ITL

Results: 829



#Item
731Data security / Technology / Security / Supply chain management / Supply chain / Security risk / Security controls / Information security / Risk management framework / Business / Computer security / Management

ITL BULLETIN FOR NOVEMBER 2012 PRACTICES FOR MANAGING SUPPLY CHAIN RISKS TO PROTECT FEDERAL INFORMATION SYSTEMS Shirley Radack, Editor Computer Security Division Information Technology Laboratory

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-16 14:02:36
732Engineering statistics / Systems engineering / Process capability / Control chart / Sample size determination / Data analysis / Analysis of variance / Reliability engineering / Sampling / Statistics / Quality / Design of experiments

3. Production Process Characterization

Add to Reading List

Source URL: www.itl.nist.gov

Language: English - Date: 2013-10-30 11:44:53
733Box–Behnken design / Fractional factorial design / Response surface methodology / Restricted randomization / Factorial experiment / Completely randomized design / Randomized block design / Optimal design / Main effect / Statistics / Design of experiments / Science

5. Process Improvement 5. Process Improvement 1. Introduction 1. Definition of experimental design

Add to Reading List

Source URL: www.itl.nist.gov

Language: English - Date: 2013-10-30 11:44:53
734Role-based access control / Mandatory access control / Discretionary access control / Authentication / XACML / Security / Computer security / Access control

ITL Security Bulletin, Attribute Based Access Conctrol (ABAC) Definition and Considerations, (March 2014)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-03-07 11:05:57
735Security / Cyberwarfare / Validation / Federal Information Security Management Act / Federal Desktop Core Configuration / National Institute of Standards and Technology / Computer security / Security Content Automation Protocol / Computing

Security Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements, April 2013 ITL Security Bulletin

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-16 12:34:21
736Security Content Automation Protocol / Extensible Configuration Checklist Description Format / Federal Information Security Management Act / National Vulnerability Database / Security controls / National Institute of Standards and Technology / Information security / Open Vulnerability and Assessment Language / Information Security Automation Program / Computer security / Security / Computing

ITL Bulletin January 2012, Advancing Security Automation and Standardization: Revised Technical Specifications Issued for the Security Content Automation Protocol (SCAP)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-16 14:29:27
737Identity / Federated identity / Access control / Electronic authentication / Single sign-on / Authentication / Digital credential / Identity provider / Identity assurance / Identity management / Security / Computer security

ITL Bulletin: Managing Identity Requirements for Remote Users of Information Systems to Protect System Security and Information Privacy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-16 13:47:41
738Knowledge / Metrology / Statistical theory / Scientific method / Quality / Calibration / Uncertainty / Accuracy and precision / Control chart / Statistics / Science / Measurement

2. Measurement Process Characterization

Add to Reading List

Source URL: www.itl.nist.gov

Language: English - Date: 2013-10-30 11:44:50
739Regression model validation / Linear regression / Design of experiments / Least squares / Statistical model / Data analysis / Process modeling / Polynomial and rational function modeling / Response surface methodology / Statistics / Regression analysis / Local regression

4. Process Modeling 4. Process Modeling The goal for this chapter is to present the background and specific analysis techniques needed to construct a statistical model that describes a particular scientific or engineeri

Add to Reading List

Source URL: www.itl.nist.gov

Language: English - Date: 2013-10-30 11:44:50
740Federal Information Processing Standard / Computer security / Evaluation / Reference / NIST Special Publication 800-53 / National Institute of Standards and Technology / Gaithersburg /  Maryland / Statistics

ITL Bulletin - ITL Updates Glossary of Key Information Security Terms, June 2013

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-12 09:20:47
UPDATE