NIST logo

Publications Portal

You searched on:
Author: ramaswamy chandramouli
Sorted by: title

Displaying records 41 to 50 of 52 records.
Resort by: Date / Title


41. SP 800-85A-1: PIV Card Application and Middleware Interface Test Guidelines (SP800-73-2 compliance)
Series: Special Publication (NIST SP)
Report Number: 800-85
Published: 4/3/2009
Authors: Ramaswamy Chandramouli, Hildegard Ferraiolo, Ketan L Mehta
Abstract: The objective of this document [SP 800-85A-1] is to provide test requirements and test assertions that could be used to validate the compliance/conformance of two PIV components PIV middleware and PIV card application with the specifications in NIST ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902200

42. Secure Domain Name System (DNS) Deployment Guide
Series: Special Publication (NIST SP)
Report Number: 800-81
Published: 1/1/2006
Authors: Ramaswamy Chandramouli, Scott William Rose
Abstract: We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multim ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150200

43. Secure Domain Name System (DNS) Deployment Guide
Series: Special Publication (NIST SP)
Report Number: 800-81rev2
Published: 9/18/2013
Authors: Ramaswamy Chandramouli, Scott William Rose
Abstract: The Domain Name System (DNS) is a distributed computing system that enables access to Internet resources by user-friendly domain names rather than IP addresses, by translating domain names to IP addresses and back. The DNS infrastructure is made up ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914217

44. Secure Domain Name System (DNS) Deployment Guide
Series: Special Publication (NIST SP)
Report Number: 800-81rev1
Published: 8/27/2010
Author: Ramaswamy Chandramouli
Abstract: This document provides deployment guidelines for securing the Domain Name System (DNS) in any enterprise a government agency or a corporate entity. The deployment guidelines follow from an analysis of security objectives and consequent protection a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905113

45. Security Assurance Requirements for Hypervisor Deployment Features
Published: 2/24/2013
Author: Ramaswamy Chandramouli
Abstract: Virtualized hosts provide abstraction of the hardware resources (i.e., CPU, Memory etc) enabling multiple computing stacks to be run on a single physical machine. The Hypervisor is the core software that enables this virtualization and hence must be ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912746

46. Security Control Variations Between In-House and Cloud-Based Virtualized Infrastructures
Published: 8/19/2012
Author: Ramaswamy Chandramouli
Abstract: Virtualization-related components (such as Hypervisor, Virtual Network and Virtual Machines (VMs)) in a virtualized data center infrastructure need effective security controls. However, the differences in scope of control (among stakeholders) over th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911036

47. Security Functional Testing Using an Interface-Driven Model-Based Test Automation Approach
Published: 9/1/2002
Authors: Ramaswamy Chandramouli, Mark Blackburn
Abstract: Independent security functional testing on a product occupies a backseat in traditional security evaluation because of the cost and stringent coverage requirements. In this paper we present the details of an approach we have developed to automate se ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151258

48. Security Functional Testing Using an Interface-Driven Model-based Test Automation Approach
Published: 12/9/2002
Authors: Ramaswamy Chandramouli, Mark Blackburn
Abstract: Independent security functional testing on a product occupies a backseat in traditional security evaluation because of the cost and stringent coverage requirements. In this paper we present the details of an approach we have developed to automate se ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51027

49. Service Model Driven Variations in Security Measures for Cloud Environments
Published: 11/6/2011
Author: Ramaswamy Chandramouli
Abstract: With the increasing adoption of cloud computing service models ‹ Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), proper implementation of adequate and appropriate security protection measures has bec ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909131

50. Specification and Validation of Enterprise Access Control Data for Conformance to Model and Policy Constraints
Published: 7/1/2003
Author: Ramaswamy Chandramouli
Abstract: This paper describes how the National Institute of Standards and Technology (NIST) selected the Advanced Encryption Standard (AES), a new standard symmetric key encryption algorithm that has been adopted for use by the U.S. Federal Government, for S ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50734



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series