Ramaswamy Chandramouli

According to our database1, Ramaswamy Chandramouli authored at least 20 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
DETERMINING THE FORENSIC DATA REQUIREMENTS FOR INVESTIGATING HYPERVISOR ATTACKS.
Proceedings of the Advances in Digital Forensics XV, 2019

2018
Comprehensive Security Assurance Measures for Virtualized Server Environments.
Proceedings of the From Database to Cyber Security, 2018

2016
Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC).
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016

2014
Cryptographic Key Management Issues and Challenges in Cloud Services.
Proceedings of the Secure Cloud Computing, 2014

2010
State of security readiness.
ACM Crossroads, 2010

Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

2009
Open Issues in Secure DNS Deployment.
IEEE Secur. Priv., 2009

2008
Policy Specification and Enforcement for Smart ID Cards Deployment.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

2007
Infrastructure Standards for Smart ID Card Deployment.
IEEE Secur. Priv., 2007

2006
Challenges in Securing the Domain Name System.
IEEE Secur. Priv., 2006

2005
Privacy Protection of Enterprise Information through Inference Analysis.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Automated Testing of Security Functions Using a Combined Model and Interface-Driven Approach.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Using Model-Based Testing to Assess Smart Card Interoperability Conformance.
Proceedings of the 2nd International Conference Computing, 2004

Enterprise access policy enforcement for applications through hybrid models and XSLT technologies.
Proceedings of the 6th International Conference on Electronic Commerce, 2004

2003
The role control center: features and case studies.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

A Policy Validation Framework for Enterprise Authorization Specification.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2001
Proposed NIST standard for role-based access control.
ACM Trans. Inf. Syst. Secur., 2001

A Framework for Multiple Authorization Types in a Healthcare Application System.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
Application of XML tools for enterprise-wide RBAC implementation tasks.
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000


  Loading...