2013
208Engineering access control policies for provenance-aware systems. Lianshan Sun, Jaehong Park, Ravi S. Sandhu. CODASPY 2013, 285-292. Web SearchBibTeXDownload
207Collaboration in Multicloud Computing Environments: Framework and Security Issues. Mukesh Singhal, Santosh Chandrasekhar, Tingjian Ge, Ravi S. Sandhu, Ram Krishnan, Gail-Joon Ahn, Elisa Bertino. IEEE Computer (46): 76-84 (2013). Web SearchBibTeXDownload
206Preserving user privacy from third-party applications in online social networks. Yuan Cheng, Jaehong Park, Ravi S. Sandhu. WWW (Companion Volume) 2013, 723-728. Web SearchBibTeXDownload
2012
205A lattice interpretation of group-centric collaboration with expedient insiders. Khalid Zaman Bijon, Tahmina Ahmed, Ravi S. Sandhu, Ram Krishnan. CollaborateCom 2012, 200-209. Web SearchBibTeXDownload
204Speculations on the science of web user security. Ravi S. Sandhu. Computer Networks (56): 3891-3895 (2012). Web SearchBibTeXDownload
203A group-centric model for collaboration with expedient insiders in multilevel systems. Khalid Zaman Bijon, Ravi S. Sandhu, Ram Krishnan. CTS 2012, 419-426. Web SearchBibTeXDownload
202A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC. Xin Jin, Ram Krishnan, Ravi S. Sandhu. DBSec 2012, 41-55. Web SearchBibTeXDownload
201A User-to-User Relationship-Based Access Control Model for Online Social Networks. Yuan Cheng, Jaehong Park, Ravi S. Sandhu. DBSec 2012, 8-24. Web SearchBibTeXDownload
200Risk-Aware RBAC Sessions. Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu. ICISS 2012, 59-74. Web SearchBibTeXDownload
199Integrated provenance data for access control in group-centric collaboration. Dang Nguyen, Jaehong Park, Ravi S. Sandhu. IRI 2012, 255-262. Web SearchBibTeXDownload
198RABAC: Role-Centric Attribute-Based Access Control. Xin Jin, Ravi S. Sandhu, Ram Krishnan. MMM-ACNS 2012, 84-96. Web SearchBibTeXDownload
197A provenance-based access control model. Jaehong Park, Dang Nguyen, Ravi S. Sandhu. PST 2012, 137-144. Web SearchBibTeXDownload
196The authorization leap from rights to attributes: maturation or chaos?. Ravi S. Sandhu. SACMAT 2012, 69-70. Web SearchBibTeXDownload
195Relationship-Based Access Control for Online Social Networks: Beyond User-to-User Relationships. Yuan Cheng, Jaehong Park, Ravi S. Sandhu. SocialCom/PASSAT 2012, 646-655. Web SearchBibTeXDownload
2011
194Group-Centric Secure Information-Sharing Models for Isolated Groups. Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough. ACM Trans. Inf. Syst. Secur. (14): 23 (2011). Web SearchBibTeXDownload
193ACON: Activity-Centric Access Control for Social Computing. Jaehong Park, Ravi S. Sandhu, Yuan Cheng. ARES 2011, 242-247. Web SearchBibTeXDownload
192An Attribute Based Framework for Risk-Adaptive Access Control Models. Savith Kandala, Ravi S. Sandhu, Venkata Bhamidipati. ARES 2011, 236-241. Web SearchBibTeXDownload
191The challenge of data and application security and privacy (DASPY): are we up to it. Ravi S. Sandhu. CODASPY 2011, 1-2. Web SearchBibTeXDownload
190On data provenance in group-centric secure collaboration. Jaehong Park, Dang Nguyen, Ravi S. Sandhu. CollaborateCom 2011, 221-230. Web SearchBibTeXDownload
189RT-based administrative models for community cyber security information sharing. Ravi S. Sandhu, Khalid Zaman Bijon, Xin Jin, Ram Krishnan. CollaborateCom 2011, 473-478. Web SearchBibTeXDownload
188Roles in information security - A survey and classification of the research area. Ludwig Fuchs, Günther Pernul, Ravi S. Sandhu. Computers & Security (30): 748-769 (2011). Web SearchBibTeXDownload
187Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing. Ram Krishnan, Ravi S. Sandhu. ICISS 2011, 102-115. Web SearchBibTeXDownload
186A User-Activity-Centric Framework for Access Control in Online Social Networks. Jaehong Park, Ravi S. Sandhu, Yuan Cheng. IEEE Internet Computing (15): 62-65 (2011). Web SearchBibTeXDownload
185Building malware infection trees. Jose Andre Morales, Michael Main, Weiliang Luo, Shouhuai Xu, Ravi S. Sandhu. MALWARE 2011, 50-57. Web SearchBibTeXDownload
2010
184Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures. Erhan J. Kartaltepe, Jose Andre Morales, Shouhuai Xu, Ravi S. Sandhu. ACNS 2010, 511-528. Web SearchBibTeXDownload
