2009 |
161 | EE | Ram Krishnan,
Ravi S. Sandhu,
Jianwei Niu,
William H. Winsborough:
A conceptual framework for Group-Centric secure information sharing.
ASIACCS 2009: 384-387 |
2008 |
160 | EE | Ram Krishnan,
Jianwei Niu,
Ravi S. Sandhu,
William H. Winsborough:
Stale-safe security properties for group-based secure information sharing.
FMSE 2008: 53-62 |
159 | EE | Vana Kalogeraki,
Dimitrios Gunopulos,
Ravi S. Sandhu,
Bhavani M. Thuraisingham:
QoS Aware Dependable Distributed Stream Processing.
ISORC 2008: 69-75 |
158 | EE | Jong Hyuk Park,
Bart Preneel,
Ravi S. Sandhu,
André Zúquete:
IS 2008 PC Co-chairs' Message.
OTM Conferences (2) 2008: 937 |
157 | EE | Timothy W. Finin,
Anupam Joshi,
Lalana Kagal,
Jianwei Niu,
Ravi S. Sandhu,
William H. Winsborough,
Bhavani M. Thuraisingham:
ROWLBAC: representing role based access control in OWL.
SACMAT 2008: 73-82 |
156 | EE | Xinwen Zhang,
Jean-Pierre Seifert,
Ravi S. Sandhu:
Security Enforcement Model for Distributed Usage Control.
SUTC 2008: 10-18 |
155 | EE | Xinwen Zhang,
Masayuki Nakae,
Michael J. Covington,
Ravi S. Sandhu:
Toward a Usage-Based Security Framework for Collaborative Computing Systems.
ACM Trans. Inf. Syst. Secur. 11(1): (2008) |
2007 |
154 | EE | Xinwen Zhang,
Michael J. Covington,
Songqing Chen,
Ravi S. Sandhu:
SecureBus: towards application-transparent trusted computing with mandatory access control.
ASIACCS 2007: 117-126 |
153 | EE | Shouhuai Xu,
Ravi S. Sandhu:
A Scalable and Secure Cryptographic Service.
DBSec 2007: 144-160 |
152 | EE | Baoxian Zhao,
Ravi S. Sandhu,
Xinwen Zhang,
Xiaolin Qin:
Towards a Times-Based Usage Control Model.
DBSec 2007: 227-242 |
151 | EE | Ezedin Barka,
Ravi S. Sandhu:
Framework for Agent-Based Role Delegation.
ICC 2007: 1361-1367 |
150 | EE | Ram Krishnan,
Ravi S. Sandhu,
Kumar Ranganathan:
PEI models towards scalable, usable and high-assurance information sharing.
SACMAT 2007: 145-150 |
149 | EE | Min Xu,
Xuxian Jiang,
Ravi S. Sandhu,
Xinwen Zhang:
Towards a VMM-based usage control framework for OS kernel integrity protection.
SACMAT 2007: 71-80 |
2006 |
148 | EE | Ravi S. Sandhu,
Kumar Ranganathan,
Xinwen Zhang:
Secure information sharing enabled by Trusted Computing and PEI models.
ASIACCS 2006: 2-12 |
147 | EE | Xinwen Zhang,
Ravi S. Sandhu,
Francesco Parisi-Presicce:
Safety analysis of usage control authorization models.
ASIACCS 2006: 243-254 |
146 | EE | Masayuki Nakae,
Xinwen Zhang,
Ravi S. Sandhu:
A general design towards secure ad-hoc collaboration.
ASIACCS 2006: 358 |
145 | EE | Xinwen Zhang,
Francesco Parisi-Presicce,
Ravi S. Sandhu:
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing.
IWSEC 2006: 179-195 |
144 | EE | Xinwen Zhang,
Masayuki Nakae,
Michael J. Covington,
Ravi S. Sandhu:
A usage-based authorization framework for collaborative computing systems.
SACMAT 2006: 180-189 |
143 | EE | Sejong Oh,
Ravi S. Sandhu,
Xinwen Zhang:
An effective role administration model using organization structure.
ACM Trans. Inf. Syst. Secur. 9(2): 113-137 (2006) |
142 | EE | Elisa Bertino,
L. R. Khan,
Ravi S. Sandhu,
Bhavani M. Thuraisingham:
Secure knowledge management: confidentiality, trust, and privacy.
