Biometric data specification for Personal Identity Verification [[electronic resource] /] / Charles Wilson, Patrick Grother, Ramaswamy Chandramouli
| Biometric data specification for Personal Identity Verification [[electronic resource] /] / Charles Wilson, Patrick Grother, Ramaswamy Chandramouli |
| Autore | Wilson Charles L. <1942-> |
| Edizione | [Draft.] |
| Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2005] |
| Descrizione fisica | vi, 27 pages : digital, PDF file |
| Altri autori (Persone) |
GrotherPatrick J
ChandramouliRamaswamy |
| Collana | NIST special publication ;Information security |
| Soggetto topico |
Biometric identification - Specifications
Identification cards - Specifications Smart cards - Specifications |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910693976803321 |
Wilson Charles L. <1942->
|
||
| Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2005] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cryptographic key management issues & challenges in cloud services / / Ramaswamy Chandramouli; Michaela Iorga; Santosh Chokhani
| Cryptographic key management issues & challenges in cloud services / / Ramaswamy Chandramouli; Michaela Iorga; Santosh Chokhani |
| Autore | Chandramouli Ramaswamy |
| Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2013 |
| Descrizione fisica | 1 online resource (35 pages) : illustrations (color) |
| Altri autori (Persone) |
ChandramouliRamaswamy
ChokhaniSantosh IorgaMichaela |
| Collana | NISTIR |
| Soggetto topico |
Cloud computing
Data encryption (Computer science) |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910710512803321 |
Chandramouli Ramaswamy
|
||
| Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Derived PIV application and data model test guidelines / / David Cooper; Hildegard Ferraiolo; Ramaswamy Chandramouli; Nabil Ghadiali; Jason Mohler; Steven Brady
| Derived PIV application and data model test guidelines / / David Cooper; Hildegard Ferraiolo; Ramaswamy Chandramouli; Nabil Ghadiali; Jason Mohler; Steven Brady |
| Autore | Cooper David |
| Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2016 |
| Descrizione fisica | 1 online resource (143 pages) : illustrations (color) |
| Altri autori (Persone) |
BradySteven
ChandramouliRamaswamy CooperDavid FerraioloHildegard GhadialiNabil MohlerJason |
| Collana | NIST special publication |
| Soggetto topico |
Authentication
Identification cards |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910711167103321 |
Cooper David
|
||
| Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Interfaces for Personal Identity Verification [[electronic resource] /] / National Institute of Standards and Technology, Technology Administration, U.S. Dept. of Commerce
| Interfaces for Personal Identity Verification [[electronic resource] /] / National Institute of Standards and Technology, Technology Administration, U.S. Dept. of Commerce |
| Autore | Chandramouli Ramaswamy |
| Edizione | [Draft.] |
| Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2005] |
| Descrizione fisica | 1 online resource (4 unnumbered volumes) : illustrations (some color) |
| Altri autori (Persone) | ChandramouliRamaswamy |
| Collana | NIST special publication ;Information security |
| Soggetto topico |
Biometric identification - Specifications
Identification cards - Specifications Smart cards - Specifications |
| Soggetto non controllato |
FIPS 201
HSPD-12 PACS PIV PIV authentication mechanisms Smart Card |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Pt. 1 End-point PIV card application namespace, data model and representation -- Pt. 2 End-point PIV card application card command interface -- Pt. 3 End-point PIV client application programming interface -- Pt. 4 The PIV transitional interface and data model specification. |
| Record Nr. | UNINA-9910693110903321 |
Chandramouli Ramaswamy
|
||
| Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2005] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Interfaces for personal identity verification - part 1 : PIV card application namespace, data model and representation / / David Cooper, Hildegard Ferraiolo, Ketan Mehta, Salvatore Francomacaro, Ramaswamy Chandramouli, Jason Mohler