183Towards a discipline of mission-aware cloud computing. Ravi S. Sandhu, Raj Boppana, Ram Krishnan, Jeff Reich, Todd Wolff, Josh Zachry. CCSW 2010, 13-18. Web SearchBibTeXDownload
182Towards a framework for cyber social status based trusted open collaboration. Jaehong Park, Yuan Cheng, Ravi S. Sandhu. CollaborateCom 2010, 1-8. Web SearchBibTeXDownload
181Towards Secure Information Sharing models for community Cyber Security. Ravi S. Sandhu, R. Krishnan, G. B. White. CollaborateCom 2010, 1-6. Web SearchBibTeXDownload
180Social-Networks Connect Services. Moonam Ko, Gorrell P. Cheek, Mohamed Shehab, Ravi S. Sandhu. IEEE Computer (43): 37-43 (2010). Web SearchBibTeXDownload
179Evaluating detection and treatment effectiveness of commercial anti-malware programs. Jose Andre Morales, Ravi S. Sandhu, Shouhuai Xu. MALWARE 2010, 31-38. Web SearchBibTeXDownload
178Symptoms-Based Detection of Bot Processes. Jose Andre Morales, Erhan J. Kartaltepe, Shouhuai Xu, Ravi S. Sandhu. MMM-ACNS 2010, 229-241. Web SearchBibTeXDownload
177Group-Centric Models for Secure and Agile Information Sharing. Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William H. Winsborough. MMM-ACNS 2010, 55-69. Web SearchBibTeXDownload
176Analyzing and Exploiting Network Behaviors of Malware. Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu, Ravi S. Sandhu. SecureComm 2010, 20-34. Web SearchBibTeXDownload
175Trustworthy Information: Concepts and Mechanisms. Shouhuai Xu, Haifeng Qian, Fengying Wang, Zhenxin Zhan, Elisa Bertino, Ravi S. Sandhu. WAIM 2010, 398-404. Web SearchBibTeXDownload
2009
174A Framework for Understanding Botnets. Justin Leonard, Shouhuai Xu, Ravi S. Sandhu. ARES 2009, 917-922. Web SearchBibTeXDownload
173A First Step towards Characterizing Stealthy Botnets. Justin Leonard, Shouhuai Xu, Ravi S. Sandhu. ARES 2009, 106-113. Web SearchBibTeXDownload
172A conceptual framework for Group-Centric secure information sharing. Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough. ASIACCS 2009, 384-387. Web SearchBibTeXDownload
171The PEI framework for application-centric security. Ravi S. Sandhu. CollaborateCom 2009, 1-5. Web SearchBibTeXDownload
170Towards a framework for group-centric secure collaboration. Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough. CollaborateCom 2009, 1-10. Web SearchBibTeXDownload
169A Hybrid Enforcement Model for Group-centric Secure Information Sharing. Ram Krishnan, Ravi S. Sandhu. CSE (3) 2009, 189-194. Web SearchBibTeXDownload
168TIUPAM: A Framework for Trustworthiness-Centric Information Sharing. Shouhuai Xu, Ravi S. Sandhu, Elisa Bertino. IFIPTM 2009, 164-175. Web SearchBibTeXDownload
167Assured Information Sharing Life Cycle. Tim Finin, Anupam Joshi, Hillol Kargupta, Yelena Yesha, Joel Sachs, Elisa Bertino, Ninghui Li, Chris Clifton, Gene Spafford, Bhavani M. Thuraisingham, Murat Kantarcioglu, Alain Bensoussan, Nathan Berg, Latifur Khan, Jiawei Han, ChengXiang Zhai, Ravi S. Sandhu, Shouhuai Xu, Jim Massaro, Lada A. Adamic. ISI 2009, 307-309. Web SearchBibTeXDownload
166A Characterization of the problem of secure provenance management. Shouhuai Xu, Qun Ni, Elisa Bertino, Ravi S. Sandhu. ISI 2009, 310-314. Web SearchBibTeXDownload
165Analyzing DNS activities of bot processes. Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu, Ravi S. Sandhu. MALWARE 2009, 98-103. Web SearchBibTeXDownload
164Foundations for group-centric secure information sharing models. Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough. SACMAT 2009, 115-124. Web SearchBibTeXDownload
163An Access Control Language for a General Provenance Model. Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu, Weili Han. Secure Data Management 2009, 68-88. Web SearchBibTeXDownload
2008
162Toward a Usage-Based Security Framework for Collaborative Computing Systems. Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu. ACM Trans. Inf. Syst. Secur. (11) (2008). Web SearchBibTeXDownload
161The ASCAA Principles for access control interpreted for collaboration systems. Ravi S. Sandhu. CTS 2008, 532. Web SearchBibTeXDownload
