| 2009 | ||
|---|---|---|
| 168 | Justin Leonard, Shouhuai Xu, Ravi S. Sandhu: A First Step towards Characterizing Stealthy Botnets. ARES 2009: 106-113 | |
| 167 | Justin Leonard, Shouhuai Xu, Ravi S. Sandhu: A Framework for Understanding Botnets. ARES 2009: 917-922 | |
| 166 | Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough: A conceptual framework for Group-Centric secure information sharing. ASIACCS 2009: 384-387 | |
| 165 | Ram Krishnan, Ravi S. Sandhu: A Hybrid Enforcement Model for Group-centric Secure Information Sharing. CSE (3) 2009: 189-194 | |
| 164 | Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough: Foundations for group-centric secure information sharing models. SACMAT 2009: 115-124 | |
| 163 | Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu, Weili Han: An Access Control Language for a General Provenance Model. Secure Data Management 2009: 68-88 | |
| 2008 | ||
| 162 | Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough: Stale-safe security properties for group-based secure information sharing. FMSE 2008: 53-62 | |
| 161 | Roshan K. Thomas, Ravi S. Sandhu, Elisa Bertino, Budak Arpinar, Shouhuai Xu: Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). ISIPS 2008: 115-121 | |
| 160 | Vana Kalogeraki, Dimitrios Gunopulos, Ravi S. Sandhu, Bhavani M. Thuraisingham: QoS Aware Dependable Distributed Stream Processing. ISORC 2008: 69-75 | |
| 159 | Jong Hyuk Park, Bart Preneel, Ravi S. Sandhu, André Zúquete: IS 2008 PC Co-chairs' Message. OTM Conferences (2) 2008: 937 | |
| 158 | Timothy W. Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough, Bhavani M. Thuraisingham: ROWLBAC: representing role based access control in OWL. SACMAT 2008: 73-82 | |
| 157 | Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu: Security Enforcement Model for Distributed Usage Control. SUTC 2008: 10-18 | |
| 156 | Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu: Toward a Usage-Based Security Framework for Collaborative Computing Systems. ACM Trans. Inf. Syst. Secur. 11(1): (2008) | |
| 2007 | ||
| 155 | Xinwen Zhang, Michael J. Covington, Songqing Chen, Ravi S. Sandhu: SecureBus: towards application-transparent trusted computing with mandatory access control. ASIACCS 2007: 117-126 | |
| 154 | Shouhuai Xu, Ravi S. Sandhu: A Scalable and Secure Cryptographic Service. DBSec 2007: 144-160 | |
| 153 | Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin: Towards a Times-Based Usage Control Model. DBSec 2007: 227-242 | |
| 152 | Ezedin Barka, Ravi S. Sandhu: Framework for Agent-Based Role Delegation. ICC 2007: 1361-1367 | |
| 151 | Ram Krishnan, Ravi S. Sandhu, Kumar Ranganathan: PEI models towards scalable, usable and high-assurance information sharing. SACMAT 2007: 145-150 | |
| 150 | Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang: Towards a VMM-based usage control framework for OS kernel integrity protection. SACMAT 2007: 71-80 | |
| 149 | David F. Ferraiolo, D. Richard Kuhn, Ravi S. Sandhu: RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control". IEEE Security & Privacy 5(6): 51-53 (2007) | |
| 2006 | ||
| 148 | Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang: Secure information sharing enabled by Trusted Computing and PEI models. ASIACCS 2006: 2-12 | |
| 147 | Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Presicce: Safety analysis of usage control authorization models. ASIACCS 2006: 243-254 | |
| 146 | Masayuki Nakae, Xinwen Zhang, Ravi S. Sandhu: A general design towards secure ad-hoc collaboration. ASIACCS 2006: 358 | |
| 145 | Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu: Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing. IWSEC 2006: 179-195 | |
| 144 | Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu: A usage-based authorization framework for collaborative computing systems. SACMAT 2006: 180-189 | |
| 143 | Sejong Oh, Ravi S. Sandhu, Xinwen Zhang: An effective role administration model using organization structure. ACM Trans. Inf. Syst. Secur. 9(2): 113-137 (2006) | |
| 142 | Elisa Bertino, L. R. Khan, Ravi S. Sandhu, Bhavani M. Thuraisingham: Secure knowledge management: confidentiality, trust, and privacy. IEEE Transactions on Systems, Man, and Cybernetics, Part A 36(3): 429-438 (2006) | |
| 141 | Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, Michael J. Covington: Client-side access control enforcement using trusted computing and PEI models. J. High Speed Networks 15(3): 229-245 (2006) | |
| 2005 | ||
| 140 | Ravi S. Sandhu, Xinwen Zhang: Peer-to-peer access control architecture using trusted computing technology. SACMAT 2005: 147-158 | |
| 139 | Ravi S. Sandhu: Editorial. ACM Trans. Inf. Syst. Secur. 8(1): 1 (2005) | |
| 138 | Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu, Jaehong Park: Formal model and policy specification of usage control. ACM Trans. Inf. Syst. Secur. 8(4): 351-387 (2005) | |
| 137 | Xinwen Zhang, Songqing Chen, Ravi S. Sandhu: Enhancing Data Authenticity and Integrity in P2P Systems. IEEE Internet Computing 9(6): 42-49 (2005) | |
| 136 | Elisa Bertino, Ravi S. Sandhu: Database Security-Concepts, Approaches, and Challenges. IEEE Trans. Dependable Sec. Comput. 2(1): 2-19 (2005) | |
| 2004 | ||
| 135 | Ezedin Barka, Ravi S. Sandhu: Role-Based Delegation Model/ Hierarchical Roles (RBDM1). ACSAC 2004: 396-404 | |
| 134 | Mohammad A. Al-Kahtani, Ravi S. Sandhu: Mohammad A. Al-Kahtani, Ravi Sandhu. ACSAC 2004: 405-415 | |
| 133 | Jaehong Park, Xinwen Zhang, Ravi S. Sandhu: Attribute Mutability in Usage Control. DBSec 2004: 15-29 | |
| 132 | Ravi S. Sandhu: A Perspective on Graphs and Access Control Models. ICGT 2004: 2-12 | |
| 131 | Shouhuai Xu, William Robert Nelson Jr., Ravi S. Sandhu: Enhancing Anonymity via Market Competition. ITCC (1) 2004: 30-34 | |
| 130 | Roshan K. Thomas, Ravi S. Sandhu: Towards a Multi-dimensional Characterization of Dissemination Control. POLICY 2004: 197-200 | |
| 129 | Roshan K. Thomas, Ravi S. Sandhu: Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions. PerCom Workshops 2004: 164-170 | |
| 128 | Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi S. Sandhu: A logical specification for usage control. SACMAT 2004: 1-10 | |
| 127 | Elisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu: Security for grid-based computing systems issues and challenges. SACMAT 2004: 125 | |
| 126 | Jaehong Park, Ravi S. Sandhu: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1): 128-174 (2004) | |
| 2003 | ||
| 125 | Shouhuai Xu, Ravi S. Sandhu: Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. CT-RSA 2003: 355-372 | |
| 124 | Xinwen Zhang, Jaehong Park, Ravi S. Sandhu: Schema Based XML Security: RBAC Approach. DBSec 2003: 330-343 | |
| 123 | Ravi S. Sandhu, Jaehong Park: Usage Control: A Vision for Next Generation Access Control. MMM-ACNS 2003: 17-31 | |
