Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Author: ramaswamy chandramouli Sorted by: title

Displaying records 1 to 10 of 69 records.
Resort by: Date / Title

1. A Framework for Multiple Authorization Types in a Healthcare Application System
Published: 1/1/2001
Author: Ramaswamy Chandramouli
Abstract: In most of the current authorization frameworks in application systems, the authorization for a user operation is determined using a static database like ACL entries or system tables. These frameworks provide cannot provide the foundation for support ...

2. A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7849
Published: 3/5/2014
Author: Ramaswamy Chandramouli
Abstract: Smart cards (smart identity tokens) are now being extensively deployed for identity verification for controlling access to Information Technology (IT) resources as well as physical resources. Depending upon the sensitivity of the resources and the ri ...

3. A Multi-Faceted Approach for Development of Security Architectures for Application Systems
Published: 3/1/2002
Author: Ramaswamy Chandramouli
Abstract: Secure application systems are often built using the Software Architecture of the system as a blue print. The Software Architecture of any application system contains along with other functional requirements, the security service requirements for th ...

4. A New Taxonomy for Analyzing Smart Card-based Authentication Processes
Published: 9/7/2007
Author: Ramaswamy Chandramouli
Abstract: As part of E-Government and security initiatives, smart cards are now being increasingly deployed as authentication tokens. The existing classification of authentication factors into What you Know, What You Have and What You Are- does not provide a g ...

5. Access Specification and Validation Framework for Secure Smart ID Cards Deployment
Published: 7/10/2009
Authors: Ramaswamy Chandramouli, Stephen Quirolgico
Abstract: Deployment of smart cards as identity tokens (Smart ID Cards) requires the support of an enterprise system called Identity Management System (IDMS) for collection, storage, processing and distribution of personal identity credentials. Secure configur ...

6. Admission Discharge and Transfer System Protection Profile (ADT-PP) (An ISO/IEC 15408 Security Protection Profile for a Healthcare IT Application System)
Report Number: 6782
Published: 3/1/2002
Authors: Ramaswamy Chandramouli, G Marshall
Abstract: The central piece of information in this document is a set of security functional and assurance requirements for an Admissions Discharge and Transfer System (ADT). The ADT is a key information technology (IT) application system used in all major heal ...

7. An Integrity Verification Scheme for DNS Zone File based on Security Impact Analysis
Published: 11/1/2005
Authors: Ramaswamy Chandramouli, Scott William Rose
Abstract: The Domain Name System (DNS) is the worlds largest distributed computing system that performs the key function of translating user-friendly domain names to IP Addresses through a process called Name Resolution. After looking at the protection measur ...

8. Analysis of Network Segmentation Techniques in Cloud Data Centers
Published: 7/30/2015
Author: Ramaswamy Chandramouli
Abstract: Cloud Data centers are predominantly made up of Virtualized hosts. The networking infrastructure in a cloud (virtualized) data center, therefore, consists of the combination of physical IP network (data center fabric) and the virtual network residing ...

9. Analysis of Protection Options for Virtualized Infrastructures in Infrastructure as a Service Cloud
Published: 5/29/2014
Author: Ramaswamy Chandramouli
Abstract: Infrastructure as a Service (IaaS) is one of the three main cloud service types where the cloud consumer consumes a great variety of resources such as computing (Virtual Machines or VMs), virtual network, storage and utility programs (DBMS). Any larg ...

10. Analysis of Virtual Networking Options for Securing Virtual Machines
Published: 3/20/2016
Author: Ramaswamy Chandramouli
Abstract: Virtual Machines (VMs) constitute the primary category of resources to be protected in virtualized infrastructures. Out of the two types of protection for VMs -- Host-level and Network-level -- it is the approaches for the Network-level protection th ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series