NIST logo

Publications Portal

You searched on:
Author: ramaswamy chandramouli
Sorted by: date

Displaying records 41 to 50 of 53 records.
Resort by: Date / Title


41. Enterprise Access Control Frameworks Using RBAC and XML Technologies
Published: 1/1/2003
Author: Ramaswamy Chandramouli
Abstract: In this chapter, we show that we can develop an Enterprise Access Control Framework using Role-based Access Control (RBAC) and Extensible Markup Language (XML) technologies. In the first section, we outline the general requirements for the Enterpris ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51025

42. Security Functional Testing Using an Interface-Driven Model-based Test Automation Approach
Published: 12/9/2002
Authors: Ramaswamy Chandramouli, Mark Blackburn
Abstract: Independent security functional testing on a product occupies a backseat in traditional security evaluation because of the cost and stringent coverage requirements. In this paper we present the details of an approach we have developed to automate se ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51027

43. Model-Based Approach to Security Test Automation
Published: 11/1/2002
Authors: Mark Blackburn, Robert Busser, Aaron Nauman, Ramaswamy Chandramouli
Abstract: Security functional testing is a costly activity typically performed by security evaluation laboratories. These laboratories have struggled to keep pace with increasing demand to test numerous product variations. This paper summarizes the results of ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151237

44. Cost Effective Use of Formal Methods in Verification and Validation Foundations
Published: 10/1/2002
Authors: David R Kuhn, Ramaswamy Chandramouli, R W Butler
Abstract: Formal methods offer the promise of significant improvements in verification and validation, and may be the only approach capable of demonstrating the absence of undesirable system behavior. But it is widely recognized that these methods are expens ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50742

45. Cost Effective Uses of Formal Methods in Verification and Validation
Published: 10/1/2002
Authors: David R Kuhn, Ramaswamy Chandramouli
Abstract: Formal methods offer the promise of significant improvements in verification and validation, and may be the only approach capable of demonstrating the absence of undesirable system behavior. But it is widely recognized that these methods are expensi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151272

46. Interface-Driven Model-Based Generation of Java Test Drivers
Published: 9/3/2002
Authors: Mark Blackburn, Robert Busser, Aaron Nauman, Ramaswamy Chandramouli
Abstract: This paper extends prior work in model-based verification and describes interface-driven analysis that combines with a requirement model to support automated generation of Java test scripts. It describes concepts of models and test driver mappings us ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51023

47. Interface-Driven Model-Based Generation of Java Test Drivers
Published: 9/1/2002
Authors: Mark Blackburn, Robert Busser, Aaron Nauman, Ramaswamy Chandramouli
Abstract: This paper extends prior work in model-based verification and describes interface-driven analysis that combines with a requirement model to support automated generation of Java test scripts. It describes concepts of models and test driver mappings us ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151262

48. Security Functional Testing Using an Interface-Driven Model-Based Test Automation Approach
Published: 9/1/2002
Authors: Ramaswamy Chandramouli, Mark Blackburn
Abstract: Independent security functional testing on a product occupies a backseat in traditional security evaluation because of the cost and stringent coverage requirements. In this paper we present the details of an approach we have developed to automate se ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151258

49. A Multi-Faceted Approach for Development of Security Architectures for Application Systems
Published: 3/1/2002
Author: Ramaswamy Chandramouli
Abstract: Secure application systems are often built using the Software Architecture of the system as a blue print. The Software Architecture of any application system contains along with other functional requirements, the security service requirements for th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51026

50. Admission Discharge and Transfer System Protection Profile (ADT-PP) (An ISO/IEC 15408 Security Protection Profile for a Healthcare IT Application System)
Report Number: 6782
Published: 3/1/2002
Authors: Ramaswamy Chandramouli, G Marshall
Abstract: The central piece of information in this document is a set of security functional and assurance requirements for an Admissions Discharge and Transfer System (ADT). The ADT is a key information technology (IT) application system used in all major heal ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151246



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series