Robert B. Bohn
National Institute of Standards and Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Robert B. Bohn.
Journal of Research of the National Institute of Standards and Technology | 2000
James S. Sims; William L. George; Steven G. Satterfield; Howard Hung; John G. Hagedorn; Peter M. Ketcham; Terence J. Griffin; Stanley A. Hagstrom; Julien C. Franiatte; Garnett W. Bryant; W. Jaskólski; Nicos Martys; C. E. Bouldin; Vernon Simmons; Oliver P. Nicolas; James A. Warren; Barbara A. Am Ende; John Koontz; B. James Filla; Vital G. Pourprix; Stefanie R. Copley; Robert B. Bohn; Adele P. Peskin; Yolanda M. Parker; Judith Ellen Devaney
The rate of scientific discovery can be accelerated through computation and visualization. This acceleration results from the synergy of expertise, computing tools, and hardware for enabling high-performance computation, information science, and visualization that is provided by a team of computation and visualization scientists collaborating in a peer-to-peer effort with the research scientists. In the context of this discussion, high performance refers to capabilities beyond the current state of the art in desktop computing. To be effective in this arena, a team comprising a critical mass of talent, parallel computing techniques, visualization algorithms, advanced visualization hardware, and a recurring investment is required to stay beyond the desktop capabilities. This article describes, through examples, how the Scientific Applications and Visualization Group (SAVG) at NIST has utilized high performance parallel computing and visualization to accelerate condensate modeling, (2) fluid flow in porous materials and in other complex geometries, (3) flows in suspensions, (4) x-ray absorption, (5) dielectric breakdown modeling, and (6) dendritic growth in alloys.
ISPE CE | 2013
Eric D. Simmon; Robert B. Bohn
Cloud computing is the next step in the continued evolution of information systems. Cloud computing allows consumers to choose what service they want, how the services will be delivered, and provides usage based. The resource pooling and rapid provisioning of cloud services allow providers to more efficiently supply these resources. This results in the consumers’ needs being better met while at the same time using fewer resources (both physical assets and energy). To achieve these goals a better understanding of the implications of cloud computing along with interoperability, portability, and security standards is needed. The National Institute of Standards and Technology (NIST) has been tasked to help drive adoption of cloud computing by federal agencies through the identification and resolution of high-priority interoperability, portability and security issues.
2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W) | 2017
Cihan Tunc; Salim Hariri; Mheni Merzouki; Charif Mahmoudi; Frederic J. de Vaulx; Jaafar Chbili; Robert B. Bohn; Abdella Battou
Cloud services have gained tremendous attentionas a utility paradigm and have been deployed extensively across awide range of fields. However, Cloud security is not catching upto the fast adoption of its services and remains one of the biggestchallenges for Cloud Service Providers (CSPs) and Cloud ServiceConsumers (CSCs) from the industry, government, andacademia. These institutions are increasingly faced with threatssuch as DoS/DDoS attacks, ransomware attacks, and databreaches that are affecting the confidentiality, integrity, andavailability of the cloud system resources. In the current cloudsystems, security requires manual translation of securityrequirements into controls. Such an approach can be for themost part labor intensive, tedious, and error-prone leading toinevitable misconfigurations rendering the system-at-handvulnerable to misuse, either malicious or unintentional.Therefore, it is of utmost importance to automate theconfiguration of the cloud systems per the client’s securityrequirements steering clear from the caveats of the manualapproach. Furthermore, cloud systems need to be continuouslymonitored for any misconfigurations. This paper presents amethodology allowing for cloud security automation anddemonstrates how a cloud environment can be automaticallyconfigured to implement a set of NIST SP 800-53 securitycontrols. In addition, this paper shows how the implementationof these controls in the cloud systems can be continuouslymonitored and validated.
Physical Review Letters | 1998
Lorin X. Benedict; Eric L. Shirley; Robert B. Bohn
Special Publication (NIST SP) - 500-292 | 2011
Fang Liu; Jin Tong; Jian Mao; Robert B. Bohn; John V. Messina; Mark L. Badger; Dawn M. Leaf
Physical Review B | 1998
Lorin X. Benedict; Eric L. Shirley; Robert B. Bohn
Archive | 2012
Fang Liu; Jin Tong; Jian Mao; Robert B. Bohn; John V. Messina; Lee Badger; Dawn M. Leaf
Archive | 2014
Lee Badger; David Bernstein; Robert B. Bohn; Frederic J. de Vaulx; Mike Hogan; Michaela Iorga; Jian Mao; John V. Messina; Kevin Mills; Eric D. Simmon; Annie W. Sokol; Jin Tong; Fred Whiteside; Dawn M. Leaf
Archive | 2017
Frederic J. de Vaulx; Eric D. Simmon; Robert B. Bohn
Electrochemical Society | 1998
Eric L. Shirley; Lorin X. Benedict; Robert B. Bohn