Search the dblp DataBase
Ravi S. Sandhu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Sushil Jajodia , Ravi S. Sandhu Towards a Multilevel Secure Relational Data Model. [Citation Graph (8, 8)][DBLP ] SIGMOD Conference, 1991, pp:50-59 [Conf ] Sushil Jajodia , Ravi S. Sandhu Database Security: Current Status and Key Issues. [Citation Graph (3, 0)][DBLP ] SIGMOD Record, 1990, v:19, n:4, pp:123-126 [Journal ] Ravi S. Sandhu , Roshan K. Thomas , Sushil Jajodia Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases. [Citation Graph (1, 0)][DBLP ] DBSec, 1991, pp:297-314 [Conf ] Ravi S. Sandhu Role Hierarchies and Constraints for Lattice-Based Access Controls. [Citation Graph (1, 0)][DBLP ] ESORICS, 1996, pp:65-79 [Conf ] Sushil Jajodia , Ravi S. Sandhu Polyinstantiation Integrity in Multilevel Relations. [Citation Graph (1, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1990, pp:104-115 [Conf ] Ravi S. Sandhu Lattice-Based Access Control Models. [Citation Graph (1, 0)][DBLP ] IEEE Computer, 1993, v:26, n:11, pp:9-19 [Journal ] Ravi S. Sandhu , Edward J. Coyne , Hal L. Feinstein , Charles E. Youman Role-Based Access Control Models. [Citation Graph (1, 0)][DBLP ] IEEE Computer, 1996, v:29, n:2, pp:38-47 [Journal ] Ravi S. Sandhu The schematic protection model: its definition and analysis for acyclic attenuating schemes. [Citation Graph (1, 0)][DBLP ] J. ACM, 1988, v:35, n:2, pp:404-432 [Journal ] Ravi S. Sandhu Undecidability of Safety for the Schematic Protection Model with Cyclic Creates. [Citation Graph (1, 0)][DBLP ] J. Comput. Syst. Sci., 1992, v:44, n:1, pp:141-159 [Journal ] Roshan K. Thomas , Ravi S. Sandhu A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases. [Citation Graph (1, 7)][DBLP ] IEEE Trans. Knowl. Data Eng., 1996, v:8, n:1, pp:16-31 [Journal ] Ravi S. Sandhu The NTree: A Two Dimension Partial Order for Protection Groups. [Citation Graph (1, 0)][DBLP ] ACM Trans. Comput. Syst., 1988, v:6, n:2, pp:197-222 [Journal ] Ravi S. Sandhu Access Control: The Neglected Frontier. [Citation Graph (0, 0)][DBLP ] ACISP, 1996, pp:219-227 [Conf ] Mohammad A. Al-Kahtani , Ravi S. Sandhu A Model for Attribute-Based User-Role Assignment. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:353-364 [Conf ] Mohammad A. Al-Kahtani , Ravi S. Sandhu Mohammad A. Al-Kahtani, Ravi Sandhu. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:405-415 [Conf ] Blaine Burnham , Cynthia E. Irvine , Charles Reynolds , Ravi S. Sandhu , Rayford B. Vaughn Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum). [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:265-0 [Conf ] Ezedin Barka , Ravi S. Sandhu Framework for Role-based Delegation Models. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:168-0 [Conf ] Ezedin Barka , Ravi S. Sandhu Role-Based Delegation Model/ Hierarchical Roles (RBDM1). [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:396-404 [Conf ] Pete Epstein , Ravi S. Sandhu Engineering of Role/Permission Assignments. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:127-136 [Conf ] T. F. Himdi , Ravi S. Sandhu Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:164-174 [Conf ] P. C. Hyland , Ravi S. Sandhu Concentric Supervision of Security Applications: A New Security Management Paradigm. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:59-0 [Conf ] Joon S. Park , Ravi S. Sandhu Binding Identities and Attributes using Digitally Signed Certificates. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:120-127 [Conf ] Jaehong Park , Ravi S. Sandhu , J. Schifalacqua Security Architectures for Controlled Digital Information Dissemination. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:224-0 [Conf ] Ravi S. Sandhu , Qamar Munawer The RRA97 Model for Role-Based Administration of Role Hierarchies. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:39-49 [Conf ] Ravi S. Sandhu , Qamar Munawer The ARBAC99 Model for Administration of Roles. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:229-0 [Conf ] Ravi S. Sandhu , Kumar Ranganathan , Xinwen Zhang Secure information sharing enabled by Trusted Computing and PEI models. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:2-12 [Conf ] Xinwen Zhang , Ravi S. Sandhu , Francesco Parisi-Presicce Safety analysis of usage control authorization models. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:243-254 [Conf ] Masayuki Nakae , Xinwen Zhang , Ravi S. Sandhu A general design towards secure ad-hoc collaboration. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:358- [Conf ] Xinwen Zhang , Michael J. Covington , Songqing Chen , Ravi S. Sandhu SecureBus: towards application-transparent trusted computing with mandatory access control. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:117-126 [Conf ] Paul Ammann , Richard J. Lipton , Ravi S. Sandhu The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model. [Citation Graph (0, 0)][DBLP ] CSFW, 1992, pp:148-156 [Conf ] Sushil Jajodia , Ravi S. Sandhu A Formal Framework for Single Level Decomposition of Multilevel Relations. [Citation Graph (0, 0)][DBLP ] CSFW, 1990, pp:152-158 [Conf ] Ravi S. Sandhu Expressive Power of the Schematic Protection Model. [Citation Graph (0, 0)][DBLP ] CSFW, 1988, pp:188-193 [Conf ] Ravi S. Sandhu , Paul Ammann One-Representative Safety Analysis in the Non-Monotonic Transform Model. [Citation Graph (0, 0)][DBLP ] CSFW, 1994, pp:139-149 [Conf ] Ravi S. Sandhu , Srinivas Ganta On Testing for Absence of Rights in Access Control Models. [Citation Graph (0, 0)][DBLP ] CSFW, 1993, pp:109-118 [Conf ] Ravi S. Sandhu , Sushil Jajodia , Teresa F. Lunt A New Polyinstantiation Integrity Constraint for Multilevel Relations. [Citation Graph (0, 0)][DBLP ] CSFW, 1990, pp:159-165 [Conf ] Ravi S. Sandhu , Roshan K. Thomas Conceptual Foundations for a Model of Task-based Authorizations. [Citation Graph (0, 0)][DBLP ] CSFW, 1994, pp:66-79 [Conf ] Ravi S. Sandhu , Roshan K. Thomas , Sushil Jajodia A Secure Kernelized Architecture for Multiple Object-Oriented Databases. [Citation Graph (0, 0)][DBLP ] CSFW, 1991, pp:139-152 [Conf ] Shouhuai Xu , Ravi S. Sandhu Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:355-372 [Conf ] Savith Kandala , Ravi S. Sandhu Secure Role-Based Workflow Models. [Citation Graph (0, 0)][DBLP ] DBSec, 2001, pp:45-58 [Conf ] Savith Kandala , Ravi S. Sandhu Extending The BFA Workflow Authorization Model to Express Weighted Voting. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:145-159 [Conf ] Sushil Jajodia , Ravi S. Sandhu Polyinstantiation Integrity in Multilevel Relations Revisited. [Citation Graph (0, 0)][DBLP ] DBSec, 1990, pp:297-308 [Conf ] Joon S. Park , Gail-Joon Ahn , Ravi S. Sandhu Role-based Access Control on the Web Using LDAP. [Citation Graph (0, 0)][DBLP ] DBSec, 2001, pp:19-30 [Conf ] Joon S. Park , Ravi S. Sandhu , SreeLatha Ghanta RBAC on the Web by Secure Cookies. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:49-62 [Conf ] Jaehong Park , Xinwen Zhang , Ravi S. Sandhu Attribute Mutability in Usage Control. [Citation Graph (0, 0)][DBLP ] DBSec, 2004, pp:15-29 [Conf ] Ravi S. Sandhu Mandatory Controls for Database Integrity. [Citation Graph (0, 0)][DBLP ] DBSec, 1989, pp:143-150 [Conf ] Ravi S. Sandhu Discussion Summary. [Citation Graph (0, 0)][DBLP ] DBSec, 1989, pp:353-365 [Conf ] Ravi S. Sandhu Separation of Duties in Computerized Information Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 1990, pp:179-190 [Conf ] Ravi S. Sandhu On Five Definitions of Data Integrity. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:257-267 [Conf ] Ravi S. Sandhu , Venkata Bhamidipati The URA97 Model for Role-Based User-Role Assignment. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:262-275 [Conf ] Ravi S. Sandhu , J. Campbell Open Issues in Database Security. [Citation Graph (0, 0)][DBLP ] DBSec, 1996, pp:169-173 [Conf ] Roshan K. Thomas , Elisa Bertino , Pierangela Samarati , Hans Hermann Brüggemann , Bret Hartman , Ravi S. Sandhu , T. C. Ting Panel Discussion: Role-Based Access Control and Next-Generation Security Models. [Citation Graph (0, 0)][DBLP ] DBSec, 1995, pp:289-298 [Conf ] Ravi S. Sandhu , LouAnna Notargiacomo , D. Thomas , Jesse C. Worthington Implementation Experiences and Prospects. [Citation Graph (0, 0)][DBLP ] DBSec, 1996, pp:261-271 [Conf ] Roshan K. Thomas , Ravi S. Sandhu Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects. [Citation Graph (0, 0)][DBLP ] DBSec, 1992, pp:15-34 [Conf ] Roshan K. Thomas , Ravi S. Sandhu Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Transactions in Multilevel databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:309-328 [Conf ] Roshan K. Thomas , Ravi S. Sandhu Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:166-181 [Conf ] Xinwen Zhang , Jaehong Park , Ravi S. Sandhu Schema Based XML Security: RBAC Approach. [Citation Graph (0, 0)][DBLP ] DBSec, 2003, pp:330-343 [Conf ] Ravi S. Sandhu , Srinivas Ganta On the Expressive Power of the Unary Transformation Model. [Citation Graph (0, 0)][DBLP ] ESORICS, 1994, pp:301-318 [Conf ] Ravi S. Sandhu , Sushil Jajodia Polyinstantation for Cover Stories. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:307-328 [Conf ] Roshan K. Thomas , Ravi S. Sandhu Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture. [Citation Graph (0, 0)][DBLP ] ESORICS, 1994, pp:403-428 [Conf ] Ravi S. Sandhu A Perspective on Graphs and Access Control Models. [Citation Graph (0, 0)][DBLP ] ICGT, 2004, pp:2-12 [Conf ] P. C. Hyland , Ravi S. Sandhu SNMP-based Network Security Management. [Citation Graph (0, 0)][DBLP ] Integrated Network Management, 1997, pp:787-787 [Conf ] Shouhuai Xu , William Robert Nelson Jr. , Ravi S. Sandhu Enhancing Anonymity via Market Competition. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:30-34 [Conf ] Xinwen Zhang , Francesco Parisi-Presicce , Ravi S. Sandhu Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:179-195 [Conf ] Ravi S. Sandhu , Jaehong Park Usage Control: A Vision for Next Generation Access Control. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:17-31 [Conf ] Ravi S. Sandhu Future Directions in Role-Based Access Control Models. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:22-26 [Conf ] Ravi S. Sandhu Security for OODBMS (Or Systems) - Panel. [Citation Graph (0, 0)][DBLP ] OOPSLA, 1993, pp:307- [Conf ] Roshan K. Thomas , Ravi S. Sandhu Concurrency, Synchronization, and Scheduling to Support High-Assurance Write-Up in Multilevel Object-Based Computing. [Citation Graph (0, 0)][DBLP ] Security for Object-Oriented Systems, 1993, pp:218-228 [Conf ] Bhavani M. Thuraisingham , Ravi S. Sandhu , T. C. Ting Security for Object-Oriented Systems: An Editorial Overview. [Citation Graph (0, 0)][DBLP ] Security for Object-Oriented Systems, 1993, pp:1-7 [Conf ] Roshan K. Thomas , Ravi S. Sandhu Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions. [Citation Graph (0, 0)][DBLP ] PerCom Workshops, 2004, pp:164-170 [Conf ] Jaehong Park , Ravi S. Sandhu Originator Control in Usage Control. [Citation Graph (0, 0)][DBLP ] POLICY, 2002, pp:60-66 [Conf ] Roshan K. Thomas , Ravi S. Sandhu Towards a Multi-dimensional Characterization of Dissemination Control. [Citation Graph (0, 0)][DBLP ] POLICY, 2004, pp:197-200 [Conf ] Gail-Joon Ahn , Ravi S. Sandhu The RSL99 Language for Role-Based Separation of Duty Constraints. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1999, pp:43-54 [Conf ] Ravi S. Sandhu , Qamar Munawer How to Do Discretionary Access Control Using Roles. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1998, pp:47-54 [Conf ] Gail-Joon Ahn , Ravi S. Sandhu , Myong H. Kang , Joon S. Park Injecting RBAC to secure a Web-based workflow system. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 2000, pp:1-10 [Conf ] Fang Chen , Ravi S. Sandhu Constraints for role-based access control. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf ] Jeremy Epstein , Ravi S. Sandhu NetWare 4 as an example of role-based access control. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf ] Pete Epstein , Ravi S. Sandhu Towards a UML Based Approach to Role Engineering. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1999, pp:135-143 [Conf ] Joon S. Park , Ravi S. Sandhu RBAC on the Web by Smart Certificates. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1999, pp:1-9 [Conf ] Ravi S. Sandhu Engineering authority and trust in cyberspace: the OM-AM and RBAC way. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 2000, pp:111-119 [Conf ] Ravi S. Sandhu Workshop summary. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf ] Ravi S. Sandhu Issues in RBAC. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf ] Ravi S. Sandhu Roles versus groups. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf ] Ravi S. Sandhu Rationale for the RBAC96 family of access control models. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf ] Ravi S. Sandhu Role Activation Hierarchies. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1998, pp:33-40 [Conf ] Ravi S. Sandhu , Venkata Bhamidipati An Oracle Implementation of the PRA97 Model for Permission-Role Assignment. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1998, pp:13-21 [Conf ] Ravi S. Sandhu , Venkata Bhamidipati , Edward J. Coyne , Srinivas Ganta , Charles E. Youman The ARBAC97 model for role-based administration of roles: preliminary description and outline. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1997, pp:41-50 [Conf ] Ravi S. Sandhu , David F. Ferraiolo , D. Richard Kuhn The NIST model for role-based access control: towards a unified standard. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 2000, pp:47-63 [Conf ] Ravi S. Sandhu , Joon S. Park Decentralized User-role Assignment for Web-based Intranets. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1998, pp:1-12 [Conf ] Shouhuai Xu , Ravi S. Sandhu Authenticated multicast immune to denial-of-service attack. [Citation Graph (0, 0)][DBLP ] SAC, 2002, pp:196-200 [Conf ] Mohammad A. Al-Kahtani , Ravi S. Sandhu Induced role hierarchies with attribute-based RBAC. [Citation Graph (0, 0)][DBLP ] SACMAT, 2003, pp:142-148 [Conf ] Jaehong Park , Ravi S. Sandhu Towards usage control models: beyond traditional access control. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:57-64 [Conf ] Elisa Bertino , Bruno Crispo , James Joshi , Wengliang (Kevin) Du , Ravi S. Sandhu Security for grid-based computing systems issues and challenges. [Citation Graph (0, 0)][DBLP ] SACMAT, 2004, pp:125- [Conf ] Elisa Bertino , Trent Jaeger , Jonathan D. Moffett , Sylvia L. Osborn , Ravi Ravi Making access control more usable. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:141- [Conf ] Ravi S. Sandhu , Elisa Bertino , Trent Jaeger , D. Richard Kuhn , Carl E. Landwehr Panel: The next generation of acess control models (panel session): do we need them and what should they be? [Citation Graph (0, 0)][DBLP ] SACMAT, 2001, pp:53- [Conf ] Ravi S. Sandhu , Xinwen Zhang Peer-to-peer access control architecture using trusted computing technology. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:147-158 [Conf ] Xinwen Zhang , Masayuki Nakae , Michael J. Covington , Ravi S. Sandhu A usage-based authorization framework for collaborative computing systems. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:180-189 [Conf ] Xinwen Zhang , Sejong Oh , Ravi S. Sandhu PBDM: a flexible delegation model in RBAC. [Citation Graph (0, 0)][DBLP ] SACMAT, 2003, pp:149-157 [Conf ] Xinwen Zhang , Jaehong Park , Francesco Parisi-Presicce , Ravi S. Sandhu A logical specification for usage control. [Citation Graph (0, 0)][DBLP ] SACMAT, 2004, pp:1-10 [Conf ] Sejong Oh , Ravi S. Sandhu A model for role administration using organization structure. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:155-162 [Conf ] Paul Ammann , Ravi S. Sandhu Safety Analysis for the Extended Schematic Protection Model. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1991, pp:87-97 [Conf ] Sushil Jajodia , Ravi S. Sandhu A Novel Decomposition of Multilevel Relations into Single-Level Relations. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1991, pp:300-315 [Conf ] Ravi S. Sandhu Transformation of Access Rights. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1989, pp:259-268 [Conf ] Ravi S. Sandhu , M. E. Share Some Owner Based Schemes with Dynamic Groups in the Schematic Protection Model. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1986, pp:61-70 [Conf ] Peter J. Denning , Ravi Athale , Nada Dabbagh , Daniel A. Menascé , Jeff Offutt , J. Mark Pullen , Steve Ruth , Ravi S. Sandhu Designing an IT College. [Citation Graph (0, 0)][DBLP ] WCCE, 2001, pp:541-550 [Conf ] Ravi S. Sandhu Role-Based Access Control. [Citation Graph (0, 0)][DBLP ] Advances in Computers, 1998, v:46, n:, pp:238-287 [Journal ] Ravi Ganesan , Ravi S. Sandhu Securing Cyberspace - Introduction to the Special Section. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1994, v:37, n:11, pp:28-31 [Journal ] Ravi S. Sandhu Lattice-based enforcement of Chinese Walls. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:8, pp:753-763 [Journal ] Ravi S. Sandhu , Sushil Jajodia Integrity principles and mechanisms in database management systems. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:5, pp:413-427 [Journal ] Ravi S. Sandhu , Sushil Jajodia Eliminating polyinstantiation securely. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:6, pp:547-562 [Journal ] Ravi S. Sandhu , Gurpreet S. Suri A distributed capability-based architecture for the transform model. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:3, pp:285-303 [Journal ] Ravi S. Sandhu , Pierangela Samarati Authetication, Access Control, and Audit. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 1996, v:28, n:1, pp:241-243 [Journal ] Duncan A. Buell , Ravi S. Sandhu IEEE Internet Computing: Guest Editors' Introduction - Identity Management. [Citation Graph (0, 0)][DBLP ] IEEE Distributed Systems Online, 2003, v:4, n:12, pp:- [Journal ] Ravi S. Sandhu IEEE Internet Computing: Guest Editor's Introduction - The Technology of Trust. [Citation Graph (0, 0)][DBLP ] IEEE Distributed Systems Online, 2002, v:3, n:11, pp:- [Journal ] Ravi S. Sandhu IEEE Internet Computing: Security Track - Good Enough Security. [Citation Graph (0, 0)][DBLP ] IEEE Distributed Systems Online, 2003, v:4, n:1, pp:- [Journal ] Duncan A. Buell , Ravi S. Sandhu Guest Editors' Introduction: Identity Management. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2003, v:7, n:6, pp:26-28 [Journal ] Li Gong , Ravi S. Sandhu Guest Editors' Introduction: What Makes Security Technologies Relevant? [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2000, v:4, n:6, pp:38-41 [Journal ] Joon S. Park , Ravi S. Sandhu Secure Cookies on the Web. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2000, v:4, n:4, pp:36-44 [Journal ] Ravi S. Sandhu Guest Editor's Introduction: The Technology of Trust. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2002, v:6, n:6, pp:28-29 [Journal ] Ravi S. Sandhu Good-Enough Security: Toward a Pragmatic Business-Driven Discipline. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2003, v:7, n:1, pp:66-68 [Journal ] Xinwen Zhang , Songqing Chen , Ravi S. Sandhu Enhancing Data Authenticity and Integrity in P2P Systems. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2005, v:9, n:6, pp:42-49 [Journal ] Ravi S. Sandhu Cryptographic Implementation of a Tree Hierarchy for Access Control. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1988, v:27, n:2, pp:95-98 [Journal ] Ravi S. Sandhu The Reflected Tree Hierarchy for Protection and Sharing. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1989, v:30, n:1, pp:21-26 [Journal ] Ravi S. Sandhu The Demand Operation in the Schematic Protection Model. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1989, v:32, n:4, pp:213-219 [Journal ] Paul Ammann , Richard J. Lipton , Ravi S. Sandhu The Expressive Power of Multi-parent Creation in Monotonic Access Control Models. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1996, v:4, n:2/3, pp:149-166 [Journal ] Paul Ammann , Ravi S. Sandhu The Extended Schematic Protection Model [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1992, v:1, n:3-4, pp:335-384 [Journal ] Ravi S. Sandhu Expressive Power of the Schematic Protection Model. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1992, v:1, n:1, pp:59-98 [Journal ] Ravi S. Sandhu , Venkata Bhamidipati Role-based Administration of User-Role Assignment: The URA97 Model and its Oracle Implementation. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1999, v:7, n:4, pp:- [Journal ] Roshan K. Thomas , Ravi S. Sandhu A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1993, v:2, n:2-3, pp:231-275 [Journal ] Ravi S. Sandhu , Xinwen Zhang , Kumar Ranganathan , Michael J. Covington Client-side access control enforcement using trusted computing and PEI models. [Citation Graph (0, 0)][DBLP ] J. High Speed Networks, 2006, v:15, n:3, pp:229-245 [Journal ] Gail-Joon Ahn , Ravi S. Sandhu Decentralized user group assignment in Windows NT. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2001, v:56, n:1, pp:39-49 [Journal ] William R. Herndon , Ravi S. Sandhu , Steve Demurjian The standards are coming! Standards for security in object-oriented systems. [Citation Graph (0, 0)][DBLP ] OOPS Messenger, 1994, v:5, n:4, pp:92-95 [Journal ] Bhavani M. Thuraisingham , Ravi S. Sandhu , T. C. Ting Security for object-oriented systems. [Citation Graph (0, 0)][DBLP ] OOPS Messenger, 1994, v:5, n:2, pp:77-78 [Journal ] Bhavani M. Thuraisingham , T. C. Ting , Peter J. Sell , Ravi S. Sandhu , Thomas F. Keefe Integrating security technology and object-oriented technology (panel). [Citation Graph (0, 0)][DBLP ] OOPS Messenger, 1994, v:5, n:2, pp:59-61 [Journal ] Elisa Bertino , Ravi S. Sandhu Database Security-Concepts, Approaches, and Challenges. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:1, pp:2-19 [Journal ] Gail-Joon Ahn , Ravi S. Sandhu Role-based authorization constraints specification. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2000, v:3, n:4, pp:207-226 [Journal ] Joon S. Park , Ravi S. Sandhu , Gail-Joon Ahn Role-based access control on the web. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2001, v:4, n:1, pp:37-71 [Journal ] Sejong Oh , Ravi S. Sandhu , Xinwen Zhang An effective role administration model using organization structure. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:2, pp:113-137 [Journal ] Ravi S. Sandhu Editorial. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2005, v:8, n:1, pp:1- [Journal ] Ravi S. Sandhu Editorial. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 1998, v:1, n:1, pp:1-2 [Journal ] Ravi S. Sandhu Editorial. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 1999, v:2, n:1, pp:1-2 [Journal ] Ravi S. Sandhu , Venkata Bhamidipati , Qamar Munawer The ARBAC97 Model for Role-Based Administration of Roles. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 1999, v:2, n:1, pp:105-135 [Journal ] Ravi S. Sandhu , Fang Chen The Multilevel Relational (MLR) Data Model. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 1998, v:1, n:1, pp:93-132 [Journal ] David F. Ferraiolo , Ravi S. Sandhu , Serban I. Gavrila , D. Richard Kuhn , Ramaswamy Chandramouli Proposed NIST standard for role-based access control. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2001, v:4, n:3, pp:224-274 [Journal ] Xinwen Zhang , Francesco Parisi-Presicce , Ravi S. Sandhu , Jaehong Park Formal model and policy specification of usage control. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2005, v:8, n:4, pp:351-387 [Journal ] Sylvia L. Osborn , Ravi S. Sandhu , Qamar Munawer Configuring role-based access control to enforce mandatory and discretionary access control policies. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2000, v:3, n:2, pp:85-106 [Journal ] Jaehong Park , Ravi S. Sandhu The UCONABC usage control model. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:1, pp:128-174 [Journal ] Ravi S. Sandhu Recognizing Immediacy in an N-Tree Hierarchy and Its Application to Protection Groups. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1989, v:15, n:12, pp:1518-1525 [Journal ] Elisa Bertino , L. R. Khan , Ravi S. Sandhu , Bhavani M. Thuraisingham Secure knowledge management: confidentiality, trust, and privacy. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2006, v:36, n:3, pp:429-438 [Journal ] Shouhuai Xu , Ravi S. Sandhu A Scalable and Secure Cryptographic Service. [Citation Graph (0, 0)][DBLP ] DBSec, 2007, pp:144-160 [Conf ] Baoxian Zhao , Ravi S. Sandhu , Xinwen Zhang , Xiaolin Qin Towards a Times-Based Usage Control Model. [Citation Graph (0, 0)][DBLP ] DBSec, 2007, pp:227-242 [Conf ] Ram Krishnan , Ravi S. Sandhu , Kumar Ranganathan PEI models towards scalable, usable and high-assurance information sharing. [Citation Graph (0, 0)][DBLP ] SACMAT, 2007, pp:145-150 [Conf ] Min Xu , Xuxian Jiang , Ravi S. Sandhu , Xinwen Zhang Towards a VMM-based usage control framework for OS kernel integrity protection. [Citation Graph (0, 0)][DBLP ] SACMAT, 2007, pp:71-80 [Conf ] A First Step towards Characterizing Stealthy Botnets. [Citation Graph (, )][DBLP ] A Framework for Understanding Botnets. [Citation Graph (, )][DBLP ] Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures. [Citation Graph (, )][DBLP ] Stale-safe security properties for group-based secure information sharing. [Citation Graph (, )][DBLP ] A conceptual framework for Group-Centric secure information sharing. [Citation Graph (, )][DBLP ] Framework for Agent-Based Role Delegation. [Citation Graph (, )][DBLP ] QoS Aware Dependable Distributed Stream Processing. [Citation Graph (, )][DBLP ] Group-Centric Models for Secure and Agile Information Sharing. [Citation Graph (, )][DBLP ] Symptoms-Based Detection of Bot Processes. [Citation Graph (, )][DBLP ] IS 2008 PC Co-chairs' Message. [Citation Graph (, )][DBLP ] ROWL BAC: representing role based access control in OWL . [Citation Graph (, )][DBLP ] Foundations for group-centric secure information sharing models. [Citation Graph (, )][DBLP ] An Access Control Language for a General Provenance Model. [Citation Graph (, )][DBLP ] Security Enforcement Model for Distributed Usage Control. [Citation Graph (, )][DBLP ] Trustworthy Information: Concepts and Mechanisms. [Citation Graph (, )][DBLP ] Towards a framework for group-centric secure collaboration. [Citation Graph (, )][DBLP ] The PEI framework for application-centric security. [Citation Graph (, )][DBLP ] A Hybrid Enforcement Model for Group-centric Secure Information Sharing. [Citation Graph (, )][DBLP ] Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). [Citation Graph (, )][DBLP ] Social-Networks Connect Services. [Citation Graph (, )][DBLP ] Search in 0.010secs, Finished in 0.761secs