NIST logo

Publications Portal

You searched on:
Author: serban gavrila
Sorted by: date

Displaying records 1 to 10 of 20 records.
Resort by: Date / Title


1. Policy Machine: Features, Architecture, and Specification
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7987
Published: 7/2/2014
Authors: David F Ferraiolo, Serban Ilie Gavrila, Wayne Jansen
Abstract: The ability to control access to sensitive data in accordance with policy is perhaps the most fundamental security requirement. Despite over four decades of security research, the limited ability for existing access control mechanisms to enforce ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913195

2. Enabling an Enterprise-wide, Data-centric Operating Environment
Published: 6/21/2013
Authors: David F Ferraiolo, Serban Ilie Gavrila, Wayne Jansen
Abstract: Although access control (AC) currently plays an important role in securing DSs, if properly envisaged and designed, access control can serve a more vital role in computing than one might expect. The Policy Machine (PM), a framework for AC developed a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912691

3. The Policy Machine: a Novel Architecture and Framework for Access Control Policy Specification and Enforcement
Published: 4/1/2011
Authors: David F Ferraiolo, Vijay (Vijay) Atluri, Serban Ilie Gavrila
Abstract: The ability to control access to sensitive data in accordance with policy is perhaps the most fundamental security requirement. Despite over four decades of security research, the limited ability for existing access control mechanisms to generically ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905440

4. Specification of Attribute Relations for Access Control Policies and Constraints Using Policy Machine
Published: 8/23/2010
Authors: Chung Tong Hu, David F Ferraiolo, Serban Ilie Gavrila
Abstract: Attribute relations in access control mechanisms or languages allow accurate and efficient specification of some popular access control models. However, most of the access control systems including today s de-facto access control protocol and specifi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906086

5. Smart Cards for Mobile Devices
Published: 12/3/2007
Authors: Wayne Jansen, Serban Ilie Gavrila, Clement Seveillac
Abstract: While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorised use and access to a device¿s contents. This paper describes two novel types of Smart Car ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50839

6. Smart Card Authentication for Mobile Devices
Published: 9/1/2006
Authors: Wayne Jansen, Serban Ilie Gavrila, Clement Seveillac
Abstract: While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorized use and access to a device¿s contents. This paper describes two novel types of smart car ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150575

7. Proximity-Based Authentication for Mobile Devices
Published: 10/1/2005
Authors: Wayne Jansen, Serban Ilie Gavrila, Vlad Korolev
Abstract: While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorized use and access to a device's contents. This paper describes two location-based user aut ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150218

8. Smart Cards and Mobile Device Authentication: an Overview and Implementation
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7206
Published: 7/1/2005
Authors: Wayne Jansen, Serban Ilie Gavrila, Clement Seveillac, Vladimir Korolev
Abstract: The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but have instead become indispensable tools that offer competitive business advantages ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150220

9. Proximity Beacons and Mobile Device Authentication: an Overview and Implementation
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7200
Published: 6/1/2005
Authors: Wayne Jansen, Serban Ilie Gavrila, Vladimir Korolev
Abstract: The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but have instead become indispensable tools that offer competitive business advantages ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150219

10. A Unified Framework for Mobile Device Security
Published: 6/15/2004
Authors: Wayne Jansen, Vlad Korolev, Serban Ilie Gavrila, T Heute, Clement Seveillac
Abstract: Present-day handheld devices, such as PDAs, are a useful blend of hardware and software oriented toward the mobile workforce. While they provide the capability to review documents, correspond via electronic mail, manage appointments and contacts, et ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150444



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series