default search action
Ravi S. Sandhu
Person information
- affiliation: University of Texas at San Antonio
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j89]Tanjila Mawla, Maanak Gupta, Safwa Ameer, Ravi Sandhu:
The $\mathrm {ACAC_{D}}$ model for mutable activity control and chain of dependencies in smart and connected systems. Int. J. Inf. Sec. 23(5): 3283-3310 (2024) - [j88]Safwa Ameer, Lopamudra Praharaj, Ravi Sandhu, Smriti Bhatt, Maanak Gupta:
ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model. ACM Trans. Priv. Secur. 27(3): 22:1-22:36 (2024) - [i14]Jingwen Fan, Yi He, Bo Tang, Qi Li, Ravi S. Sandhu:
Ruledger: Ensuring Execution Integrity in Trigger-Action IoT Platforms. CoRR abs/2402.19011 (2024) - [i13]Tanjila Mawla, Maanak Gupta, Ravi S. Sandhu:
Specification and Enforcement of Activity Dependency Policies using XACML. CoRR abs/2403.10092 (2024) - 2023
- [j87]Maanak Gupta, Ravi S. Sandhu, Tanjila Mawla, James O. Benson:
Reachability Analysis for Attributes in ABAC With Group Hierarchy. IEEE Trans. Dependable Secur. Comput. 20(1): 841-858 (2023) - [j86]Safwa Ameer, James O. Benson, Ravi S. Sandhu:
Hybrid Approaches (ABAC and RBAC) Toward Secure Access Control in Smart Home IoT. IEEE Trans. Dependable Secur. Comput. 20(5): 4032-4051 (2023) - [c261]Safwa Ameer, Ram Krishnan, Ravi S. Sandhu, Maanak Gupta:
Utilizing The DLBAC Approach Toward a ZT Score-based Authorization for IoT Systems. CODASPY 2023: 283-285 - [i12]Tanjila Mawla, Maanak Gupta, Safwa Ameer, Ravi S. Sandhu:
The ACAC_D Model for Mutable Activity Control and Chain of Dependencies in Smart and Collaborative Systems. CoRR abs/2308.01783 (2023) - 2022
- [b1]Maanak Gupta, Smriti Bhatt, Asma Hassan Alshehri, Ravi S. Sandhu:
Access Control Models and Architectures For IoT and Cyber Physical Systems. Springer 2022, ISBN 978-3-030-81088-7, pp. 1-173 - [j85]Safwa Ameer, James O. Benson, Ravi S. Sandhu:
An Attribute-Based Approach toward a Secured Smart-Home IoT Access Control and a Comparison with a Role-Based Approach. Inf. 13(2): 60 (2022) - [j84]Maanak Gupta, James O. Benson, Farhan Patwa, Ravi S. Sandhu:
Secure V2V and V2I Communication in Intelligent Transportation Using Cloudlets. IEEE Trans. Serv. Comput. 15(4): 1912-1925 (2022) - [c260]Mehrnoosh Shakarami, James O. Benson, Ravi S. Sandhu:
Blockchain-Based Administration of Access in Smart Home IoT. SAT-CPS@CODASPY 2022: 57-66 - [c259]Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, Mehrnoosh Shakarami, Ravi S. Sandhu:
Toward Deep Learning Based Access Control. CODASPY 2022: 143-154 - [c258]Elisa Bertino, Ravi S. Sandhu, Bhavani Thuraisingham, Indrakshi Ray, Wenjia Li, Maanak Gupta, Sudip Mittal:
Security and Privacy for Emerging IoT and CPS Domains. CODASPY 2022: 336-337 - [c257]Lopamudra Praharaj, Safwa Ameer, Maanak Gupta, Ravi S. Sandhu:
Attributes Aware Relationship-based Access Control for Smart IoT Systems. CIC 2022: 72-81 - [c256]Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, Ravi S. Sandhu:
Administration of Machine Learning Based Access Control. ESORICS (2) 2022: 189-210 - [c255]Mohammad Nur Nobi, Ram Krishnan, Ravi S. Sandhu:
Adversarial Attacks in Machine Learning Based Access Control. itaDATA 2022: 3-14 - [c254]Tanjila Mawla, Maanak Gupta, Ravi S. Sandhu:
BlueSky: Activity Control: A Vision for "Active" Security Models for Smart Collaborative Systems. SACMAT 2022: 207-216 - [c253]Safwa Ameer, Maanak Gupta, Smriti Bhatt, Ravi S. Sandhu:
BlueSky: Towards Convergence of Zero Trust Principles and Score-Based Authorization for IoT Enabled Smart Systems. SACMAT 2022: 235-244 - [c252]Mehrnoosh Shakarami, James O. Benson, Ravi S. Sandhu:
Scenario-Driven Device-to-Device Access Control in Smart Home IoT. TPS-ISA 2022: 217-228 - [i11]Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, Mehrnoosh Shakarami, Ravi S. Sandhu:
Toward Deep Learning Based Access Control. CoRR abs/2203.15124 (2022) - [i10]Tanjila Mawla, Maanak Gupta, Ravi S. Sandhu:
BlueSky: Activity Control: A Vision for "Active" Security Models for Smart Collaborative Systems. CoRR abs/2205.08852 (2022) - [i9]Mohammad Nur Nobi, Maanak Gupta, Lopamudra Praharaj, Mahmoud Abdelsalam, Ram Krishnan, Ravi S. Sandhu:
Machine Learning in Access Control: A Taxonomy and Survey. CoRR abs/2207.01739 (2022) - 2021
- [j83]Jeffrey C. Kimmell, Andrew McDole, Mahmoud Abdelsalam, Maanak Gupta, Ravi S. Sandhu:
Recurrent Neural Networks Based Online Behavioural Malware Detection Techniques for Cloud Infrastructure. IEEE Access 9: 68066-68080 (2021) - [j82]Smriti Bhatt, Thanh Kim Pham, Maanak Gupta, James O. Benson, Jaehong Park, Ravi S. Sandhu:
Attribute-Based Access Control for AWS Internet of Things and Secure Industries of the Future. IEEE Access 9: 107200-107223 (2021) - [j81]Jaehong Park, Ravi S. Sandhu, Maanak Gupta, Smriti Bhatt:
Activity Control Design Principles: Next Generation Access Control for Smart and Collaborative Systems. IEEE Access 9: 151004-151022 (2021) - [j80]Jin Han, Wanyu Zang, Meng Yu, Ravi S. Sandhu:
Quantify Co-Residency Risks in the Cloud Through Deep Learning. IEEE Trans. Dependable Secur. Comput. 18(4): 1568-1579 (2021) - [j79]Maanak Gupta, Feras M. Awaysheh, James O. Benson, Mamoun Alazab, Farhan Patwa, Ravi S. Sandhu:
An Attribute-Based Access Control for Cloud Enabled Industrial Smart Vehicles. IEEE Trans. Ind. Informatics 17(6): 4288-4297 (2021) - [c251]Safwa Ameer, Ravi S. Sandhu:
The HABAC Model for Smart Home IoT and Comparison to EGRBAC. SAT-CPS@CODASPY 2021: 39-48 - [c250]Mehrnoosh Shakarami, Ravi S. Sandhu:
Role-Based Administration of Role-Based Smart Home IoT. SAT-CPS@CODASPY 2021: 49-58 - [c249]Shuvra Chakraborty, Ravi S. Sandhu:
Formal Analysis of ReBAC Policy Mining Feasibility. CODASPY 2021: 197-207 - [c248]John Heaps, Ram Krishnan, Yufei Huang, Jianwei Niu, Ravi S. Sandhu:
Access Control Policy Generation from User Stories Using Machine Learning. DBSec 2021: 171-188 - [c247]Na Shi, Bo Tang, Ravi S. Sandhu, Qi Li:
DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things. DBSec 2021: 278-290 - [c246]Shuvra Chakraborty, Ravi S. Sandhu:
On Feasibility of Attribute-Aware Relationship-Based Access Control Policy Mining. DBSec 2021: 393-405 - [c245]Jingwen Fan, Yi He, Bo Tang, Qi Li, Ravi S. Sandhu:
Ruledger: Ensuring Execution Integrity in Trigger-Action IoT Platforms. INFOCOM 2021: 1-10 - [c244]Maanak Gupta, Ravi S. Sandhu:
Towards Activity-Centric Access Control for Smart Collaborative Ecosystems. SACMAT 2021: 155-164 - [c243]Ravi S. Sandhu:
Access Control Convergence: Challenges and Opportunities. SECRYPT 2021: 9 - [c242]Maanak Gupta, James O. Benson, Farhan Patwa, Ravi S. Sandhu:
Secure V2V and V2I Communication in Intelligent Transportation using Cloudlets. SERVICES 2021: 13 - [c241]Glen Cathey, James O. Benson, Maanak Gupta, Ravi S. Sandhu:
Edge Centric Secure Data Sharing with Digital Twins in Smart Ecosystems. TPS-ISA 2021: 70-79 - [i8]Maanak Gupta, Ravi S. Sandhu:
Reachability Analysis for Attributes in ABAC with Group Hierarchy. CoRR abs/2101.03736 (2021) - [i7]Maanak Gupta, Ravi S. Sandhu:
Towards Activity-Centric Access Control for Smart Collaborative Ecosystems. CoRR abs/2102.11484 (2021) - [i6]Glen Cathey, James O. Benson, Maanak Gupta, Ravi S. Sandhu:
