A role-based access control model and reference implementation within a corporate intranet DF Ferraiolo, JF Barkley, DR Kuhn ACM Transactions on Information and System Security (TISSEC) 2 (1), 34-64, 1999 | 4978 | 1999 |
Proposed NIST standard for role-based access control DF Ferraiolo, R Sandhu, S Gavrila, DR Kuhn, R Chandramouli ACM Transactions on Information and System Security (TISSEC) 4 (3), 224-274, 2001 | 4043 | 2001 |
Role-based access control features in commercial database management systems C Ramaswamy, R Sandhu Proc. 21st Nat’l Information Systems Security Conf, 503-511, 1998 | 181 | 1998 |
Extensible access control markup language (XACML) and next generation access control (NGAC) D Ferraiolo, R Chandramouli, R Kuhn, V Hu Proceedings of the 2016 ACM International Workshop on Attribute Based Access …, 2016 | 143 | 2016 |
Cryptographic key management issues and challenges in cloud services R Chandramouli, M Iorga, S Chokhani Secure Cloud Computing, 1-30, 2013 | 136 | 2013 |
Application of XML tools for enterprise-wide RBAC implementation tasks R Chandramouli Proceedings of the fifth ACM workshop on Role-based access control, 11-18, 2000 | 105 | 2000 |
Role-based access control. Artech House DF Ferraiolo, DR Kuhn, R Chandramouli Inc., Norwood, MA, USA, 2003 | 98 | 2003 |
A framework for multiple authorization types in a healthcare application system R Chandramouli Seventeenth Annual Computer Security Applications Conference, 137-148, 2001 | 87 | 2001 |
Microservices-based application systems R Chandramouli NIST Special Publication 800 (204), 800-204, 2019 | 79 | 2019 |
Model-based approach to security test automation M Blackburn, R Busser, A Nauman, R Chandramouli Proceeding of Quality Week 2001, 2001 | 58 | 2001 |
Building secure microservices-based applications using service-mesh architecture R Chandramouli, Z Butcher NIST Special Publication 800, 204A, 2020 | 55 | 2020 |
Secure domain name system (DNS) deployment guide R Chandramouli, S Rose NIST Special Publication 800, 81-2, 2006 | 55 | 2006 |
A comparison of attribute based access control (ABAC) standards for data service applications D Ferraiolo, R Chandramouli, V Hu, R Kuhn NIST Special Publication 800 (2016), 178, 2016 | 53 | 2016 |
Role-based access control [electronic resource] DR Kuhn, R Chandramouli Artech House, 2003 | 48 | 2003 |
The role control center: Features and case studies DF Ferraiolo, R Chandramouli, GJ Ahn, SI Gavrila Proceedings of the eighth ACM symposium on Access control models and …, 2003 | 47 | 2003 |
State of security readiness R Chandramouli, P Mell XRDS: Crossroads, The ACM Magazine for Students 16 (3), 23-25, 2010 | 45 | 2010 |
Attribute-Based Access Control VC Hu, DF Ferraiolo, R Chandramouli, DR Kuhn Artech House, 2017 | 44 | 2017 |
Challenges in securing the domain name system R Chandramouli, S Rose IEEE Security & Privacy 4 (1), 84-87, 2006 | 40 | 2006 |
Cost effective uses of formal methods in verification and validation DR Kuhn, R Chandramouli D. Richard Kuhn, Ramaswamy Chandramouli, 2002 | 38 | 2002 |
Biometric specifications for personal identity verification P Grother, W Salamon, R Chandramouli NIST Special Publication 800, 76-2, 2013 | 29 | 2013 |