160Stale-safe security properties for group-based secure information sharing. Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough. FMSE 2008, 53-62. Web SearchBibTeXDownload
159Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). Roshan K. Thomas, Ravi S. Sandhu, Elisa Bertino, Ismailcem Budak Arpinar, Shouhuai Xu. ISIPS 2008, 115-121. Web SearchBibTeXDownload
158QoS Aware Dependable Distributed Stream Processing. Vana Kalogeraki, Dimitrios Gunopulos, Ravi S. Sandhu, Bhavani M. Thuraisingham. ISORC 2008, 69-75. Web SearchBibTeXDownload
157IS 2008 PC Co-chairs' Message. Jong Hyuk Park, Bart Preneel, Ravi S. Sandhu, André Zúquete. OTM Conferences (2) 2008, 937. Web SearchBibTeXDownload
156ROWLBAC: representing role based access control in OWL. Timothy W. Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough, Bhavani M. Thuraisingham. SACMAT 2008, 73-82. Cited by 25Web SearchBibTeXDownload
155Security Enforcement Model for Distributed Usage Control. Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu. SUTC 2008, 10-18. Web SearchBibTeXDownload
2007
154SecureBus: towards application-transparent trusted computing with mandatory access control. Xinwen Zhang, Michael J. Covington, Songqing Chen, Ravi S. Sandhu. ASIACCS 2007, 117-126. Web SearchBibTeXDownload
153A Scalable and Secure Cryptographic Service. Shouhuai Xu, Ravi S. Sandhu. DBSec 2007, 144-160. Web SearchBibTeXDownload
152Towards a Times-Based Usage Control Model. Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin. DBSec 2007, 227-242. Web SearchBibTeXDownload
151Framework for Agent-Based Role Delegation. Ezedin Barka, Ravi S. Sandhu. ICC 2007, 1361-1367. Web SearchBibTeXDownload
150RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control". David F. Ferraiolo, D. Richard Kuhn, Ravi S. Sandhu. IEEE Security & Privacy (5): 51-53 (2007). Web SearchBibTeXDownload
149PEI models towards scalable, usable and high-assurance information sharing. Ram Krishnan, Ravi S. Sandhu, Kumar Ranganathan. SACMAT 2007, 145-150. Web SearchBibTeXDownload
148Towards a VMM-based usage control framework for OS kernel integrity protection. Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang. SACMAT 2007, 71-80. Web SearchBibTeXDownload
2006
147An effective role administration model using organization structure. Sejong Oh, Ravi S. Sandhu, Xinwen Zhang. ACM Trans. Inf. Syst. Secur. (9): 113-137 (2006). Web SearchBibTeXDownload
146A general design towards secure ad-hoc collaboration. Masayuki Nakae, Xinwen Zhang, Ravi S. Sandhu. ASIACCS 2006, 358. Web SearchBibTeXDownload
145Safety analysis of usage control authorization models. Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Presicce. ASIACCS 2006, 243-254. Web SearchBibTeXDownload
144Secure information sharing enabled by Trusted Computing and PEI models. Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang. ASIACCS 2006, 2-12. Web SearchBibTeXDownload
143Secure knowledge management: confidentiality, trust, and privacy. Elisa Bertino, Latifur R. Khan, Ravi S. Sandhu, Bhavani M. Thuraisingham. IEEE Transactions on Systems, Man, and Cybernetics, Part A (36): 429-438 (2006). Cited by 26Web SearchBibTeXDownload
142Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing. Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu. IWSEC 2006, 179-195. Web SearchBibTeXDownload
141Client-side access control enforcement using trusted computing and PEI models. Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, Michael J. Covington. J. High Speed Networks (15): 229-245 (2006). Web SearchBibTeXDownload
140A usage-based authorization framework for collaborative computing systems. Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu. SACMAT 2006, 180-189. Web SearchBibTeXDownload
2005
139Formal model and policy specification of usage control. Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu, Jaehong Park. ACM Trans. Inf. Syst. Secur. (8): 351-387 (2005). Web SearchBibTeXDownload
138Enhancing Data Authenticity and Integrity in P2P Systems. Xinwen Zhang, Songqing Chen, Ravi S. Sandhu. IEEE Internet Computing (9): 42-49 (2005). Web SearchBibTeXDownload
137Database Security-Concepts, Approaches, and Challenges. Elisa Bertino, Ravi S. Sandhu. IEEE Trans. Dependable Sec. Comput. (2): 2-19 (2005). Cited by 103Web SearchBibTeXDownload
