Information Technology Laboratory
Share
Publications
Federal Information Processing Standards
NIST Special Publication 800 series (SP 800; Computer Security)
NIST Interagency or Internal Report (IR)
NIST Cybersecurity White Paper (CSWP)
NIST Trustworthy and Responsible AI (AI)
Other Papers
Articles
Books
Book Sections
Conference Papers
Eprint Articles
Recognition
Internal
External
Patents
Computer Security Division Patents
Federal Information Processing Standards (FIPS)
- National Institute of Standards and Technology. Digital Signature Standard (DSS). (U.S. Department of Commerce, Washington, DC), Federal Information Processing Standards Publication (FIPS) NIST FIPS 186-5 (2023). DOI:10.6028/NIST.FIPS.186-5
- National Institute of Standards and Technology. Advanced Encryption Standard (AES). (U.S. Department of Commerce, Washington, DC), Federal Information Processing Standards Publication (FIPS) NIST FIPS 197-upd1, updated May 9, 2023 (2023). DOI:10.6028/NIST.FIPS.197-upd1
NIST Special Publication 800 series (SP 800; Computer Security)
- M. Souppaya and K. Scarfone. Guide to Enterprise Patch Management Planning: Preventive Maintenance for Technology. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-40r4 (2022). DOI:10.6028/NIST.SP.800-40r4
- K. Dempsey, V. Pillitteri, and A. Regenscheid. Managing the Security of Information Exchanges. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-47r1 (2021). DOI:10.6028/NIST.SP.800-47r1
- Joint Task Force. Assessing Security and Privacy Controls in Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-53Ar5 (2022). DOI:10.6028/NIST.SP.800-53Ar5
- K. Stouffer, M. Pease, C.Y. Tang, T. Zimmerman, V. Pillitteri, S. Lightman, A. Hahn, S. Saravia, A. Sherule, and M. Thompson. Guide to Operational Technology (OT) Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-82r3 (2023). DOI:10.6028/NIST.SP.800-82r3
- L. Chen. Recommendation for Key Derivation Using Pseudorandom Functions. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-108r1-upd1, Includes updates as of February 2, 2024 (2024). DOI:10.6028/NIST.SP.800-108r1-upd1
- J. Padgette, J. Bahr, M. Holtmann, M. Batra, L. Chen, R. Smithbey, and K. Scarfone. Guide to Bluetooth Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-121r2-upd1. Includes updates as of January 19, 2022 (2022). DOI:10.6028/NIST.SP.800-121r2-upd1
- G. Howell, J. Franklin, V. Sritapan, M. Souppaya, and K. Scarfone. Guidelines for Managing the Security of Mobile Devices in the Enterprise. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-124r2 (2023). DOI:10.6028/NIST.SP.800-124r2
- D. Hawes, A. Calis, and R. Crombie. Cryptographic Module Validation Program (CMVP) Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-140Br1 (2023). DOI:10.6028/NIST.SP.800-140Br1
- K. Schaffer and A. Calis. CMVP Approved Security Functions: CMVP Validation Authority Updates to ISO/IEC 24759. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-140Cr1 (2022). DOI:10.6028/NIST.SP.800-140Cr1
- A. Calis. Cryptographic Module Validation Program (CMVP)-Approved Security Functions: CMVP Validation Authority Updates to ISO/IEC 24759. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-140Cr2 (2023). DOI:10.6028/NIST.SP.800-140Cr2
- K. Schaffer and A. Calis. CMVP Approved Sensitive Parameter Generation and Establishment Methods: CMVP Validation Authority Updates to ISO/IEC 24759. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-140Dr1 (2022). DOI:10.6028/NIST.SP.800-140Dr1
- A. Calis. Cryptographic Module Validation Program (CMVP)-Approved Sensitive Security Parameter Generation and Establishment Methods: CMVP Validation Authority Updates to ISO/IEC 24759. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-140Dr2 (2023). DOI: 10.6028/NIST.SP.800-140Dr2
- R. Ross, V. Pillitteri, R. Graubart, D. Bodeau, and R. McQuaid. Developing Cyber Resilient Systems: A Systems Security Engineering Approach. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-160v2r1 (2021). DOI:10.6028/NIST.SP.800-160v2r1
- J. Boyens, A. Smith, N. Bartol, K. Winkler, A. Holbrook, and M. Fallon. Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-161r1 (2022). DOI: 10.6028/NIST.SP.800-161r1
- R. Ross, V. Pillitteri, and K. Dempsey. Assessing Enhanced Security Requirements for Controlled Unclassified Information. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-172A (2022). DOI:10.6028/NIST.SP.800-172A
- L. Chen, D. Moody, A. Regenscheid, A. Robinson, and K. Randall. Recommendations for Discrete Logarithm-based Cryptography: Elliptic Curve Domain Parameters. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-186 (2023). DOI:10.6028/NIST.SP.800-186
- R. Chandramouli, Z. Butcher, A. Chetal. Attribute-based Access Control for Microservices-based Applications using a Service Mesh. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-204B (2021). DOI:10.6028/NIST.SP.800-204B
- R. Chandramouli. Implementation of DevSecOps for a Microservices-based Application with Service Mesh. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-204C (2022). DOI:10.6028/NIST.SP.800-204C
- R. Chandramouli, F. Kautz, and S. Torres-Arias. Strategies for the Integration of Software Supply Chain Security in DevSecOps CI/CD Pipelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-204D (2024). DOI:10.6028/NIST.SP.800-204D