IEEE Transactions on Systems, Man, and Cybernetics, Part A 36(3): 429-438 (2006) |
141 | EE | Ravi S. Sandhu,
Xinwen Zhang,
Kumar Ranganathan,
Michael J. Covington:
Client-side access control enforcement using trusted computing and PEI models.
J. High Speed Networks 15(3): 229-245 (2006) |
2005 |
140 | EE | Ravi S. Sandhu,
Xinwen Zhang:
Peer-to-peer access control architecture using trusted computing technology.
SACMAT 2005: 147-158 |
139 | EE | Ravi S. Sandhu:
Editorial.
ACM Trans. Inf. Syst. Secur. 8(1): 1 (2005) |
138 | EE | Xinwen Zhang,
Francesco Parisi-Presicce,
Ravi S. Sandhu,
Jaehong Park:
Formal model and policy specification of usage control.
ACM Trans. Inf. Syst. Secur. 8(4): 351-387 (2005) |
137 | EE | Xinwen Zhang,
Songqing Chen,
Ravi S. Sandhu:
Enhancing Data Authenticity and Integrity in P2P Systems.
IEEE Internet Computing 9(6): 42-49 (2005) |
136 | EE | Elisa Bertino,
Ravi S. Sandhu:
Database Security-Concepts, Approaches, and Challenges.
IEEE Trans. Dependable Sec. Comput. 2(1): 2-19 (2005) |
2004 |
135 | EE | Ezedin Barka,
Ravi S. Sandhu:
Role-Based Delegation Model/ Hierarchical Roles (RBDM1).
ACSAC 2004: 396-404 |
134 | EE | Mohammad A. Al-Kahtani,
Ravi S. Sandhu:
Mohammad A. Al-Kahtani, Ravi Sandhu.
ACSAC 2004: 405-415 |
133 | | Jaehong Park,
Xinwen Zhang,
Ravi S. Sandhu:
Attribute Mutability in Usage Control.
DBSec 2004: 15-29 |
132 | EE | Ravi S. Sandhu:
A Perspective on Graphs and Access Control Models.
ICGT 2004: 2-12 |
131 | EE | Shouhuai Xu,
William Robert Nelson Jr.,
Ravi S. Sandhu:
Enhancing Anonymity via Market Competition.
ITCC (1) 2004: 30-34 |
130 | EE | Roshan K. Thomas,
Ravi S. Sandhu:
Towards a Multi-dimensional Characterization of Dissemination Control.
POLICY 2004: 197-200 |
129 | EE | Roshan K. Thomas,
Ravi S. Sandhu:
Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions.
PerCom Workshops 2004: 164-170 |
128 | EE | Xinwen Zhang,
Jaehong Park,
Francesco Parisi-Presicce,
Ravi S. Sandhu:
A logical specification for usage control.
SACMAT 2004: 1-10 |
127 | EE | Elisa Bertino,
Bruno Crispo,
James Joshi,
Wengliang (Kevin) Du,
Ravi S. Sandhu:
Security for grid-based computing systems issues and challenges.
SACMAT 2004: 125 |
126 | EE | Jaehong Park,
Ravi S. Sandhu:
The UCONABC usage control model.
ACM Trans. Inf. Syst. Secur. 7(1): 128-174 (2004) |
2003 |
125 | EE | Shouhuai Xu,
Ravi S. Sandhu:
Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures.
CT-RSA 2003: 355-372 |
124 | | Xinwen Zhang,
Jaehong Park,
Ravi S. Sandhu:
Schema Based XML Security: RBAC Approach.
DBSec 2003: 330-343 |
123 | EE | Ravi S. Sandhu,
Jaehong Park:
Usage Control: A Vision for Next Generation Access Control.
MMM-ACNS 2003: 17-31 |
122 | EE | Mohammad A. Al-Kahtani,
Ravi S. Sandhu:
Induced role hierarchies with attribute-based RBAC.
SACMAT 2003: 142-148 |
121 | EE | Xinwen Zhang,
Sejong Oh,
Ravi S. Sandhu:
PBDM: a flexible delegation model in RBAC.
SACMAT 2003: 149-157 |
120 | EE | Ravi S. Sandhu:
IEEE Internet Computing: Security Track - Good Enough Security.
IEEE Distributed Systems Online 4(1): (2003) |
119 | EE | Duncan A. Buell,
Ravi S. Sandhu:
IEEE Internet Computing: Guest Editors' Introduction - Identity Management.