| Interfaces for personal identity verification - part 1 : PIV card application namespace, data model and representation / / David Cooper, Hildegard Ferraiolo, Ketan Mehta, Salvatore Francomacaro, Ramaswamy Chandramouli, Jason Mohler |
| Autore | Cooper David |
| Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2015 |
| Descrizione fisica | 1 online resource (150 pages) : illustrations (color) |
| Altri autori (Persone) |
ChandramouliRamaswamy
CooperDavid FerraioloHildegard FrancomacaroSalvatore MehtaKetan MohlerJason |
| Collana | NIST special publication |
| Soggetto topico |
Identification cards
Personal identity - Security measures |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Interfaces for personal identity verification - part 1 |
| Record Nr. | UNINA-9910709582403321 |
Cooper David
|
||
| Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Representation of PIV chain-of-trust for import and export / / Hildegard Ferraiolo; Ramaswamy Chandramouli; Ketan Mehta; Jason Mohler; Stephen Skordinski; Steven Brady
| Representation of PIV chain-of-trust for import and export / / Hildegard Ferraiolo; Ramaswamy Chandramouli; Ketan Mehta; Jason Mohler; Stephen Skordinski; Steven Brady |
| Autore | Ferraiolo Hildegard |
| Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2016 |
| Descrizione fisica | 1 online resource (48 pages) : illustrations (color) |
| Altri autori (Persone) |
BradySteven
ChandramouliRamaswamy FerraioloHildegard MehtaKetan MohlerJason SkordinskiStephen |
| Collana | NIST special publication |
| Soggetto topico |
Identification
XML (Document markup language) |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910711167203321 |
Ferraiolo Hildegard
|
||
| Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Role-based access control [[electronic resource] /] / David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli
| Role-based access control [[electronic resource] /] / David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli |
| Autore | Ferraiolo David |
| Edizione | [2nd ed.] |
| Pubbl/distr/stampa | Boston, : Artech House, c2007 |
| Descrizione fisica | 1 online resource (404 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
ChandramouliRamaswamy
KuhnD. Richard |
| Collana | Artech House information security and privacy series |
| Soggetto topico |
Computer networks - Access control
Computer security Computers - Access control |
| Soggetto genere / forma | Electronic books. |
| ISBN | 1-59693-114-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Contents; Preface; Acknowledgments; Chapter 1 Introduction; Chapter 2 Access Control: Properties, Policies, and Models; Chapter 3 Core RBAC Features; Chapter 4 Role Hierarchies; Chapter 5 SoD and Constraints in RBAC Systems; Chapter 6 RBAC, MAC, and DAC; Chapter 7 Privacy and Regulatory Issues; Chapter 8 RBAC Standards and Profiles; Chapter 9 Role-Based Administration of RBAC; Chapter 10 Role Engineering; Chapter 11 Enterprise Access Control Frameworks Using RBAC and XML Technologies; Chapter 12 Integrating RBAC with Enterprise IT Infrastructures
Chapter 13 Migrating to RBAC-Case Study: Multiline Insurance CompanyChapter 14 RBAC Features in Commercial Products; Appendix A: XML Schema for the RBAC Model; Appendix B: XML-Encoded Data for RBAC Model |
| Record Nr. | UNINA-9910454389703321 |
Ferraiolo David
|
||
| Boston, : Artech House, c2007 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Role-based access control [[electronic resource] /] / David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli
| Role-based access control [[electronic resource] /] / David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli |
| Autore | Ferraiolo David |
| Edizione | [2nd ed.] |
| Pubbl/distr/stampa | Boston, : Artech House, c2007 |
| Descrizione fisica | 1 online resource (404 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
ChandramouliRamaswamy
KuhnD. Richard |
| Collana | Artech House information security and privacy series |
| Soggetto topico |
Computer networks - Access control
Computer security Computers - Access control |