- R. Chandramouli and Z. Butcher. A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-207A (2023). DOI:10.6028/NIST.SP.800-207A
- P. O'Reilly II, K. Rigopoulos, L. Feldman, and G. Witte (eds.). 2020 Cybersecurity and Privacy Annual Report. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-214 (2021). DOI:10.6028/NIST.SP.800-214
- R. Chandramouli. Guide to a Secure Enterprise Network Landscape. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-215 (2022). DOI:10.6028/NIST.SP.800-215
- K. Schaffer, P. Mell, H. Trinh, and I. Van Wyk. Recommendations for Federal Vulnerability Disclosure Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-216 (2023). DOI:10.6028/NIST.SP.800-216
- M. Souppaya, K. Scarfone, and D. Dodson. Secure Software Development Framework (SSDF) Version 1.1: Recommendations for Mitigating the Risk of Software Vulnerabilities. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-218 (2022). DOI:10.6028/NIST.SP.800-218
- M. Trapnell, E. Trapnell, M. Souppaya, B. Gendler, and K. Scarfone. Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-219 (2022). DOI:10.6028/NIST.SP.800-219
- M. Trapnell, E. Trapnell, M. Souppaya, B. Gendler, and K. Scarfone. Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-219r1 (2023). DOI: 10.6028/NIST.SP.800-219r1
- P. O'Reilly II, K. Rigopoulos, L. Feldman, and G. Witte (eds.). Fiscal Year 2021 Cybersecurity and Privacy Annual Report. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-220 (2021). DOI:10.6028/NIST.SP.800-220
- Y. Guo, R. Chandramouli, L. Wofford, R. Gregg, G. Key, A. Clark, C. Hinton, A. Prout, A. Reuther, R. Adamson, A. Warren, P. Bangalore, E. Deumens, and C. Farkas. High-Performance Computing Security: Architecture, Threat Analysis, and Security Posture. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-223 (2024). DOI:10.6028/NIST.SP.800-223
- P. O'Reilly II, K. Rigopoulos, L. Feldman, and G. Witte (eds.). Fiscal Year 2022 Cybersecurity and Privacy Annual Report. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-225 (2023). DOI:10.6028/NIST.SP.800-225
NIST Interagency or Internal Report (IR)
- K. Dempsey, V. Pillitteri, C. Baer, R. Rudman, R. Niemeyer, and S. Urban. ISCMA: An Information Security Continuous Monitoring Program Assessment. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8212 (2021). DOI:10.6028/NIST.IR.8212
- M. Scholl and T. Suloway. Introduction to Cybersecurity for Commercial Satellite Operations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8270 (2023). DOI:10.6028/NIST.IR.8270
- N. Keller, S. Quinn, K. Scarfone, M. Smith, and V. Johnson. National Online Informative References (OLIR) Program: Overview, Benefits, and Use. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8278r1 (2024). DOI:10.6028/NIST.IR.8278r1
- M. Barrett, N. Keller, S. Quinn, M. Smith, K. Scarfone, V. Johnson. National Online Informative References (OLIR) Program: Submission Guidance for OLIR Developers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8278Ar1 (2024). DOI:10.6028/NIST.IR.8278Ar1
- N. Mouha. Review of the Advanced Encryption Standard. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8319 (2021). DOI:10.6028/NIST.IR.8319
- D. Cooper. NIST Test Personal Identity Verification (PIV) Cards Version 2.(National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8347 (2021). DOI:10.6028/NIST.IR.8347
- V. Hu. Machine Learning for Access Control Policy Verification.(National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8360 (2021). DOI:10.6028/NIST.IR.8360
- M. Sönmez Turan, K. McKay, D. Chang, Ç. Çalık, L. Bassham III, J. Kang, and J. Kelsey. Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8369 (2021). DOI: 10.6028/NIST.IR.8369
- S. Lightman, T. Suloway, and J. Brule. Satellite Ground Segment: Applying the Cybersecurity Framework to Satellite Command and Control.(National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8401 (2022). DOI:10.6028/NIST.IR.8401
- V. Hu. Blockchain for Access Control Systems.(National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8403 (2022). DOI:10.6028/NIST.IR.8403
- P. Mell, D. Yaga. Understanding Stablecoin Technology and Related Security Considerations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8408 (2023). DOI:10.6028/NIST.IR.8408
- P. Mell, J. Spring, D. Dugal, S. Ananthakrishna, F. Casotto, T. Fridley, C. Ganas, A. Kundu, P. Nordwall, V. Pushpanathan, D. Sommerfeld, M. Tesauro, and C. Turner. Measuring the Common Vulnerability Scoring System Base Score Equation. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8409 (2022). DOI:10.6028/NIST.IR.8409
- G. Alagic, D. Apon, D. Cooper, Q. Dang, T. Dang, J. Kelsey, J. Lichtinger, Y.-K. Liu, C. Miller, D. Moody, R. Peralta, R. Perlner, A. Robinson, D. Smith-Tone. Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8413-upd1, Includes updates as of September 26, 2022 (2022). DOI: 10.6028/NIST.IR.8413-upd1
- D. Buller, A. Kaufer, A. Roginsky, M. Sönmez Turan. Discussion on the Full Entropy Assumption of the SP 800-90 Series. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8427 (2023). DOI:10.6028/NIST.IR.8427
- V. Hu. Overview and Considerations of Access Control Based on Attribute Encryption. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8450-upd1, Includes updates as of December 20, 2023 (2023). DOI:10.6028/NIST.IR.8450-upd1
