Ramaswamy Chandramouli
Ramaswamy Chandramouli
Supervisory Computer Scientist, Computer Security Division, Information Technology Lab, NIST
Dirección de correo verificada de nist.gov
TítuloCitado porAño
Role-based access control
D Ferraiolo, DR Kuhn, R Chandramouli
Artech House, 2003
6675*2003
Attribute-based access control
VC Hu, DR Kuhn, DF Ferraiolo, J Voas
Computer 48 (2), 85-88, 2015
2132015
Role-based access control features in commercial database management systems
C Ramaswamy, R Sandhu
Proc. 21st Nat’l Information Systems Security Conf, 503-511, 1998
1651998
Role-based access control features in commercial database management systems
C Ramaswamy, R Sandhu
Proc. 21st Nat’l Information Systems Security Conf, 503-511, 1998
1651998
Application of XML tools for enterprise-wide RBAC implementation tasks
R Chandramouli
Proceedings of the fifth ACM workshop on Role-based access control, 11-18, 2000
932000
A framework for multiple authorization types in a healthcare application system
R Chandramouli
Seventeenth Annual Computer Security Applications Conference, 137-148, 2001
822001
Cryptographic key management issues and challenges in cloud services
R Chandramouli, M Iorga, S Chokhani
Secure Cloud Computing, 1-30, 2014
692014
Model-based approach to security test automation
M Blackburn, R Busser, A Nauman, R Chandramouli
Proceeding of Quality Week 2001, 2001
502001
The role control center: features and case studies
DF Ferraiolo, R Chandramouli, GJ Ahn, SI Gavrila
Proceedings of the eighth ACM symposium on Access control models and …, 2003
462003
Extensible access control markup language (XACML) and next generation access control (NGAC)
D Ferraiolo, R Chandramouli, R Kuhn, V Hu
Proceedings of the 2016 ACM International Workshop on Attribute Based Access …, 2016
412016
Secure domain name system (DNS) deployment guide
R Chandramouli, S Rose
NIST Special Publication 800, 81-2, 2006
412006
Role-based access control
David F.. Ferraiolo, DR Kuhn, R Chandramouli
Artech House, 2003
392003
Cost effective uses of formal methods in verification and validation
DR Kuhn, R Chandramouli
Foundations Verification and Validation Workshop, 2002
362002
State of security readiness
R Chandramouli, P Mell
XRDS: Crossroads, The ACM Magazine for Students 16 (3), 23-25, 2010
322010
Challenges in securing the domain name system
R Chandramouli, S Rose
IEEE Security & Privacy 4 (1), 84-87, 2006
312006
Automated testing of security functions using a combined model and interface-driven approach
R Chandramouli, M Blackburn
37th Annual Hawaii International Conference on System Sciences, 2004 …, 2004
272004
Biometric Specifications for Personal Identity Verification
P Grother, W Salamon, R Chandramouli
NIST Special Publication 800, 76-2, 2013
252013
Business process driven framework for defining an access control service based on roles and rules
R Chandramouli
23rd National information systems security conference, 2000
212000
Challenges and issues within cloud computing technology
O Ali, J Soar
The fifth international conference on cloud computing, GRIDs, and …, 2014
152014
Secure cloud computing
S Jajodia, K Kant, P Samarati, A Singhal, V Swarup, C Wang
Springer, 2014
132014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20