NIST logo

Publications Portal

You searched on: Author: ramaswamy chandramouli Sorted by: title

Displaying records 21 to 30 of 67 records.
Resort by: Date / Title


21. Cryptographic Key Management Issues & Challenges in Cloud Services
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7956
Published: 9/18/2013
Authors: Ramaswamy Chandramouli, Michaela Iorga, Santosh Chokhani
Abstract: To interact with various services in the cloud and to store the data generated/processed by those services, several security capabilities are required. Based on a core set of features in the three common cloud services - Infrastructure as a Service ( ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914304

22. Deployment-driven Security Configuration for Virtual Networks
Published: 12/28/2014
Author: Ramaswamy Chandramouli
Abstract: Virtualized Infrastructures are increasingly deployed in many data centers. One of the key components of this virtualized infrastructure is the virtual network - a software-defined communication fabric that links together the various Virtual Machines ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916369

23. Determining Authentication Strength for Smart Card-based Authentication Use Cases
Published: 1/30/2012
Author: Ramaswamy Chandramouli
Abstract: Smart cards are now being extensively deployed for identity verification(smart identity tokens) for controlling access to Information Technology (IT) as well as physical resources. Depending upon the sensitivity of the resources and the risk of wrong ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908626

24. Enterprise Access Control Frameworks Using RBAC and XML Technologies
Published: 1/1/2003
Author: Ramaswamy Chandramouli
Abstract: In this chapter, we show that we can develop an Enterprise Access Control Framework using Role-based Access Control (RBAC) and Extensible Markup Language (XML) technologies. In the first section, we outline the general requirements for the Enterpris ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51025

25. Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC)
Published: 3/11/2016
Authors: David F Ferraiolo, Ramaswamy Chandramouli, David R Kuhn, Chung Tong Hu
Abstract: Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC) are very different attribute based access control standards with similar goals and objectives. An objective of both is to provide a standardized way for expre ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=920189

26. Framework for Emergency Response Official (ERO): Authentication and Authorization Infrastructure
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7601
Published: 8/31/2010
Authors: Ramaswamy Chandramouli, Teresa T. Schwarzhoff
Abstract: This document describe a framework (with the acronym ERO-AA) for establishing an infrastructure for authentication and authorization of Emergency Response officials (ERO) who respond to various types of man-made and natural disasters. The population ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903025

27. Guidelines for the Accreditation of Personal Identity Verification Card Issuers
Series: Special Publication (NIST SP)
Report Number: 800-79-1
Published: 6/18/2008
Authors: Ramaswamy Chandramouli, Dennis Bailey, Nabil Ghadiali, Dennis Keith Branstad
Abstract: [Superseded by SP 800-79-2 (July 2015): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918845] The purpose of this publication is to provide appropriate and useful guidelines for accrediting the reliability of issuers of Personal Identi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152182

28. Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI)
Series: Special Publication (NIST SP)
Report Number: 800-79-2
Published: 7/30/2015
Authors: Hildegard Ferraiolo, Ramaswamy Chandramouli, Nabil Ghadiali, Jason Mohler, Scott Shorter
Abstract: The purpose of this Special Publication is to provide appropriate and useful guidelines for assessing the reliability of issuers of Personal Identity Verification (PIV) Cards and Derived PIV Credentials. These issuers store personal information and i ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918845

29. Information Leakage Through the Domain Name System
Series: OTHER
Published: 3/31/2011
Authors: Scott William Rose, Anastase Nakassis, Ramaswamy Chandramouli
Abstract: The Domain Name System (DNS) is the global lookup service for network resources. It is often the first step in an Internet transaction as well as a network attack. An attacker can query an organization's DNS as reconnaissance before attacking hos ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900237

30. Infrastructure Standards for Smart ID-Cards Deployment
Published: 9/7/2007
Authors: Ramaswamy Chandramouli, Philip Lee
Abstract: Smart cards are being increasingly deployed for many applications. Typical applications are Subscriber Identification Module (SIM) cards (in Telecommunication), Micropayment (in Financial Transactions), Commuter Cards (in Urban Transportation Systems ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51147



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series