136Peer-to-peer access control architecture using trusted computing technology. Ravi S. Sandhu, Xinwen Zhang. SACMAT 2005, 147-158. Web SearchBibTeXDownload
2004
135The UCONABC usage control model. Jaehong Park, Ravi S. Sandhu. ACM Trans. Inf. Syst. Secur. (7): 128-174 (2004). Web SearchBibTeXDownload
134Mohammad A. Al-Kahtani, Ravi Sandhu. Mohammad A. Al-Kahtani, Ravi S. Sandhu. ACSAC 2004, 405-415. Web SearchBibTeXDownload
133Role-Based Delegation Model/ Hierarchical Roles (RBDM1). Ezedin Barka, Ravi S. Sandhu. ACSAC 2004, 396-404. Web SearchBibTeXDownload
132Attribute Mutability in Usage Control. Jaehong Park, Xinwen Zhang, Ravi S. Sandhu. DBSec 2004, 15-29. Web SearchBibTeX
131A Perspective on Graphs and Access Control Models. Ravi S. Sandhu. ICGT 2004, 2-12. Web SearchBibTeXDownload
130Enhancing Anonymity via Market Competition. Shouhuai Xu, William Robert Nelson Jr., Ravi S. Sandhu. ITCC (1) 2004, 30-34. Web SearchBibTeXDownload
129Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions. Roshan K. Thomas, Ravi S. Sandhu. PerCom Workshops 2004, 164-170. Web SearchBibTeXDownload
128Towards a Multi-dimensional Characterization of Dissemination Control. Roshan K. Thomas, Ravi S. Sandhu. POLICY 2004, 197-200. Web SearchBibTeXDownload
127A logical specification for usage control. Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi S. Sandhu. SACMAT 2004, 1-10. Web SearchBibTeXDownload
126Security for grid-based computing systems issues and challenges. Elisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu. SACMAT 2004, 125. Cited by 2Web SearchBibTeXDownload
2003
125Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. Shouhuai Xu, Ravi S. Sandhu. CT-RSA 2003, 355-372. Web SearchBibTeXDownload
124Schema Based XML Security: RBAC Approach. Xinwen Zhang, Jaehong Park, Ravi S. Sandhu. DBSec 2003, 330-343. Web SearchBibTeX
123IEEE Internet Computing: Guest Editors' Introduction - Identity Management. Duncan A. Buell, Ravi S. Sandhu. IEEE Distributed Systems Online (4) (2003). Web SearchBibTeXDownload
122IEEE Internet Computing: Security Track - Good Enough Security. Ravi S. Sandhu. IEEE Distributed Systems Online (4) (2003). Web SearchBibTeXDownload
121Good-Enough Security: Toward a Pragmatic Business-Driven Discipline. Ravi S. Sandhu. IEEE Internet Computing (7): 66-68 (2003). Web SearchBibTeXDownload
120Guest Editors' Introduction: Identity Management. Duncan A. Buell, Ravi S. Sandhu. IEEE Internet Computing (7): 26-28 (2003). Web SearchBibTeXDownload
119Usage Control: A Vision for Next Generation Access Control. Ravi S. Sandhu, Jaehong Park. MMM-ACNS 2003, 17-31. Web SearchBibTeXDownload
118PBDM: a flexible delegation model in RBAC. Xinwen Zhang, Sejong Oh, Ravi S. Sandhu. SACMAT 2003, 149-157. Web SearchBibTeXDownload
117Induced role hierarchies with attribute-based RBAC. Mohammad A. Al-Kahtani, Ravi S. Sandhu. SACMAT 2003, 142-148. Web SearchBibTeXDownload
2002
116A Model for Attribute-Based User-Role Assignment. Mohammad A. Al-Kahtani, Ravi S. Sandhu. ACSAC 2002, 353-362. Web SearchBibTeXDownload
115IEEE Internet Computing: Guest Editor's Introduction - The Technology of Trust. Ravi S. Sandhu. IEEE Distributed Systems Online (3) (2002). Web SearchBibTeXDownload
114Guest Editor's Introduction: The Technology of Trust. Ravi S. Sandhu. IEEE Internet Computing (6): 28-29 (2002). Web SearchBibTeXDownload
113Originator Control in Usage Control. Jaehong Park, Ravi S. Sandhu. POLICY 2002, 60-66. Web SearchBibTeXDownload
112Authenticated multicast immune to denial-of-service attack. Shouhuai Xu, Ravi S. Sandhu. SAC 2002, 196-200. Web SearchBibTeXDownload
111A model for role administration using organization structure. Sejong Oh, Ravi S. Sandhu. SACMAT 2002, 155-162. Web SearchBibTeXDownload
110Towards usage control models: beyond traditional access control. Jaehong Park, Ravi S. Sandhu. SACMAT 2002, 57-64. Web SearchBibTeXDownload
109Making access control more usable. Elisa Bertino, Trent Jaeger, Jonathan D. Moffett, Sylvia L. Osborn, Ravi Ravi. SACMAT 2002, 141. Web SearchBibTeXDownload
2001
