The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ravi S. Sandhu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sushil Jajodia, Ravi S. Sandhu
    Towards a Multilevel Secure Relational Data Model. [Citation Graph (8, 8)][DBLP]
    SIGMOD Conference, 1991, pp:50-59 [Conf]
  2. Sushil Jajodia, Ravi S. Sandhu
    Database Security: Current Status and Key Issues. [Citation Graph (3, 0)][DBLP]
    SIGMOD Record, 1990, v:19, n:4, pp:123-126 [Journal]
  3. Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia
    Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases. [Citation Graph (1, 0)][DBLP]
    DBSec, 1991, pp:297-314 [Conf]
  4. Ravi S. Sandhu
    Role Hierarchies and Constraints for Lattice-Based Access Controls. [Citation Graph (1, 0)][DBLP]
    ESORICS, 1996, pp:65-79 [Conf]
  5. Sushil Jajodia, Ravi S. Sandhu
    Polyinstantiation Integrity in Multilevel Relations. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:104-115 [Conf]
  6. Ravi S. Sandhu
    Lattice-Based Access Control Models. [Citation Graph (1, 0)][DBLP]
    IEEE Computer, 1993, v:26, n:11, pp:9-19 [Journal]
  7. Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman
    Role-Based Access Control Models. [Citation Graph (1, 0)][DBLP]
    IEEE Computer, 1996, v:29, n:2, pp:38-47 [Journal]
  8. Ravi S. Sandhu
    The schematic protection model: its definition and analysis for acyclic attenuating schemes. [Citation Graph (1, 0)][DBLP]
    J. ACM, 1988, v:35, n:2, pp:404-432 [Journal]
  9. Ravi S. Sandhu
    Undecidability of Safety for the Schematic Protection Model with Cyclic Creates. [Citation Graph (1, 0)][DBLP]
    J. Comput. Syst. Sci., 1992, v:44, n:1, pp:141-159 [Journal]
  10. Roshan K. Thomas, Ravi S. Sandhu
    A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases. [Citation Graph (1, 7)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1996, v:8, n:1, pp:16-31 [Journal]
  11. Ravi S. Sandhu
    The NTree: A Two Dimension Partial Order for Protection Groups. [Citation Graph (1, 0)][DBLP]
    ACM Trans. Comput. Syst., 1988, v:6, n:2, pp:197-222 [Journal]
  12. Ravi S. Sandhu
    Access Control: The Neglected Frontier. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:219-227 [Conf]
  13. Mohammad A. Al-Kahtani, Ravi S. Sandhu
    A Model for Attribute-Based User-Role Assignment. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:353-364 [Conf]
  14. Mohammad A. Al-Kahtani, Ravi S. Sandhu
    Mohammad A. Al-Kahtani, Ravi Sandhu. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:405-415 [Conf]
  15. Blaine Burnham, Cynthia E. Irvine, Charles Reynolds, Ravi S. Sandhu, Rayford B. Vaughn
    Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum). [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:265-0 [Conf]
  16. Ezedin Barka, Ravi S. Sandhu
    Framework for Role-based Delegation Models. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:168-0 [Conf]
  17. Ezedin Barka, Ravi S. Sandhu
    Role-Based Delegation Model/ Hierarchical Roles (RBDM1). [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:396-404 [Conf]
  18. Pete Epstein, Ravi S. Sandhu
    Engineering of Role/Permission Assignments. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:127-136 [Conf]
  19. T. F. Himdi, Ravi S. Sandhu
    Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:164-174 [Conf]
  20. P. C. Hyland, Ravi S. Sandhu
    Concentric Supervision of Security Applications: A New Security Management Paradigm. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:59-0 [Conf]
  21. Joon S. Park, Ravi S. Sandhu
    Binding Identities and Attributes using Digitally Signed Certificates. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:120-127 [Conf]
  22. Jaehong Park, Ravi S. Sandhu, J. Schifalacqua
    Security Architectures for Controlled Digital Information Dissemination. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:224-0 [Conf]
  23. Ravi S. Sandhu, Qamar Munawer
    The RRA97 Model for Role-Based Administration of Role Hierarchies. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:39-49 [Conf]
  24. Ravi S. Sandhu, Qamar Munawer
    The ARBAC99 Model for Administration of Roles. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:229-0 [Conf]
  25. Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
    Secure information sharing enabled by Trusted Computing and PEI models. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:2-12 [Conf]
  26. Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Presicce
    Safety analysis of usage control authorization models. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:243-254 [Conf]
  27. Masayuki Nakae, Xinwen Zhang, Ravi S. Sandhu
    A general design towards secure ad-hoc collaboration. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:358- [Conf]
  28. Xinwen Zhang, Michael J. Covington, Songqing Chen, Ravi S. Sandhu
    SecureBus: towards application-transparent trusted computing with mandatory access control. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:117-126 [Conf]
  29. Paul Ammann, Richard J. Lipton, Ravi S. Sandhu
    The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model. [Citation Graph (0, 0)][DBLP]
    CSFW, 1992, pp:148-156 [Conf]
  30. Sushil Jajodia, Ravi S. Sandhu
    A Formal Framework for Single Level Decomposition of Multilevel Relations. [Citation Graph (0, 0)][DBLP]
    CSFW, 1990, pp:152-158 [Conf]
  31. Ravi S. Sandhu
    Expressive Power of the Schematic Protection Model. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:188-193 [Conf]
  32. Ravi S. Sandhu, Paul Ammann
    One-Representative Safety Analysis in the Non-Monotonic Transform Model. [Citation Graph (0, 0)][DBLP]
    CSFW, 1994, pp:139-149 [Conf]
  33. Ravi S. Sandhu, Srinivas Ganta
    On Testing for Absence of Rights in Access Control Models. [Citation Graph (0, 0)][DBLP]
    CSFW, 1993, pp:109-118 [Conf]
  34. Ravi S. Sandhu, Sushil Jajodia, Teresa F. Lunt
    A New Polyinstantiation Integrity Constraint for Multilevel Relations. [Citation Graph (0, 0)][DBLP]
    CSFW, 1990, pp:159-165 [Conf]
  35. Ravi S. Sandhu, Roshan K. Thomas
    Conceptual Foundations for a Model of Task-based Authorizations. [Citation Graph (0, 0)][DBLP]
    CSFW, 1994, pp:66-79 [Conf]
  36. Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia
    A Secure Kernelized Architecture for Multiple Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:139-152 [Conf]
  37. Shouhuai Xu, Ravi S. Sandhu
    Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:355-372 [Conf]
  38. Savith Kandala, Ravi S. Sandhu
    Secure Role-Based Workflow Models. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:45-58 [Conf]
  39. Savith Kandala, Ravi S. Sandhu
    Extending The BFA Workflow Authorization Model to Express Weighted Voting. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:145-159 [Conf]
  40. Sushil Jajodia, Ravi S. Sandhu
    Polyinstantiation Integrity in Multilevel Relations Revisited. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:297-308 [Conf]
  41. Joon S. Park, Gail-Joon Ahn, Ravi S. Sandhu
    Role-based Access Control on the Web Using LDAP. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:19-30 [Conf]
  42. Joon S. Park, Ravi S. Sandhu, SreeLatha Ghanta
    RBAC on the Web by Secure Cookies. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:49-62 [Conf]
  43. Jaehong Park, Xinwen Zhang, Ravi S. Sandhu
    Attribute Mutability in Usage Control. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:15-29 [Conf]
  44. Ravi S. Sandhu
    Mandatory Controls for Database Integrity. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:143-150 [Conf]
  45. Ravi S. Sandhu
    Discussion Summary. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:353-365 [Conf]
  46. Ravi S. Sandhu
    Separation of Duties in Computerized Information Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:179-190 [Conf]
  47. Ravi S. Sandhu
    On Five Definitions of Data Integrity. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:257-267 [Conf]
  48. Ravi S. Sandhu, Venkata Bhamidipati
    The URA97 Model for Role-Based User-Role Assignment. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:262-275 [Conf]
  49. Ravi S. Sandhu, J. Campbell
    Open Issues in Database Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:169-173 [Conf]
  50. Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting
    Panel Discussion: Role-Based Access Control and Next-Generation Security Models. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:289-298 [Conf]
  51. Ravi S. Sandhu, LouAnna Notargiacomo, D. Thomas, Jesse C. Worthington
    Implementation Experiences and Prospects. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:261-271 [Conf]
  52. Roshan K. Thomas, Ravi S. Sandhu
    Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects. [Citation Graph (0, 0)][DBLP]
    DBSec, 1992, pp:15-34 [Conf]
  53. Roshan K. Thomas, Ravi S. Sandhu
    Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Transactions in Multilevel databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:309-328 [Conf]
  54. Roshan K. Thomas, Ravi S. Sandhu
    Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:166-181 [Conf]
  55. Xinwen Zhang, Jaehong Park, Ravi S. Sandhu
    Schema Based XML Security: RBAC Approach. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:330-343 [Conf]
  56. Ravi S. Sandhu, Srinivas Ganta
    On the Expressive Power of the Unary Transformation Model. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:301-318 [Conf]
  57. Ravi S. Sandhu, Sushil Jajodia
    Polyinstantation for Cover Stories. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:307-328 [Conf]
  58. Roshan K. Thomas, Ravi S. Sandhu
    Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:403-428 [Conf]
  59. Ravi S. Sandhu
    A Perspective on Graphs and Access Control Models. [Citation Graph (0, 0)][DBLP]
    ICGT, 2004, pp:2-12 [Conf]
  60. P. C. Hyland, Ravi S. Sandhu
    SNMP-based Network Security Management. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 1997, pp:787-787 [Conf]
  61. Shouhuai Xu, William Robert Nelson Jr., Ravi S. Sandhu
    Enhancing Anonymity via Market Competition. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:30-34 [Conf]
  62. Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu
    Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:179-195 [Conf]
  63. Ravi S. Sandhu, Jaehong Park
    Usage Control: A Vision for Next Generation Access Control. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:17-31 [Conf]
  64. Ravi S. Sandhu
    Future Directions in Role-Based Access Control Models. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:22-26 [Conf]
  65. Ravi S. Sandhu
    Security for OODBMS (Or Systems) - Panel. [Citation Graph (0, 0)][DBLP]
    OOPSLA, 1993, pp:307- [Conf]
  66. Roshan K. Thomas, Ravi S. Sandhu
    Concurrency, Synchronization, and Scheduling to Support High-Assurance Write-Up in Multilevel Object-Based Computing. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:218-228 [Conf]
  67. Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting
    Security for Object-Oriented Systems: An Editorial Overview. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:1-7 [Conf]
  68. Roshan K. Thomas, Ravi S. Sandhu
    Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2004, pp:164-170 [Conf]
  69. Jaehong Park, Ravi S. Sandhu
    Originator Control in Usage Control. [Citation Graph (0, 0)][DBLP]
    POLICY, 2002, pp:60-66 [Conf]
  70. Roshan K. Thomas, Ravi S. Sandhu
    Towards a Multi-dimensional Characterization of Dissemination Control. [Citation Graph (0, 0)][DBLP]
    POLICY, 2004, pp:197-200 [Conf]
  71. Gail-Joon Ahn, Ravi S. Sandhu
    The RSL99 Language for Role-Based Separation of Duty Constraints. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:43-54 [Conf]
  72. Ravi S. Sandhu, Qamar Munawer
    How to Do Discretionary Access Control Using Roles. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1998, pp:47-54 [Conf]
  73. Gail-Joon Ahn, Ravi S. Sandhu, Myong H. Kang, Joon S. Park
    Injecting RBAC to secure a Web-based workflow system. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:1-10 [Conf]
  74. Fang Chen, Ravi S. Sandhu
    Constraints for role-based access control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  75. Jeremy Epstein, Ravi S. Sandhu
    NetWare 4 as an example of role-based access control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  76. Pete Epstein, Ravi S. Sandhu
    Towards a UML Based Approach to Role Engineering. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:135-143 [Conf]
  77. Joon S. Park, Ravi S. Sandhu
    RBAC on the Web by Smart Certificates. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:1-9 [Conf]
  78. Ravi S. Sandhu
    Engineering authority and trust in cyberspace: the OM-AM and RBAC way. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:111-119 [Conf]
  79. Ravi S. Sandhu
    Workshop summary. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  80. Ravi S. Sandhu
    Issues in RBAC. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  81. Ravi S. Sandhu
    Roles versus groups. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  82. Ravi S. Sandhu
    Rationale for the RBAC96 family of access control models. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  83. Ravi S. Sandhu
    Role Activation Hierarchies. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1998, pp:33-40 [Conf]
  84. Ravi S. Sandhu, Venkata Bhamidipati
    An Oracle Implementation of the PRA97 Model for Permission-Role Assignment. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1998, pp:13-21 [Conf]
  85. Ravi S. Sandhu, Venkata Bhamidipati, Edward J. Coyne, Srinivas Ganta, Charles E. Youman
    The ARBAC97 model for role-based administration of roles: preliminary description and outline. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:41-50 [Conf]
  86. Ravi S. Sandhu, David F. Ferraiolo, D. Richard Kuhn
    The NIST model for role-based access control: towards a unified standard. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:47-63 [Conf]
  87. Ravi S. Sandhu, Joon S. Park
    Decentralized User-role Assignment for Web-based Intranets. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1998, pp:1-12 [Conf]
  88. Shouhuai Xu, Ravi S. Sandhu
    Authenticated multicast immune to denial-of-service attack. [Citation Graph (0, 0)][DBLP]
    SAC, 2002, pp:196-200 [Conf]
  89. Mohammad A. Al-Kahtani, Ravi S. Sandhu
    Induced role hierarchies with attribute-based RBAC. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:142-148 [Conf]
  90. Jaehong Park, Ravi S. Sandhu
    Towards usage control models: beyond traditional access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:57-64 [Conf]
  91. Elisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu
    Security for grid-based computing systems issues and challenges. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:125- [Conf]
  92. Elisa Bertino, Trent Jaeger, Jonathan D. Moffett, Sylvia L. Osborn, Ravi Ravi
    Making access control more usable. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:141- [Conf]
  93. Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr
    Panel: The next generation of acess control models (panel session): do we need them and what should they be? [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:53- [Conf]
  94. Ravi S. Sandhu, Xinwen Zhang
    Peer-to-peer access control architecture using trusted computing technology. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:147-158 [Conf]
  95. Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu
    A usage-based authorization framework for collaborative computing systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:180-189 [Conf]
  96. Xinwen Zhang, Sejong Oh, Ravi S. Sandhu
    PBDM: a flexible delegation model in RBAC. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:149-157 [Conf]
  97. Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi S. Sandhu
    A logical specification for usage control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:1-10 [Conf]
  98. Sejong Oh, Ravi S. Sandhu
    A model for role administration using organization structure. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:155-162 [Conf]
  99. Paul Ammann, Ravi S. Sandhu
    Safety Analysis for the Extended Schematic Protection Model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:87-97 [Conf]
  100. Sushil Jajodia, Ravi S. Sandhu
    A Novel Decomposition of Multilevel Relations into Single-Level Relations. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:300-315 [Conf]
  101. Ravi S. Sandhu
    Transformation of Access Rights. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:259-268 [Conf]
  102. Ravi S. Sandhu, M. E. Share
    Some Owner Based Schemes with Dynamic Groups in the Schematic Protection Model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:61-70 [Conf]
  103. Peter J. Denning, Ravi Athale, Nada Dabbagh, Daniel A. Menascé, Jeff Offutt, J. Mark Pullen, Steve Ruth, Ravi S. Sandhu
    Designing an IT College. [Citation Graph (0, 0)][DBLP]
    WCCE, 2001, pp:541-550 [Conf]
  104. Ravi S. Sandhu
    Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    Advances in Computers, 1998, v:46, n:, pp:238-287 [Journal]
  105. Ravi Ganesan, Ravi S. Sandhu
    Securing Cyberspace - Introduction to the Special Section. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:11, pp:28-31 [Journal]
  106. Ravi S. Sandhu
    Lattice-based enforcement of Chinese Walls. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:8, pp:753-763 [Journal]
  107. Ravi S. Sandhu, Sushil Jajodia
    Integrity principles and mechanisms in database management systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1991, v:10, n:5, pp:413-427 [Journal]
  108. Ravi S. Sandhu, Sushil Jajodia
    Eliminating polyinstantiation securely. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:6, pp:547-562 [Journal]
  109. Ravi S. Sandhu, Gurpreet S. Suri
    A distributed capability-based architecture for the transform model. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:3, pp:285-303 [Journal]
  110. Ravi S. Sandhu, Pierangela Samarati
    Authetication, Access Control, and Audit. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1996, v:28, n:1, pp:241-243 [Journal]
  111. Duncan A. Buell, Ravi S. Sandhu
    IEEE Internet Computing: Guest Editors' Introduction - Identity Management. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2003, v:4, n:12, pp:- [Journal]
  112. Ravi S. Sandhu
    IEEE Internet Computing: Guest Editor's Introduction - The Technology of Trust. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2002, v:3, n:11, pp:- [Journal]
  113. Ravi S. Sandhu
    IEEE Internet Computing: Security Track - Good Enough Security. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2003, v:4, n:1, pp:- [Journal]
  114. Duncan A. Buell, Ravi S. Sandhu
    Guest Editors' Introduction: Identity Management. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2003, v:7, n:6, pp:26-28 [Journal]
  115. Li Gong, Ravi S. Sandhu
    Guest Editors' Introduction: What Makes Security Technologies Relevant? [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2000, v:4, n:6, pp:38-41 [Journal]
  116. Joon S. Park, Ravi S. Sandhu
    Secure Cookies on the Web. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2000, v:4, n:4, pp:36-44 [Journal]
  117. Ravi S. Sandhu
    Guest Editor's Introduction: The Technology of Trust. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2002, v:6, n:6, pp:28-29 [Journal]
  118. Ravi S. Sandhu
    Good-Enough Security: Toward a Pragmatic Business-Driven Discipline. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2003, v:7, n:1, pp:66-68 [Journal]
  119. Xinwen Zhang, Songqing Chen, Ravi S. Sandhu
    Enhancing Data Authenticity and Integrity in P2P Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2005, v:9, n:6, pp:42-49 [Journal]
  120. Ravi S. Sandhu
    Cryptographic Implementation of a Tree Hierarchy for Access Control. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1988, v:27, n:2, pp:95-98 [Journal]
  121. Ravi S. Sandhu
    The Reflected Tree Hierarchy for Protection and Sharing. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1989, v:30, n:1, pp:21-26 [Journal]
  122. Ravi S. Sandhu
    The Demand Operation in the Schematic Protection Model. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1989, v:32, n:4, pp:213-219 [Journal]
  123. Paul Ammann, Richard J. Lipton, Ravi S. Sandhu
    The Expressive Power of Multi-parent Creation in Monotonic Access Control Models. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1996, v:4, n:2/3, pp:149-166 [Journal]
  124. Paul Ammann, Ravi S. Sandhu
    The Extended Schematic Protection Model [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1992, v:1, n:3-4, pp:335-384 [Journal]
