NIST logo

Publications Portal

You searched on: Author: ramaswamy chandramouli Sorted by: date

Displaying records 41 to 50 of 60 records.
Resort by: Date / Title


41. An Integrity Verification Scheme for DNS Zone File based on Security Impact Analysis
Published: 11/1/2005
Authors: Ramaswamy Chandramouli, Scott William Rose
Abstract: The Domain Name System (DNS) is the worlds largest distributed computing system that performs the key function of translating user-friendly domain names to IP Addresses through a process called Name Resolution. After looking at the protection measur ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150378

42. PIV Middleware and PIV Card Application Conformance Test Guidance (SP 800-73 Compliance)
Series: Special Publication (NIST SP)
Report Number: 800-85
Published: 10/19/2005
Authors: Ramaswamy Chandramouli, Levent Eyuboglu, Ketan Mehta
Abstract: [Superseded by: SP 800-85A (April 2006): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151318 and SP 800-85B (July 2006): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50848] This document specifies the test plan, proces ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150377

43. Integrity Checking of DNS Zone File Data Using XSLT
Published: 7/1/2005
Authors: Ramaswamy Chandramouli, Scott William Rose
Abstract: We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all ha ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150128

44. Personal Identity Verification (PIV) of Federal Employees and Contractors
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 201
Published: 2/1/2005
Authors: William C Barker, James F Dray Jr., Ramaswamy Chandramouli, Teresa T. Schwarzhoff, William T Polk, Donna F Dodson, Ketan L Mehta, S Gupta, William Edward Burr, Timothy Grance
Abstract: [Superseded by FIPS 201-1 (March 2006): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50836] FIPS 201 specifies the technical and operational requirements for interoperable PIV systems that issue smart cards as identification credentia ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150207

45. Specification and Validation of Enterprise Access Control Data for Conformance to Model and Policy Constraints
Published: 7/30/2003
Author: Ramaswamy Chandramouli
Abstract: The effectiveness of an enterprise access control framework depends upon the integrity of the various components or the building blocks used in that framework. The essential components of that framework are: (a) an Enterprise Access Control Model (b) ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50734

46. The Role Control Center: Features and Case Studies
Published: 6/4/2003
Authors: David F Ferraiolo, Gail-Joon Ahn, Ramaswamy Chandramouli, Serban Ilie Gavrila
Abstract: Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of products called Enterprise Security Management Systems (ESMS). ESMS produ ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916543

47. Enterprise Access Control Frameworks Using RBAC and XML Technologies
Published: 1/1/2003
Author: Ramaswamy Chandramouli
Abstract: In this chapter, we show that we can develop an Enterprise Access Control Framework using Role-based Access Control (RBAC) and Extensible Markup Language (XML) technologies. In the first section, we outline the general requirements for the Enterpris ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51025

48. Security Functional Testing Using an Interface-Driven Model-based Test Automation Approach
Published: 12/9/2002
Authors: Ramaswamy Chandramouli, Mark Blackburn
Abstract: Independent security functional testing on a product occupies a backseat in traditional security evaluation because of the cost and stringent coverage requirements. In this paper we present the details of an approach we have developed to automate se ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51027

49. Model-Based Approach to Security Test Automation
Published: 11/1/2002
Authors: Mark Blackburn, Robert Busser, Aaron Nauman, Ramaswamy Chandramouli
Abstract: Security functional testing is a costly activity typically performed by security evaluation laboratories. These laboratories have struggled to keep pace with increasing demand to test numerous product variations. This paper summarizes the results of ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151237

50. Cost Effective Use of Formal Methods in Verification and Validation Foundations
Published: 10/1/2002
Authors: David R Kuhn, Ramaswamy Chandramouli, R W Butler
Abstract: Formal methods offer the promise of significant improvements in verification and validation, and may be the only approach capable of demonstrating the absence of undesirable system behavior. But it is widely recognized that these methods are expens ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50742



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series