NIST logo

Publications Portal

You searched on: Author: Serban Gavrila

Displaying records 1 to 10 of 23 records.
Resort by: Date / Title


1. On the Unification of Access Control and Data Services
Published: 4/10/2015
Authors: David F Ferraiolo, Serban Ilie Gavrila, Wayne Jansen
Abstract: A primary objective of enterprise computing (via a data center, cloud, etc.) is the controlled delivery of data services (DS). Typical DSs include applications such as email, workflow, and records management, as well as system level features, such as ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916565

2. Policy Machine: Features, Architecture, and Specification
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7987
Published: 7/2/2014
Authors: David F Ferraiolo, Serban Ilie Gavrila, Wayne Jansen
Abstract: The ability to control access to sensitive data in accordance with policy is perhaps the most fundamental security requirement. Despite over four decades of security research, the limited ability for existing access control mechanisms to enforce ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913195

3. Enabling an Enterprise-wide, Data-centric Operating Environment
Published: 6/21/2013
Authors: David F Ferraiolo, Serban Ilie Gavrila, Wayne Jansen
Abstract: Although access control (AC) currently plays an important role in securing DSs, if properly envisaged and designed, access control can serve a more vital role in computing than one might expect. The Policy Machine (PM), a framework for AC developed a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912691

4. The Policy Machine: a Novel Architecture and Framework for Access Control Policy Specification and Enforcement
Published: 4/1/2011
Authors: David F Ferraiolo, Vijay (Vijay) Atluri, Serban Ilie Gavrila
Abstract: The ability to control access to sensitive data in accordance with policy is perhaps the most fundamental security requirement. Despite over four decades of security research, the limited ability for existing access control mechanisms to generically ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905440

5. Specification of Attribute Relations for Access Control Policies and Constraints Using Policy Machine
Published: 8/23/2010
Authors: Chung Tong Hu, David F Ferraiolo, Serban Ilie Gavrila
Abstract: Attribute relations in access control mechanisms or languages allow accurate and efficient specification of some popular access control models. However, most of the access control systems including today s de-facto access control protocol and specifi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906086

6. Smart Cards for Mobile Devices
Published: 12/3/2007
Authors: Wayne Jansen, Serban Ilie Gavrila, Clement Seveillac
Abstract: While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorised use and access to a device¿s contents. This paper describes two novel types of Smart Car ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50839

7. Smart Card Authentication for Mobile Devices
Published: 9/1/2006
Authors: Wayne Jansen, Serban Ilie Gavrila, Clement Seveillac
Abstract: While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorized use and access to a device¿s contents. This paper describes two novel types of smart car ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150575

8. Proximity-Based Authentication for Mobile Devices
Published: 10/1/2005
Authors: Wayne Jansen, Serban Ilie Gavrila, Vlad Korolev
Abstract: While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorized use and access to a device's contents. This paper describes two location-based user aut ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150218

9. Smart Cards and Mobile Device Authentication: an Overview and Implementation
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7206
Published: 7/1/2005
Authors: Wayne Jansen, Serban Ilie Gavrila, Clement Seveillac, Vladimir Korolev
Abstract: The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but have instead become indispensable tools that offer competitive business advantages ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150220

10. Proximity Beacons and Mobile Device Authentication: an Overview and Implementation
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7200
Published: 6/1/2005
Authors: Wayne Jansen, Serban Ilie Gavrila, Vladimir Korolev
Abstract: The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but have instead become indispensable tools that offer competitive business advantages ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150219



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series