NIST logo

Publication Citation: Specification and Validation of Enterprise Access Control Data for Conformance to Model and Policy Constraints

NIST Authors in Bold

Author(s): Ramaswamy Chandramouli;
Title: Specification and Validation of Enterprise Access Control Data for Conformance to Model and Policy Constraints
Published: July 01, 2003
Abstract: This paper describes how the National Institute of Standards and Technology (NIST) selected the Advanced Encryption Standard (AES), a new standard symmetric key encryption algorithm that has been adopted for use by the U.S. Federal Government, for Standards and Technology (NIST). The paper also describes the NIST follow-on efforts to bring other federal cryptographic standards up to the same level of strength as AES and to update and extend the NIST standard cryptographic modes of operation.
Conference: World Multiconference on Systems, Cybernetics and Informatics
Proceedings: 7th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2003)
Volume: 1
Location: Orlando, FL
Dates: July 27-30, 2003
Keywords: document object model (DOM);enterprise access control model;policy constraints;role-based access control model;schematron;XML schema
Research Areas: