NIST logo

Publications Portal

You searched on:
Author: ramaswamy chandramouli
Sorted by: title

Displaying records 41 to 50 of 57 records.
Resort by: Date / Title


41. Personal Identity Verification (PIV) of Federal Employees and Contractors
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 201
Published: 2/1/2005
Authors: William C Barker, James F Dray Jr, Ramaswamy Chandramouli, Teresa T. Schwarzhoff, William T Polk, Donna F Dodson, Ketan L Mehta, S Gupta, William E. (William E.) Burr, Timothy Grance
Abstract: [Superseded by FIPS 201-1 (March 2006): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50836] FIPS 201 specifies the technical and operational requirements for interoperable PIV systems that issue smart cards as identification credentia ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150207

42. Policy Specification and Enforcement for Smart ID Cards Deployment
Published: 6/3/2008
Author: Ramaswamy Chandramouli
Abstract: Deployment of Smart Cards for Identity Verification requires collection of credentials and provisioning of credentials from and to heterogeneous and sometimes legacy systems. To facilitate this process, a centralized identity store called Identity Ma ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152096

43. Privacy & Authorization Policies - Validation & Assurance Techniques (Two Chapters for a book, Identity and Policy, by FutureText)
Published: 12/19/2008
Author: Ramaswamy Chandramouli
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152171

44. Role-Based Access Control Features in Commercial Database Management Systems
Published: 10/9/1998
Authors: Ramaswamy Chandramouli, R. Sandhu
Abstract: This paper analyzes and compares role-based access control (RBAC) features supported in the most recent versions of three popular commercial database management systems: Informix Online Dynamic Server Version 7.2, Oracle Enterprise Server Version 8.0 ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916539

45. Role-Based Access Control, Second Edition
Published: 12/31/2006
Authors: David F Ferraiolo, David R Kuhn, Ramaswamy Chandramouli
Abstract: [ISBN-13: 978-1-59693-113-8] This newly revised edition of "Role-Based Access Control" offers the latest details on a security model aimed at reducing the cost and complexity of security administration for large networked applications. The second edi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916555

46. Secure Domain Name System (DNS) Deployment Guide
Series: Special Publication (NIST SP)
Report Number: 800-81
Published: 1/1/2006
Authors: Ramaswamy Chandramouli, Scott William Rose
Abstract: [Superseded by SP 800-81 Rev. 1 (April 2010): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905113] We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) finger ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150200

47. Secure Domain Name System (DNS) Deployment Guide
Series: Special Publication (NIST SP)
Report Number: 800-81-2
Published: 9/18/2013
Authors: Ramaswamy Chandramouli, Scott William Rose
Abstract: The Domain Name System (DNS) is a distributed computing system that enables access to Internet resources by user-friendly domain names rather than IP addresses, by translating domain names to IP addresses and back. The DNS infrastructure is made up ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914217

48. Secure Domain Name System (DNS) Deployment Guide
Series: Special Publication (NIST SP)
Report Number: 800-81 Rev 1
Published: 8/27/2010
Author: Ramaswamy Chandramouli
Abstract: [Superseded by SP 800-81-2 (September 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914217] This document provides deployment guidelines for securing the Domain Name System (DNS) in any enterprise a government agency or a corp ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905113

49. Security Assurance Requirements for Hypervisor Deployment Features
Published: 2/24/2013
Author: Ramaswamy Chandramouli
Abstract: Virtualized hosts provide abstraction of the hardware resources (i.e., CPU, Memory etc) enabling multiple computing stacks to be run on a single physical machine. The Hypervisor is the core software that enables this virtualization and hence must be ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912746

50. Security Control Variations Between In-House and Cloud-Based Virtualized Infrastructures
Published: 8/19/2012
Author: Ramaswamy Chandramouli
Abstract: Virtualization-related components (such as Hypervisor, Virtual Network and Virtual Machines (VMs)) in a virtualized data center infrastructure need effective security controls. However, the differences in scope of control (among stakeholders) over th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911036



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series