| ISBN | 1-59693-114-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Contents; Preface; Acknowledgments; Chapter 1 Introduction; Chapter 2 Access Control: Properties, Policies, and Models; Chapter 3 Core RBAC Features; Chapter 4 Role Hierarchies; Chapter 5 SoD and Constraints in RBAC Systems; Chapter 6 RBAC, MAC, and DAC; Chapter 7 Privacy and Regulatory Issues; Chapter 8 RBAC Standards and Profiles; Chapter 9 Role-Based Administration of RBAC; Chapter 10 Role Engineering; Chapter 11 Enterprise Access Control Frameworks Using RBAC and XML Technologies; Chapter 12 Integrating RBAC with Enterprise IT Infrastructures
Chapter 13 Migrating to RBAC-Case Study: Multiline Insurance CompanyChapter 14 RBAC Features in Commercial Products; Appendix A: XML Schema for the RBAC Model; Appendix B: XML-Encoded Data for RBAC Model |
| Record Nr. | UNINA-9910782015203321 |
Ferraiolo David
|
||
| Boston, : Artech House, c2007 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Role-based access control / / David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli
| Role-based access control / / David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli |
| Autore | Ferraiolo David |
| Edizione | [2nd ed.] |
| Pubbl/distr/stampa | Boston : , : Artech House, , ©2003 |
| Descrizione fisica | 1 online resource (336 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
KuhnD. Richard
ChandramouliRamaswamy |
| Collana | Artech House computer security series |
| Soggetto topico |
Computers - Access control
Computer security Computer networks - Access control |
| Soggetto genere / forma | Electronic books. |
| ISBN | 1-58053-324-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Role-Based Access Control; Contents vii; Preface xv; Acknowledgements xvii; Chapter 1 Introduction 1; Chapter 2 Access Control Policy, Models, and Mechanisms--Concepts and Examples 27; Chapter 3 Core RBAC Features 51; Chapter 4 Role Hierachies 67; Chapter 5 SoD and Constraints in RBAC Systems 91; Chapter 6 RBAC, MAC, and DAC 121; Chapter 7 NIST's Proposed RBAC Standard 141; Chapter 8 Role-Based Administration of RBAC 155; Chapter 9 Enterprise Access Control Framework Using RBAC and XML Technologies 179; Chapter 10 Integrating RBAC with Enterprise IT Infrastructures 211
Chapter 11 Migrating to RBAC--Case Study: Multiline Insurance Company 255Chapter 12 RBAC Features in Commercial Products 265; References 293; Appendix A 295; Appendix B 299; About the authors 303; Index 305 |
| Record Nr. | UNINA-9910456255303321 |
Ferraiolo David
|
||
| Boston : , : Artech House, , ©2003 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Role-based access control / / David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli
| Role-based access control / / David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli |
| Autore | Ferraiolo David |
| Edizione | [2nd ed.] |
| Pubbl/distr/stampa | Boston : , : Artech House, , ©2003 |
| Descrizione fisica | 1 online resource (336 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
KuhnD. Richard
ChandramouliRamaswamy |
| Collana | Artech House computer security series |
| Soggetto topico |
Computers - Access control
Computer security Computer networks - Access control |
| ISBN | 1-58053-324-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Role-Based Access Control; Contents vii; Preface xv; Acknowledgements xvii; Chapter 1 Introduction 1; Chapter 2 Access Control Policy, Models, and Mechanisms--Concepts and Examples 27; Chapter 3 Core RBAC Features 51; Chapter 4 Role Hierachies 67; Chapter 5 SoD and Constraints in RBAC Systems 91; Chapter 6 RBAC, MAC, and DAC 121; Chapter 7 NIST's Proposed RBAC Standard 141; Chapter 8 Role-Based Administration of RBAC 155; Chapter 9 Enterprise Access Control Framework Using RBAC and XML Technologies 179; Chapter 10 Integrating RBAC with Enterprise IT Infrastructures 211
Chapter 11 Migrating to RBAC--Case Study: Multiline Insurance Company 255Chapter 12 RBAC Features in Commercial Products 265; References 293; Appendix A 295; Appendix B 299; About the authors 303; Index 305 |
| Record Nr. | UNINA-9910780484403321 |
Ferraiolo David
|
||
| Boston : , : Artech House, , ©2003 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||