NIST logo

Publications Portal

You searched on: Author: ramaswamy chandramouli Sorted by: title

Displaying records 21 to 30 of 65 records.
Resort by: Date / Title


21. Deployment-driven Security Configuration for Virtual Networks
Published: 12/28/2014
Author: Ramaswamy Chandramouli
Abstract: Virtualized Infrastructures are increasingly deployed in many data centers. One of the key components of this virtualized infrastructure is the virtual network - a software-defined communication fabric that links together the various Virtual Machines ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916369

22. Determining Authentication Strength for Smart Card-based Authentication Use Cases
Published: 1/30/2012
Author: Ramaswamy Chandramouli
Abstract: Smart cards are now being extensively deployed for identity verification(smart identity tokens) for controlling access to Information Technology (IT) as well as physical resources. Depending upon the sensitivity of the resources and the risk of wrong ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908626

23. Enterprise Access Control Frameworks Using RBAC and XML Technologies
Published: 1/1/2003
Author: Ramaswamy Chandramouli
Abstract: In this chapter, we show that we can develop an Enterprise Access Control Framework using Role-based Access Control (RBAC) and Extensible Markup Language (XML) technologies. In the first section, we outline the general requirements for the Enterpris ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51025

24. Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC)
Published: 3/11/2016
Authors: David F Ferraiolo, Ramaswamy Chandramouli, David R Kuhn, Chung Tong Hu
Abstract: Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC) are very different attribute based access control standards with similar goals and objectives. An objective of both is to provide a standardized way for expre ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=920189

25. Framework for Emergency Response Official (ERO): Authentication and Authorization Infrastructure
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7601
Published: 8/31/2010
Authors: Ramaswamy Chandramouli, Teresa T. Schwarzhoff
Abstract: This document describe a framework (with the acronym ERO-AA) for establishing an infrastructure for authentication and authorization of Emergency Response officials (ERO) who respond to various types of man-made and natural disasters. The population ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903025

26. Guidelines for the Accreditation of Personal Identity Verification Card Issuers
Series: Special Publication (NIST SP)
Report Number: 800-79-1
Published: 6/18/2008
Authors: Ramaswamy Chandramouli, Dennis Bailey, Nabil Ghadiali, Dennis Keith Branstad
Abstract: [Superseded by SP 800-79-2 (July 2015): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918845] The purpose of this publication is to provide appropriate and useful guidelines for accrediting the reliability of issuers of Personal Identi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152182

27. Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI)
Series: Special Publication (NIST SP)
Report Number: 800-79-2
Published: 7/30/2015
Authors: Hildegard Ferraiolo, Ramaswamy Chandramouli, Nabil Ghadiali, Jason Mohler, Scott Shorter
Abstract: The purpose of this Special Publication is to provide appropriate and useful guidelines for assessing the reliability of issuers of Personal Identity Verification (PIV) Cards and Derived PIV Credentials. These issuers store personal information and i ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918845

28. Information Leakage Through the Domain Name System
Series: OTHER
Published: 3/31/2011
Authors: Scott William Rose, Anastase Nakassis, Ramaswamy Chandramouli
Abstract: The Domain Name System (DNS) is the global lookup service for network resources. It is often the first step in an Internet transaction as well as a network attack. An attacker can query an organization's DNS as reconnaissance before attacking hos ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900237

29. Infrastructure Standards for Smart ID-Cards Deployment
Published: 9/7/2007
Authors: Ramaswamy Chandramouli, Philip Lee
Abstract: Smart cards are being increasingly deployed for many applications. Typical applications are Subscriber Identification Module (SIM) cards (in Telecommunication), Micropayment (in Financial Transactions), Commuter Cards (in Urban Transportation Systems ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51147

30. Infrastructure System Design Methodology for Smart ID Cards Deployment
Published: 4/19/2008
Author: Ramaswamy Chandramouli
Abstract: With the increasing use of smart cards for identity verification of individuals, it has become imperative for organizations to properly design and engineer the expensive infrastructure system that supports smart card deployment. Apart from sound syst ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152095



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series