NIST logo

Publications Portal

You searched on:
Author: ramaswamy chandramouli

Displaying records 31 to 40 of 52 records.
Resort by: Date / Title


31. Challenges in Securing the Domain Name System
Published: 1/1/2006
Authors: Scott William Rose, Ramaswamy Chandramouli
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51337

32. Secure Domain Name System (DNS) Deployment Guide
Series: Special Publication (NIST SP)
Report Number: 800-81
Published: 1/1/2006
Authors: Ramaswamy Chandramouli, Scott William Rose
Abstract: We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multim ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150200

33. Integrity Checking of DNS Zone File Data Using XSLT
Published: 12/1/2005
Authors: Ramaswamy Chandramouli, Scott William Rose
Abstract: We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all ha ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150129

34. PIV Middleware and On-Card Application Conformance Test Guidance (SP 800-73 Compliance)
Series: Special Publication (NIST SP)
Report Number: 800-85
Published: 12/1/2005
Authors: Ramaswamy Chandramouli, Levent Eyuboglu, Ketan Mehta
Abstract: This document specifies the test plan, processes, derived test requirements, and detailed test assertions for testing the following: (a)PIV middleware (client application API conformance) (b)PIV on-card application (for conformance to card applicatio ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150377

35. An Integrity Verification Scheme for DNS Zone File based on Security Impact Analysis
Published: 11/1/2005
Authors: Ramaswamy Chandramouli, Scott William Rose
Abstract: The Domain Name System (DNS) is the worlds largest distributed computing system that performs the key function of translating user-friendly domain names to IP Addresses through a process called Name Resolution. After looking at the protection measur ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150378

36. Integrity Checking of DNS Zone File Data Using XSLT
Published: 7/1/2005
Authors: Ramaswamy Chandramouli, Scott William Rose
Abstract: We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all ha ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150128

37. Personal Identity Verification of Federal Employees and Contractors
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 201
Published: 2/1/2005
Authors: William C Barker, James F Dray Jr, Ramaswamy Chandramouli, Teresa Schwarzhoff, William T Polk, Donna F Dodson, Ketan L Mehta, S Gupta, William Edward Burr, Timothy Grance
Abstract: FIPS 201 specifies the technical and operational requirements for interoperable PIV systems that issue smart cards as identification credentials and that use the cards to authenticate an individual's identity. FIPS 201 has been issued in two pa ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150207

38. Biometric Data Specification for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-76
Published: 1/1/2005
Authors: Charles L. Wilson, Patrick J Grother, Ramaswamy Chandramouli
Abstract: The Homeland Security Presidential Directive HSPD-12 called for new standards to be adopted governing the interoperable use of identity credentials to allow physical and logical access to Federal government locations and systems. The Personal Ident ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50286

39. Specification and Validation of Enterprise Access Control Data for Conformance to Model and Policy Constraints
Published: 7/1/2003
Author: Ramaswamy Chandramouli
Abstract: This paper describes how the National Institute of Standards and Technology (NIST) selected the Advanced Encryption Standard (AES), a new standard symmetric key encryption algorithm that has been adopted for use by the U.S. Federal Government, for S ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50734

40. Enterprise Access Control Frameworks Using RBAC and XML Technologies
Published: 1/1/2003
Author: Ramaswamy Chandramouli
Abstract: In this chapter, we show that we can develop an Enterprise Access Control Framework using Role-based Access Control (RBAC) and Extensible Markup Language (XML) technologies. In the first section, we outline the general requirements for the Enterpris ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51025



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series