  125. Ravi S. Sandhu
    Expressive Power of the Schematic Protection Model. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1992, v:1, n:1, pp:59-98 [Journal]
  126. Ravi S. Sandhu, Venkata Bhamidipati
    Role-based Administration of User-Role Assignment: The URA97 Model and its Oracle Implementation. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1999, v:7, n:4, pp:- [Journal]
  127. Roshan K. Thomas, Ravi S. Sandhu
    A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1993, v:2, n:2-3, pp:231-275 [Journal]
  128. Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, Michael J. Covington
    Client-side access control enforcement using trusted computing and PEI models. [Citation Graph (0, 0)][DBLP]
    J. High Speed Networks, 2006, v:15, n:3, pp:229-245 [Journal]
  129. Gail-Joon Ahn, Ravi S. Sandhu
    Decentralized user group assignment in Windows NT. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2001, v:56, n:1, pp:39-49 [Journal]
  130. William R. Herndon, Ravi S. Sandhu, Steve Demurjian
    The standards are coming! Standards for security in object-oriented systems. [Citation Graph (0, 0)][DBLP]
    OOPS Messenger, 1994, v:5, n:4, pp:92-95 [Journal]
  131. Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting
    Security for object-oriented systems. [Citation Graph (0, 0)][DBLP]
    OOPS Messenger, 1994, v:5, n:2, pp:77-78 [Journal]
  132. Bhavani M. Thuraisingham, T. C. Ting, Peter J. Sell, Ravi S. Sandhu, Thomas F. Keefe
    Integrating security technology and object-oriented technology (panel). [Citation Graph (0, 0)][DBLP]
    OOPS Messenger, 1994, v:5, n:2, pp:59-61 [Journal]
  133. Elisa Bertino, Ravi S. Sandhu
    Database Security-Concepts, Approaches, and Challenges. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:1, pp:2-19 [Journal]
  134. Gail-Joon Ahn, Ravi S. Sandhu
    Role-based authorization constraints specification. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2000, v:3, n:4, pp:207-226 [Journal]
  135. Joon S. Park, Ravi S. Sandhu, Gail-Joon Ahn
    Role-based access control on the web. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2001, v:4, n:1, pp:37-71 [Journal]
  136. Sejong Oh, Ravi S. Sandhu, Xinwen Zhang
    An effective role administration model using organization structure. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2006, v:9, n:2, pp:113-137 [Journal]
  137. Ravi S. Sandhu
    Editorial. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2005, v:8, n:1, pp:1- [Journal]
  138. Ravi S. Sandhu
    Editorial. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1998, v:1, n:1, pp:1-2 [Journal]
  139. Ravi S. Sandhu
    Editorial. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1999, v:2, n:1, pp:1-2 [Journal]
  140. Ravi S. Sandhu, Venkata Bhamidipati, Qamar Munawer
    The ARBAC97 Model for Role-Based Administration of Roles. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1999, v:2, n:1, pp:105-135 [Journal]
  141. Ravi S. Sandhu, Fang Chen
    The Multilevel Relational (MLR) Data Model. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1998, v:1, n:1, pp:93-132 [Journal]
  142. David F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn, Ramaswamy Chandramouli
    Proposed NIST standard for role-based access control. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2001, v:4, n:3, pp:224-274 [Journal]
  143. Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu, Jaehong Park
    Formal model and policy specification of usage control. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2005, v:8, n:4, pp:351-387 [Journal]
  144. Sylvia L. Osborn, Ravi S. Sandhu, Qamar Munawer
    Configuring role-based access control to enforce mandatory and discretionary access control policies. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2000, v:3, n:2, pp:85-106 [Journal]
  145. Jaehong Park, Ravi S. Sandhu
    The UCONABC usage control model. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:1, pp:128-174 [Journal]
  146. Ravi S. Sandhu
    Recognizing Immediacy in an N-Tree Hierarchy and Its Application to Protection Groups. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1989, v:15, n:12, pp:1518-1525 [Journal]
  147. Elisa Bertino, L. R. Khan, Ravi S. Sandhu, Bhavani M. Thuraisingham
    Secure knowledge management: confidentiality, trust, and privacy. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2006, v:36, n:3, pp:429-438 [Journal]
  148. Shouhuai Xu, Ravi S. Sandhu
    A Scalable and Secure Cryptographic Service. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:144-160 [Conf]
  149. Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin
    Towards a Times-Based Usage Control Model. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:227-242 [Conf]
  150. Ram Krishnan, Ravi S. Sandhu, Kumar Ranganathan
    PEI models towards scalable, usable and high-assurance information sharing. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:145-150 [Conf]
  151. Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang
    Towards a VMM-based usage control framework for OS kernel integrity protection. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:71-80 [Conf]