108Role-based access control on the web. Joon S. Park, Ravi S. Sandhu, Gail-Joon Ahn. ACM Trans. Inf. Syst. Secur. (4): 37-71 (2001). Web SearchBibTeXDownload
107Proposed NIST standard for role-based access control. David F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn, Ramaswamy Chandramouli. ACM Trans. Inf. Syst. Secur. (4): 224-274 (2001). Web SearchBibTeXDownload
106Engineering of Role/Permission Assignments. Pete Epstein, Ravi S. Sandhu. ACSAC 2001, 127-136. Web SearchBibTeXDownload
105Role-based Access Control on the Web Using LDAP. Joon S. Park, Gail-Joon Ahn, Ravi S. Sandhu. DBSec 2001, 19-30. Web SearchBibTeX
104Secure Role-Based Workflow Models. Savith Kandala, Ravi S. Sandhu. DBSec 2001, 45-58. Web SearchBibTeX
103The Security of Practical Two-Party RSA Signature Schemes. Mihir Bellare, Ravi S. Sandhu. IACR Cryptology ePrint Archive (2001): 60 (2001). Web SearchBibTeXDownload
102Decentralized user group assignment in Windows NT. Gail-Joon Ahn, Ravi S. Sandhu. Journal of Systems and Software (56): 39-49 (2001). Web SearchBibTeXDownload
101Future Directions in Role-Based Access Control Models. Ravi S. Sandhu. MMM-ACNS 2001, 22-26. Web SearchBibTeXDownload
100Panel: The next generation of acess control models (panel session): do we need them and what should they be?. Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr. SACMAT 2001, 53. Web SearchBibTeXDownload
99Designing an IT College. Peter J. Denning, Ravi Athale, Nada Dabbagh, Daniel A. Menascé, Jeff Offutt, J. Mark Pullen, Steve Ruth, Ravi S. Sandhu. WCCE 2001, 541-550. Web SearchBibTeX
2000
98Configuring role-based access control to enforce mandatory and discretionary access control policies. Sylvia L. Osborn, Ravi S. Sandhu, Qamar Munawer. ACM Trans. Inf. Syst. Secur. (3): 85-106 (2000). Web SearchBibTeXDownload
97Role-based authorization constraints specification. Gail-Joon Ahn, Ravi S. Sandhu. ACM Trans. Inf. Syst. Secur. (3): 207-226 (2000). Web SearchBibTeXDownload
96Engineering authority and trust in cyberspace: the OM-AM and RBAC way. Ravi S. Sandhu. ACM Workshop on Role-Based Access Control 2000, 111-119. Web SearchBibTeXDownload
95Injecting RBAC to secure a Web-based workflow system. Gail-Joon Ahn, Ravi S. Sandhu, Myong H. Kang, Joon S. Park. ACM Workshop on Role-Based Access Control 2000, 1-10. Web SearchBibTeXDownload
94The NIST model for role-based access control: towards a unified standard. Ravi S. Sandhu, David F. Ferraiolo, D. Richard Kuhn. ACM Workshop on Role-Based Access Control 2000, 47-63. Web SearchBibTeXDownload
93Security Architectures for Controlled Digital Information Dissemination. Jaehong Park, Ravi S. Sandhu, J. Schifalacqua. ACSAC 2000, 224. Web SearchBibTeXDownload
92Framework for Role-based Delegation Models. Ezedin Barka, Ravi S. Sandhu. ACSAC 2000, 168. Web SearchBibTeXDownload
91Binding Identities and Attributes using Digitally Signed Certificates. Joon S. Park, Ravi S. Sandhu. ACSAC 2000, 120-127. Web SearchBibTeXDownload
90Secure Cookies on the Web. Joon S. Park, Ravi S. Sandhu. IEEE Internet Computing (4): 36-44 (2000). Web SearchBibTeXDownload
89Guest Editors' Introduction: What Makes Security Technologies Relevant?. Li Gong, Ravi S. Sandhu. IEEE Internet Computing (4): 38-41 (2000). Web SearchBibTeXDownload
1999
88The ARBAC97 Model for Role-Based Administration of Roles. Ravi S. Sandhu, Venkata Bhamidipati, Qamar Munawer. ACM Trans. Inf. Syst. Secur. (2): 105-135 (1999). Web SearchBibTeXDownload
87The RSL99 Language for Role-Based Separation of Duty Constraints. Gail-Joon Ahn, Ravi S. Sandhu. ACM Workshop on Role-Based Access Control 1999, 43-54. Web SearchBibTeXDownload
86Towards a UML Based Approach to Role Engineering. Pete Epstein, Ravi S. Sandhu. ACM Workshop on Role-Based Access Control 1999, 135-143. Web SearchBibTeXDownload
85RBAC on the Web by Smart Certificates. Joon S. Park, Ravi S. Sandhu. ACM Workshop on Role-Based Access Control 1999, 1-9. Web SearchBibTeXDownload
84The ARBAC99 Model for Administration of Roles. Ravi S. Sandhu, Qamar Munawer. ACSAC 1999, 229-238. Web SearchBibTeXDownload
83Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum). Blaine Burnham, Cynthia E. Irvine, Charles Reynolds, Ravi S. Sandhu, Rayford B. Vaughn. ACSAC 1999, 265. Web SearchBibTeXDownload
