Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kevin M. Stine is active.

Publication


Featured researches published by Kevin M. Stine.


Special Publication (NIST SP) - 800-66 Rev 1 | 2005

An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule

Matthew A. Scholl; Kevin M. Stine; Joan Hash; Pauline Bowen; L A. Johnson; Carla Dancy Smith; Daniel Steinberg

The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nations measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology. ITLs responsibilities include the development of management, administrative, technical, and physical standards and guidelines for the cost-effective security and privacy of other than national security-related information in federal information systems. The Special Publication 800-series reports on ITLs research, guidelines, and outreach efforts in information system security, and its collaborative activities with industry, government, and academic organizations. Authority This document has been developed by the National Institute of Standards and Technology (NIST) to further its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, P.L. 107-347. NIST is responsible for developing standards and guidelines, including minimum requirements, for providing adequate information security for all agency operations and assets, but such standards and guidelines shall not apply to national security systems. This guideline is consistent with the requirements of the Office of Management and This guideline has been prepared for use by federal agencies. It may also be used by nongovernmental organizations on a voluntary basis and is not subject to copyright. (Attribution would be appreciated by NIST.) Nothing in this document should be taken to contradict standards and guidelines made mandatory and binding on federal agencies by the Secretary of Commerce under statutory authority. Nor should these guidelines be interpreted as altering or superseding the existing authorities of the Secretary of Commerce, Director of the OMB, or any other federal official. There are references in this publication to documents currently under development by NIST in accordance with responsibilities assigned to NIST under the Federal Information Security Management Act of 2002. The methodologies in this document may be used even before the completion of such companion documents. Thus, until such time as each document is completed, current requirements, guidelines, and procedures (where they exist) remain operative. For planning and transition purposes, agencies may wish to closely follow the development of these new documents by NIST. Individuals are also encouraged to review the public draft documents and offer their comments to NIST. All NIST documents mentioned in this publication, other than the ones noted above, are available at Certain commercial entities, equipment, or materials …


Special Publication (NIST SP) - 800-55 Rev 1 | 2008

Performance Measurement Guide for Information Security

Elizabeth Chew; Marianne Swanson; Kevin M. Stine; Nadya Bartol; Anthony Brown; Will Robinson


National Institute of Standards and Technology (U.S.) | 2006

Guidelines for Media Sanitization

Richard Kissel; Andrew Regenscheid; Matthew A. Scholl; Kevin M. Stine


Special Publication (NIST SP) - 800-64 Rev 2 | 2008

Security Considerations in the System Development Life Cycle

Richard Kissel; Kevin M. Stine; Matthew A. Scholl; Hart Rossman; James Fahlsing; Jessica Gulick


Archive | 2011

Information Security Continuous Monitoring (Iscm) for Federal Information Systems and Organizations

Kelley L. Dempsey; Nirali Shah Chawla; L A. Johnson; Ronald Johnston; Alicia Clay Jones; Angela Orebaugh; Matthew A. Scholl; Kevin M. Stine


Security Architecture Design Process for Health Information Exchanges (HIEs) [DRAFT] / AHIMA, American Health Information Management Association | 2010

Security Architecture Design Process for Health Information Exchanges (HIEs) [DRAFT]

Matthew A. Scholl; Kevin M. Stine; Kenneth Lin; Daniel Steinberg


Archive | 2008

SP 800-66 Rev. 1. An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule

Matthew A. Scholl; Kevin M. Stine; Joan Hash; Pauline Bowen; L. Arnold Johnson; Carla Dancy Smith; Daniel Steinberg


National Institute of Standards and Technology (U.S.) | 2009

Information Security Training Requirements: A Role- and performance-Based Model (Draft)

Mark Wilson; Kevin M. Stine; Pauline Bowen


Archive | 2008

SP 800-64 Rev. 2. Security Considerations in the System Development Life Cycle

Richard Kissel; Kevin M. Stine; Matthew A. Scholl; Hart Rossman; James Fahlsing; Jessica Gulick


National Institute of Standards and Technology (U.S.) | 2008

Volume II :: appendices to guide for mapping types of information and information systems to security categories

Kevin M. Stine; Rich Kissel; William C. Barker; Annabelle Lee; Jim Fahlsing

Collaboration


Dive into the Kevin M. Stine's collaboration.

Top Co-Authors

Avatar

Matthew A. Scholl

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Richard Kissel

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Elizabeth Chew

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Kelley L. Dempsey

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Marianne Swanson

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Pauline Bowen

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

James Fahlsing

Science Applications International Corporation

View shared research outputs
Top Co-Authors

Avatar

Jessica Gulick

Science Applications International Corporation

View shared research outputs
Researchain Logo
Decentralizing Knowledge