Edge Centric Secure Data Sharing with Digital Twins in Smart Ecosystems. CoRR abs/2110.04691 (2021) - 2020
- [j78]Sai Sree Laya Chukkapalli, Sudip Mittal, Maanak Gupta, Mahmoud Abdelsalam, Anupam Joshi, Ravi S. Sandhu, Karuna P. Joshi:
Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem. IEEE Access 8: 164045-164064 (2020) - [j77]Naiwei Liu, Meng Yu, Wanyu Zang, Ravi S. Sandhu:
Cost and Effectiveness of TrustZone Defense and Side-Channel Attack on ARM Platform. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(4): 1-15 (2020) - [j76]P. V. Rajkumar, Ravi S. Sandhu:
Safety Decidability for Pre-Authorization Usage Control with Identifier Attribute Domains. IEEE Trans. Dependable Secur. Comput. 17(3): 465-478 (2020) - [c240]Abdullah S. Al-Alaj, Ram Krishnan, Ravi S. Sandhu:
ParaSDN: An Access Control Model for SDN Applications based on Parameterized Roles and Permissions. CIC 2020: 107-116 - [c239]Sina Sontowski, Maanak Gupta, Sai Sree Laya Chukkapalli, Mahmoud Abdelsalam, Sudip Mittal, Anupam Joshi, Ravi S. Sandhu:
Cyber Attacks on Smart Farming Infrastructure. CIC 2020: 135-143 - [c238]Safwa Ameer, James O. Benson, Ravi S. Sandhu:
The EGRBAC Model for Smart Home IoT. IRI 2020: 457-462 - [c237]Smriti Bhatt, Ravi S. Sandhu:
ABAC-CC: Attribute-Based Access Control and Communication Control for Internet of Things. SACMAT 2020: 203-212 - [c236]Smriti Bhatt, Ravi S. Sandhu:
Convergent Access Control to Enable Secure Smart Communities. TPS-ISA 2020: 148-156 - [c235]Abdullah S. Al-Alaj, Ravi S. Sandhu, Ram Krishnan:
A Model for the Administration of Access Control in Software Defined Networking using Custom Permissions. TPS-ISA 2020: 169-178 - [c234]Naiwei Liu, Meng Yu, Wanyu Zang, Ravi S. Sandhu:
On the Cost-Effectiveness of TrustZone Defense on ARM Platform. WISA 2020: 203-214 - [i5]Maanak Gupta, James O. Benson, Farhan Patwa, Ravi S. Sandhu:
Secure V2V and V2I Communication in Intelligent Transportation using Cloudlets. CoRR abs/2001.04041 (2020)
2010 – 2019
- 2019
- [j75]Gang Wang, Jaehong Park, Ravi S. Sandhu, Jun Wang, Xiaolin Gui:
Dynamic trust evaluation model based on bidding and multi-attributes for social networks. Int. J. High Perform. Comput. Netw. 13(4): 436-454 (2019) - [j74]Naiwei Liu, Wanyu Zang, Songqing Chen, Meng Yu, Ravi S. Sandhu:
Adaptive Noise Injection against Side-Channel Attacks on ARM Platform. EAI Endorsed Trans. Security Safety 6(19): e1 (2019) - [c233]Abdullah S. Al-Alaj, Ravi S. Sandhu, Ram Krishnan:
A Formal Access Control Model for SE-Floodlight Controller. SDN-NFV@CODASPY 2019: 1-6 - [c232]Maanak Gupta, James O. Benson, Farhan Patwa, Ravi S. Sandhu:
Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart Cars. CODASPY 2019: 61-72 - [c231]Mehrnoosh Shakarami, Ravi S. Sandhu:
Refresh Instead of Revoke Enhances Safety and Availability: A Formal Analysis. DBSec 2019: 301-313 - [c230]Mahmoud Abdelsalam, Ram Krishnan, Ravi S. Sandhu:
Online Malware Detection in Cloud Auto-scaling Systems Using Shallow Convolutional Neural Networks. DBSec 2019: 381-397 - [c229]Abdullah S. Al-Alaj, Ram Krishnan, Ravi S. Sandhu:
SDN-RBAC: An Access Control Model for SDN Controller Applications. ICCCS 2019: 1-8 - [c228]Shuvra Chakraborty, Ravi S. Sandhu, Ram Krishnan:
On the Feasibility of Attribute-Based Access Control Policy Mining. IRI 2019: 245-252 - [c227]Mehrnoosh Shakarami, Ravi S. Sandhu:
Safety and Consistency of Subject Attributes for Attribute-Based Pre-Authorization Systems. NCS 2019: 248-263 - [c226]Bo Tang, Hongjuan Kang, Jingwen Fan, Qi Li, Ravi S. Sandhu:
IoT Passport: A Blockchain-Based Trust Framework for Collaborative Internet-of-Things. SACMAT 2019: 83-92 - [c225]Shuvra Chakraborty, Ravi S. Sandhu, Ram Krishnan:
On the Feasibility of RBAC to ABAC Policy Mining: A Formal Analysis. SKM 2019: 147-163 - [c224]Mehrnoosh Shakarami, Ravi S. Sandhu:
Safety and Consistency of Mutable Attributes Using Quotas: A Formal Analysis. TPS-ISA 2019: 1-9 - [i4]Maanak Gupta, James O. Benson, Farhan Patwa, Ravi S. Sandhu:
Secure Cloud Assisted Smart Cars Using Dynamic Groups and Attribute Based Access Control. CoRR abs/1908.08112 (2019) - 2018
- [c223]Mahmoud Abdelsalam, Ram Krishnan, Yufei Huang, Ravi S. Sandhu:
Malware Detection in Cloud Infrastructures Using Convolutional Neural Networks. IEEE CLOUD 2018: 162-169 - [c222]Asma Alshehri, James O. Benson, Farhan Patwa, Ravi S. Sandhu:
Access Control Model for Virtual Objects (Shadows) Communication for AWS Internet of Things. CODASPY 2018: 175-185 - [c221]Maanak Gupta, Ravi S. Sandhu:
Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things. SACMAT 2018: 193-204 - 2017
- [j73]Qi Li, Ravi S. Sandhu, Xinwen Zhang, Mingwei Xu:
Mandatory Content Access Control for Privacy Protection in Information Centric Networks. IEEE Trans. Dependable Secur. Comput. 14(5): 494-506 (2017) - [c220]Mahmoud Abdelsalam, Ram Krishnan, Ravi S. Sandhu:
Clustering-Based IaaS Cloud Monitoring. CLOUD 2017: 672-679 - [c219]Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan:
Attribute Transformation for Attribute-Based Access Control. ABAC@CODASPY 2017: 1-8 - [c218]Smriti Bhatt, Farhan Patwa, Ravi S. Sandhu:
ABAC with Group Attributes and Attribute Hierarchies Utilizing the Policy Machine. ABAC@CODASPY 2017: 17-28 - [c217]Tahmina Ahmed, Ravi S. Sandhu, Jaehong Park:
Classifying and Comparing Attribute-Based and Relationship-Based Access Control. CODASPY 2017: 59-70 - [c216]Smriti Bhatt, Farhan Patwa, Ravi S. Sandhu:
An Access Control Framework for Cloud-Enabled Wearable Internet of Things. CIC 2017: 328-338 - [c215]Maanak Gupta, Farhan Patwa, Ravi S. Sandhu:
Object-Tagged RBAC Model for the Hadoop Ecosystem. DBSec 2017: 63-81 - [c214]Ravi S. Sandhu:
Keynote talk #1: Attribute-based access control: Insights and challenges. DSC 2017: 34 - [c213]Asma Alshehri, Ravi S. Sandhu:
Access Control Models for Virtual Object Communication in Cloud-Enabled IoT. IRI 2017: 16-25 - [c212]Tahmina Ahmed, Ravi S. Sandhu:
Safety of ABAC _\alpha Is Decidable. NSS 2017: 257-272 - [c211]Smriti Bhatt, Farhan Patwa, Ravi S. Sandhu:
Access Control Model for AWS Internet of Things. NSS 2017: 721-736 - [c210]Maanak Gupta, Farhan Patwa, Ravi S. Sandhu:
POSTER: Access Control Model for the Hadoop Ecosystem. SACMAT 2017: 125-127 - [c209]Maanak Gupta, Farhan Patwa, James O. Benson, Ravi S. Sandhu:
Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment. SACMAT 2017: 183-190 - [e20]Elisa Bertino, Ravi S. Sandhu, Ram Krishnan:
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, ABAC@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017. ACM 2017, ISBN 978-1-4503-4910-9 [contents] - [e19]Elisa Bertino, Ravi S. Sandhu, Edgar R. Weippl:
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2017, Indianapolis, IN, USA, June 21-23, 2017. ACM 2017, ISBN 978-1-4503-4702-0 [contents] - 2016
- [j72]Ravi S. Sandhu:
Foreword. Intell. Autom. Soft Comput. 22(3): 341 (2016) - [j71]Lianshan Sun, Jaehong Park, Dang Nguyen, Ravi S. Sandhu:
A Provenance-Aware Access Control Framework with Typed Provenance. IEEE Trans. Dependable Secur. Comput. 13(4): 411-423 (2016) - [j70]Yuan Cheng, Jaehong Park, Ravi S. Sandhu:
An Access Control Model for Online Social Networks Using User-to-User Relationships. IEEE Trans. Dependable Secur. Comput. 13(4): 424-436 (2016) - [j69]P. V. Rajkumar, Ravi S. Sandhu:
Safety Decidability for Pre-Authorization Usage Control with Finite Attribute Domains. IEEE Trans. Dependable Secur. Comput. 13(5): 582-590 (2016) - [c208]Yun Zhang, Farhan Patwa, Ravi S. Sandhu:
Community-Based Secure Information and Resource Sharing in Azure Cloud IaaS. SCC@AsiaCCS 2016: 82-89 - [c207]P. V. Rajkumar, Ravi S. Sandhu:
POSTER: Security Enhanced Administrative Role Based Access Control Models. CCS 2016: 1802-1804 - [c206]Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan:
Label-Based Access Control: An ABAC Model with Enumerated Authorization Policy. ABAC@CODASPY 2016: 1-12 - [c205]Navid Pustchi, Farhan Patwa, Ravi S. Sandhu:
Multi Cloud IaaS with Domain Trust in OpenStack. CODASPY 2016: 121-123 - [c204]Smriti Bhatt, Farhan Patwa, Ravi S. Sandhu:
An Attribute-Based Access Control Extension for OpenStack and Its Enforcement Utilizing the Policy Machine. CIC 2016: 37-45 - [c203]Asma Alshehri, Ravi S. Sandhu:
Access Control Models for Cloud-Enabled Internet of Things: A Proposed Architecture and Research Agenda. CIC 2016: 530-538 - [c202]Navid Pustchi, Ravi S. Sandhu:
Role-Centric Circle-of-Trust in Multi-tenant Cloud IaaS. DBSec 2016: 106-121 - [c201]Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan:
A Comparison of Logical-Formula and Enumerated Authorization Policy ABAC Models. DBSec 2016: 122-129 - [c200]Tahmina Ahmed, Farhan Patwa, Ravi S. Sandhu:
Object-to-Object Relationship-Based Access Control: Model and Multi-Cloud Demonstration (Invited Paper). IRI 2016: 297-304 - [c199]Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan:
Uni-ARBAC: A Unified Administrative Model for Role-Based Access Control. ISC 2016: 218-230 - [c198]Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan:
An Attribute-Based Protection Model for JSON Documents. NSS 2016: 303-317 - [c197]Maanak Gupta, Ravi S. Sandhu:
The \mathrm GURA_G GURA G Administrative Model for User and Group Attribute Assignment. NSS 2016: 318-332 - [c196]Asma Alshehri, Ravi S. Sandhu:
On the Relationship Between Finite Domain ABAM and PreUCON \mathrm _A A. NSS 2016: 333-346 - [c195]Jianwei Niu, Yier Jin, Adam J. Lee, Ravi S. Sandhu, Wenyuan Xu, Xiaoguang Zhang:
Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges. SACMAT 2016: 49-50 - [c194]Yuan Cheng, Khalid Zaman Bijon, Ravi S. Sandhu:
Extended ReBAC Administrative Models with Cascading Revocation and Provenance Support. SACMAT 2016: 161-170 - [e18]Elisa Bertino, Ravi S. Sandhu, Alexander Pretschner:
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016. ACM 2016, ISBN 978-1-4503-3935-3 [contents] - [e17]Elisa Bertino, Ravi S. Sandhu, Ram Krishnan:
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, ABAC@CODASPY 2016, New Orleans, Louisiana, USA, March 11, 2016. ACM 2016, ISBN 978-1-4503-4079-3 [contents] - 2015
- [j68]Bo Tang, Ravi S. Sandhu, Qi Li:
Multi-tenancy authorization models for collaborative cloud services. Concurr. Comput. Pract. Exp. 27(11): 2851-2868 (2015) - [j67]Qi Li, Xinwen Zhang, Qingji Zheng, Ravi S. Sandhu, Xiaoming Fu:
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking. IEEE Trans. Inf. Forensics Secur. 10(2): 308-320 (2015) - [j66]Bao Liu, Ravi S. Sandhu:
Fingerprint-Based Detection and Diagnosis of Malicious Programs in Hardware. IEEE Trans. Reliab. 64(3): 1068-1077 (2015) - [c193]Navid Pustchi, Ram Krishnan, Ravi S. Sandhu:
Authorization Federation in IaaS Multi Cloud. SCC@ASIACCS 2015: 63-71 - [c192]Ravi S. Sandhu:
Attribute-Based Access Control Models and Beyond. AsiaCCS 2015: 677 - [c191]Prosunjit Biswas, Farhan Patwa, Ravi S. Sandhu:
Content Level Access Control for OpenStack Swift Storage. CODASPY 2015: 123-126 - [c190]Yun Zhang, Ram Krishnan, Ravi S. Sandhu:
Secure Information and Resource Sharing in Cloud. CODASPY 2015: 131-133 - [c189]Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu:
Virtual Resource Orchestration Constraints in Cloud Infrastructure as a Service. CODASPY 2015: 183-194 - [c188]Yun Zhang, Farhan Patwa, Ravi S. Sandhu:
Community-Based Secure Information and Resource Sharing in AWS Public Cloud. CIC 2015: 46-53 - [c187]Yun Zhang, Farhan Patwa, Ravi S. Sandhu, Bo Tang:
Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud. IRI 2015: 419-426 - [c186]Navid Pustchi, Ravi S. Sandhu:
MT-ABAC: A Multi-Tenant Attribute-Based Access Control Model with Tenant Trust. NSS 2015: 206-220 - [c185]Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu:
Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling. SACMAT 2015: 63-74 - [e16]Jaime Lloret Mauri, Sabu M. Thampi, Michal Wozniak, Oge Marques, Dilip Krishnaswamy, Sartaj Sahni, Christian Callegari, Hideyuki Takagi, Zoran S. Bojkovic, Vinod M., Neeli R. Prasad, José M. Alcaraz Calero, Joal Rodrigues, Xinyu Que, Natarajan Meghanathan, Ravi S. Sandhu, Edward Au:
2015 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015, Kochi, India, August 10-13, 2015. IEEE 2015, ISBN 978-1-4799-8790-0 [contents] - 2014
- [j65]Bharat K. Bhargava, Ibrahim Khalil, Ravi S. Sandhu:
Securing Big Data Applications in the Cloud [Guest editors' introduction]. IEEE Cloud Comput. 1(3): 24-26 (2014) - [j64]Elisa Bertino, Gabriel Ghinita, Murat Kantarcioglu, Dang Nguyen, Jae Park, Ravi S. Sandhu, Salmin Sultana, Bhavani Thuraisingham, Shouhuai Xu:
A roadmap for privacy-enhanced secure data provenance. J. Intell. Inf. Syst. 43(3): 481-501 (2014) - [c184]Yun Zhang, Ram Krishnan, Ravi S. Sandhu:
Secure Information and Resource Sharing in Cloud Infrastructure as a Service. WISCS@CCS 2014: 81-90 - [c183]Xin Jin, Ram Krishnan, Ravi S. Sandhu:
Role and attribute based collaborative administration of intra-tenant cloud IaaS. CollaborateCom 2014: 261-274 - [c182]Yuan Cheng, Jaehong Park, Ravi S. Sandhu:
Attribute-Aware Relationship-Based Access Control for Online Social Networks. DBSec 2014: 292-306 - [c181]Dang Nguyen, Jaehong Park, Ravi S. Sandhu:
Adopting Provenance-Based Access Control in OpenStack Cloud IaaS. NSS 2014: 15-27 - [c180]Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu:
A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service. NSS 2014: 41-53 - [c179]Bo Tang, Ravi S. Sandhu:
Extending OpenStack Access Control with Domain Trust. NSS 2014: 54-69 - [p1]Sabrina De Capitani di Vimercati, Pierangela Samarati, Ravi S. Sandhu:
Access Control. Computing Handbook, 3rd ed. (1) 2014: 47: 1-25 - [e15]Elisa Bertino, Ravi S. Sandhu, Jaehong Park:
Fourth ACM Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, USA - March 03 - 05, 2014. ACM 2014, ISBN 978-1-4503-2278-2 [contents] - 2013
- [j63]Mukesh Singhal, Santosh Chandrasekhar, Tingjian Ge, Ravi S. Sandhu, Ram Krishnan, Gail-Joon Ahn, Elisa Bertino:
Collaboration in Multicloud Computing Environments: Framework and Security Issues. Computer 46(2): 76-84 (2013) - [c178]Ravi S. Sandhu:
The science, engineering and business of cyber security. CCS 2013: 411-412 - [c177]Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu:
