Search results
SP 800-178 (Final) A Comparison of Attribute Based Access Control (ABAC) Standards for Data Service Applications: Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC)
- Search Search
Search Search - Search | CSRC - NIST Computer Security...
- View All Publications
View All Publications - Search | CSRC - NIST Computer...
- SP 1800
SP 1800 - Search | CSRC - NIST Computer Security Resource...
- Search Search
21 maj 2018 · Publications in NIST’s Special Publication (SP) 800 series present information of interest to the computer security community. The series comprises guidelines, recommendations, technical specifications, and annual reports of NIST’s cybersecurity activities.
SP800. Title: Secure Development Practices for Generative AI and Dual-Use Foundation AI Models: An SSDF Community Profile. Date Published: 2024. Authors: Murugiah Souppaya. Report Number: NIST SP 800-218A ipd. doi:10.6028/NIST.SP.800-218A.ipd. Download PDF | Download Citation.
NIST Technical Series publications are written by or for NIST and published by the NIST Research Library. These publications consist of technical reports, recommendations, practice guides, industry handbooks, and other similar technical documents intended for external distribution.
7 lut 2011 · NIST Technical Series publications are written by or for NIST and published by the NIST Research Library. These publications consist of technical reports, recommendations, practice guides, industry handbooks, and other similar technical documents intended for external distribution.
This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to establish and implement an information security program.
10 gru 2020 · This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets, individuals, other organizations, and the Nation from a diverse set of threats and risks, including hostile attacks, human errors, natural... See full abstract.