- M. Sönmez Turan, K. McKay, D. Chang, L. Bassham III, J. Kang, N. Waller, J. Kelsey, and D. Hong. Status Report on the Final Round of the NIST Lightweight Cryptography Standardization Process. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8454 (2023). DOI:10.6028/NIST.IR.8454
- Y. Guo, J. Licata, V. Pillitteri, S. Rekhi, R. Beverly, X. Yuan, G. Key, R. Gregg, S. Bowman, C. Hinton, A. Reuther, R. Adamson, A. Warren, P. Bangalore, E. Deumens, and C. Farkas. 3rd High-Performance Computing Security Workshop: Joint NIST-NSF Workshop Report. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8476 (2023). DOI:10.6028/NIST.IR.8476
NIST Cybersecurity White Paper (CSWP)
- D. Kuhn. A Data Structure for Integrity Protection with Erasure Capability.(National Institute of Standards and Technology, Gaithersburg, MD), NIST Cybersecurity White Paper (CSWP) NIST CSWP 25 (2022). DOI: 10.6028/NIST.CSWP.25
- D. Kuhn, M. Raunak, and R. Kacker. Ordered t-way Combinations for Testing State-based Systems.(National Institute of Standards and Technology, Gaithersburg, MD), NIST Cybersecurity White Paper (CSWP) NIST CSWP 26 (2022). DOI: 10.6028/NIST.CSWP.26
- E. Takamura, J. Licata, and V. Pillitteri. Automation Support for Control Assessments: Project Update and Vision. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Cybersecurity White Paper (CSWP) NIST CSWP 30 (2023). DOI:10.6028/NIST.CSWP.30
NIST Trustworthy and Responsible AI (AI)
- A. Vassilev, A. Oprea, A. Fordyce, and H. Anderson. Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations. (National Institute of Standards and Technology, Gaithersburg, MD) NIST Trustworthy and Responsible AI (AI) NIST AI 100-2e2023 (2024). DOI:10.6028/NIST.AI.100-2e2023
Other Papers
- National Institute of Standards and Technology. Software Supply Chain Security Guidance Under Executive Order (EO) 14028 Section 4e. (2022). Available athttps://www.nist.gov/document/software-supply-chain-security-guidance-under-executive-order-eo-14028-section-4e
- National Institute of Standards and Technology. Security Measures for “EO-Critical Software” Use Under Executive Order (EO) 14028. (2021). Available athttps://www.nist.gov/document/security-measures-eo-critical-software-use-under-executive-order-eo-14028-pdf-version
- National Institute of Standards and Technology. Software Security in Supply Chains. May 5, 2022 (2022). Available athttps://www.nist.gov/document/guidance-supply-chain-security-under-eo-14028-section-4c4d.
Articles
- Y. LiuXing, Daniel, Isaac, McDaniel, Olsan, Ozbay, Akib, Abir, Sukanya, Mumtahina Islam, Rekhi, Sanjay, and Srivastava, Ankur. Security Advantages and Challenges of 3D Heterogeneous Integration. Computer, vol. 57, no. 3, pp. 107-112. (2024) DOI:10.1109/MC.2023.3340798
- M. S. Raunak, D. R. Kuhn, R. N. Kacker and J. Y. Lei. Combinatorial Testing for Building Reliable Systems.IEEE Reliability Magazine, vol. 1, no. 1, pp. 15-19 (2024), DOI: 10.1109/MRL.2024.3355874
- Kelsey, J., Lucks, S., and Müller, S. XDRBG: A Proposed Deterministic Random Bit Generator Based on Any XOF.IACR Transactions on Symmetric Cryptology, 5–34. (2024) DOI:10.46586/tosc.v2024.i1.5-34
- Guo, Yang. A review of machine learning-based zero-day attack detection: Challenges and future directions. Computer Communications. Vol. 198, pp. 175-185. (2023)https://doi.org/10.1016/j.comcom.2022.11.001
- Shook, James, Maximally Edge-Connected Realizations and Kundu’s k- factor Theorem. Journal of Graph Theory, Vol 105, Iss. 1, pp. 83-97 (2023) https://doi.org/10.1002/jgt.23017
- Dietrich, Dianne, Alexander Nelson. To Everything There Is a Session: A Time to Listen, a Time to Read Multi-session CDs Code4Lib. Issue 56 (2023)
- Dai, Yuanjun, An Wang, Yang Guo, Songqing Chen. Elastically Augmenting the Control-Path Throughput in SDN to Deal with Internet DDoS Attacks. ACM Transactions on Internet Technology. Vol. 23, Iss. 1. (2023)https://doi.org/10.1145/3559759
- Hsieh, Li-Tse, Hang Liu, Yang Guo, Robert Gazda. Deep Reinforcement Learning-based Task Assignment for Cooperative Mobile Edge Computing. IEEE Transactions on Mobile Computing. vol. 23, no. 4, pp. 3156-3171 (2023) https://doi.org/10.1109/TMC.2023.3270242
- Zou, Qingtian, Lan Zhang, Anoop Singhal, Xiaoyan Sun, Peng Liu. (2023) Analysis of Neural Network Detectors for Network Attacks. Journal of Computer Security. Pp. 1-28. (2023)https://doi.org/10.3233/JCS-230031
- Okutan, Ahmet, Peter Mell, Medhi Mirakhorli, Igor Khokhlov, Joanna Santos, Danielle Gonzalez, Steven Simmons. Empirical Validation of Automated Vulnerability Curation and Characterization. IEEE Transactions on Software Engineering. Vol. 49, Issue 5, pp 3241-3260. (2023).https://doi.org/10.1109/TSE.2023.3250479
- Wei, Zihao and Sun, Siwei and Hu, Lei and Wei, Man and Peralta, Rene. Searching the space of tower field implementations of the𝔽28 inverter - with applications to AES, Camellia and SM4. International Journal of Information and Computer Security,20:1-2 (2023), 1-26. DOI:10.1504/IJICS.2023.127999
- Zou, Qingtiana, Singhal, Anoop, and Sun, Xiaoyanc. Deep Learning for Detecting Logic-flaw-exploiting Network Attacks: AnEnd-to-end Approach. Journal of Computer Security, vol.30, no. 4, pp. 541-570, (2022) DOI:10.3233/JCS-210101
- Chen, Lily. Paving the Runway for Standardization of Post-Quantum Cryptography. ISO/IEC JTC 1/SC 27 Journal: Cryptography and Security Mechanisms. Vol. 1, issue 3, pp. 11-19. (2022).