IEEE Distributed Systems Online 4(12): (2003) |
118 | EE | Ravi S. Sandhu:
Good-Enough Security: Toward a Pragmatic Business-Driven Discipline.
IEEE Internet Computing 7(1): 66-68 (2003) |
117 | EE | Duncan A. Buell,
Ravi S. Sandhu:
Guest Editors' Introduction: Identity Management.
IEEE Internet Computing 7(6): 26-28 (2003) |
2002 |
116 | EE | Mohammad A. Al-Kahtani,
Ravi S. Sandhu:
A Model for Attribute-Based User-Role Assignment.
ACSAC 2002: 353-364 |
115 | EE | Jaehong Park,
Ravi S. Sandhu:
Originator Control in Usage Control.
POLICY 2002: 60-66 |
114 | EE | Shouhuai Xu,
Ravi S. Sandhu:
Authenticated multicast immune to denial-of-service attack.
SAC 2002: 196-200 |
113 | EE | Sejong Oh,
Ravi S. Sandhu:
A model for role administration using organization structure.
SACMAT 2002: 155-162 |
112 | EE | Jaehong Park,
Ravi S. Sandhu:
Towards usage control models: beyond traditional access control.
SACMAT 2002: 57-64 |
111 | EE | Ravi S. Sandhu:
IEEE Internet Computing: Guest Editor's Introduction - The Technology of Trust.
IEEE Distributed Systems Online 3(11): (2002) |
110 | EE | Ravi S. Sandhu:
Guest Editor's Introduction: The Technology of Trust.
IEEE Internet Computing 6(6): 28-29 (2002) |
2001 |
109 | EE | Pete Epstein,
Ravi S. Sandhu:
Engineering of Role/Permission Assignments.
ACSAC 2001: 127-136 |
108 | | Joon S. Park,
Gail-Joon Ahn,
Ravi S. Sandhu:
Role-based Access Control on the Web Using LDAP.
DBSec 2001: 19-30 |
107 | | Savith Kandala,
Ravi S. Sandhu:
Secure Role-Based Workflow Models.
DBSec 2001: 45-58 |
106 | EE | Ravi S. Sandhu:
Future Directions in Role-Based Access Control Models.
MMM-ACNS 2001: 22-26 |
105 | EE | Ravi S. Sandhu,
Elisa Bertino,
Trent Jaeger,
D. Richard Kuhn,
Carl E. Landwehr:
Panel: The next generation of acess control models (panel session): do we need them and what should they be?
SACMAT 2001: 53 |
104 | | Peter J. Denning,
Ravi Athale,
Nada Dabbagh,
Daniel A. Menascé,
Jeff Offutt,
J. Mark Pullen,
Steve Ruth,
Ravi S. Sandhu:
Designing an IT College.
WCCE 2001: 541-550 |
103 | EE | Joon S. Park,
Ravi S. Sandhu,
Gail-Joon Ahn:
Role-based access control on the web.
ACM Trans. Inf. Syst. Secur. 4(1): 37-71 (2001) |
102 | EE | David F. Ferraiolo,
Ravi S. Sandhu,
Serban I. Gavrila,
D. Richard Kuhn,
Ramaswamy Chandramouli:
Proposed NIST standard for role-based access control.
ACM Trans. Inf. Syst. Secur. 4(3): 224-274 (2001) |
101 | EE | Gail-Joon Ahn,
Ravi S. Sandhu:
Decentralized user group assignment in Windows NT.
Journal of Systems and Software 56(1): 39-49 (2001) |
2000 |
100 | EE | Gail-Joon Ahn,
Ravi S. Sandhu,
Myong H. Kang,
Joon S. Park:
Injecting RBAC to secure a Web-based workflow system.
ACM Workshop on Role-Based Access Control 2000: 1-10 |
99 | EE | Ravi S. Sandhu:
Engineering authority and trust in cyberspace: the OM-AM and RBAC way.
ACM Workshop on Role-Based Access Control 2000: 111-119 |
98 | EE | Ravi S. Sandhu,
David F. Ferraiolo,
D. Richard Kuhn:
The NIST model for role-based access control: towards a unified standard.
ACM Workshop on Role-Based Access Control 2000: 47-63 |
97 | EE | Joon S. Park,
Ravi S. Sandhu:
Binding Identities and Attributes using Digitally Signed Certificates.
ACSAC 2000: 120-127 |
96 | EE | Ezedin Barka,
Ravi S. Sandhu:
Framework for Role-based Delegation Models.
ACSAC 2000: 168- |
95 | EE | Jaehong Park,
Ravi S. Sandhu,
J. Schifalacqua:
Security Architectures for Controlled Digital Information Dissemination.
ACSAC 2000: 224- |
94 | EE | Sylvia L. Osborn,
Ravi S. Sandhu,
Qamar Munawer:
Configuring role-based access control to enforce mandatory and discretionary access control policies.
ACM Trans. Inf. Syst. Secur. 3(2): 85-106 (2000) |
93 | EE | Gail-Joon Ahn,
Ravi S. Sandhu:
Role-based authorization constraints specification.
ACM Trans. Inf. Syst. Secur. 3(4): 207-226 (2000) |
92 | EE | Joon S. Park,
Ravi S. Sandhu:
Secure Cookies on the Web.
IEEE Internet Computing 4(4): 36-44 (2000) |
91 | EE | Li Gong,
Ravi S. Sandhu:
Guest Editors' Introduction: What Makes Security Technologies Relevant?
IEEE Internet Computing 4(6): 38-41 (2000) |
1999 |
90 | EE | Joon S. Park,
Ravi S. Sandhu:
RBAC on the Web by Smart Certificates.
ACM Workshop on Role-Based Access Control 1999: 1-9 |
89 | EE | Pete Epstein,
Ravi S. Sandhu:
Towards a UML Based Approach to Role Engineering.
ACM Workshop on Role-Based Access Control 1999: 135-143 |
88 | EE | Gail-Joon Ahn,
Ravi S. Sandhu:
The RSL99 Language for Role-Based Separation of Duty Constraints.
ACM Workshop on Role-Based Access Control 1999: 43-54 |
87 | EE | Ravi S. Sandhu,
Qamar Munawer:
The ARBAC99 Model for Administration of Roles.
ACSAC 1999: 229- |
86 | EE | Blaine Burnham,
Cynthia E. Irvine,
Charles Reynolds,
Ravi S. Sandhu,
Rayford B. Vaughn:
Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum).
ACSAC 1999: 265- |
85 | | Savith Kandala,
Ravi S. Sandhu:
Extending The BFA Workflow Authorization Model to Express Weighted Voting.
DBSec 1999: 145-159 |
84 | | Joon S. Park,
Ravi S. Sandhu,
SreeLatha Ghanta:
RBAC on the Web by Secure Cookies.
DBSec 1999: 49-62 |
83 | EE | Ravi S. Sandhu:
Editorial.
ACM Trans. Inf. Syst. Secur. 2(1): 1-2 (1999) |
82 | EE | Ravi S. Sandhu,
Venkata Bhamidipati,
Qamar Munawer:
The ARBAC97 Model for Role-Based Administration of Roles.
ACM Trans. Inf. Syst. Secur. 2(1): 105-135 (1999) |
81 | | Ravi S. Sandhu,
Venkata Bhamidipati:
Role-based Administration of User-Role Assignment: The URA97 Model and its Oracle Implementation.
Journal of Computer Security 7(4): (1999) |
1998 |
80 | EE | Ravi S. Sandhu,
Joon S. Park:
Decentralized User-role Assignment for Web-based Intranets.
ACM Workshop on Role-Based Access Control 1998: 1-12 |
79 | EE | Ravi S. Sandhu,
Venkata Bhamidipati:
An Oracle Implementation of the PRA97 Model for Permission-Role Assignment.
ACM Workshop on Role-Based Access Control 1998: 13-21 |
78 | EE | Ravi S. Sandhu:
Role Activation Hierarchies.
ACM Workshop on Role-Based Access Control 1998: 33-40 |
77 | EE | Ravi S. Sandhu,
Qamar Munawer:
How to Do Discretionary Access Control Using Roles.
ACM Workshop on Role-Based Access Control 1998: 47-54 |
76 | EE | Ravi S. Sandhu,
Qamar Munawer:
The RRA97 Model for Role-Based Administration of Role Hierarchies.
ACSAC 1998: 39-49 |
75 | EE | P. C. Hyland,
Ravi S. Sandhu:
Concentric Supervision of Security Applications: A New Security Management Paradigm.
ACSAC 1998: 59- |
74 | EE | Ravi S. Sandhu:
Editorial.
ACM Trans. Inf. Syst. Secur. 1(1): 1-2 (1998) |
73 | EE | Ravi S. Sandhu,
Fang Chen:
The Multilevel Relational (MLR) Data Model.
ACM Trans. Inf. Syst. Secur. 1(1): 93-132 (1998) |
72 | | Ravi S. Sandhu:
Role-Based Access Control.
Advances in Computers 46: 238-287 (1998) |
1997 |
71 | | Pierangela Samarati,
Ravi S. Sandhu:
Database Security Volume X, Status and Prospects, IFIP TC11 / WG11.3 Tenth International Conference on Database Security, 22-24 July 1996, Como, Italy
Chapman & Hall 1997 |
70 | EE | Ravi S. Sandhu,
Venkata Bhamidipati,
Edward J. Coyne,
Srinivas Ganta,
Charles E. Youman:
The ARBAC97 model for role-based administration of roles: preliminary description and outline.
ACM Workshop on Role-Based Access Control 1997: 41-50 |
69 | EE | T. F. Himdi,
Ravi S. Sandhu:
Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System.
ACSAC 1997: 164-174 |
68 | | Roshan K. Thomas,
Ravi S. Sandhu:
Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management.
DBSec 1997: 166-181 |
67 | | Ravi S. Sandhu,
Venkata Bhamidipati:
The URA97 Model for Role-Based User-Role Assignment.
DBSec 1997: 262-275 |
66 | | P. C. Hyland,
Ravi S. Sandhu:
SNMP-based Network Security Management.
Integrated Network Management 1997: 787-787 |
65 | | Ravi S. Sandhu,
Pierangela Samarati:
Authentication, Access Controls, and Intrusion Detection.
The Computer Science and Engineering Handbook 1997: 1929-1948 |
1996 |
64 | | Ravi S. Sandhu:
Access Control: The Neglected Frontier.
ACISP 1996: 219-227 |
63 | | Ravi S. Sandhu,
J. Campbell:
Open Issues in Database Security.
DBSec 1996: 169-173 |
62 | | Ravi S. Sandhu,
LouAnna Notargiacomo,
D. Thomas,
Jesse C. Worthington:
Implementation Experiences and Prospects.
DBSec 1996: 261-271 |
61 | EE | Ravi S. Sandhu:
Role Hierarchies and Constraints for Lattice-Based Access Controls.
ESORICS 1996: 65-79 |
60 | | Ravi S. Sandhu,
Pierangela Samarati:
Authetication, Access Control, and Audit.
ACM Comput. Surv. 28(1): 241-243 (1996) |
59 | | Ravi S. Sandhu,
Edward J. Coyne,
Hal L. Feinstein,
Charles E. Youman:
Role-Based Access Control Models.
IEEE Computer 29(2): 38-47 (1996) |
58 | EE | Roshan K. Thomas,
Ravi S. Sandhu:
A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases.
IEEE Trans. Knowl. Data Eng. 8(1): 16-31 (1996) |
57 | | Paul Ammann,
Richard J. Lipton,
Ravi S. Sandhu:
The Expressive Power of Multi-parent Creation in Monotonic Access Control Models.
Journal of Computer Security 4(2/3): 149-166 (1996) |
1995 |
56 | EE | Fang Chen,
Ravi S. Sandhu:
Constraints for role-based access control.
ACM Workshop on Role-Based Access Control 1995 |
55 | EE | Ravi S. Sandhu:
Issues in RBAC.
ACM Workshop on Role-Based Access Control 1995 |
54 | EE | Jeremy Epstein,
Ravi S. Sandhu:
NetWare 4 as an example of role-based access control.
ACM Workshop on Role-Based Access Control 1995 |
53 | EE | Ravi S. Sandhu:
Rationale for the RBAC96 family of access control models.
ACM Workshop on Role-Based Access Control 1995 |
52 | EE | Ravi S. Sandhu:
Roles versus groups.
ACM Workshop on Role-Based Access Control 1995 |
51 | EE | Ravi S. Sandhu:
Workshop summary.
ACM Workshop on Role-Based Access Control 1995 |
50 | | Roshan K. Thomas,
Elisa Bertino,
Pierangela Samarati,
Hans Hermann Brüggemann,
Bret Hartman,
Ravi S. Sandhu,
T. C. Ting:
Panel Discussion: Role-Based Access Control and Next-Generation Security Models.
DBSec 1995: 289-298 |
1994 |
49 | | Bhavani M. Thuraisingham,
Ravi S. Sandhu,
T. C. Ting:
Security for Object-Oriented Systems, Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993
Springer 1994 |
48 | | Ravi S. Sandhu,
Paul Ammann:
One-Representative Safety Analysis in the Non-Monotonic Transform Model.
CSFW 1994: 139-149 |
47 | | Ravi S. Sandhu,
Roshan K. Thomas:
Conceptual Foundations for a Model of Task-based Authorizations.
CSFW 1994: 66-79 |
46 | EE | Ravi S. Sandhu,
Srinivas Ganta:
On the Expressive Power of the Unary Transformation Model.
ESORICS 1994: 301-318 |
45 | EE | Roshan K. Thomas,
Ravi S. Sandhu:
Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture.
ESORICS 1994: 403-428 |
44 | | Ravi Ganesan,
Ravi S. Sandhu:
Securing Cyberspace - Introduction to the Special Section.
Commun. ACM 37(11): 28-31 (1994) |
43 | | Bhavani M. Thuraisingham,
T. C. Ting,
Peter J. Sell,
Ravi S. Sandhu,
Thomas F. Keefe:
Integrating security technology and object-oriented technology (panel).
OOPS Messenger 5(2): 59-61 (1994) |
42 | | Bhavani M. Thuraisingham,
Ravi S. Sandhu,
T. C. Ting:
Security for object-oriented systems.
OOPS Messenger 5(2): 77-78 (1994) |
41 | | William R. Herndon,
Ravi S. Sandhu,
Steve Demurjian:
The standards are coming! Standards for security in object-oriented systems.
OOPS Messenger 5(4): 92-95 (1994) |
1993 |
40 | | Ravi S. Sandhu,
Srinivas Ganta:
On Testing for Absence of Rights in Access Control Models.
CSFW 1993: 109-118 |
39 | | Ravi S. Sandhu:
On Five Definitions of Data Integrity.
DBSec 1993: 257-267 |
38 | | Roshan K. Thomas,
Ravi S. Sandhu:
Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Transactions in Multilevel databases.
DBSec 1993: 309-328 |
37 | | Ravi S. Sandhu:
Security for OODBMS (Or Systems) - Panel.
OOPSLA 1993: 307 |
36 | | Bhavani M. Thuraisingham,
Ravi S. Sandhu,
T. C. Ting:
Security for Object-Oriented Systems: An Editorial Overview.
Security for Object-Oriented Systems 1993: 1-7 |
35 | | Roshan K. Thomas,
Ravi S. Sandhu:
Concurrency, Synchronization, and Scheduling to Support High-Assurance Write-Up in Multilevel Object-Based Computing.
Security for Object-Oriented Systems 1993: 218-228 |
34 | EE | Ravi S. Sandhu,
Gurpreet S. Suri:
A distributed capability-based architecture for the transform model.
Computers & Security 12(3): 285-303 (1993) |
33 | | Ravi S. Sandhu:
Lattice-Based Access Control Models.
IEEE Computer 26(11): 9-19 (1993) |
32 | | Roshan K. Thomas,
Ravi S. Sandhu:
A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up.
Journal of Computer Security 2(2-3): 231-275 (1993) |
1992 |
31 | | Paul Ammann,
Richard J. Lipton,
Ravi S. Sandhu:
The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model.
CSFW 1992: 148-156 |
30 | | Roshan K. Thomas,
Ravi S. Sandhu:
Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects.
DBSec 1992: 15-34 |
29 | EE | Ravi S. Sandhu,
Sushil Jajodia:
Polyinstantation for Cover Stories.
ESORICS 1992: 307-328 |
28 | EE | Ravi S. Sandhu,
Sushil Jajodia:
Eliminating polyinstantiation securely.
Computers & Security 11(6): 547-562 (1992) |
27 | EE | Ravi S. Sandhu:
Lattice-based enforcement of Chinese Walls.
Computers & Security 11(8): 753-763 (1992) |
26 | | Ravi S. Sandhu:
Undecidability of Safety for the Schematic Protection Model with Cyclic Creates.
J. Comput. Syst. Sci. 44(1): 141-159 (1992) |
25 | | Ravi S. Sandhu:
Expressive Power of the Schematic Protection Model.
Journal of Computer Security 1(1): 59-98 (1992) |
24 | | Paul Ammann,
Ravi S. Sandhu:
The Extended Schematic Protection Model
Journal of Computer Security 1(3-4): 335-384 (1992) |
1991 |
23 | | Ravi S. Sandhu,
Roshan K. Thomas,
Sushil Jajodia:
A Secure Kernelized Architecture for Multiple Object-Oriented Databases.
CSFW 1991: 139-152 |
22 | | Ravi S. Sandhu,
Roshan K. Thomas,
Sushil Jajodia:
Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases.
DBSec 1991: 297-314 |
21 | | Sushil Jajodia,
Ravi S. Sandhu:
A Novel Decomposition of Multilevel Relations into Single-Level Relations.
IEEE Symposium on Security and Privacy 1991: 300-315 |
20 | | Paul Ammann,
Ravi S. Sandhu:
Safety Analysis for the Extended Schematic Protection Model.
IEEE Symposium on Security and Privacy 1991: 87-97 |
19 | EE | Sushil Jajodia,
Ravi S. Sandhu:
Towards a Multilevel Secure Relational Data Model.
SIGMOD Conference 1991: 50-59 |
18 | EE | Ravi S. Sandhu,
Sushil Jajodia:
Integrity principles and mechanisms in database management systems.
Computers & Security 10(5): 413-427 (1991) |
1990 |
17 | | Sushil Jajodia,
Ravi S. Sandhu:
A Formal Framework for Single Level Decomposition of Multilevel Relations.
CSFW 1990: 152-158 |
16 | | Ravi S. Sandhu,
Sushil Jajodia,
Teresa F. Lunt:
A New Polyinstantiation Integrity Constraint for Multilevel Relations.
CSFW 1990: 159-165 |
15 | | Ravi S. Sandhu:
Separation of Duties in Computerized Information Systems.
DBSec 1990: 179-190 |
14 | | Sushil Jajodia,
Ravi S. Sandhu:
Polyinstantiation Integrity in Multilevel Relations Revisited.
DBSec 1990: 297-308 |
13 | | Sushil Jajodia,
Ravi S. Sandhu:
Polyinstantiation Integrity in Multilevel Relations.
IEEE Symposium on Security and Privacy 1990: 104-115 |
12 | EE | Sushil Jajodia,
Ravi S. Sandhu:
Database Security: Current Status and Key Issues.
SIGMOD Record 19(4): 123-126 (1990) |
1989 |
11 | | Ravi S. Sandhu:
Mandatory Controls for Database Integrity.
DBSec 1989: 143-150 |
10 | | Ravi S. Sandhu:
Discussion Summary.
DBSec 1989: 353-365 |
9 | | Ravi S. Sandhu:
Transformation of Access Rights.
IEEE Symposium on Security and Privacy 1989: 259-268 |
8 | EE | Ravi S. Sandhu:
Recognizing Immediacy in an N-Tree Hierarchy and Its Application to Protection Groups.
IEEE Trans. Software Eng. 15(12): 1518-1525 (1989) |
7 | | Ravi S. Sandhu:
The Reflected Tree Hierarchy for Protection and Sharing.
Inf. Process. Lett. 30(1): 21-26 (1989) |
6 | | Ravi S. Sandhu:
The Demand Operation in the Schematic Protection Model.
Inf. Process. Lett. 32(4): 213-219 (1989) |
1988 |
5 | | Ravi S. Sandhu:
Expressive Power of the Schematic Protection Model.
CSFW 1988: 188-193 |
4 | EE | Ravi S. Sandhu:
The NTree: A Two Dimension Partial Order for Protection Groups.
ACM Trans. Comput. Syst. 6(2): 197-222 (1988) |
3 | | Ravi S. Sandhu:
Cryptographic Implementation of a Tree Hierarchy for Access Control.
Inf. Process. Lett. 27(2): 95-98 (1988) |
2 | EE | Ravi S. Sandhu:
The schematic protection model: its definition and analysis for acyclic attenuating schemes.
J. ACM 35(2): 404-432 (1988) |
1986 |
1 | | Ravi S. Sandhu,
M. E. Share:
Some Owner Based Schemes with Dynamic Groups in the Schematic Protection Model.
IEEE Symposium on Security and Privacy 1986: 61-70 |