Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Author: ramaswamy chandramouli Sorted by: date

Displaying records 51 to 60 of 69 records.
Resort by: Date / Title

51. PIV Middleware and PIV Card Application Conformance Test Guidance (SP 800-73 Compliance)
Series: Special Publication (NIST SP)
Report Number: 800-85
Published: 10/19/2005
Authors: Ramaswamy Chandramouli, Levent Eyuboglu, Ketan Mehta
Abstract: [Superseded by: SP 800-85A (April 2006): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151318 and SP 800-85B (July 2006): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50848] This document specifies the test plan, proces ...

52. Integrity Checking of DNS Zone File Data Using XSLT
Published: 7/1/2005
Authors: Ramaswamy Chandramouli, Scott William Rose
Abstract: We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all ha ...

53. Personal Identity Verification (PIV) of Federal Employees and Contractors
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 201
Published: 2/1/2005
Authors: William Curtis Barker, James F Dray Jr., Ramaswamy Chandramouli, Teresa T. Schwarzhoff, William T Polk, Donna F Dodson, Ketan L Mehta, S Gupta, William Edward Burr, Timothy Grance
Abstract: [Superseded by FIPS 201-1 (March 2006): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50836] FIPS 201 specifies the technical and operational requirements for interoperable PIV systems that issue smart cards as identification credentia ...

54. Specification and Validation of Enterprise Access Control Data for Conformance to Model and Policy Constraints
Published: 7/30/2003
Author: Ramaswamy Chandramouli
Abstract: The effectiveness of an enterprise access control framework depends upon the integrity of the various components or the building blocks used in that framework. The essential components of that framework are: (a) an Enterprise Access Control Model (b) ...

55. The Role Control Center: Features and Case Studies
Published: 6/4/2003
Authors: David F Ferraiolo, Gail-Joon Ahn, Ramaswamy Chandramouli, Serban Ilie Gavrila
Abstract: Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of products called Enterprise Security Management Systems (ESMS). ESMS produ ...

56. Enterprise Access Control Frameworks Using RBAC and XML Technologies
Published: 1/1/2003
Author: Ramaswamy Chandramouli
Abstract: In this chapter, we show that we can develop an Enterprise Access Control Framework using Role-based Access Control (RBAC) and Extensible Markup Language (XML) technologies. In the first section, we outline the general requirements for the Enterpris ...

57. Security Functional Testing Using an Interface-Driven Model-based Test Automation Approach
Published: 12/9/2002
Authors: Ramaswamy Chandramouli, Mark Blackburn
Abstract: Independent security functional testing on a product occupies a backseat in traditional security evaluation because of the cost and stringent coverage requirements. In this paper we present the details of an approach we have developed to automate se ...

58. Model-Based Approach to Security Test Automation
Published: 11/1/2002
Authors: Mark Blackburn, Robert Busser, Aaron Nauman, Ramaswamy Chandramouli
Abstract: Security functional testing is a costly activity typically performed by security evaluation laboratories. These laboratories have struggled to keep pace with increasing demand to test numerous product variations. This paper summarizes the results of ...

59. Cost Effective Use of Formal Methods in Verification and Validation Foundations
Published: 10/1/2002
Authors: David R Kuhn, Ramaswamy Chandramouli, R W Butler
Abstract: Formal methods offer the promise of significant improvements in verification and validation, and may be the only approach capable of demonstrating the absence of undesirable system behavior. But it is widely recognized that these methods are expens ...

60. Cost Effective Uses of Formal Methods in Verification and Validation
Published: 10/1/2002
Authors: David R Kuhn, Ramaswamy Chandramouli
Abstract: Formal methods offer the promise of significant improvements in verification and validation, and may be the only approach capable of demonstrating the absence of undesirable system behavior. But it is widely recognized that these methods are expensi ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series