A framework for risk-aware role based access control. CNS 2013: 462-469 - [c176]Lianshan Sun, Jaehong Park, Ravi S. Sandhu:
Engineering access control policies for provenance-aware systems. CODASPY 2013: 285-292 - [c175]Bo Tang, Ravi S. Sandhu, Qi Li:
Multi-tenancy authorization models for collaborative cloud services. CTS 2013: 132-138 - [c174]Xin Jin, Ram Krishnan, Ravi S. Sandhu:
Reachability analysis for role-based administration of attributes. Digital Identity Management 2013: 73-84 - [c173]Ravi S. Sandhu:
The future of access control: Attributes, automation and adaptation. IRI 2013 - [c172]Bo Tang, Ravi S. Sandhu:
Cross-tenant trust models in cloud computing. IRI 2013: 129-136 - [c171]Bo Tang, Qi Li, Ravi S. Sandhu:
A multi-tenant RBAC model for collaborative cloud services. PST 2013: 229-238 - [c170]Dang Nguyen, Jaehong Park, Ravi S. Sandhu:
A provenance-based access control model for dynamic separation of duties. PST 2013: 247-256 - [c169]Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu:
Towards an Attribute Based Constraints Specification Language. SocialCom 2013: 108-113 - [c168]Yuan Cheng, Jaehong Park, Ravi S. Sandhu:
Preserving user privacy from third-party applications in online social networks. WWW (Companion Volume) 2013: 723-728 - [e14]Elisa Bertino, Ravi S. Sandhu, Lujo Bauer, Jaehong Park:
Third ACM Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013. ACM 2013, ISBN 978-1-4503-1890-7 [contents] - [e13]Bruno Crispo, Ravi S. Sandhu, Nora Cuppens-Boulahia, Mauro Conti, Jean-Louis Lanet:
2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), La Rochelle, France, October 23-25, 2013. IEEE Computer Society 2013 [contents] - [e12]Javier López, Xinyi Huang, Ravi S. Sandhu:
Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. Lecture Notes in Computer Science 7873, Springer 2013, ISBN 978-3-642-38630-5 [contents] - 2012
- [j62]Ravi S. Sandhu:
Speculations on the science of web user security. Comput. Networks 56(18): 3891-3895 (2012) - [j61]Ravi S. Sandhu:
Editorial. IEEE Trans. Dependable Secur. Comput. 9(1): 1 (2012) - [c167]Khalid Zaman Bijon, Tahmina Ahmed, Ravi S. Sandhu, Ram Krishnan:
A lattice interpretation of group-centric collaboration with expedient insiders. CollaborateCom 2012: 200-209 - [c166]Khalid Zaman Bijon, Ravi S. Sandhu, Ram Krishnan:
A group-centric model for collaboration with expedient insiders in multilevel systems. CTS 2012: 419-426 - [c165]Yuan Cheng, Jaehong Park, Ravi S. Sandhu:
A User-to-User Relationship-Based Access Control Model for Online Social Networks. DBSec 2012: 8-24 - [c164]Xin Jin, Ram Krishnan, Ravi S. Sandhu:
A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC. DBSec 2012: 41-55 - [c163]Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu:
Risk-Aware RBAC Sessions. ICISS 2012: 59-74 - [c162]Dang Nguyen, Jaehong Park, Ravi S. Sandhu:
Integrated provenance data for access control in group-centric collaboration. IRI 2012: 255-262 - [c161]Xin Jin, Ravi S. Sandhu, Ram Krishnan:
RABAC: Role-Centric Attribute-Based Access Control. MMM-ACNS 2012: 84-96 - [c160]Jaehong Park, Dang Nguyen, Ravi S. Sandhu:
A provenance-based access control model. PST 2012: 137-144 - [c159]Ravi S. Sandhu:
The authorization leap from rights to attributes: maturation or chaos? SACMAT 2012: 69-70 - [c158]Yuan Cheng, Jaehong Park, Ravi S. Sandhu:
Relationship-Based Access Control for Online Social Networks: Beyond User-to-User Relationships. SocialCom/PASSAT 2012: 646-655 - [c157]Dang Nguyen, Jaehong Park, Ravi S. Sandhu:
Dependency Path Patterns as the Foundation of Access Control in Provenance-aware Systems. TaPP 2012 - [e11]Elisa Bertino, Ravi S. Sandhu:
Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, San Antonio, TX, USA, February 7-9, 2012. ACM 2012, ISBN 978-1-4503-1091-8 [contents] - 2011
- [j60]Ludwig Fuchs, Günther Pernul, Ravi S. Sandhu:
Roles in information security - A survey and classification of the research area. Comput. Secur. 30(8): 748-769 (2011) - [j59]Jaehong Park, Ravi S. Sandhu, Yuan Cheng:
A User-Activity-Centric Framework for Access Control in Online Social Networks. IEEE Internet Comput. 15(5): 62-65 (2011) - [j58]Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough:
Group-Centric Secure Information-Sharing Models for Isolated Groups. ACM Trans. Inf. Syst. Secur. 14(3): 23:1-23:29 (2011) - [c156]Savith Kandala, Ravi S. Sandhu, Venkata Bhamidipati:
An Attribute Based Framework for Risk-Adaptive Access Control Models. ARES 2011: 236-241 - [c155]Jaehong Park, Ravi S. Sandhu, Yuan Cheng:
ACON: Activity-Centric Access Control for Social Computing. ARES 2011: 242-247 - [c154]Ravi S. Sandhu:
The challenge of data and application security and privacy (DASPY): are we up to it. CODASPY 2011: 1-2 - [c153]Jaehong Park, Dang Nguyen, Ravi S. Sandhu:
On data provenance in group-centric secure collaboration. CollaborateCom 2011: 221-230 - [c152]Ravi S. Sandhu, Khalid Zaman Bijon, Xin Jin, Ram Krishnan:
RT-based administrative models for community cyber security information sharing. CollaborateCom 2011: 473-478 - [c151]Ram Krishnan, Ravi S. Sandhu:
Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing. ICISS 2011: 102-115 - [c150]Jose Andre Morales, Michael Main, Weiliang Luo, Shouhuai Xu, Ravi S. Sandhu:
Building malware infection trees. MALWARE 2011: 50-57 - [e10]Bruce S. N. Cheung, Lucas Chi Kwong Hui, Ravi S. Sandhu, Duncan S. Wong:
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22-24, 2011. ACM 2011, ISBN 978-1-4503-0564-8 [contents] - [e9]Ravi S. Sandhu, Elisa Bertino:
First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings. ACM 2011, ISBN 978-1-4503-0466-5 [contents] - [r3]Ravi S. Sandhu:
Relational Database Access Controls: SQL. Encyclopedia of Information Assurance 2011 - [r2]Ravi S. Sandhu, Sushil Jojodia:
Relational Database Security. Encyclopedia of Information Assurance 2011 - 2010
- [j57]Moonam Ko, Gorrell P. Cheek, Mohamed Shehab, Ravi S. Sandhu:
Social-Networks Connect Services. Computer 43(8): 37-43 (2010) - [j56]Ravi S. Sandhu:
Editorial. IEEE Trans. Dependable Secur. Comput. 7(1): 4 (2010) - [j55]Ravi S. Sandhu:
Editorial. IEEE Trans. Dependable Secur. Comput. 7(3): 225 (2010) - [c149]Erhan J. Kartaltepe, Jose Andre Morales, Shouhuai Xu, Ravi S. Sandhu:
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures. ACNS 2010: 511-528 - [c148]Ravi S. Sandhu, Raj Boppana, Ram Krishnan, Jeff Reich, Todd Wolff, Josh Zachry:
Towards a discipline of mission-aware cloud computing. CCSW 2010: 13-18 - [c147]Jaehong Park, Yuan Cheng, Ravi S. Sandhu:
Towards a framework for cyber social status based trusted open collaboration. CollaborateCom 2010: 1-8 - [c146]Ravi S. Sandhu, Ram Krishnan, G. B. White:
Towards Secure Information Sharing models for community Cyber Security. CollaborateCom 2010: 1-6 - [c145]Jose Andre Morales, Ravi S. Sandhu, Shouhuai Xu:
Evaluating detection and treatment effectiveness of commercial anti-malware programs. MALWARE 2010: 31-38 - [c144]Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William H. Winsborough:
Group-Centric Models for Secure and Agile Information Sharing. MMM-ACNS 2010: 55-69 - [c143]Jose Andre Morales, Erhan J. Kartaltepe, Shouhuai Xu, Ravi S. Sandhu:
Symptoms-Based Detection of Bot Processes. MMM-ACNS 2010: 229-241 - [c142]Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu, Ravi S. Sandhu:
Analyzing and Exploiting Network Behaviors of Malware. SecureComm 2010: 20-34 - [c141]Shouhuai Xu, Haifeng Qian, Fengying Wang, Zhenxin Zhan, Elisa Bertino, Ravi S. Sandhu:
Trustworthy Information: Concepts and Mechanisms. WAIM 2010: 398-404 - [e8]Sandro Etalle, Alexander Pretschner, Ravi S. Sandhu, Marianne Winslett:
Distributed Usage Control, 06.04. - 09.04.2010. Dagstuhl Seminar Proceedings 10141, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2010 [contents] - [i3]Sandro Etalle, Alexander Pretschner, Ravi S. Sandhu, Marianne Winslett:
10141 Abstracts Collection - Distributed Usage Control. Distributed Usage Control 2010 - [i2]Sandro Etalle, Alexander Pretschner, Ravi S. Sandhu, Marianne Winslett:
10141 Summary - Distributed Usage Control. Distributed Usage Control 2010
2000 – 2009
- 2009
- [c140]Justin Leonard, Shouhuai Xu, Ravi S. Sandhu:
A First Step towards Characterizing Stealthy Botnets. ARES 2009: 106-113 - [c139]Justin Leonard, Shouhuai Xu, Ravi S. Sandhu:
A Framework for Understanding Botnets. ARES 2009: 917-922 - [c138]Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough:
A conceptual framework for Group-Centric secure information sharing. AsiaCCS 2009: 384-387 - [c137]Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough:
Towards a framework for group-centric secure collaboration. CollaborateCom 2009: 1-10 - [c136]Ravi S. Sandhu:
The PEI framework for application-centric security. CollaborateCom 2009: 1-5 - [c135]Ram Krishnan, Ravi S. Sandhu:
A Hybrid Enforcement Model for Group-centric Secure Information Sharing. CSE (3) 2009: 189-194 - [c134]Shouhuai Xu, Ravi S. Sandhu, Elisa Bertino:
TIUPAM: A Framework for Trustworthiness-Centric Information Sharing. IFIPTM 2009: 164-175 - [c133]Tim Finin, Anupam Joshi, Hillol Kargupta, Yelena Yesha, Joel Sachs, Elisa Bertino, Ninghui Li, Chris Clifton, Gene Spafford, Bhavani Thuraisingham, Murat Kantarcioglu, Alain Bensoussan, Nathan Berg, Latifur Khan, Jiawei Han, ChengXiang Zhai, Ravi S. Sandhu, Shouhuai Xu, Jim Massaro, Lada A. Adamic:
Assured Information Sharing Life Cycle. ISI 2009: 307-309 - [c132]Shouhuai Xu, Qun Ni, Elisa Bertino, Ravi S. Sandhu:
A Characterization of the problem of secure provenance management. ISI 2009: 310-314 - [c131]Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu, Ravi S. Sandhu:
Analyzing DNS activities of bot processes. MALWARE 2009: 98-103 - [c130]Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough:
Foundations for group-centric secure information sharing models. SACMAT 2009: 115-124 - [c129]Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu, Weili Han:
An Access Control Language for a General Provenance Model. Secure Data Management 2009: 68-88 - 2008
- [j54]Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu:
Toward a Usage-Based Security Framework for Collaborative Computing Systems. ACM Trans. Inf. Syst. Secur. 11(1): 3:1-3:36 (2008) - [c128]Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough:
Stale-safe security properties for group-based secure information sharing. FMSE 2008: 53-62 - [c127]Ravi S. Sandhu:
The ASCAA Principles for access control interpreted for collaboration systems. CTS 2008: 532 - [c126]Roshan K. Thomas, Ravi S. Sandhu, Elisa Bertino, Ismailcem Budak Arpinar, Shouhuai Xu:
Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). ISIPS 2008: 115-121 - [c125]Vana Kalogeraki, Dimitrios Gunopulos, Ravi S. Sandhu, Bhavani Thuraisingham:
QoS Aware Dependable Distributed Stream Processing. ISORC 2008: 69-75 - [c124]Jong Hyuk Park, Bart Preneel, Ravi S. Sandhu, André Zúquete:
IS 2008 PC Co-chairs' Message. OTM Conferences (2) 2008: 937 - [c123]Tim Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough, Bhavani Thuraisingham:
Role Based Access Control and OWL. OWLED (Spring) 2008 - [c122]Timothy W. Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough, Bhavani Thuraisingham:
ROWLBAC: representing role based access control in OWL. SACMAT 2008: 73-82 - [c121]Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu:
Security Enforcement Model for Distributed Usage Control. SUTC 2008: 10-18 - 2007
- [j53]David F. Ferraiolo, D. Richard Kuhn, Ravi S. Sandhu:
RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control". IEEE Secur. Priv. 5(6): 51-53 (2007) - [c120]Xinwen Zhang, Michael J. Covington, Songqing Chen, Ravi S. Sandhu:
SecureBus: towards application-transparent trusted computing with mandatory access control. AsiaCCS 2007: 117-126 - [c119]Shouhuai Xu, Ravi S. Sandhu:
A Scalable and Secure Cryptographic Service. DBSec 2007: 144-160 - [c118]Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin:
Towards a Times-Based Usage Control Model. DBSec 2007: 227-242 - [c117]Ezedin Barka, Ravi S. Sandhu:
Framework for Agent-Based Role Delegation. ICC 2007: 1361-1367 - [c116]Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang:
Towards a VMM-based usage control framework for OS kernel integrity protection. SACMAT 2007: 71-80 - [c115]Ram Krishnan, Ravi S. Sandhu, Kumar Ranganathan:
PEI models towards scalable, usable and high-assurance information sharing. SACMAT 2007: 145-150 - 2006
- [j52]Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, Michael J. Covington:
Client-side access control enforcement using trusted computing and PEI models. J. High Speed Networks 15(3): 229-245 (2006) - [j51]Sejong Oh, Ravi S. Sandhu, Xinwen Zhang:
An effective role administration model using organization structure. ACM Trans. Inf. Syst. Secur. 9(2): 113-137 (2006) - [j50]Elisa Bertino, Latifur R. Khan, Ravi S. Sandhu, Bhavani Thuraisingham:
Secure knowledge management: confidentiality, trust, and privacy. IEEE Trans. Syst. Man Cybern. Part A 36(3): 429-438 (2006) - [c114]Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang:
Secure information sharing enabled by Trusted Computing and PEI models. AsiaCCS 2006: 2-12 - [c113]Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Presicce:
Safety analysis of usage control authorization models. AsiaCCS 2006: 243-254 - [c112]Masayuki Nakae, Xinwen Zhang, Ravi S. Sandhu:
A general design towards secure ad-hoc collaboration. AsiaCCS 2006: 358 - [c111]Zhixiong Zhang, Xinwen Zhang, Ravi S. Sandhu:
ROBAC: Scalable Role and Organization Based Access Control Models. CollaborateCom 2006 - [c110]Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu:
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing. IWSEC 2006: 179-195 - [c109]Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu:
A usage-based authorization framework for collaborative computing systems. SACMAT 2006: 180-189 - 2005
- [j49]Xinwen Zhang, Songqing Chen, Ravi S. Sandhu:
Enhancing Data Authenticity and Integrity in P2P Systems. IEEE Internet Comput. 9(6): 42-49 (2005) - [j48]Elisa Bertino, Ravi S. Sandhu:
Database Security-Concepts, Approaches, and Challenges. IEEE Trans. Dependable Secur. Comput. 2(1): 2-19 (2005) - [j47]Ravi S. Sandhu:
Editorial. ACM Trans. Inf. Syst. Secur. 8(1): 1 (2005) - [j46]Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu, Jaehong Park:
Formal model and policy specification of usage control. ACM Trans. Inf. Syst. Secur. 8(4): 351-387 (2005) - [c108]Ravi S. Sandhu, Xinwen Zhang:
Peer-to-peer access control architecture using trusted computing technology. SACMAT 2005: 147-158 - 2004
- [j45]Jaehong Park, Ravi S. Sandhu:
The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1): 128-174 (2004) - [c107]Ezedin Barka, Ravi S. Sandhu:
Role-Based Delegation Model/ Hierarchical Roles (RBDM1). ACSAC 2004: 396-404 - [c106]Mohammad A. Al-Kahtani, Ravi S. Sandhu:
Mohammad A. Al-Kahtani, Ravi Sandhu. ACSAC 2004: 405-415 - [c105]Jaehong Park, Xinwen Zhang, Ravi S. Sandhu:
Attribute Mutability in Usage Control. DBSec 2004: 15-29 - [c104]Ravi S. Sandhu:
A Perspective on Graphs and Access Control Models. ICGT 2004: 2-12 - [c103]Shouhuai Xu, William Robert Nelson Jr., Ravi S. Sandhu:
Enhancing Anonymity via Market Competition. ITCC (1) 2004: 30-34 - [c102]Roshan K. Thomas, Ravi S. Sandhu:
Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions. PerCom Workshops 2004: 164-170 - [c101]Roshan K. Thomas, Ravi S. Sandhu:
Towards a Multi-dimensional Characterization of Dissemination Control. POLICY 2004: 197-200 - [c100]Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi S. Sandhu:
A logical specification for usage control. SACMAT 2004: 1-10 - [c99]Elisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu:
Security for grid-based computing systems issues and challenges. SACMAT 2004: 125 - 2003
- [j44]Ravi S. Sandhu:
IEEE Internet Computing: Security Track - Good Enough Security. IEEE Distributed Syst. Online 4(1) (2003) - [j43]Duncan A. Buell, Ravi S. Sandhu:
IEEE Internet Computing: Guest Editors' Introduction - Identity Management. IEEE Distributed Syst. Online 4(12) (2003) - [j42]Ravi S. Sandhu:
Good-Enough Security: Toward a Pragmatic Business-Driven Discipline. IEEE Internet Comput. 7(1): 66-68 (2003) - [j41]Duncan A. Buell, Ravi S. Sandhu:
Guest Editors' Introduction: Identity Management. IEEE Internet Comput. 7(6): 26-28 (2003) - [c98]Shouhuai Xu, Ravi S. Sandhu:
Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. CT-RSA 2003: 355-372 - [c97]Xinwen Zhang, Jaehong Park, Ravi S. Sandhu:
Schema Based XML Security: RBAC Approach. DBSec 2003: 330-343 - [c96]Ravi S. Sandhu, Jaehong Park:
Usage Control: A Vision for Next Generation Access Control. MMM-ACNS 2003: 17-31 - [c95]Mohammad A. Al-Kahtani, Ravi S. Sandhu:
Induced role hierarchies with attribute-based RBAC. SACMAT 2003: 142-148 - [c94]Xinwen Zhang, Sejong Oh, Ravi S. Sandhu:
PBDM: a flexible delegation model in RBAC. SACMAT 2003: 149-157 - 2002
- [j40]Ravi S. Sandhu:
IEEE Internet Computing: Guest Editor's Introduction - The Technology of Trust. IEEE Distributed Syst. Online 3(11) (2002) - [j39]Ravi S. Sandhu:
Guest Editor's Introduction: The Technology of Trust. IEEE Internet Comput. 6(6): 28-29 (2002) - [c93]Mohammad A. Al-Kahtani, Ravi S. Sandhu:
A Model for Attribute-Based User-Role Assignment. ACSAC 2002: 353-362 - [c92]Jaehong Park, Ravi S. Sandhu:
Originator Control in Usage Control. POLICY 2002: 60-66 - [c91]Shouhuai Xu, Ravi S. Sandhu:
Authenticated multicast immune to denial-of-service attack. SAC 2002: 196-200 - [c90]Jaehong Park, Ravi S. Sandhu:
Towards usage control models: beyond traditional access control. SACMAT 2002: 57-64 - [c89]Elisa Bertino, Trent Jaeger, Jonathan D. Moffett, Sylvia L. Osborn, Ravi S. Sandhu:
Making access control more usable. SACMAT 2002: 141 - [c88]Sejong Oh, Ravi S. Sandhu:
A model for role administration using organization structure. SACMAT 2002: 155-162 - [e7]Ravi S. Sandhu, Elisa Bertino:
7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002. ACM 2002, ISBN 1-58113-496-7 [contents] - 2001
- [j38]Gail-Joon Ahn, Ravi S. Sandhu:
Decentralized user group assignment in Windows NT. J. Syst. Softw. 56(1): 39-49 (2001) - [j37]Joon S. Park, Ravi S. Sandhu, Gail-Joon Ahn:
Role-based access control on the web. ACM Trans. Inf. Syst. Secur. 4(1): 37-71 (2001) - [j36]David F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn, Ramaswamy Chandramouli:
Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3): 224-274 (2001) - [c87]Pete Epstein, Ravi S. Sandhu:
Engineering of Role/Permission Assignments. ACSAC 2001: 127-136 - [c86]Joon S. Park, Gail-Joon Ahn, Ravi S. Sandhu:
Role-based Access Control on the Web Using LDAP. DBSec 2001: 19-30 - [c85]Savith Kandala, Ravi S. Sandhu:
Secure Role-Based Workflow Models. DBSec 2001: 45-58 - [c84]Ravi S. Sandhu:
Future Directions in Role-Based Access Control Models. MMM-ACNS 2001: 22-26 - [c83]Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr:
Panel: The next generation of acess control models (panel session): do we need them and what should they be? SACMAT 2001: 53 - [c82]Peter J. Denning, Ravi Athale, Nada Dabbagh, Daniel A. Menascé, Jeff Offutt, J. Mark Pullen, Steve Ruth, Ravi S. Sandhu:
Designing an IT College. WCCE 2001: 541-550 - [e6]Ravi S. Sandhu, Trent Jaeger:
6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001. ACM 2001, ISBN 1-58113-350-2 [contents] - [i1]Mihir Bellare, Ravi S. Sandhu:
The Security of Practical Two-Party RSA Signature Schemes. IACR Cryptol. ePrint Arch. 2001: 60 (2001) - 2000
- [j35]Joon S. Park, Ravi S. Sandhu:
Secure Cookies on the Web. IEEE Internet Comput. 4(4): 36-44 (2000) - [j34]Li Gong, Ravi S. Sandhu:
Guest Editors' Introduction: What Makes Security Technologies Relevant? IEEE Internet Comput. 4(6): 38-41 (2000) - [j33]Sylvia L. Osborn, Ravi S. Sandhu, Qamar Munawer:
Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Secur. 3(2): 85-106 (2000) - [j32]Gail-Joon Ahn, Ravi S. Sandhu:
Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3(4): 207-226 (2000) - [c81]Joon S. Park, Ravi S. Sandhu:
Binding Identities and Attributes using Digitally Signed Certificates. ACSAC 2000: 120-127 - [c80]Ezedin Barka, Ravi S. Sandhu:
Framework for Role-based Delegation Models. ACSAC 2000: 168- - [c79]Jaehong Park, Ravi S. Sandhu, J. Schifalacqua:
Security Architectures for Controlled Digital Information Dissemination. ACSAC 2000: 224- - [c78]Gail-Joon Ahn, Ravi S. Sandhu, Myong H. Kang, Joon S. Park:
Injecting RBAC to secure a Web-based workflow system. ACM Workshop on Role-Based Access Control 2000: 1-10 - [c77]Ravi S. Sandhu, David F. Ferraiolo, D. Richard Kuhn:
The NIST model for role-based access control: towards a unified standard. ACM Workshop on Role-Based Access Control 2000: 47-63 - [c76]Ravi S. Sandhu:
Engineering authority and trust in cyberspace: the OM-AM and RBAC way. ACM Workshop on Role-Based Access Control 2000: 111-119
1990 – 1999
- 1999
- [j31]Ravi S. Sandhu, Venkata Bhamidipati:
Role-based Administration of User-Role Assignment: The URA97 Model and its Oracle Implementation. J. Comput. Secur. 7(4): 317-342 (1999) - [j30]Gail-Joon Ahn, Ravi S. Sandhu:
Towards role-based administration in network information services. J. Netw. Comput. Appl. 22(3): 199-213 (1999) - [j29]Ravi S. Sandhu:
Editorial. ACM Trans. Inf. Syst. Secur. 2(1): 1-2 (1999) - [j28]Ravi S. Sandhu, Venkata Bhamidipati, Qamar Munawer:
The ARBAC97 Model for Role-Based Administration of Roles. ACM Trans. Inf. Syst. Secur. 2(1): 105-135 (1999) - [c75]Ravi S. Sandhu, Qamar Munawer:
The ARBAC99 Model for Administration of Roles. ACSAC 1999: 229-238 - [c74]Ron Ross, Cynthia E. Irvine, Charles Reynolds, Ravi S. Sandhu, Blaine Burnham, Rayford B. Vaughn:
Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum). ACSAC 1999: 265- - [c73]Joon S. Park, Ravi S. Sandhu, SreeLatha Ghanta:
RBAC on the Web by Secure Cookies. DBSec 1999: 49-62 - [c72]Savith Kandala, Ravi S. Sandhu:
Extending The BFA Workflow Authorization Model to Express Weighted Voting. DBSec 1999: 145-159 - [c71]Joon S. Park, Ravi S. Sandhu:
RBAC on the Web by Smart Certificates. ACM Workshop on Role-Based Access Control 1999: 1-9 - [c70]Gail-Joon Ahn, Ravi S. Sandhu:
The RSL99 Language for Role-Based Separation of Duty Constraints. ACM Workshop on Role-Based Access Control 1999: 43-54 - [c69]Pete Epstein, Ravi S. Sandhu:
Towards a UML Based Approach to Role Engineering. ACM Workshop on Role-Based Access Control 1999: 135-143 - 1998
- [j27]Ravi S. Sandhu:
Role-Based Access Control. Adv. Comput. 46: 237-286 (1998) - [j26]Ravi S. Sandhu:
Editorial. ACM Trans. Inf. Syst. Secur. 1(1): 1-2 (1998) - [j25]Ravi S. Sandhu, Fang Chen:
The Multilevel Relational (MLR) Data Model. ACM Trans. Inf. Syst. Secur. 1(1): 93-132 (1998) - [c68]Ravi S. Sandhu, Qamar Munawer:
The RRA97 Model for Role-Based Administration of Role Hierarchies. ACSAC 1998: 39-49 - [c67]P. C. Hyland, Ravi S. Sandhu:
Concentric Supervision of Security Applications: A New Security Management Paradigm. ACSAC 1998: 59-68 - [c66]Ravi S. Sandhu, Joon S. Park:
Decentralized User-role Assignment for Web-based Intranets. ACM Workshop on Role-Based Access Control 1998: 1-12 - [c65]Ravi S. Sandhu, Venkata Bhamidipati:
An Oracle Implementation of the PRA97 Model for Permission-Role Assignment. ACM Workshop on Role-Based Access Control 1998: 13-21 - [c64]Ravi S. Sandhu:
Role Activation Hierarchies. ACM Workshop on Role-Based Access Control 1998: 33-40 - [c63]Ravi S. Sandhu, Qamar Munawer:
How to Do Discretionary Access Control Using Roles. ACM Workshop on Role-Based Access Control 1998: 47-54 - 1997
- [c62]T. F. Himdi, Ravi S. Sandhu:
Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System. ACSAC 1997: 164-174 - [c61]Roshan K. Thomas, Ravi S. Sandhu:
Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. DBSec 1997: 166-181 - [c60]Ravi S. Sandhu, Venkata Bhamidipati:
The URA97 Model for Role-Based User-Role Assignment. DBSec 1997: 262-275 - [c59]P. C. Hyland, Ravi S. Sandhu:
SNMP-based Network Security Management. Integrated Network Management 1997: 787-787 - [c58]Ravi S. Sandhu, Venkata Bhamidipati, Edward J. Coyne, Srinivas Ganta, Charles E. Youman:
The ARBAC97 model for role-based administration of roles: preliminary description and outline. ACM Workshop on Role-Based Access Control 1997: 41-50 - [e5]Pierangela Samarati, Ravi S. Sandhu:
Database Security Volume X, Status and Prospects, IFIP TC11 / WG11.3 Tenth International Conference on Database Security, 22-24 July 1996, Como, Italy. IFIP Conference Proceedings 79, Chapman & Hall 1997, ISBN 0-412-80820-X [contents] - [r1]Ravi S. Sandhu, Pierangela Samarati:
Authentication, Access Controls, and Intrusion Detection. The Computer Science and Engineering Handbook 1997: 1929-1948 - 1996
- [j24]Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman:
Role-Based Access Control Models. Computer 29(2): 38-47 (1996) - [j23]Ravi S. Sandhu, Pierangela Samarati:
Authetication, Access Control, and Audit. ACM Comput. Surv. 28(1): 241-243 (1996) - [j22]Paul Ammann, Richard J. Lipton, Ravi S. Sandhu:
The Expressive Power of Multi-parent Creation in Monotonic Access Control Models. J. Comput. Secur. 4(2/3): 149-166 (1996) - [j21]Roshan K. Thomas, Ravi S. Sandhu:
A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases. IEEE Trans. Knowl. Data Eng. 8(1): 16-31 (1996) - [c57]Ravi S. Sandhu:
Access Control: The Neglected Frontier. ACISP 1996: 219-227 - [c56]Ravi S. Sandhu, J. Campbell:
Open Issues in Database Security. DBSec 1996: 169-173 - [c55]Ravi S. Sandhu, LouAnna Notargiacomo, D. Thomas, Jesse C. Worthington:
Implementation Experiences and Prospects. DBSec 1996: 261-271 - [c54]Ravi S. Sandhu:
Role Hierarchies and Constraints for Lattice-Based Access Controls. ESORICS 1996: 65-79 - 1995
- [c53]Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting:
Panel Discussion: Role-Based Access Control and Next-Generation Security Models. DBSec 1995: 289-298 - [c52]Fang Chen, Ravi S. Sandhu:
Constraints for role-based access control. ACM Workshop on Role-Based Access Control 1995 - [c51]Jeremy Epstein, Ravi S. Sandhu:
NetWare 4 as an example of role-based access control. ACM Workshop on Role-Based Access Control 1995 - [c50]Ravi S. Sandhu:
Workshop summary. ACM Workshop on Role-Based Access Control 1995 - [c49]Ravi S. Sandhu:
Issues in RBAC. ACM Workshop on Role-Based Access Control 1995 - [c48]Ravi S. Sandhu:
Roles versus groups. ACM Workshop on Role-Based Access Control 1995 - [c47]Ravi S. Sandhu:
Rationale for the RBAC96 family of access control models. ACM Workshop on Role-Based Access Control 1995 - [c46]Fang Chen, Ravi S. Sandhu:
The semantics and expressive power of the MLR data model. S&P 1995: 128-142 - [e4]Charles E. Youman, Ravi S. Sandhu, Edward J. Coyne:
Proceedings of the First ACM Workshop on Role-Based Access Control, RBAC 1995, Gaithersburg, MD, USA, November 30 - December 2, 1995. ACM 1995, ISBN 0-89791-759-6 [contents] - 1994
- [j20]Ravi Ganesan, Ravi S. Sandhu:
Securing Cyberspace - Introduction to the Special Section. Commun. ACM 37(11): 28-31 (1994) - [j19]Ravi S. Sandhu, Pierangela Samarati:
Access control: principles and practice. IEEE Commun. Mag. 32(9): 40-48 (1994) - [c45]Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman:
Role-based access control: a multi-dimensional view. ACSAC 1994: 54-62 - [c44]Ravi S. Sandhu, Roshan K. Thomas:
Conceptual Foundations for a Model of Task-based Authorizations. CSFW 1994: 66-79 - [c43]Ravi S. Sandhu, Paul Ammann:
One-Representative Safety Analysis in the Non-Monotonic Transform Model. CSFW 1994: 139-149 - [c42]Ravi S. Sandhu, Srinivas Ganta:
On the Expressive Power of the Unary Transformation Model. ESORICS 1994: 301-318 - [c41]Roshan K. Thomas, Ravi S. Sandhu:
Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture. ESORICS 1994: 403-428 - [c40]Ravi S. Sandhu, Srinivas Ganta:
On the minimality of testing for rights in transformation models. S&P 1994: 230-241 - [c39]William R. Herndon, Ravi S. Sandhu, Steve Demurjian:
The standards are coming! Standards for security in object-oriented systems. OOPSLA Addendum 1994: 92-95 - [e3]Dorothy E. Denning, Raymond Pyle, Ravi Ganesan, Ravi S. Sandhu:
CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994. ACM 1994, ISBN 0-89791-732-4 [contents] - [e2]Bhavani Thuraisingham, Ravi S. Sandhu, T. C. Ting:
Security for Object-Oriented Systems, Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993. Workshops in Computing, Springer 1994, ISBN 3-540-19877-6 [contents] - 1993
- [j18]Ravi S. Sandhu, Gurpreet S. Suri:
A distributed capability-based architecture for the transform model. Comput. Secur. 12(3): 285-303 (1993) - [j17]Ravi S. Sandhu:
Lattice-Based Access Control Models. Computer 26(11): 9-19 (1993) - [j16]Ravi S. Sandhu, Sushil Jajodia:
Limitations of Relational Data Base Access Controls. Inf. Secur. J. A Glob. Perspect. 2(1): 57-72 (1993) - [j15]Roshan K. Thomas, Ravi S. Sandhu:
A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up. J. Comput. Secur. 2(2-3): 231-275 (1993) - [c38]Ravi S. Sandhu, Srinivas Ganta:
Expressive power of the single-object typed access matrix model. ACSAC 1993: 184-194 - [c37]Ravi S. Sandhu, Srinivas Ganta:
On Testing for Absence of Rights in Access Control Models. CSFW 1993: 109-118 - [c36]Ravi S. Sandhu:
On Five Definitions of Data Integrity. DBSec 1993: 257-267 - [c35]Roshan K. Thomas, Ravi S. Sandhu:
Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Transactions in Multilevel databases. DBSec 1993: 309-328 - [c34]Roshan K. Thomas, Ravi S. Sandhu:
Towards a task-based paradigm for flexible and adaptable access control in distributed applications. NSPW 1993: 138-142 - [c33]Bhavani Thuraisingham, Ravi S. Sandhu, T. C. Ting:
Security for Object-Oriented Systems: An Editorial Overview. Security for Object-Oriented Systems 1993: 1-7 - [c32]Roshan K. Thomas, Ravi S. Sandhu:
Concurrency, Synchronization, and Scheduling to Support High-Assurance Write-Up in Multilevel Object-Based Computing. Security for Object-Oriented Systems 1993: 218-228 - [c31]Ravi S. Sandhu:
Security for OODBMS (Or Systems) - Panel. OOPSLA 1993: 307 - [c30]Bhavani Thuraisingham, T. C. Ting, Peter J. Sell, Ravi S. Sandhu, Thomas F. Keefe:
Integrating security technology and object-oriented technology (panel). OOPSLA Addendum 1993: 59-61 - [c29]Bhavani Thuraisingham, Ravi S. Sandhu, T. C. Ting:
Security for object-oriented systems. OOPSLA Addendum 1993: 77-78 - [e1]Dorothy E. Denning, Raymond Pyle, Ravi Ganesan, Ravi S. Sandhu, Victoria Ashby:
CCS '93, Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993. ACM 1993, ISBN 0-89791-629-8 [contents] - 1992
- [j14]Ravi S. Sandhu, Sushil Jajodia:
Eliminating polyinstantiation securely. Comput. Secur. 11(6): 547-562 (1992) - [j13]Ravi S. Sandhu:
Lattice-based enforcement of Chinese Walls. Comput. Secur. 11(8): 753-763 (1992) - [j12]Ravi S. Sandhu:
Expressive Power of the Schematic Protection Model. J. Comput. Secur. 1(1): 59-98 (1992) - [j11]Paul Ammann, Ravi S. Sandhu:
The Extended Schematic Protection Model. J. Comput. Secur. 1(3-4): 335-384 (1992) - [j10]Ravi S. Sandhu:
Undecidability of Safety for the Schematic Protection Model with Cyclic Creates. J. Comput. Syst. Sci. 44(1): 141-159 (1992) - [c28]Paul Ammann, Ravi S. Sandhu:
Implementing transaction control expressions by checking for absence of access rights. ACSAC 1992: 131-140 - [c27]Paul Ammann, Richard J. Lipton, Ravi S. Sandhu:
The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model. CSFW 1992: 148-156 - [c26]Roshan K. Thomas, Ravi S. Sandhu:
Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects. DBSec 1992: 15-34 - [c25]Ravi S. Sandhu, Sushil Jajodia:
Polyinstantation for Cover Stories. ESORICS 1992: 307-328 - [c24]Ravi S. Sandhu:
The typed access matrix model. S&P 1992: 122-136 - [c23]Ravi S. Sandhu, Gurpreet S. Suri:
Non-monotonic transformation of access rights. S&P 1992: 148-161 - 1991
- [j9]Ravi S. Sandhu, Sushil Jajodia:
Integrity principles and mechanisms in database management systems. Comput. Secur. 10(5): 413-427 (1991) - [c22]John P. McDermott, Sushil Jajodia, Ravi S. Sandhu:
A single-level scheduler for the replicated architecture for multilevel-secure databases. ACSAC 1991: 2-11 - [c21]Paul Ammann, Ravi S. Sandhu, Gurpreet S. Suri:
A distributed implementation of the extended schematic protection model. ACSAC 1991: 152-164 - [c20]Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia:
A Secure Kernelized Architecture for Multiple Object-Oriented Databases. CSFW 1991: 139-152 - [c19]Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia:
Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases. DBSec 1991: 297-314 - [c18]Sushil Jajodia, Ravi S. Sandhu:
Towards a Multilevel Secure Relational Data Model. SIGMOD Conference 1991: 50-59 - [c17]Paul Ammann, Ravi S. Sandhu:
Safety Analysis for the Extended Schematic Protection Model. S&P 1991: 87-97 - [c16]Sushil Jajodia, Ravi S. Sandhu:
A Novel Decomposition of Multilevel Relations into Single-Level Relations. S&P 1991: 300-315 - 1990
- [j8]Sushil Jajodia, Ravi S. Sandhu:
Database Security: Current Status and Key Issues. SIGMOD Rec. 19(4): 123-126 (1990) - [c15]Paul Ammann, Ravi S. Sandhu:
Extending the creation operation in the Schematic Protection Model. ACSAC 1990 - [c14]Sushil Jajodia, Ravi S. Sandhu, Edgar H. Sibley:
Update semantics for multilevel relations. ACSAC 1990: 103-112 - [c13]Sushil Jajodia, Ravi S. Sandhu:
A Formal Framework for Single Level Decomposition of Multilevel Relations. CSFW 1990: 152-158 - [c12]Ravi S. Sandhu, Sushil Jajodia, Teresa F. Lunt:
A New Polyinstantiation Integrity Constraint for Multilevel Relations. CSFW 1990: 159-165 - [c11]Ravi S. Sandhu:
Separation of Duties in Computerized Information Systems. DBSec 1990: 179-190 - [c10]Sushil Jajodia, Ravi S. Sandhu:
Polyinstantiation Integrity in Multilevel Relations Revisited. DBSec 1990: 297-308 - [c9]Sushil Jajodia, Ravi S. Sandhu:
Polyinstantiation Integrity in Multilevel Relations. S&P 1990: 104-115
1980 – 1989
- 1989
- [j7]Ravi S. Sandhu:
The Reflected Tree Hierarchy for Protection and Sharing. Inf. Process. Lett. 30(1): 21-26 (1989) - [j6]Ravi S. Sandhu:
The Demand Operation in the Schematic Protection Model. Inf. Process. Lett. 32(4): 213-219 (1989) - [j5]Ravi S. Sandhu:
Recognizing Immediacy in an N-Tree Hierarchy and Its Application to Protection Groups. IEEE Trans. Software Eng. 15(12): 1518-1525 (1989) - [c8]Ravi S. Sandhu:
A perspective on integrity mechanisms. ACSAC 1989 - [c7]Ravi S. Sandhu:
Mandatory Controls for Database Integrity. DBSec 1989: 143-150 - [c6]Ravi S. Sandhu:
Discussion Summary. DBSec 1989: 353-365 - [c5]Ravi S. Sandhu:
Transformation of Access Rights. S&P 1989: 259-268 - 1988
- [j4]Ravinderpal Singh Sandhu:
Nested categories for access control. Comput. Secur. 7(6): 599-605 (1988) - [j3]Ravi S. Sandhu:
Cryptographic Implementation of a Tree Hierarchy for Access Control. Inf. Process. Lett. 27(2): 95-98 (1988) - [j2]Ravi S. Sandhu:
The schematic protection model: its definition and analysis for acyclic attenuating schemes. J. ACM 35(2): 404-432 (1988) - [j1]Ravi S. Sandhu:
The NTree: A Two Dimension Partial Order for Protection Groups. ACM Trans. Comput. Syst. 6(2): 197-222 (1988) - [c4]Ravi S. Sandhu:
Expressive Power of the Schematic Protection Model. CSFW 1988: 188-193 - 1987
- [c3]Ravinderpal Singh Sandhu:
On some cryptographic solutions for access control in a tree hierarchy. FJCC 1987: 405-410 - 1986
- [c2]Ravi S. Sandhu, M. E. Share:
Some Owner Based Schemes with Dynamic Groups in the Schematic Protection Model. S&P 1986: 61-70 - 1985
- [c1]Ravinderpal Singh Sandhu:
Analysis of Acyclic Attenuating Systems for the SSR Protection Model. S&P 1985: 197-207
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint