D. Richard Kuhn
   HOME

TheInfoList



OR:

Rick Kuhn is an American computer scientist and cybersecurity researcher. He is a guest researcher in the Computer Security Division at the
National Institute of Standards and Technology The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into Outline of p ...
(NIST) and affiliate faculty at
Virginia Tech The Virginia Polytechnic Institute and State University, commonly referred to as Virginia Tech (VT), is a Public university, public Land-grant college, land-grant research university with its main campus in Blacksburg, Virginia, United States ...
’s Hume Center for National Security and Technology. He contributed to the development of
Role-based access control In computer systems security, role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users, and to implementing mandatory access control (MAC) or discretionary access control, discretion ...
(RBAC) and combinatorial testing techniques through NIST’s Advanced Combinatorial Testing System (ACTS).


Early life and education

Kuhn earned an MS in computer science from the
University of Maryland, College Park The University of Maryland, College Park (University of Maryland, UMD, or simply Maryland) is a public university, public Land-grant university, land-grant research university in College Park, Maryland, United States. Founded in 1856, UMD i ...
and an MBA from the
College of William & Mary The College of William & Mary (abbreviated as W&M) is a public university, public research university in Williamsburg, Virginia, United States. Founded in 1693 under a royal charter issued by King William III of England, William III and Queen ...
.


Career

Kuhn previously worked in software development at
NCR Corporation NCR Voyix Corporation, previously known as NCR Corporation and National Cash Register, is a global software, consulting and technology company providing several professional services and Electronics, electronic products. It manufactured Self-c ...
and the
Johns Hopkins University Applied Physics Laboratory The Johns Hopkins University Applied Physics Laboratory (or simply Applied Physics Laboratory, or APL) is a not-for-profit university-affiliated research center (UARC) in Howard County, Maryland. It is affiliated with Johns Hopkins University ...
before joining NIST as a guest researcher focused on access control, software verification, and software assurance.


Role-based access control (RBAC)

In 1992, Kuhn and David Ferraiolo introduced and formalized the concept of role-based access control (RBAC) during a presentation at the 15th National Computer Security Conference. Their model proposed assigning access permissions based on defined roles within an organization, rather than directly to individual users. This approach simplified permission management, especially in large-scale systems, and provided a scalable framework for enforcing the principle of least privilege. The RBAC model gained traction in both academic and government settings and underwent further refinement through collaborative work by Ferraiolo, Kuhn, and Ravi Sandhu. In 2004, RBAC was formally standardized as
ANSI The American National Standards Institute (ANSI ) is a private nonprofit organization that oversees the development of voluntary consensus standards for products, services, processes, systems, and personnel in the United States. The organiz ...
INCITS 359-2004, making it the first standardized access control model of its kind. RBAC has since become one of the most widely deployed access control mechanisms in enterprise environments and federal systems. It is integral to a range of security frameworks and compliance standards, including the Federal Information Security Modernization Act (FISMA),
HIPAA The Health Insurance Portability and Accountability Act of 1996 (HIPAA or the Kennedy– Kassebaum Act) is a United States Act of Congress enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, ...
, and
NIST Special Publication 800-53 NIST Special Publication 800-53 is an information security standard that provides a catalog of privacy and security controls for information systems. Originally intended for U.S. federal agencies except those related to national security, sinc ...
. In 2011, ''Route Fifty'' reported that RBAC contributed over $6 billion in economic impact, citing its extensive adoption across federal agencies and private sector organizations. Kuhn's early leadership in defining and promoting RBAC laid the foundation for modern identity and access management (IAM) systems and remains a cornerstone of secure system design across critical infrastructure sectors.


Combinatorial testing and ACTS

Kuhn led the development of NIST’s Advanced Combinatorial Testing System (ACTS), applying t-way testing to improve software reliability in domains such as aerospace and defense. In a 2010 interview with ''LogiGear Magazine'', Kuhn described how ACTS reduces test case volume while maintaining fault detection. ''
SIGNAL Magazine AFCEA International (formerly called Armed Forces Communications & Electronics Association International), established in 1946, is a nonprofit membership association serving the military, government, industry, and academia as a forum for advancing ...
'' also reported on ACTS in the context of tools used by the
Department of Defense The United States Department of Defense (DoD, USDOD, or DOD) is an executive department of the U.S. federal government charged with coordinating and supervising the six U.S. armed services: the Army, Navy, Marines, Air Force, Space Force, ...
.


VoIP security

Kuhn contributed to the development of NIST Special Publication 800-58, titled ''Security Considerations for Voice Over IP Systems'', which provides guidelines for securing
Voice over IP Voice over Internet Protocol (VoIP), also known as IP telephony, is a set of technologies used primarily for voice communication sessions over Internet Protocol (IP) networks, such as the Internet. VoIP enables voice calls to be transmitted as ...
(VoIP) communications. The publication outlines various technical and operational risks associated with VoIP, including the potential for eavesdropping, traffic interception, denial of service, and compromised endpoints. As part of this effort, Kuhn co-authored recommendations for mitigating these vulnerabilities through authentication, encryption, network segmentation, and monitoring. His work supported the integration of VoIP security into federal information system policies and helped align emerging communication technologies with existing cybersecurity frameworks. In an article published by ''
CIO Magazine ''CIO'' is a magazine related to technology and IT. The magazine was founded in 1987 and is now entirely digital. The name refers to the job title chief information officer. ''CIO'' is part of Boston-based International Data Group's enterprise ...
'', Kuhn discussed the practical challenges of securing VoIP implementations, particularly the risks posed by unauthenticated traffic and inadequate endpoint protections.


Past professional activities

* Member of the
DARPA The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Adva ...
High Confidence Systems Working Group and the
IEEE The Institute of Electrical and Electronics Engineers (IEEE) is an American 501(c)(3) organization, 501(c)(3) public charity professional organization for electrical engineering, electronics engineering, and other related disciplines. The IEEE ...
Technical Committee on Operating Systems, including participation in the
POSIX The Portable Operating System Interface (POSIX; ) is a family of standards specified by the IEEE Computer Society for maintaining compatibility between operating systems. POSIX defines application programming interfaces (APIs), along with comm ...
1003.1, 1003.2, and 1201.2 working groups * Contributor to software tools, conformance test suites, and methods for formal specification analysis and cryptographic protocol verification * Co-author of the first formal definition of role-based access control (RBAC) * Contributor to the
POSIX The Portable Operating System Interface (POSIX; ) is a family of standards specified by the IEEE Computer Society for maintaining compatibility between operating systems. POSIX defines application programming interfaces (APIs), along with comm ...
Conformance Test Suite for IEEE 1003.1 * Contributor to FIPS 140-1 software assurance requirements


Research and projects

* ''Combinatorial methods in software testing'' – Combinatorial, or ''t''-way testing, is a method for improving software testing efficiency. It has been applied to systems such as AI and autonomous systems, where traditional verification methods are limited. * ''Privacy-enhancing distributed ledger technology'' – This project developed a blockchain-inspired system designed for regulatory compliance, allowing block modification and deletion to meet standards such as the
GDPR The General Data Protection Regulation (Regulation (EU) 2016/679), abbreviated GDPR, is a European Union regulation on information privacy in the European Union (EU) and the European Economic Area (EEA). The GDPR is an important component of ...
. The system is available as an
open source Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use and view the source code, design documents, or content of the product. The open source model is a decentrali ...
distribution.


Selected NIST publications

* * * * * *


Patents

* U.S. Patent #6,023,765 – Implementation of Role-Based Access Control in Multi-level Secure Systems * U.S. Patent #10,552,300 – Oracle-Free Match Testing of a Program Using Covering Arrays and Equivalence Classes * U.S. Patent #11,175,826 – Data Block Matrix (privacy-preserving distributed ledger)


Publications

Kuhn has authored or co-authored over 200 publications on cybersecurity, access control, and software testing.


Honors and awards

* Fellow of the
Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers (IEEE) is an American 501(c)(3) public charity professional organization for electrical engineering, electronics engineering, and other related disciplines. The IEEE has a corporate office ...
(IEEE) * Fellow of the
American Association for the Advancement of Science The American Association for the Advancement of Science (AAAS) is a United States–based international nonprofit with the stated mission of promoting cooperation among scientists, defending scientific freedom, encouraging scientific responsib ...
(AAAS) * Fellow of the Washington Academy of Sciences * Member,
Association for Computing Machinery The Association for Computing Machinery (ACM) is a US-based international learned society for computing. It was founded in 1947 and is the world's largest scientific and educational computing society. The ACM is a non-profit professional membe ...
(ACM) * Member, Eta Kappa Nu engineering honor society * Member, Beta Gamma Sigma business and finance honor society * Associate editor, ''IEEE Computer'' and ''IEEE Transactions on Reliability'' * Editorial board and department editor, ''IEEE Security & Privacy'' and ''IEEE IT Professional'' * IEEE Reliability Society Lifetime Achievement Award – for contributions to combinatorial testing methods * IEEE Innovation in Societal Infrastructure Award – for work on
role-based access control In computer systems security, role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users, and to implementing mandatory access control (MAC) or discretionary access control, discretion ...
* Annual Computer Security Applications Conference Test-of-Time Award (2019) – for the paper "Role Based Access Control: Features and Motivations" (with David Ferraiolo and Jeffrey Cugini) * Most Influential Paper Award, ICST (2023) – for "ACTS: A Combinatorial Test Generation Tool" (with Yu Lei, Raghu Kacker, and L. Yu) * Best Poster Award, Hot Topics in Science of Security (2018) – for "What Proportion of Vulnerabilities Can Be Attributed to Ordinary Coding Errors?" (with M.S. Raunak and Raghu Kacker) * Silver Medal for scientific and engineering achievement,
United States Department of Commerce The United States Department of Commerce (DOC) is an executive department of the U.S. federal government. It is responsible for gathering data for business and governmental decision making, establishing industrial standards, catalyzing econ ...
(2014) – for contributions to combinatorial testing * Excellence in Technology Transfer Award, Federal Laboratory Consortium – Mid-Atlantic Region (2009) – for methods and tools in combinatorial testing * Best Standards Contribution Award,
NIST The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into physical s ...
/ITL (2008) * Best Journal Paper Award, NIST/ITL (2007) * Outstanding Authorship Award, NIST/ITL (2003) * Gold Medal for scientific and engineering achievement, U.S. Department of Commerce (2002) – for co-development of
RBAC In computer systems security, role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users, and to implementing mandatory access control (MAC) or discretionary access control (DAC). Ro ...
* Excellence in Technology Transfer Award, Federal Laboratory Consortium (1998) – for co-development of RBAC * Bronze Medal, NIST/U.S. Department of Commerce (1990) – for contributions to
POSIX The Portable Operating System Interface (POSIX; ) is a family of standards specified by the IEEE Computer Society for maintaining compatibility between operating systems. POSIX defines application programming interfaces (APIs), along with comm ...
standardization and conformance test suite co-development


Books (as author/co-author)

* ''Role‑Based Access Control'' (2nd ed.), by David F. Ferraiolo, D. Richard Kuhn, and Ramaswamy Chandrasekarouli (Artech House, January 31, 2007). 418 pp. * ''Attribute‑Based Access Control'', by Vincent C. Hu, David F. Ferraiolo, Ramaswamy Chandrasekarouli, and D. Richard Kuhn (Artech House, October 31, 2017). 280 pp.


Media mentions

* Route Fifty – “Need a Way to Control Network Access? Government Already Has It” (April 4, 2011) * CIO Magazine – “Dial VoIP For Vulnerability” (~2005) * LogiGear Magazine – November 2010 issue on ACTS * AFCEA’s SIGNAL Media – Covers NIST’s release of the Advanced Combinatorial Testing System (ACTS) and quotes Rick Kuhn on improvements to the tool’s constraint handling interface. * FedTech Magazine – “Don’t Fear Telework, But Set Smart Security Parameters” (December 14, 2009) * CERIAS – “Security Seminar: Rick Kuhn on Software Assurance and Combinatorial Testing” (April 10, 2024) * ANSI Blog – Highlights Rick Kuhn’s role in the development of the RBAC standard. * StateTech Magazine – Author page for Rick Kuhn, presenting his contributions and bio as a NIST computer scientist with expertise in cybersecurity and combinatorial testing.


Legacy and impact

Kuhn's work on role-based access control (RBAC) has had a lasting influence on cybersecurity policy and practice. The RBAC model, which he co-developed in the early 1990s, became the foundation for
ANSI The American National Standards Institute (ANSI ) is a private nonprofit organization that oversees the development of voluntary consensus standards for products, services, processes, systems, and personnel in the United States. The organiz ...
standard INCITS 359-2004 and has been widely adopted in both government and industry systems to enforce access policies and reduce administrative complexity. His contributions to combinatorial testing have advanced the field of software assurance. The NIST-developed Advanced Combinatorial Testing System has been used to improve the reliability and efficiency of software testing across sectors such as defense, aerospace, and AI-enabled systems. These methods have gained relevance in testing machine learning and autonomous systems, where traditional approaches often fall short. Kuhn's work has been cited in federal standards, international technical publications, and industry best practices. He has received multiple awards from professional societies and government agencies in recognition of his impact on software engineering and information security. After retiring from NIST in 2025, Kuhn joined the Hume Center for National Security and Technology at
Virginia Tech The Virginia Polytechnic Institute and State University, commonly referred to as Virginia Tech (VT), is a Public university, public Land-grant college, land-grant research university with its main campus in Blacksburg, Virginia, United States ...
as affiliate faculty, where he continues research on assurance of autonomous systems through combinatorial methods.


See also

*
Role-based access control In computer systems security, role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users, and to implementing mandatory access control (MAC) or discretionary access control, discretion ...
*
Access control In physical security and information security, access control (AC) is the action of deciding whether a subject should be granted or denied access to an object (for example, a place or a resource). The act of ''accessing'' may mean consuming ...
*
National Institute of Standards and Technology The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into Outline of p ...
*
Software testing Software testing is the act of checking whether software satisfies expectations. Software testing can provide objective, independent information about the Quality (business), quality of software and the risk of its failure to a User (computin ...
*
Cybersecurity standards Information security standards (also cyber security standards) are techniques generally outlined in published materials that attempt to protect a user's or organization's cyber environment. This environment includes users themselves, networks, devi ...
*
Ron Ross Ronald S. Ross is an American computer scientist, retired United States Army lieutenant colonel, and senior cybersecurity advisor best known for leading the development of federal information security standards at the National Institute of Standa ...


References

{{Authority control Living people American computer scientists National Institute of Standards and Technology people Fellows of the IEEE Fellows of the American Association for the Advancement of Science University of Maryland, College Park alumni College of William & Mary alumni Software testing people Access control American technology writers