NIST logo

Publications Portal

You searched on:
Author: ramaswamy chandramouli
Sorted by: title

Displaying records 11 to 20 of 53 records.
Resort by: Date / Title


11. Biometric Data Specification for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-76
Published: 1/1/2005
Authors: Charles L. Wilson, Patrick J Grother, Ramaswamy Chandramouli
Abstract: The Homeland Security Presidential Directive HSPD-12 called for new standards to be adopted governing the interoperable use of identity credentials to allow physical and logical access to Federal government locations and systems. The Personal Ident ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50286

12. Biometric Data Specification for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-76-1
Published: 1/17/2007
Authors: Charles L. Wilson, Patrick J Grother, Ramaswamy Chandramouli
Abstract: This document, Special Publication 800-76, is a companion document to FIPS 201, Personal Identity Verification (PIV) of Federal Employees and Contractors. It describes technical acquisition and formatting specifications for the biometric credentials ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51101

13. Biometric Specifications for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-76-2
Published: 7/11/2013
Authors: Patrick J Grother, Wayne J Salamon, Ramaswamy Chandramouli
Abstract: Homeland Security Presidential Directive HSPD-12, Policy for a Common Identification Standard for Federal Employees and Contractors [HSPD-12], called for new standards to be adopted governing interoperable use of identity credentials to allow physica ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914224

14. Business Process Driven Framework for Defining an Access Control Service Based on Roles and Rules
Published: 10/1/2000
Author: Ramaswamy Chandramouli
Abstract: Defining an Access Control Service for an enterprise application requires the choice of an access control model and a process for formulation of access decision rules to be used by the access enforcement mechanism. In this paper, we describe a busin ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151214

15. Challenges in Securing the Domain Name System
Published: 1/1/2006
Authors: Scott William Rose, Ramaswamy Chandramouli
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51337

16. Cloud Service Feature Driven Security Policies for Virtualized Infrastructures
Published: 7/19/2011
Author: Ramaswamy Chandramouli
Abstract: With the increasing maturity of various cloud service delivery models (Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS)) and deployment models (Private, Community, Public, Hybrid), the security risk profi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908387

17. Cost Effective Use of Formal Methods in Verification and Validation Foundations
Published: 10/1/2002
Authors: David R Kuhn, Ramaswamy Chandramouli, R W Butler
Abstract: Formal methods offer the promise of significant improvements in verification and validation, and may be the only approach capable of demonstrating the absence of undesirable system behavior. But it is widely recognized that these methods are expens ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50742

18. Cost Effective Uses of Formal Methods in Verification and Validation
Published: 10/1/2002
Authors: David R Kuhn, Ramaswamy Chandramouli
Abstract: Formal methods offer the promise of significant improvements in verification and validation, and may be the only approach capable of demonstrating the absence of undesirable system behavior. But it is widely recognized that these methods are expensi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151272

19. Cryptographic Key Management Issues & Challenges in Cloud Services
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7956
Published: 9/18/2013
Authors: Ramaswamy Chandramouli, Michaela Iorga, Santosh Chokhani
Abstract: To interact with various services in the cloud and to store the data generated/processed by those services, several security capabilities are required. Based on a core set of features in the three common cloud services - Infrastructure as a Service ( ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914304

20. Determining Authentication Strength for Smart Card-based Authentication Use Cases
Published: 1/30/2012
Author: Ramaswamy Chandramouli
Abstract: Smart cards are now being extensively deployed for identity verification(smart identity tokens) for controlling access to Information Technology (IT) as well as physical resources. Depending upon the sensitivity of the resources and the risk of wrong ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908626



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series