| 122 | Mohammad A. Al-Kahtani, Ravi S. Sandhu: Induced role hierarchies with attribute-based RBAC. SACMAT 2003: 142-148 | |
| 121 | Xinwen Zhang, Sejong Oh, Ravi S. Sandhu: PBDM: a flexible delegation model in RBAC. SACMAT 2003: 149-157 | |
| 120 | Ravi S. Sandhu: IEEE Internet Computing: Security Track - Good Enough Security. IEEE Distributed Systems Online 4(1): (2003) | |
| 119 | Duncan A. Buell, Ravi S. Sandhu: IEEE Internet Computing: Guest Editors' Introduction - Identity Management. IEEE Distributed Systems Online 4(12): (2003) | |
| 118 | Ravi S. Sandhu: Good-Enough Security: Toward a Pragmatic Business-Driven Discipline. IEEE Internet Computing 7(1): 66-68 (2003) | |
| 117 | Duncan A. Buell, Ravi S. Sandhu: Guest Editors' Introduction: Identity Management. IEEE Internet Computing 7(6): 26-28 (2003) | |
| 2002 | ||
| 116 | Mohammad A. Al-Kahtani, Ravi S. Sandhu: A Model for Attribute-Based User-Role Assignment. ACSAC 2002: 353-364 | |
| 115 | Jaehong Park, Ravi S. Sandhu: Originator Control in Usage Control. POLICY 2002: 60-66 | |
| 114 | Shouhuai Xu, Ravi S. Sandhu: Authenticated multicast immune to denial-of-service attack. SAC 2002: 196-200 | |
| 113 | Sejong Oh, Ravi S. Sandhu: A model for role administration using organization structure. SACMAT 2002: 155-162 | |
| 112 | Jaehong Park, Ravi S. Sandhu: Towards usage control models: beyond traditional access control. SACMAT 2002: 57-64 | |
| 111 | Ravi S. Sandhu: IEEE Internet Computing: Guest Editor's Introduction - The Technology of Trust. IEEE Distributed Systems Online 3(11): (2002) | |
| 110 | Ravi S. Sandhu: Guest Editor's Introduction: The Technology of Trust. IEEE Internet Computing 6(6): 28-29 (2002) | |
| 2001 | ||
| 109 | Pete Epstein, Ravi S. Sandhu: Engineering of Role/Permission Assignments. ACSAC 2001: 127-136 | |
| 108 | Joon S. Park, Gail-Joon Ahn, Ravi S. Sandhu: Role-based Access Control on the Web Using LDAP. DBSec 2001: 19-30 | |
| 107 | Savith Kandala, Ravi S. Sandhu: Secure Role-Based Workflow Models. DBSec 2001: 45-58 | |
| 106 | Ravi S. Sandhu: Future Directions in Role-Based Access Control Models. MMM-ACNS 2001: 22-26 | |
| 105 | Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr: Panel: The next generation of acess control models (panel session): do we need them and what should they be? SACMAT 2001: 53 | |
| 104 | Peter J. Denning, Ravi Athale, Nada Dabbagh, Daniel A. Menascé, Jeff Offutt, J. Mark Pullen, Steve Ruth, Ravi S. Sandhu: Designing an IT College. WCCE 2001: 541-550 | |
| 103 | Joon S. Park, Ravi S. Sandhu, Gail-Joon Ahn: Role-based access control on the web. ACM Trans. Inf. Syst. Secur. 4(1): 37-71 (2001) | |
| 102 | David F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn, Ramaswamy Chandramouli: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3): 224-274 (2001) | |
| 101 | Gail-Joon Ahn, Ravi S. Sandhu: Decentralized user group assignment in Windows NT. Journal of Systems and Software 56(1): 39-49 (2001) | |
| 2000 | ||
| 100 | Gail-Joon Ahn, Ravi S. Sandhu, Myong H. Kang, Joon S. Park: Injecting RBAC to secure a Web-based workflow system. ACM Workshop on Role-Based Access Control 2000: 1-10 | |
| 99 | Ravi S. Sandhu: Engineering authority and trust in cyberspace: the OM-AM and RBAC way. ACM Workshop on Role-Based Access Control 2000: 111-119 | |
| 98 | Ravi S. Sandhu, David F. Ferraiolo, D. Richard Kuhn: The NIST model for role-based access control: towards a unified standard. ACM Workshop on Role-Based Access Control 2000: 47-63 | |
| 97 | Joon S. Park, Ravi S. Sandhu: Binding Identities and Attributes using Digitally Signed Certificates. ACSAC 2000: 120-127 | |
| 96 | Ezedin Barka, Ravi S. Sandhu: Framework for Role-based Delegation Models. ACSAC 2000: 168- | |
| 95 | Jaehong Park, Ravi S. Sandhu, J. Schifalacqua: Security Architectures for Controlled Digital Information Dissemination. ACSAC 2000: 224- | |
| 94 | Sylvia L. Osborn, Ravi S. Sandhu, Qamar Munawer: Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Secur. 3(2): 85-106 (2000) | |
| 93 | Gail-Joon Ahn, Ravi S. Sandhu: Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3(4): 207-226 (2000) | |
| 92 | Joon S. Park, Ravi S. Sandhu: Secure Cookies on the Web. IEEE Internet Computing 4(4): 36-44 (2000) | |
| 91 | Li Gong, Ravi S. Sandhu: Guest Editors' Introduction: What Makes Security Technologies Relevant? IEEE Internet Computing 4(6): 38-41 (2000) | |
| 1999 | ||
| 90 | Joon S. Park, Ravi S. Sandhu: RBAC on the Web by Smart Certificates. ACM Workshop on Role-Based Access Control 1999: 1-9 | |
| 89 | Pete Epstein, Ravi S. Sandhu: Towards a UML Based Approach to Role Engineering. ACM Workshop on Role-Based Access Control 1999: 135-143 | |
| 88 | Gail-Joon Ahn, Ravi S. Sandhu: The RSL99 Language for Role-Based Separation of Duty Constraints. ACM Workshop on Role-Based Access Control 1999: 43-54 | |
| 87 | Ravi S. Sandhu, Qamar Munawer: The ARBAC99 Model for Administration of Roles. ACSAC 1999: 229- | |
| 86 | Blaine Burnham, Cynthia E. Irvine, Charles Reynolds, Ravi S. Sandhu, Rayford B. Vaughn: Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum). ACSAC 1999: 265- | |
| 85 | Savith Kandala, Ravi S. Sandhu: Extending The BFA Workflow Authorization Model to Express Weighted Voting. DBSec 1999: 145-159 | |
| 84 | Joon S. Park, Ravi S. Sandhu, SreeLatha Ghanta: RBAC on the Web by Secure Cookies. DBSec 1999: 49-62 | |
| 83 | Ravi S. Sandhu: Editorial. ACM Trans. Inf. Syst. Secur. 2(1): 1-2 (1999) | |
| 82 | Ravi S. Sandhu, Venkata Bhamidipati, Qamar Munawer: The ARBAC97 Model for Role-Based Administration of Roles. ACM Trans. Inf. Syst. Secur. 2(1): 105-135 (1999) | |
| 81 | Ravi S. Sandhu, Venkata Bhamidipati: Role-based Administration of User-Role Assignment: The URA97 Model and its Oracle Implementation. Journal of Computer Security 7(4): (1999) | |
| 1998 | ||
| 80 | Ravi S. Sandhu, Joon S. Park: Decentralized User-role Assignment for Web-based Intranets. ACM Workshop on Role-Based Access Control 1998: 1-12 | |
| 79 | Ravi S. Sandhu, Venkata Bhamidipati: An Oracle Implementation of the PRA97 Model for Permission-Role Assignment. ACM Workshop on Role-Based Access Control 1998: 13-21 | |
| 78 | Ravi S. Sandhu: Role Activation Hierarchies. ACM Workshop on Role-Based Access Control 1998: 33-40 | |
| 77 | Ravi S. Sandhu, Qamar Munawer: How to Do Discretionary Access Control Using Roles. ACM Workshop on Role-Based Access Control 1998: 47-54 | |
| 76 | Ravi S. Sandhu, Qamar Munawer: The RRA97 Model for Role-Based Administration of Role Hierarchies. ACSAC 1998: 39-49 | |
| 75 | P. C. Hyland, Ravi S. Sandhu: Concentric Supervision of Security Applications: A New Security Management Paradigm. ACSAC 1998: 59- | |
| 74 | Ravi S. Sandhu: Editorial. ACM Trans. Inf. Syst. Secur. 1(1): 1-2 (1998) | |
| 73 | Ravi S. Sandhu, Fang Chen: The Multilevel Relational (MLR) Data Model. ACM Trans. Inf. Syst. Secur. 1(1): 93-132 (1998) | |
| 72 | Ravi S. Sandhu: Role-Based Access Control. Advances in Computers 46: 238-287 (1998) | |
| 1997 | ||
| 71 | Pierangela Samarati, Ravi S. Sandhu: Database Security Volume X, Status and Prospects, IFIP TC11 / WG11.3 Tenth International Conference on Database Security, 22-24 July 1996, Como, Italy Chapman & Hall 1997 | |
| 70 | Ravi S. Sandhu, Venkata Bhamidipati, Edward J. Coyne, Srinivas Ganta, Charles E. Youman: The ARBAC97 model for role-based administration of roles: preliminary description and outline. ACM Workshop on Role-Based Access Control 1997: 41-50 | |
| 69 | T. F. Himdi, Ravi S. Sandhu: Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System. ACSAC 1997: 164-174 | |
| 68 | Roshan K. Thomas, Ravi S. Sandhu: Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. DBSec 1997: 166-181 | |
| 67 | Ravi S. Sandhu, Venkata Bhamidipati: The URA97 Model for Role-Based User-Role Assignment. DBSec 1997: 262-275 | |
| 66 | P. C. Hyland, Ravi S. Sandhu: SNMP-based Network Security Management. Integrated Network Management 1997: 787-787 | |
| 65 | Ravi S. Sandhu, Pierangela Samarati: Authentication, Access Controls, and Intrusion Detection. The Computer Science and Engineering Handbook 1997: 1929-1948 | |
| 1996 | ||
| 64 | Ravi S. Sandhu: Access Control: The Neglected Frontier. ACISP 1996: 219-227 | |
| 63 | Ravi S. Sandhu, J. Campbell: Open Issues in Database Security. DBSec 1996: 169-173 | |
| 62 | Ravi S. Sandhu, LouAnna Notargiacomo, D. Thomas, Jesse C. Worthington: Implementation Experiences and Prospects. DBSec 1996: 261-271 | |
| 61 | Ravi S. Sandhu: Role Hierarchies and Constraints for Lattice-Based Access Controls. ESORICS 1996: 65-79 | |
| 60 | Ravi S. Sandhu, Pierangela Samarati: Authetication, Access Control, and Audit. ACM Comput. Surv. 28(1): 241-243 (1996) | |
| 59 | Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman: Role-Based Access Control Models. IEEE Computer 29(2): 38-47 (1996) | |
| 58 | Roshan K. Thomas, Ravi S. Sandhu: A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases. IEEE Trans. Knowl. Data Eng. 8(1): 16-31 (1996) | |
| 57 | Paul Ammann, Richard J. Lipton, Ravi S. Sandhu: The Expressive Power of Multi-parent Creation in Monotonic Access Control Models. Journal of Computer Security 4(2/3): 149-166 (1996) | |
| 1995 | ||
| 56 | Fang Chen, Ravi S. Sandhu: Constraints for role-based access control. ACM Workshop on Role-Based Access Control 1995 | |
| 55 | Ravi S. Sandhu: Issues in RBAC. ACM Workshop on Role-Based Access Control 1995 | |
| 54 | Jeremy Epstein, Ravi S. Sandhu: NetWare 4 as an example of role-based access control. ACM Workshop on Role-Based Access Control 1995 | |
| 53 | Ravi S. Sandhu: Rationale for the RBAC96 family of access control models. ACM Workshop on Role-Based Access Control 1995 | |
| 52 | Ravi S. Sandhu: Roles versus groups. ACM Workshop on Role-Based Access Control 1995 | |
| 51 | Ravi S. Sandhu: Workshop summary. ACM Workshop on Role-Based Access Control 1995 | |
| 50 | Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting: Panel Discussion: Role-Based Access Control and Next-Generation Security Models. DBSec 1995: 289-298 | |
| 1994 | ||
| 49 | Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting: Security for Object-Oriented Systems, Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993 Springer 1994 | |
| 48 | Ravi S. Sandhu, Paul Ammann: One-Representative Safety Analysis in the Non-Monotonic Transform Model. CSFW 1994: 139-149 | |
| 47 | Ravi S. Sandhu, Roshan K. Thomas: Conceptual Foundations for a Model of Task-based Authorizations. CSFW 1994: 66-79 | |
| 46 | Ravi S. Sandhu, Srinivas Ganta: On the Expressive Power of the Unary Transformation Model. ESORICS 1994: 301-318 | |
| 45 | Roshan K. Thomas, Ravi S. Sandhu: Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture. ESORICS 1994: 403-428 | |
| 44 | Ravi Ganesan, Ravi S. Sandhu: Securing Cyberspace - Introduction to the Special Section. Commun. ACM 37(11): 28-31 (1994) | |
| 43 | Bhavani M. Thuraisingham, T. C. Ting, Peter J. Sell, Ravi S. Sandhu, Thomas F. Keefe: Integrating security technology and object-oriented technology (panel). OOPS Messenger 5(2): 59-61 (1994) | |
| 42 | Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting: Security for object-oriented systems. OOPS Messenger 5(2): 77-78 (1994) | |
| 41 | William R. Herndon, Ravi S. Sandhu, Steve Demurjian: The standards are coming! Standards for security in object-oriented systems. OOPS Messenger 5(4): 92-95 (1994) | |
| 1993 | ||
| 40 | Ravi S. Sandhu, Srinivas Ganta: On Testing for Absence of Rights in Access Control Models. CSFW 1993: 109-118 | |
| 39 | Ravi S. Sandhu: On Five Definitions of Data Integrity. DBSec 1993: 257-267 | |
| 38 | Roshan K. Thomas, Ravi S. Sandhu: Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Transactions in Multilevel databases. DBSec 1993: 309-328 | |
| 37 | Ravi S. Sandhu: Security for OODBMS (Or Systems) - Panel. OOPSLA 1993: 307 | |
| 36 | Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting: Security for Object-Oriented Systems: An Editorial Overview. Security for Object-Oriented Systems 1993: 1-7 | |
| 35 | Roshan K. Thomas, Ravi S. Sandhu: Concurrency, Synchronization, and Scheduling to Support High-Assurance Write-Up in Multilevel Object-Based Computing. Security for Object-Oriented Systems 1993: 218-228 | |
| 34 | Ravi S. Sandhu, Gurpreet S. Suri: A distributed capability-based architecture for the transform model. Computers & Security 12(3): 285-303 (1993) | |
| 33 | Ravi S. Sandhu: Lattice-Based Access Control Models. IEEE Computer 26(11): 9-19 (1993) | |
| 32 | Roshan K. Thomas, Ravi S. Sandhu: A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up. Journal of Computer Security 2(2-3): 231-275 (1993) | |
| 1992 | ||
| 31 | Paul Ammann, Richard J. Lipton, Ravi S. Sandhu: The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model. CSFW 1992: 148-156 | |
| 30 | Roshan K. Thomas, Ravi S. Sandhu: Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects. DBSec 1992: 15-34 | |
| 29 | Ravi S. Sandhu, Sushil Jajodia: Polyinstantation for Cover Stories. ESORICS 1992: 307-328 | |
| 28 | Ravi S. Sandhu, Sushil Jajodia: Eliminating polyinstantiation securely. Computers & Security 11(6): 547-562 (1992) | |
| 27 | Ravi S. Sandhu: Lattice-based enforcement of Chinese Walls. Computers & Security 11(8): 753-763 (1992) | |
| 26 | Ravi S. Sandhu: Undecidability of Safety for the Schematic Protection Model with Cyclic Creates. J. Comput. Syst. Sci. 44(1): 141-159 (1992) | |
| 25 | Ravi S. Sandhu: Expressive Power of the Schematic Protection Model. Journal of Computer Security 1(1): 59-98 (1992) | |
| 24 | Paul Ammann, Ravi S. Sandhu: The Extended Schematic Protection Model Journal of Computer Security 1(3-4): 335-384 (1992) | |
| 1991 | ||
| 23 | Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia: A Secure Kernelized Architecture for Multiple Object-Oriented Databases. CSFW 1991: 139-152 | |
| 22 | Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia: Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases. DBSec 1991: 297-314 | |
| 21 | Sushil Jajodia, Ravi S. Sandhu: A Novel Decomposition of Multilevel Relations into Single-Level Relations. IEEE Symposium on Security and Privacy 1991: 300-315 | |
| 20 | Paul Ammann, Ravi S. Sandhu: Safety Analysis for the Extended Schematic Protection Model. IEEE Symposium on Security and Privacy 1991: 87-97 | |
| 19 | Sushil Jajodia, Ravi S. Sandhu: Towards a Multilevel Secure Relational Data Model. SIGMOD Conference 1991: 50-59 | |
| 18 | Ravi S. Sandhu, Sushil Jajodia: Integrity principles and mechanisms in database management systems. Computers & Security 10(5): 413-427 (1991) | |
| 1990 | ||
| 17 | Sushil Jajodia, Ravi S. Sandhu: A Formal Framework for Single Level Decomposition of Multilevel Relations. CSFW 1990: 152-158 | |
| 16 | Ravi S. Sandhu, Sushil Jajodia, Teresa F. Lunt: A New Polyinstantiation Integrity Constraint for Multilevel Relations. CSFW 1990: 159-165 | |
| 15 | Ravi S. Sandhu: Separation of Duties in Computerized Information Systems. DBSec 1990: 179-190 | |
| 14 | Sushil Jajodia, Ravi S. Sandhu: Polyinstantiation Integrity in Multilevel Relations Revisited. DBSec 1990: 297-308 | |
| 13 | Sushil Jajodia, Ravi S. Sandhu: Polyinstantiation Integrity in Multilevel Relations. IEEE Symposium on Security and Privacy 1990: 104-115 | |
| 12 | Sushil Jajodia, Ravi S. Sandhu: Database Security: Current Status and Key Issues. SIGMOD Record 19(4): 123-126 (1990) | |
| 1989 | ||
| 11 | Ravi S. Sandhu: Mandatory Controls for Database Integrity. DBSec 1989: 143-150 | |
| 10 | Ravi S. Sandhu: Discussion Summary. DBSec 1989: 353-365 | |
| 9 | Ravi S. Sandhu: Transformation of Access Rights. IEEE Symposium on Security and Privacy 1989: 259-268 | |
| 8 | Ravi S. Sandhu: Recognizing Immediacy in an N-Tree Hierarchy and Its Application to Protection Groups. IEEE Trans. Software Eng. 15(12): 1518-1525 (1989) | |
| 7 | Ravi S. Sandhu: The Reflected Tree Hierarchy for Protection and Sharing. Inf. Process. Lett. 30(1): 21-26 (1989) | |
| 6 | Ravi S. Sandhu: The Demand Operation in the Schematic Protection Model. Inf. Process. Lett. 32(4): 213-219 (1989) | |
| 1988 | ||
| 5 | Ravi S. Sandhu: Expressive Power of the Schematic Protection Model. CSFW 1988: 188-193 | |
| 4 | Ravi S. Sandhu: The NTree: A Two Dimension Partial Order for Protection Groups. ACM Trans. Comput. Syst. 6(2): 197-222 (1988) | |
| 3 | Ravi S. Sandhu: Cryptographic Implementation of a Tree Hierarchy for Access Control. Inf. Process. Lett. 27(2): 95-98 (1988) | |
| 2 | Ravi S. Sandhu: The schematic protection model: its definition and analysis for acyclic attenuating schemes. J. ACM 35(2): 404-432 (1988) | |
| 1986 | ||
| 1 | Ravi S. Sandhu, M. E. Share: Some Owner Based Schemes with Dynamic Groups in the Schematic Protection Model. IEEE Symposium on Security and Privacy 1986: 61-70 | |