Ramaswamy Chandramouli
Ramaswamy Chandramouli
Supervisory Computer Scientist, Computer Security Division, Information Technology Lab, NIST
Dirección de correo verificada de nist.gov
Título
Citado por
Citado por
Año
Role-based access control
D Ferraiolo, DR Kuhn, R Chandramouli
Artech House, 2003
6729*2003
Attribute-based access control
VC Hu, DR Kuhn, DF Ferraiolo, J Voas
Computer 48 (2), 85-88, 2015
2682015
Role-based access control features in commercial database management systems
C Ramaswamy, R Sandhu
Proc. 21st Nat’l Information Systems Security Conf, 503-511, 1998
1711998
Role-based access control features in commercial database management systems
C Ramaswamy, R Sandhu
Proc. 21st Nat’l Information Systems Security Conf, 503-511, 1998
1711998
Application of XML tools for enterprise-wide RBAC implementation tasks
R Chandramouli
Proceedings of the fifth ACM workshop on Role-based access control, 11-18, 2000
942000
A framework for multiple authorization types in a healthcare application system
R Chandramouli
Seventeenth Annual Computer Security Applications Conference, 137-148, 2001
842001
Cryptographic key management issues and challenges in cloud services
R Chandramouli, M Iorga, S Chokhani
Secure Cloud Computing, 1-30, 2014
732014
Extensible access control markup language (XACML) and next generation access control (NGAC)
D Ferraiolo, R Chandramouli, R Kuhn, V Hu
Proceedings of the 2016 ACM International Workshop on Attribute Based Access …, 2016
532016
Model-based approach to security test automation
M Blackburn, R Busser, A Nauman, R Chandramouli
Proceeding of Quality Week 2001, 2001
502001
The role control center: features and case studies
DF Ferraiolo, R Chandramouli, GJ Ahn, SI Gavrila
Proceedings of the eighth ACM symposium on Access control models and …, 2003
472003
Role-based access control
David F.. Ferraiolo, DR Kuhn, R Chandramouli
Artech House, 2003
432003
Secure domain name system (DNS) deployment guide
R Chandramouli, S Rose
NIST Special Publication 800, 81-2, 2006
402006
State of security readiness
R Chandramouli, P Mell
XRDS: Crossroads, The ACM Magazine for Students 16 (3), 23-25, 2010
392010
Challenges in securing the domain name system
R Chandramouli, S Rose
IEEE Security & Privacy 4 (1), 84-87, 2006
362006
Cost effective uses of formal methods in verification and validation
DR Kuhn, R Chandramouli
Foundations Verification and Validation Workshop, 2002
352002
Automated testing of security functions using a combined model and interface-driven approach
R Chandramouli, M Blackburn
37th Annual Hawaii International Conference on System Sciences, 2004 …, 2004
272004
Business process driven framework for defining an access control service based on roles and rules
R Chandramouli
23rd National information systems security conference, 2000
222000
Biometric Specifications for Personal Identity Verification
P Grother, W Salamon, R Chandramouli
NIST Special Publication 800, 76-2, 2013
192013
Challenges and issues within cloud computing technology
O Ali, J Soar
The fifth international conference on cloud computing, GRIDs, and …, 2014
162014
Secure cloud computing
S Jajodia, K Kant, P Samarati, A Singhal, V Swarup, C Wang
Springer, 2014
162014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20