82RBAC on the Web by Secure Cookies. Joon S. Park, Ravi S. Sandhu, SreeLatha Ghanta. DBSec 1999, 49-62. Web SearchBibTeX
81Extending The BFA Workflow Authorization Model to Express Weighted Voting. Savith Kandala, Ravi S. Sandhu. DBSec 1999, 145-159. Web SearchBibTeX
80Towards role-based administration in network information services. Gail-Joon Ahn, Ravi S. Sandhu. J. Network and Computer Applications (22): 199-213 (1999). Web SearchBibTeXDownload
79Role-based Administration of User-Role Assignment: The URA97 Model and its Oracle Implementation. Ravi S. Sandhu, Venkata Bhamidipati. Journal of Computer Security (7): 317-342 (1999). Web SearchBibTeXDownload
1998
78The Multilevel Relational (MLR) Data Model. Ravi S. Sandhu, Fang Chen. ACM Trans. Inf. Syst. Secur. (1): 93-132 (1998). Web SearchBibTeXDownload
77Decentralized User-role Assignment for Web-based Intranets. Ravi S. Sandhu, Joon S. Park. ACM Workshop on Role-Based Access Control 1998, 1-12. Web SearchBibTeXDownload
76How to Do Discretionary Access Control Using Roles. Ravi S. Sandhu, Qamar Munawer. ACM Workshop on Role-Based Access Control 1998, 47-54. Web SearchBibTeXDownload
75An Oracle Implementation of the PRA97 Model for Permission-Role Assignment. Ravi S. Sandhu, Venkata Bhamidipati. ACM Workshop on Role-Based Access Control 1998, 13-21. Web SearchBibTeXDownload
74Role Activation Hierarchies. Ravi S. Sandhu. ACM Workshop on Role-Based Access Control 1998, 33-40. Web SearchBibTeXDownload
73The RRA97 Model for Role-Based Administration of Role Hierarchies. Ravi S. Sandhu, Qamar Munawer. ACSAC 1998, 39-49. Web SearchBibTeXDownload
72Concentric Supervision of Security Applications: A New Security Management Paradigm. P. C. Hyland, Ravi S. Sandhu. ACSAC 1998, 59-68. Web SearchBibTeXDownload
71Role-Based Access Control. Vijay Alturi, David F. Ferraiolo. Advances in Computers (46): 237-286 (1998). Web SearchBibTeXDownload
1997
70The ARBAC97 model for role-based administration of roles: preliminary description and outline. Ravi S. Sandhu, Venkata Bhamidipati, Edward J. Coyne, Srinivas Ganta, Charles E. Youman. ACM Workshop on Role-Based Access Control 1997, 41-50. Web SearchBibTeXDownload
69Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System. T. F. Himdi, Ravi S. Sandhu. ACSAC 1997, 164-174. Web SearchBibTeXDownload
68The URA97 Model for Role-Based User-Role Assignment. Ravi S. Sandhu, Venkata Bhamidipati. DBSec 1997, 262-275. Web SearchBibTeX
67Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. Roshan K. Thomas, Ravi S. Sandhu. DBSec 1997, 166-181. Web SearchBibTeX
66SNMP-based Network Security Management. P. C. Hyland, Ravi S. Sandhu. Integrated Network Management 1997, 787-787. Web SearchBibTeX
65Authentication, Access Controls, and Intrusion Detection. Ravi S. Sandhu, Pierangela Samarati. The Computer Science and Engineering Handbook 1997, 1929-1948. Cited by 64Web SearchBibTeX
1996
64Access Control: The Neglected Frontier. Ravi S. Sandhu. ACISP 1996, 219-227. Web SearchBibTeXDownload
63Authetication, Access Control, and Audit. Ravi S. Sandhu, Pierangela Samarati. ACM Comput. Surv. (28): 241-243 (1996). Cited by 85Web SearchBibTeXDownload
62Open Issues in Database Security. Ravi S. Sandhu, J. Campbell. DBSec 1996, 169-173. Web SearchBibTeX
61Implementation Experiences and Prospects. Ravi S. Sandhu, LouAnna Notargiacomo, D. Thomas, Jesse C. Worthington. DBSec 1996, 261-271. Web SearchBibTeX
60Role Hierarchies and Constraints for Lattice-Based Access Controls. Ravi S. Sandhu. ESORICS 1996, 65-79. Web SearchBibTeXDownload
59Role-Based Access Control Models. Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman. IEEE Computer (29): 38-47 (1996). Web SearchBibTeXDownload
58A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases. Roshan K. Thomas, Ravi S. Sandhu. IEEE Trans. Knowl. Data Eng. (8): 16-31 (1996). Web SearchBibTeXDownload
57The Expressive Power of Multi-parent Creation in Monotonic Access Control Models. Paul Ammann, Richard J. Lipton, Ravi S. Sandhu. Journal of Computer Security (4): 149-166 (1996). Web SearchBibTeXDownload
1995
56Issues in RBAC. Ravi S. Sandhu. ACM Workshop on Role-Based Access Control 1995. Web SearchBibTeXDownload
