NIST logo

Publications Portal

You searched on: Author: ramaswamy chandramouli Sorted by: title

Displaying records 51 to 60 of 65 records.
Resort by: Date / Title


51. Role-Based Access Control Features in Commercial Database Management Systems
Published: 10/9/1998
Authors: Ramaswamy Chandramouli, R. Sandhu
Abstract: This paper analyzes and compares role-based access control (RBAC) features supported in the most recent versions of three popular commercial database management systems: Informix Online Dynamic Server Version 7.2, Oracle Enterprise Server Version 8.0 ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916539

52. Role-Based Access Control, Second Edition
Published: 12/31/2006
Authors: David F Ferraiolo, David R Kuhn, Ramaswamy Chandramouli
Abstract: [ISBN-13: 978-1-59693-113-8] This newly revised edition of "Role-Based Access Control" offers the latest details on a security model aimed at reducing the cost and complexity of security administration for large networked applications. The second edi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916555

53. Secure Domain Name System (DNS) Deployment Guide
Series: Special Publication (NIST SP)
Report Number: 800-81
Published: 5/16/2006
Authors: Ramaswamy Chandramouli, Scott William Rose
Abstract: [Superseded by SP 800-81 Rev. 1 (April 2010): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905113] We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) finger ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150200

54. Secure Domain Name System (DNS) Deployment Guide
Series: Special Publication (NIST SP)
Report Number: 800-81-2
Published: 9/18/2013
Authors: Ramaswamy Chandramouli, Scott William Rose
Abstract: The Domain Name System (DNS) is a distributed computing system that enables access to Internet resources by user-friendly domain names rather than IP addresses, by translating domain names to IP addresses and back. The DNS infrastructure is made up ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914217

55. Secure Domain Name System (DNS) Deployment Guide
Series: Special Publication (NIST SP)
Report Number: 800-81 Rev 1
Published: 4/30/2010
Author: Ramaswamy Chandramouli
Abstract: [Superseded by SP 800-81-2 (September 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914217] This document provides deployment guidelines for securing the Domain Name System (DNS) in any enterprise a government agency or a corp ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905113

56. Secure Virtual Network Configuration for Virtual Machine (VM) Protection
Series: Special Publication (NIST SP)
Report Number: 800-125B
Published: 3/7/2016
Author: Ramaswamy Chandramouli
Abstract: Virtual Machines (VMs) are key resources to be protected since they are the compute engines hosting mission-critical applications. Since VMs are end-nodes of a virtual network, the configuration of the virtual network forms an important element in th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919997

57. Security Assurance Requirements for Hypervisor Deployment Features
Published: 2/24/2013
Author: Ramaswamy Chandramouli
Abstract: Virtualized hosts provide abstraction of the hardware resources (i.e., CPU, Memory etc) enabling multiple computing stacks to be run on a single physical machine. The Hypervisor is the core software that enables this virtualization and hence must be ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912746

58. Security Control Variations Between In-House and Cloud-Based Virtualized Infrastructures
Published: 8/19/2012
Author: Ramaswamy Chandramouli
Abstract: Virtualization-related components (such as Hypervisor, Virtual Network and Virtual Machines (VMs)) in a virtualized data center infrastructure need effective security controls. However, the differences in scope of control (among stakeholders) over th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911036

59. Security Functional Testing Using an Interface-Driven Model-Based Test Automation Approach
Published: 9/1/2002
Authors: Ramaswamy Chandramouli, Mark Blackburn
Abstract: Independent security functional testing on a product occupies a backseat in traditional security evaluation because of the cost and stringent coverage requirements. In this paper we present the details of an approach we have developed to automate se ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151258

60. Security Functional Testing Using an Interface-Driven Model-based Test Automation Approach
Published: 12/9/2002
Authors: Ramaswamy Chandramouli, Mark Blackburn
Abstract: Independent security functional testing on a product occupies a backseat in traditional security evaluation because of the cost and stringent coverage requirements. In this paper we present the details of an approach we have developed to automate se ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51027



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series