- Juyal, A., Moody, D. & Roy, B. On ranks of quadratic twists of a Mordell curve.Ramanujan J59, 31–50 (2022). DOI:10.1007/s11139-022-00585-1
- L. Freeman, F. A. Batarseh, D. R. Kuhn, M. S. Raunak and R. N. Kacker. The Path to a Consensus on Artificial Intelligence Assurance. Computer. vol. 55, no. 3, pp. 82-86. (2022) DOI: 10.1109/MC.2021.3129027
- Kampel, L., Simos, D. E., Kuhn, D. R., & Kacker, R. N. An exploration of combinatorial testing-based approaches to fault localization for explainable AI. Annals of Mathematics and Artificial Intelligence, 1-14. (2022).
- Wang, Zheng, Yang Guo, Douglas Montgomery. Machine Learning-Based Algorithmically Generated Domain Detection. Computers & Electrical Engineering.Vol 100. (2022).https://doi.org/10.1016/j.compeleceng.2022.107841
- Zha, Zili, An Wang, Yang Guo, Songqing Chen. Towards Software Defined Measurement with Open vSwitches: Designs, Implementation, and Evaluation. IEEE Transactions on Cloud Computing. Vol. 11, No. 2, pp. 2057-2070. (2022)https://doi.org/10.1109/TCC.2022.3181890
- Moody, Dustin, Angela Robinson Cryptographic Standards in a Post- Quantum Era. IEEE Security & Privacy, Vol. 20, Iss. 6, pp. 66-72 (2022) https://doi.org/10.1109/MSEC.2022.3202589
- Oprea, Alina, Anoop Singhal, Apostol Vassilev. Poisoning Attacks against Machine Learning: Can Machine Learning be Trustworthy? IEEE Computer. Vol. 55, Iss. 11, pp. 94-99 (2022)https://doi.org/10.1109/MC.2022.3190787
- Brandao, Luis, Carlos Eduardo Cardoso Galhardo, Rene Peralta. ZKASP: ZKP-based Attestation of Software Possession for Measuring Instruments. Measurement Science and Technology. Vol. 33, Issue 6 (2022) https://doi.org/10.1088/1361-6501/ac5438
- Juyal, Abhishek, Dustin Moody. Pairs of Heron and right triangles with a common area and a common perimeter. Publicationes Mathematicae Debrecen,Article 12, Vol. 100, pp. 449-460 (2022)
- Miller, Carl A., (2022), The Mathematics of Quantum Coin-Flipping. Notices of the American Mathematical Society.Vol. 69, Iss. 11, pp. 1908-1917 (2022).https://doi.org/10.1090/noti2575
- Moody, Dustin, Abhishek Juyal. ON THE FAMILY OF ELLIPTIC CURVES X + 1/X + Y + 1/Y + t = 0. INTEGERS, The electronic journal of combinatorial number theory. Article 18, Vol. 21. (2021) https://doi.org/10.5281/zenodo.10807511
- Gueye, Assane, Carlos Galhardo, Irena Bojanova, Peter Mell. A Decade of Reoccurring Software Weaknesses. IEEE Security & Privacy. Vol. 19, Iss. 6, pp. 74-82 (2021) https://doi.org/10.1109/MSEC.2021.3082757
- DeFranco, Joanna, David Ferraiolo, D. Richard Kuhn, Joshua Roberts. A Trusted Federated System to Share Granular Data Among Disparate Database Resources. IEEE Computer. Vol. 54, Issue 3, pp 55-62. (2021)https://doi.org/10.1109/MC.2021.3049888
- Toohey, Jack, M S Raunak, Dave Binkley. From Neuron Coverage to Steering Angle: Testing Autonomous Vehicles Effectively. Special Issue on Safety, Security, and Reliability of Autonomous Vehicle Software. Vol. 54, Issue 8, pp 77-85. (2021)https://doi.org/10.1109/MC.2021.3079921
- Rao, Chang, Nan Li, Yu Lei, Jin Guo, YaDong Zhang, Raghu N. Kacker, D. Richard Kuhn. Combinatorial Test Generation for Multiple Input Models with Shared Parameters. IEEE Transactions on Software Engineering. Vol. 48, Issue 7, pp 2606-2628. (2021). https://doi.org/10.1109/TSE.2021.3065950
- Brandao, Luis, Rene Peralta.Privacy-enhancing cryptography to complement differential privacy. NIST Differential Privacy Blog Series (2021) (2021)https://www.nist.gov/blogs/cybersecurity-insights/privacy-enhancing-cryptography-complement-differential-privacy
- Moody, Dustin, Thinh Dang, Fouazou Lontouo Perez, Emmanuel Fouotsa. Isogenies on twisted Hessian curves. Journal of Mathematical Cryptography. Vol 15, Iss. 1, pp 345-358. (2021)https://doi.org/10.1515/jmc-2020-0037
- Wang, Zheng, Yang Guo. Neural Networks Based Domain Name Generation. Journal of Information Security and Applications. Vol 61. (2021).https://doi.org/10.1016/j.jisa.2021.102948
- Peralta, Rene, Angela Robinson. Encounter Metrics and Exposure Notification. NISTJRES, Article 126003, Vol. 126. (2021) https://doi.org/10.6028/jres.126.003
- Smid, Miles E. Development of the Advanced Encryption Standard. NISTJRES. Article 126024, Vol. 126. (2021).https://doi.org/10.6028/jres.126.024
Books
- C. Kaufman, R. Perlman, M. Speciner, and R. Perlner. Network Security: Private Communication in a Public World (Addison-Wesley Professional; Boston, MA), 3rd Ed. (2022). Available athttps://www.informit.com/store/network-security-private-communication-in-a-public-9780136643609
Book Sections
- Sonmez Turan, Meltem. Design Trends in Lightweight Ciphers. Symmetric Cryptography (2024) (ISTE Science Publishing Ltd,, Tuition House, 27-37 St George’s Road, London, SW19 4EU, GB) (2024)