55Rationale for the RBAC96 family of access control models. Ravi S. Sandhu. ACM Workshop on Role-Based Access Control 1995. Web SearchBibTeXDownload
54Constraints for role-based access control. Fang Chen, Ravi S. Sandhu. ACM Workshop on Role-Based Access Control 1995. Web SearchBibTeXDownload
53Roles versus groups. Ravi S. Sandhu. ACM Workshop on Role-Based Access Control 1995. Web SearchBibTeXDownload
52NetWare 4 as an example of role-based access control. Jeremy Epstein, Ravi S. Sandhu. ACM Workshop on Role-Based Access Control 1995. Web SearchBibTeXDownload
51Workshop summary. Ravi S. Sandhu. ACM Workshop on Role-Based Access Control 1995. Web SearchBibTeXDownload
50Panel Discussion: Role-Based Access Control and Next-Generation Security Models. Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting. DBSec 1995, 289-298. Web SearchBibTeX
49The semantics and expressive power of the MLR data model. Fang Chen, Ravi S. Sandhu. IEEE Symposium on Security and Privacy 1995, 128-142. Web SearchBibTeXDownload
1994
48Securing Cyberspace - Introduction to the Special Section. Ravi Ganesan, Ravi S. Sandhu. Commun. ACM (37): 28-31 (1994). Web SearchBibTeXDownload
47One-Representative Safety Analysis in the Non-Monotonic Transform Model. Ravi S. Sandhu, Paul Ammann. CSFW 1994, 139-149. Web SearchBibTeX
46Conceptual Foundations for a Model of Task-based Authorizations. Ravi S. Sandhu, Roshan K. Thomas. CSFW 1994, 66-79. Web SearchBibTeX
45On the Expressive Power of the Unary Transformation Model. Ravi S. Sandhu, Srinivas Ganta. ESORICS 1994, 301-318. Web SearchBibTeXDownload
44Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture. Roshan K. Thomas, Ravi S. Sandhu. ESORICS 1994, 403-428. Web SearchBibTeXDownload
43The standards are coming! Standards for security in object-oriented systems. William R. Herndon, Ravi S. Sandhu, Steve Demurjian. OOPS Messenger (5): 92-95 (1994). Web SearchBibTeXDownload
42Integrating security technology and object-oriented technology (panel). Bhavani M. Thuraisingham, T. C. Ting, Peter J. Sell, Ravi S. Sandhu, Thomas F. Keefe. OOPS Messenger (5): 59-61 (1994). Web SearchBibTeXDownload
41Security for object-oriented systems. Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting. OOPS Messenger (5): 77-78 (1994). Cited by 1Web SearchBibTeXDownload
1993
40A distributed capability-based architecture for the transform model. Ravi S. Sandhu, Gurpreet S. Suri. Computers & Security (12): 285-303 (1993). Web SearchBibTeXDownload
39On Testing for Absence of Rights in Access Control Models. Ravi S. Sandhu, Srinivas Ganta. CSFW 1993, 109-118. Web SearchBibTeX
38On Five Definitions of Data Integrity. Ravi S. Sandhu. DBSec 1993, 257-267. Web SearchBibTeX
37Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Transactions in Multilevel databases. Roshan K. Thomas, Ravi S. Sandhu. DBSec 1993, 309-328. Web SearchBibTeX
36Lattice-Based Access Control Models. Ravi S. Sandhu. IEEE Computer (26): 9-19 (1993). Web SearchBibTeXDownload
35A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up. Roshan K. Thomas, Ravi S. Sandhu. Journal of Computer Security (2): 231-275 (1993). Web SearchBibTeXDownload
34Security for OODBMS (Or Systems) - Panel. Ravi S. Sandhu. OOPSLA 1993, 307. Web SearchBibTeXDownload
33Concurrency, Synchronization, and Scheduling to Support High-Assurance Write-Up in Multilevel Object-Based Computing. Roshan K. Thomas, Ravi S. Sandhu. Security for Object-Oriented Systems 1993, 218-228. Web SearchBibTeX
32Security for Object-Oriented Systems: An Editorial Overview. Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting. Security for Object-Oriented Systems 1993, 1-7. Web SearchBibTeX
1992
31Eliminating polyinstantiation securely. Ravi S. Sandhu, Sushil Jajodia. Computers & Security (11): 547-562 (1992). Cited by 10Web SearchBibTeXDownload
30Lattice-based enforcement of Chinese Walls. Ravi S. Sandhu. Computers & Security (11): 753-763 (1992). Web SearchBibTeXDownload
29The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model. Paul Ammann, Richard J. Lipton, Ravi S. Sandhu. CSFW 1992, 148-156. Web SearchBibTeX
28Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects. Roshan K. Thomas, Ravi S. Sandhu. DBSec 1992, 15-34. Web SearchBibTeX
