NIST logo

Publications Portal

You searched on: Author: ramaswamy chandramouli

Displaying records 41 to 50 of 58 records.
Resort by: Date / Title


41. Personal Identity Verification (PIV) of Federal Employees and Contractors
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 201
Published: 2/1/2005
Authors: William C Barker, James F Dray Jr, Ramaswamy Chandramouli, Teresa T. Schwarzhoff, William T Polk, Donna F Dodson, Ketan L Mehta, S Gupta, William Edward Burr, Timothy Grance
Abstract: [Superseded by FIPS 201-1 (March 2006): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50836] FIPS 201 specifies the technical and operational requirements for interoperable PIV systems that issue smart cards as identification credentia ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150207

42. Biometric Data Specification for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-76
Published: 1/1/2005
Authors: Charles L. Wilson, Patrick J Grother, Ramaswamy Chandramouli
Abstract: [Superseded by SP 800-76-1 (January 2007): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51101] The Homeland Security Presidential Directive HSPD-12 called for new standards to be adopted governing the interoperable use of identity cre ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50286

43. Specification and Validation of Enterprise Access Control Data for Conformance to Model and Policy Constraints
Published: 7/30/2003
Author: Ramaswamy Chandramouli
Abstract: The effectiveness of an enterprise access control framework depends upon the integrity of the various components or the building blocks used in that framework. The essential components of that framework are: (a) an Enterprise Access Control Model (b) ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50734

44. The Role Control Center: Features and Case Studies
Published: 6/4/2003
Authors: David F Ferraiolo, Gail-Joon Ahn, Ramaswamy Chandramouli, Serban Ilie Gavrila
Abstract: Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of products called Enterprise Security Management Systems (ESMS). ESMS produ ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916543

45. Enterprise Access Control Frameworks Using RBAC and XML Technologies
Published: 1/1/2003
Author: Ramaswamy Chandramouli
Abstract: In this chapter, we show that we can develop an Enterprise Access Control Framework using Role-based Access Control (RBAC) and Extensible Markup Language (XML) technologies. In the first section, we outline the general requirements for the Enterpris ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51025

46. Security Functional Testing Using an Interface-Driven Model-based Test Automation Approach
Published: 12/9/2002
Authors: Ramaswamy Chandramouli, Mark Blackburn
Abstract: Independent security functional testing on a product occupies a backseat in traditional security evaluation because of the cost and stringent coverage requirements. In this paper we present the details of an approach we have developed to automate se ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51027

47. Model-Based Approach to Security Test Automation
Published: 11/1/2002
Authors: Mark Blackburn, Robert Busser, Aaron Nauman, Ramaswamy Chandramouli
Abstract: Security functional testing is a costly activity typically performed by security evaluation laboratories. These laboratories have struggled to keep pace with increasing demand to test numerous product variations. This paper summarizes the results of ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151237

48. Cost Effective Use of Formal Methods in Verification and Validation Foundations
Published: 10/1/2002
Authors: David R Kuhn, Ramaswamy Chandramouli, R W Butler
Abstract: Formal methods offer the promise of significant improvements in verification and validation, and may be the only approach capable of demonstrating the absence of undesirable system behavior. But it is widely recognized that these methods are expens ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50742

49. Cost Effective Uses of Formal Methods in Verification and Validation
Published: 10/1/2002
Authors: David R Kuhn, Ramaswamy Chandramouli
Abstract: Formal methods offer the promise of significant improvements in verification and validation, and may be the only approach capable of demonstrating the absence of undesirable system behavior. But it is widely recognized that these methods are expensi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151272

50. Interface-Driven Model-Based Generation of Java Test Drivers
Published: 9/3/2002
Authors: Mark Blackburn, Robert Busser, Aaron Nauman, Ramaswamy Chandramouli
Abstract: This paper extends prior work in model-based verification and describes interface-driven analysis that combines with a requirement model to support automated generation of Java test scripts. It describes concepts of models and test driver mappings us ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51023



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series