Conference Papers
- Akbar, Ashrafi, Fariha Rahman, Anoop Singhal, Latifur Khan, Bhavani Thuriasingham. The Design and Application of a Unified Ontology for Cyber Security. ICISS 2023: Information Systems Security.Vol 14424, pp. 23-41. (2023).(Raipur, IN, 16-DEC-23 to 20-DEC-23),https://doi.org/10.1007/978-3-031-49099-6_2
- Shashwat, Kumar, Francis Hahn, Xinming Ou, Anoop Singhal.Security Analysis of Trust on the Controller in the Matter Protocol. 2023 IEEE Conference on Communications and Network Security (CNS). Pp. 1-6. (2023) (Orlando, FL, US, 05-OCT-23 to 05-OCT-23),https://doi.org/10.1109/CNS59707.2023.10288747
- Wang, Yigong, Ayoade, Gbadebo Ayoade, Gao, Yang, and Singhal, Anoop , Khan, Latifur, Thuraisingham, Bhavani, Jee, Kangkook. Advanced Persistent Threat Detection Using Data Provenance and Metric Learning, inIEEE Transactions on Dependable and Secure Computing, vol. 20, no. 5, pp. 3957-3969, 1 Sept.-Oct. 2023, DOI:10.1109/TDSC.2022.3221789
- Sonmez Turan, Meltem. Optimizing Implementations of Boolean Functions. The 8th International Workshop on Boolean Functions and their Applications (BFA). Pp. 45-51 (2023) (Voss, Norway 3-SEP-23 to 8-SEP-23).
- Basel, Abdeen, Ehab Al-Sheer, Anoop Singhal, Latifur Khan, Kevin Hamlen. SMET: Semantic Mapping of CVE to ATT&CK and its Application to Cyber Security. DBSec 2023: Data and Applications Security and Privacy XXXVII. Vol 13942, pp. 243-260. (2023). (Sophia Antopolis, FR, 19-JUL-23 to 21-JUL-23),https://doi.org/10.1007/978-3-031-37586-6_15
- Piez, Wendell. A Generic STS Viewer on the Web. Journal Article Tag Suite Conference (JATS-Con) Proceedings (JATS-Con, Bethesda, MD, US, 13- JUN-23 to 14-JUN-23) (2023) https://www.ncbi.nlm.nih.gov/books/NBK592511/
- Olsen, M., Raunak, M.S., Kuhn, D.R. Predicting ABM Results with Covering Arrays and Random Forests. Computational Science – ICCS 2023. ICCS 2023. Lecture Notes in Computer Science, vol 14073 237-252 (2023) Jul 3-5, 2023. DOI:10.1007/978-3-031-35995-8_17
- Mouha, Nicky, Christopher Celi. A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms. CT-RSA 2023: Cryptographers' Track at the RSA Conference. Vol 13871, pp. 3-28 (2023) (San Francisco, CA, US, 24-APR-23 to 27-APR-23),https://doi.org/10.1007/978-3-031-30872-7_1
- Zou, Qingtian, Lan Zhang, Anoop Singhal, Xiaoyan Sun, Peng Liu.Attacks on ML Systems: From Security Risk Analysis to Attack Mitigation. Proceedings of 18th International Conference on Information and Systems Security (Tirupati, IN, 16-DEC-22 to 20-DEC-22), Vol. 13674, pp. 119-138. (2022) https://doi.org/10.1007/978-3-031-23690-7_7
- Fahr Jr., Michael, Hunter Kippen, Andrew Kwong, Thinh Dang, Jacob Lichtinger, Dana Dachman-Soled, Daniel Genkin, Alexander Nelson, Ray Perlner, Arkady Yerukhimovich, Daniel Apon. When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer. CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Pp. 979-993. (2022) (Los Angeles, CA, US, 07-NOV-22 to 11-NOV-22),https://doi.org/10.1145/3548606.3560673
- Laplante, Phillip, D. Richard Kuhn. AI Assurance for the Public -- Trust but Verify, Continuously. 2022 IEEE 29th Annual Software Technology Conference (STC). Pp. 174-180. (2022) (Gaithersburg, MD, US, 03-OCT-22 to 06-OCT-22),https://doi.org/10.1109/STC55697.2022.00032
- Mell, Peter. The Generation of Software Security Scoring Systems Leveraging Human Expert Opinion. 2022 IEEE 29th Annual Software Technology Conference (STC) (Virtual, MD, US, 03-OCT-22 to 06-OCT-22). Pp 116-124. (2022). https://doi.org/10.1109/STC55697.2022.00023
- Olsen, Megan, M S Raunak. Efficient Parameter Exploration of Simulation Studies. The proceedings of the IEEE Computer Technology Conference (STC) 2022. Pp. 190-191. (2022).(Gaithersburg, MD. US, 03-OCT-22 to 06-OCT-22.)https://doi.org/10.1109/STC55697.2022.00034
- Cartor, Ryann, Max Cartor, Mark Lewis, Daniel Smith-Tone. "IPRainbow. Proceedings of PQCrypto 2022: The Thirteenth International Conference on Post-Quantum Cryptography.Vol 13512, pp. 170-184. (2022). (Virtual, DC, US, 28-SEP-22 to 30- SEP-22).https://doi.org/10.1007/978-3-031-17234-2_9
- Smith-Tone, Daniel.2F - A New Method for Constructing Efficient Multivariate Encryption Schemes. Proceedings of PQCrypto 2022: The Thirteenth International Conference on Post-Quantum Cryptography. Vol 13512, pp. 185-201. (2022) (PQCrypto 2022, virtual, DC, US, 28-SEP-22 to 30-SEP-22),https://doi.org/10.1007/978-3-031-17234-2_10
- Perlner, Ray, David Cooper, John M. Kelsey. Breaking Category Five SPHINCS+ with SHA-256. Proceedings of PQCrypto 2022: The Thirteenth International Conference on Post-Quantum Cryptography. Vol 13512, pp. 501-522. (2022) (CA, US, 28-SEP-22 to 30-SEP-22),https://doi.org/10.1007/978-3-031-17234-2_23