27Polyinstantation for Cover Stories. Ravi S. Sandhu, Sushil Jajodia. ESORICS 1992, 307-328. Cited by 43Web SearchBibTeXDownload
26Undecidability of Safety for the Schematic Protection Model with Cyclic Creates. Ravi S. Sandhu. J. Comput. Syst. Sci. (44): 141-159 (1992). Web SearchBibTeXDownload
25Expressive Power of the Schematic Protection Model. Ravi S. Sandhu. Journal of Computer Security (1): 59-98 (1992). Web SearchBibTeXDownload
24The Extended Schematic Protection Model. Paul Ammann, Ravi S. Sandhu. Journal of Computer Security (1): 335-384 (1992). Web SearchBibTeXDownload
1991
23Integrity principles and mechanisms in database management systems. Ravi S. Sandhu, Sushil Jajodia. Computers & Security (10): 413-427 (1991). Cited by 26Web SearchBibTeXDownload
22A Secure Kernelized Architecture for Multiple Object-Oriented Databases. Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia. CSFW 1991, 139-152. Cited by 17Web SearchBibTeX
21Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases. Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia. DBSec 1991, 297-314. Cited by 15Web SearchBibTeX
20Safety Analysis for the Extended Schematic Protection Model. Paul Ammann, Ravi S. Sandhu. IEEE Symposium on Security and Privacy 1991, 87-97. Web SearchBibTeX
19A Novel Decomposition of Multilevel Relations into Single-Level Relations. Sushil Jajodia, Ravi S. Sandhu. IEEE Symposium on Security and Privacy 1991, 300-315. Cited by 26Web SearchBibTeX
18Towards a Multilevel Secure Relational Data Model. Sushil Jajodia, Ravi S. Sandhu. SIGMOD Conference 1991, 50-59. Cited by 186Web SearchBibTeXDownload
1990
17A New Polyinstantiation Integrity Constraint for Multilevel Relations. Ravi S. Sandhu, Sushil Jajodia, Teresa F. Lunt. CSFW 1990, 159-165. Cited by 24Web SearchBibTeX
16A Formal Framework for Single Level Decomposition of Multilevel Relations. Sushil Jajodia, Ravi S. Sandhu. CSFW 1990, 152-158. Cited by 8Web SearchBibTeX
15Separation of Duties in Computerized Information Systems. Ravi S. Sandhu. DBSec 1990, 179-190. Web SearchBibTeX
14Polyinstantiation Integrity in Multilevel Relations Revisited. Sushil Jajodia, Ravi S. Sandhu. DBSec 1990, 297-308. Web SearchBibTeX
13Polyinstantiation Integrity in Multilevel Relations. Sushil Jajodia, Ravi S. Sandhu. IEEE Symposium on Security and Privacy 1990, 104-115. Cited by 89Web SearchBibTeX
12Database Security: Current Status and Key Issues. Sushil Jajodia, Ravi S. Sandhu. SIGMOD Record (19): 123-126 (1990). Web SearchBibTeX
1989
11Discussion Summary. Ravi S. Sandhu. DBSec 1989, 353-365. Web SearchBibTeX
10Mandatory Controls for Database Integrity. Ravi S. Sandhu. DBSec 1989, 143-150. Web SearchBibTeX
9Transformation of Access Rights. Ravi S. Sandhu. IEEE Symposium on Security and Privacy 1989, 259-268. Web SearchBibTeXDownload
8Recognizing Immediacy in an N-Tree Hierarchy and Its Application to Protection Groups. Ravi S. Sandhu. IEEE Trans. Software Eng. (15): 1518-1525 (1989). Web SearchBibTeXDownload
7The Reflected Tree Hierarchy for Protection and Sharing. Ravi S. Sandhu. Inf. Process. Lett. (30): 21-26 (1989). Web SearchBibTeXDownload
6The Demand Operation in the Schematic Protection Model. Ravi S. Sandhu. Inf. Process. Lett. (32): 213-219 (1989). Web SearchBibTeXDownload
1988
5The NTree: A Two Dimension Partial Order for Protection Groups. Ravi S. Sandhu. ACM Trans. Comput. Syst. (6): 197-222 (1988). Web SearchBibTeXDownload
4Expressive Power of the Schematic Protection Model. Ravi S. Sandhu. CSFW 1988, 188-193. Web SearchBibTeX
3Cryptographic Implementation of a Tree Hierarchy for Access Control. Ravi S. Sandhu. Inf. Process. Lett. (27): 95-98 (1988). Web SearchBibTeXDownload
2The schematic protection model: its definition and analysis for acyclic attenuating schemes. Ravi S. Sandhu. J. ACM (35): 404-432 (1988). Web SearchBibTeXDownload
1986
1Some Owner Based Schemes with Dynamic Groups in the Schematic Protection Model. Ravi S. Sandhu, M. E. Share. IEEE Symposium on Security and Privacy 1986, 61-70. Web SearchBibTeX
from DBLP and Google Scholar
Developed by the Database Group at the University of Wisconsin and Yahoo! Research