NIST logo

Publications Portal

You searched on: Author: ramaswamy chandramouli

Displaying records 1 to 10 of 61 records.
Resort by: Date / Title

1. Analysis of Network Segmentation Techniques in Cloud Data Centers
Published: 7/30/2015
Author: Ramaswamy Chandramouli
Abstract: Cloud Data centers are predominantly made up of Virtualized hosts. The networking infrastructure in a cloud (virtualized) data center, therefore, consists of the combination of physical IP network (data center fabric) and the virtual network residing ...

2. Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI)
Series: Special Publication (NIST SP)
Report Number: 800-79-2
Published: 7/30/2015
Authors: Hildegard Ferraiolo, Ramaswamy Chandramouli, Nabil Ghadiali, Jason Mohler, Scott Shorter
Abstract: The purpose of this Special Publication is to provide appropriate and useful guidelines for assessing the reliability of issuers of Personal Identity Verification (PIV) Cards and Derived PIV Credentials. These issuers store personal information and i ...

3. Interfaces for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-73-4
Published: 5/29/2015
Authors: David A Cooper, Hildegard Ferraiolo, Ketan L Mehta, Salvatore Francomacaro, Ramaswamy Chandramouli, Jason Mohler
Abstract: FIPS 201 defines the requirements and characteristics of a government-wide interoperable identity credential. FIPS 201 also specifies that this identity credential must be stored on a smart card. This document, SP 800-73, contains the technical speci ...

4. Deployment-driven Security Configuration for Virtual Networks
Published: 12/28/2014
Author: Ramaswamy Chandramouli
Abstract: Virtualized Infrastructures are increasingly deployed in many data centers. One of the key components of this virtualized infrastructure is the virtual network - a software-defined communication fabric that links together the various Virtual Machines ...

5. Analysis of Protection Options for Virtualized Infrastructures in Infrastructure as a Service Cloud
Published: 5/29/2014
Author: Ramaswamy Chandramouli
Abstract: Infrastructure as a Service (IaaS) is one of the three main cloud service types where the cloud consumer consumes a great variety of resources such as computing (Virtual Machines or VMs), virtual network, storage and utility programs (DBMS). Any larg ...

6. A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7849
Published: 3/5/2014
Author: Ramaswamy Chandramouli
Abstract: Smart cards (smart identity tokens) are now being extensively deployed for identity verification for controlling access to Information Technology (IT) resources as well as physical resources. Depending upon the sensitivity of the resources and the ri ...

7. Cryptographic Key Management Issues & Challenges in Cloud Services
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7956
Published: 9/18/2013
Authors: Ramaswamy Chandramouli, Michaela Iorga, Santosh Chokhani
Abstract: To interact with various services in the cloud and to store the data generated/processed by those services, several security capabilities are required. Based on a core set of features in the three common cloud services - Infrastructure as a Service ( ...

8. Secure Domain Name System (DNS) Deployment Guide
Series: Special Publication (NIST SP)
Report Number: 800-81-2
Published: 9/18/2013
Authors: Ramaswamy Chandramouli, Scott William Rose
Abstract: The Domain Name System (DNS) is a distributed computing system that enables access to Internet resources by user-friendly domain names rather than IP addresses, by translating domain names to IP addresses and back. The DNS infrastructure is made up ...

9. Biometric Specifications for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-76-2
Published: 7/11/2013
Authors: Patrick J Grother, Wayne J Salamon, Ramaswamy Chandramouli
Abstract: Homeland Security Presidential Directive HSPD-12, Policy for a Common Identification Standard for Federal Employees and Contractors [HSPD-12], called for new standards to be adopted governing interoperable use of identity credentials to allow physica ...

10. Security Assurance Requirements for Hypervisor Deployment Features
Published: 2/24/2013
Author: Ramaswamy Chandramouli
Abstract: Virtualized hosts provide abstraction of the hardware resources (i.e., CPU, Memory etc) enabling multiple computing stacks to be run on a single physical machine. The Hypervisor is the core software that enables this virtualization and hence must be ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series