- Sonmez Turan, Meltem. New Bounds on the Multiplicative Complexity of Boolean Functions. Special issue on Boolean Functions and their Applications in the Journal Cryptography and Communications. Pp. 1-6. (2022) (The 7th International Workshop on Boolean Functions and their Applications (BFA), Balestrand, NO, 11-SEP-22 to 16- SEP-22)
- Baena, J., Briaud, P., Cabarcas, D., Perlner, R., Smith-Tone, D., and Verbel, J. (2022). Improving Support-Minors Rank Attacks: Applications toGeMSS andRainbow. Advances in Cryptology – CRYPTO 2022. CRYPTO 2022. Lecture Notes in Computer Science, vol 13509. Springer, Cham. (2022). Aug. 13-18, 2022. DOI:https://doi.org/10.1007/978-3-031-15982-4_13
- Akbar, Khandakar Ashrafi, Sadaf MD Halim, Yibo Hu, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham. Knowledge Mining in Cybersecurity: From Attack to Defense. Data and Applications Security and Privacy XXXVI (International Conference on Data and Application Security and Privacy 2022 (DBSec 2022) Vol 13383, pp. 110-122. (2022). (Newark, NJ, US, 18-JUL-22 to 20-JUL-22).https://doi.org/10.1007/978-3-031-10684-2_7
- Zha, Zili, An Wang, Yang Guo, Songqing Chen. EZPath: Expediting Container Network Traffic via Programmable Switches in Data Centers. IFIP Networking Conference 2022 (2022) (Catania, IT, 13-JUN-22 to 16- JUN-22)
- Chang, Donghoon, Jinkeon Kang, Meltem Sonmez Turan. A New Conditional Cube Attack on Reduced-Round Ascon-128a in a Nonce-misuse Setting. NIST Lightweight Cryptography Workshop (virtual). May 9-11, 2022 (Gaithersburg, MD, US) (2022).https://csrc.nist.gov/Events/2022/lightweight-cryptography-workshop-2022
- Jablonwski, Matthew, Duminda Wijesekera, Anoop Singhal. Generating Cyber-Physical System Risk Overlays for Attack and Fault Trees using Systems Theory. Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems.Pp. 13-20. (2022) (Baltimore, MD, US, 26-APR-22 to 26-APR-22),https://doi.org/10.1145/3510547.3517922
- Prado, Charles, Vinay Patil, Raghu N. Kacker, D. Richard Kuhn, M S Raunak. Combination Frequency Differencing for Identifying Design Weaknesses in Physical Unclonable Functions. IEEE International Workshop on Combinatorial TestingPp. 110-117. (2022). (Valencia, ES, 04- APR-22 to 13-APR-22).https://doi.org/10.1109/ICSTW55395.2022.00032
- Akbar, Khandakar Ashrafi, Yigong Wang, Md Islam, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham. Identifying Tactics of Advanced Persistent Threats with Limited Attack Traces. International Conference on Information System Security ICISS 2021. Vol. 13146, pp. 3-25. (2021). (Patna, MD, US, 16-DEC-21 to 20-DEC-21).https://doi.org/10.1007/978-3-030-92571-0_1
- Piez, Wendell. Client-side XSLT, Validation and Data Security." Balisage Series on Markup Technologies (Balisage: The Markup Conference 2021, Washington, DC, US, 02-AUG-21 to 06-AUG-21). (2021)https://doi.org/10.4242/BalisageVol26.Piez01
- Zou, Qingtian, Anoop Singhal, Xiaoyan Sun, Peng Liu. Deep Learning for Detecting Network Attacks: An End to End approach. DBSec 2021: Data and Applications Security and Privacy XXXV. Vol 12840, pp. 221-234. (2021) (Virtual, US, 19-JUL-21 to 20-JUL-21), https://doi.org/10.1007/978-3-030-81242-3_13
- Farhan, Mohammed, Caroline Krejci, Megan Olsen, M S Raunak. Metamorphic Testing for Hybrid Simulation Validation. Proceedings of the 2021 Annual Modeling and Simulation Conference (ANNSIM '21). Pp. 1-13 (2021) (Fairfax, VA, US, 19-JUL-21 to 22-JUL-21), https://doi.org/10.23919/ANNSIM52504.2021.9552058
- Jayakumar, Athira, D. Richard Kuhn, Brandon Simons, Aidan Collins, Smitha Gautham, Richard Hite, Raghu N. Kacker, Abhi Rajagopala, Carl Elks. A Pseudo Exhaustive Software Testing Framework for Embedded Digital Devices in Nuclear Power. 2021 American Nuclear Society Virtual Annual Meeting. (Virtual, TN, US, 14-JUN-21 to 17- JUN-21) (2021) https://www.ans.org/meetings/am2021/search/?q=kuhn
- Raunak, M S, Megan Olsen. Metamorphic Testing on the Continuum of Verification and Validation of Simulation Models. IEEE/ACM 6th International Workshop on Metamorphic Testing (MET)pp 47-52. (2021) (Madrid, ES, 01-JUN-21 to 02-JUN-21).https://doi.org/10.1109/MET52542.2021.00015
- Howe, James, Thomas Prest, Daniel Apon. SoK: How (not) to Design and Implement Post-Quantum Cryptography. The Cryptographer's Track at the RSA Conference.Article 19, Vol. 12704, pp. 444-477. (2021). (San Francisco, CA, US, 17-MAY-21 to 21-MAY-21). https://doi.org/10.1007/978-3-030-75539-3_19
- Gueye, Assane, Peter Mell. A Historical and Statistical Study of the Software Vulnerability Landscape. The Seventh International Conference on Advances and Trends in Software Engineering (SOFTENG 2021) Pp 1-7. (2021). (Porto, PT, 18-APR-21 to 22-APR-21).
- Lanus, Erin, Laura Freeman, D. Richard Kuhn, Raghu N. Kacker. Combinatorial Testing Metrics for Machine Learning. IEEE International Conference on Software Testing, Verification and Validation Workshop (ICSTW). Pp 81-84. (2021) (Porto, PT, 12-APR-21 to 16-APR-21.)https://doi.org/10.1109/ICSTW52544.2021.00025
- Garn, Bernhard, Daniel Lang, Manuel Leithner, D. Richard Kuhn, Raghu N. Kacker, Dimitris Simos. Combinatorially XSSing Web Application Firewalls. 2021 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW). Pp. 85-94 (2021) (Porto de Galinhas, BR, 12-APR-21 to 16- APR-21). https://doi.org/10.1109/ICSTW52544.2021.00026
- Mazumdar, Suryadipta, Daniel Bostos, Anoop Singhal. Security Auditing of Internet of Things Devices in a Smart Home. Advances in Digital Forensics XVII. Chapter 14, Vol. 612, pp. 213-234. (2021) (Arlington, VA, US, 01-FEB-21 to 02-FEB-21),https://doi.org/10.1007/978-3-030-88381-2_11
Eprint Articles
- Smith-Tone, Daniel. A Total Break of the 3WISE Digital Signature Scheme. Cryptology Eprint Archive. Article 1535, Vol. 2023. (2023)https://ia.cr/2023/1535
- Smith-Tone, Daniel. A Total Break of the Scrap Digital Signature Scheme. Cryptology Eprint Archive. Article 1481, Vol. 2023. (2023)https://ia.cr/2023/1481
- Smith-Tone, Daniel. The Generating Series of Support Minors MinRank Ideals. Cryptology Eprint Archive. Article 1456, Vol. 2023. (2023)https://ia.cr/2023/1456
- Vassilev, Apostol, Honglan Jin, Munawar Hasan, (2023), "Meta Learning with Language Models: Challenges and Opportunities in the Classification of Imbalanced Text. arXiv.org. Vol 2310, Issue 15019. (2023) https://doi.org/10.48550/arXiv.2310.15019
- Jackson, Kelsey A., Miller, Carl A., and Wang, Daochen. Evaluating the security of CRYSTALS-Dilithium in the quantum random oracle model. (2023) arXiv.org. https://arxiv.org/abs/2312.16619
- Alnawakhtha, Yusuf, Atul Mantri, Carl A. Miller, Daochen Wang. Lattice- Based Quantum Advantage from Rotated Measurements. arXiv.org. Article 10143, Vol. 2210, pp. 1-39. (2022) https://doi.org/10.48550/arXiv.2210.10143
- Shook, James, Bing Wei. A characterization of the Centers of Chordal Graphs. arXiv.org.Article 00039, Vol. 2210 (2022).https://doi.org/10.48550/arXiv.2210.00039
- Chang, Donghoon, Deukjo Hong, Jinkeon Kang, Meltem Sonmez Turan. Resistance of Ascon Family against Conditional Cube Attacks in Nonce-Misuse Setting. Cryptology ePrint Archive. Article 1456, Vo. 2022. (2022) https://ia.cr/2022/1456
- Kelsey, John M., Stefan Lucks. Coalition and Threshold Hash-Based Signatures. Cryptology ePrint Archive. Article 241, Vol. 2022. (2022)https://eprint.iacr.org/2022/241
- Arpin, Sarah, Tyler Billingsley, Daniel Hast, Jun Bo Lao, Ray Perlner, Angela Robinson. A Study of Error Floor Behavior in QC-MDPC Codes. Cryptology ePprint Archive. Article 1043, Vol. 2022. (2022).https://eprint.iacr.org/2022/1043
- Smith-Tone, Daniel. New Practical Multivariate Signatures from a Nonlinear Modifier. Cryptology ePrint Archive. Article 429, Vol. 2021 (2021) https://eprint.iacr.org/2021/429
- Oygarden, Morten, Daniel Smith-Tone, Javier Verbel. On the Effect of Projection on Rank Attacks in Multivariate Cryptography. Cryptology ePrint Archive. Article 655, Vol. 2021, pp. 1-16. (2021).https://eprint.iacr.org/2021/655
- Chang, Donghoon, Meltem Sonmez Turan. "Recovering the Key from the Internal State of Grain-128AEAD. Cryptology ePrint Archive. Article 439, Vol. 2021. (2021) https://eprint.iacr.org/2021/439
- Vassilev, Apostol, Munawar Hasan, Honglan Jin. Can you tell? SSNet - a Biologically-inspired Neural Network Framework for Sentiment Classifiers. arXiv.org Article 12958v3, Vol 2006. (2021)https://arxiv.org/abs/2006.12958v3
- Sonmez Turan, Meltem, Rene Peralta. On the Multiplicative Complexity of Cubic Boolean Functions. Cryptology ePrint Archive. Article 1041, Vol 2021. (2021)https://eprint.iacr.org/2021/1041
Recognition
Internal
Name | Award Name | Year | Citation |
Sanjay Rekhi | George A. Uriano Award | 2023 | For its leadership and engagement of stakeholders to identify measurement grand challenges facing the U.S. semiconductor industry. The team's two Semiconductor Metrology Workshops and its publication of Strategic Opportunities for U.S. Semiconductor Manufacturing defined the required advances in measurements and standards needed for NIST and DOC to successfully implement core programs in the CHIPS for America Act. The programs authorized by the CHIPS Act will expand U.S. manufacturing capacity, grow the research and innovation ecosystem for microelectronics and semiconductors in the U.S., and restore U.S. leadership in semiconductor manufacturing. |
