Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications by: Ramaswamy Chandramouli (Fed)

Search Title, Abstract, Conference, Citation, Keyword or Author
Displaying 76 - 97 of 97

Integrity Checking of DNS Zone File Data Using XSLT

December 1, 2005
Author(s)
Ramaswamy Chandramouli, Scott W. Rose
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Integrity Checking of DNS Zone File Data Using XSLT

July 1, 2005
Author(s)
Ramaswamy Chandramouli, Scott W. Rose
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Personal Identity Verification (PIV) of Federal Employees and Contractors

February 1, 2005
Author(s)
William Barker, James F. Dray Jr., Ramaswamy Chandramouli, Teresa T. Schwarzhoff, Tim Polk, Donna F. Dodson, Ketan Mehta, S Gupta, William E. Burr, Timothy Grance, National Institute of Standards and Technology (NIST)
[Superseded by FIPS 201-1 (March 2006): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50836] FIPS 201 specifies the technical and operational requirements for interoperable PIV systems that issue smart cards as identification credentials and

The Role Control Center: Features and Case Studies

June 4, 2003
Author(s)
David F. Ferraiolo, Gail-Joon Ahn, Ramaswamy Chandramouli, Serban I. Gavrila
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of products called Enterprise Security Management Systems (ESMS). ESMS products

Enterprise Access Control Frameworks Using RBAC and XML Technologies

January 1, 2003
Author(s)
Ramaswamy Chandramouli
In this chapter, we show that we can develop an Enterprise Access Control Framework using Role-based Access Control (RBAC) and Extensible Markup Language (XML) technologies. In the first section, we outline the general requirements for the Enterprise

Model-Based Approach to Security Test Automation

November 1, 2002
Author(s)
Mark Blackburn, Robert Busser, Aaron Nauman, Ramaswamy Chandramouli
Security functional testing is a costly activity typically performed by security evaluation laboratories. These laboratories have struggled to keep pace with increasing demand to test numerous product variations. This paper summarizes the results of

Cost Effective Use of Formal Methods in Verification and Validation Foundations

October 1, 2002
Author(s)
D. Richard Kuhn, Ramaswamy Chandramouli, R W. Butler
Formal methods offer the promise of significant improvements in verification and validation, and may be the only approach capable of demonstrating the absence of undesirable system behavior. But it is widely recognized that these methods are expensive, and

Cost Effective Uses of Formal Methods in Verification and Validation

October 1, 2002
Author(s)
D. Richard Kuhn, Ramaswamy Chandramouli
Formal methods offer the promise of significant improvements in verification and validation, and may be the only approach capable of demonstrating the absence of undesirable system behavior. But it is widely recognized that these methods are expensive, and

Interface-Driven Model-Based Generation of Java Test Drivers

September 3, 2002
Author(s)
Mark Blackburn, Robert Busser, Aaron Nauman, Ramaswamy Chandramouli
This paper extends prior work in model-based verification and describes interface-driven analysis that combines with a requirement model to support automated generation of Java test scripts. It describes concepts of models and test driver mappings using

Interface-Driven Model-Based Generation of Java Test Drivers

September 1, 2002
Author(s)
Mark Blackburn, Robert Busser, Aaron Nauman, Ramaswamy Chandramouli
This paper extends prior work in model-based verification and describes interface-driven analysis that combines with a requirement model to support automated generation of Java test scripts. It describes concepts of models and test driver mappings using

Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks

July 27, 2000
Author(s)
Ramaswamy Chandramouli
The use of Extensible Markup Language (XML) and its associated APIs, for information modeling and information interchange applications is being actively explored by the research community. In this paper we develop an XML Document Type Definition (DTD) for

Role-Based Access Control Features in Commercial Database Management Systems

October 9, 1998
Author(s)
Ramaswamy Chandramouli, R. Sandhu
This paper analyzes and compares role-based access control (RBAC) features supported in the most recent versions of three popular commercial database management systems: Informix Online Dynamic Server Version 7.2, Oracle Enterprise Server Version 8.0 and
Was this page helpful?