An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
https://www.nist.gov/people/david-ferraiolo
David Ferraiolo (Fed)
Group Manager for Secure Systems and Applications Group, Computer Scientist
Joanna DeFranco, Joshua Roberts, David Ferraiolo, Daniel Compton
Objective: To address database interoperability challenges to improve collaboration among disparate organizations. Materials and Methods: We developed a
Joanna DeFranco, David Ferraiolo, Joshua Roberts, D. Richard Kuhn
Sharing data among disparate organizations can be extremely difficult, when the data comes from different database management systems (DBMS). Most problematic
Joanna DeFranco, David F. Ferraiolo, D. Richard Kuhn, Joshua D. Roberts
Sharing data between different organizations is a challenge primarily due to database management systems (DBMSs) being different types that impose different
David F. Ferraiolo, Joanna DeFranco, D. Richard Kuhn, Joshua D. Roberts
Distributed systems have always presented complex challenges, and technology trends are in many ways making the software designer's job more difficult. In
Chung Tong Hu, David F. Ferraiolo, David R. Kuhn, Adam Schnitzer, Kenneth Sandlin, Robert Miller, Karen Scarfone
[Includes updates as of August 2, 2019] This document provides Federal agencies with a definition of attribute based access control (ABAC). ABAC is a logical
An access control system for managing and enforcing an attribute based access control (ABAC) policy includes: a minimum ABAC implementation that produces a representation access control list in an ABAC policy system; and a local host system that produces a resource repository access control list in
An access control system for managing and enforcing an attribute based access control (ABAC) policy includes: a minimum ABAC implementation that produces a representation access control list in an ABAC policy system; and a local host system that produces a resource repository access control list in
A computer-implemented method included: receiving, by an access manager, a query from a source; communicating the query from the access manager to a translator; translating the query into a next generation access control (NGAC) input; communicating the NGAC input to an NGAC engine, the NGAC engine