Dylan Yaga | Gold Medal Award | 2023 | For improving Law Enforcement, DHS, and Border Patrol’s operations by identifying over 1000 errors in biometric data exchange standards. |
Suzanne Lightman | Silver Medal Award | 2022 | For strengthening the resilience of position, navigation, and timing infrastructure and services on which global commerce and national security rely. |
Michael Bartock | |||
Nikita Wootten | Gold Medal Award | 2022 | For enabling faster, more accurate, and lower cost system implementations through automated assessment of security control effectiveness. |
Stephen Banghart | Gold Medal Award | 2022 | The group is recognized for enabling faster, more accurate, and more secure system deployments and updates with reduced operational costs through the automated assessment of security control implementation and effectiveness. The group developed and increased adoption of the Open Security Controls Assessment Language to facilitate a transition from manual to machine-driven, automated security assessments. The rapid international adoption demonstrates OSCAL’s groundbreaking transformation of systems security-assessment processes. |
Alexander Stein | Gold Medal Award | 2022 | For enabling faster, more accurate, and lower cost system implementations through automated assessment of security control effectiveness. |
Dmitry Cousin | |||
Wendell Piez | |||
David Waltermire | |||
Michaela Iorga | |||
Victoria Pillitteri | Gold Medal Award | 2021 | For exceptional leadership and outstanding technical capability in developing the world’s first framework for managing privacy risk. The group achieved consensus on a flexible and voluntary framework that enables organizations to protect individuals’ privacy while embracing the beneficial uses of data and encouraging technical innovation |
Murugiah Souppaya | Silver Medal Award | 2021 | For developing the first SCAP 1.3 technical content for multiple macOS operating systems |
Dylan Yaga | |||
Eric Trapnell | |||
Mark Trapnell |
External
Name | Award Name | Year | Citation |
Angela Robinson | Women in Technology Rising Star Award | 2023 | This category honors a woman in the beginning stages of her career who has demonstrated exemplary leadership traits and mentorship |
Jeff Voas | Washington Academy of Sciences Distinguished Career Award in Computer Science | 2023 | For foundational contributions in software fault injection, testability, cloud computing, vetting mobile apps, internet of things, digital twins, and carbon-aware cybersecurity. |
D. Richard Kuhn | ICST Most Influential Paper Award (MIP) | 2023 | For a paper they presented 10 years ago at the 2013 IEEE International Conference on Software Testing, Verification and Validation (ICST). The award has been selected to receive the conference’s 2023 Most Influential Paper (MIP) Award in the category of MIP Practical. |
Ron Ross | Retired General Michael V. Hayden Lifetime Leadership Award | 2021 | For distinguished contributions to the advancement and strength of the US federal cybersecurity community. |
Ron Ross | Special Recognition Award from The American Bar Association’s Section on Science & Technology Law | 2021 | For the enormous contribution made in the field of cybersecurity, particularly in the area of best practices and standards for cybersecurity and cyber risk management that are so critical to securing the Internet and protecting national and economic security. |
David Waltermire | InnovateIT Award | 2021 | For the enormous contribution made in the field of cybersecurity, particularly in the area of best practices and standards for cybersecurity and cyber risk management that are so critical to securing the Internet and protecting national and economic security. |
Christopher Turner | |||
Robert Byers | |||
Annie Sokol | INCITS Merit | 2021 | For her tenacious participation and significant exemplary leadership in the development of international standards for smart cards, cloud computing, and cybersecurity |
Victoria Pillitteri | Federal 100 Award | 2021 | For exceptional leadership and outstanding technical capability in developing the world’s first framework for managing privacy risk. The group achieved consensus on a flexible and voluntary framework that enables organizations to protect individuals’ privacy while embracing the beneficial uses of data and encouraging technical innovation |
Patents
Name | Patent Number | Date of Patent | Hyperlink |
Access Control System and Process for Managing and Enforcing an Attribute Based Access Control Policy | 11,062,044 | 2023-07-13 | US00000011062044B220210713 (nist.gov) |
Created April 16, 2024, Updated April 24, 2024