  152. A First Step towards Characterizing Stealthy Botnets. [Citation Graph (, )][DBLP]


  153. A Framework for Understanding Botnets. [Citation Graph (, )][DBLP]


  154. Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures. [Citation Graph (, )][DBLP]


  155. Stale-safe security properties for group-based secure information sharing. [Citation Graph (, )][DBLP]


  156. A conceptual framework for Group-Centric secure information sharing. [Citation Graph (, )][DBLP]


  157. Framework for Agent-Based Role Delegation. [Citation Graph (, )][DBLP]


  158. QoS Aware Dependable Distributed Stream Processing. [Citation Graph (, )][DBLP]


  159. Group-Centric Models for Secure and Agile Information Sharing. [Citation Graph (, )][DBLP]


  160. Symptoms-Based Detection of Bot Processes. [Citation Graph (, )][DBLP]


  161. IS 2008 PC Co-chairs' Message. [Citation Graph (, )][DBLP]


  162. ROWLBAC: representing role based access control in OWL. [Citation Graph (, )][DBLP]


  163. Foundations for group-centric secure information sharing models. [Citation Graph (, )][DBLP]


  164. An Access Control Language for a General Provenance Model. [Citation Graph (, )][DBLP]


  165. Security Enforcement Model for Distributed Usage Control. [Citation Graph (, )][DBLP]


  166. Trustworthy Information: Concepts and Mechanisms. [Citation Graph (, )][DBLP]


  167. Towards a framework for group-centric secure collaboration. [Citation Graph (, )][DBLP]


  168. The PEI framework for application-centric security. [Citation Graph (, )][DBLP]


  169. A Hybrid Enforcement Model for Group-centric Secure Information Sharing. [Citation Graph (, )][DBLP]


  170. Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). [Citation Graph (, )][DBLP]


  171. Social-Networks Connect Services. [Citation Graph (, )][DBLP]


Search in 0.010secs, Finished in 0.761secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002