for Generative AI and Dual-Use Foundation AI Models: An SSDF Community Profile.
This catalog includes the following NIST technical publication series: Find more of our research in: Journal Articles, Conference Papers, Books, and Other miscellaneous papers. More of these publications from before 2008 will be added to this database. See NIST Publications for additional Cybersecurity Publications. More info:
10 gru 2020 · Analysis of updates between 800-53 Rev. 5 and Rev. 4 (Updated 1/07/22) Describes the changes to each control and control enhancement, provides a brief summary of the changes, and includes an assessment of the significance of the changes.
SP 800-178 A Comparison of Attribute Based Access Control (ABAC) Standards for Data Service Applications: Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC)
10 gru 2020 · This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets, individuals, other organizations, and the Nation from a diverse set of threats and risks, including hostile attacks, human errors, natural... See full abstract.