Journal Papers


Home
Publications
Most Cited Papers
Guide to Papers
Patents
Grants
PhD's Awarded
Invited Talks etc.
Teaching
Vitae etc.
Contact Me

Up Conference Papers Journal Papers Articles Miscellaneous Acronyms

    2017: 1

  1. Qi Li, Ravi Sandhu, Xinwen Zhang and Mingwei Xu, Mandatory Content Access Control for Privacy Protection in Information Centric Networks. IEEE Transactions on Dependable and Secure Computing. Volume 14, Number 5, Sept./Oct. 2017, pages 494-506.
    Google Scholar Search 0*
  2. 2016: 3

  3. Rajkumar P.V. and Ravi Sandhu, Safety Decidability for Pre-Authorization Usage Control with Finite Attribute Domains. IEEE Transactions on Dependable and Secure Computing. Volume 13, Number 5, Sept./Oct. 2016, pages 582-590.
    Google Scholar Search 0*
  4. Yuan Cheng, Jae Park and Ravi Sandhu, An Access Control Model for Online Social Networks Using User-to-User Relationships. IEEE Transactions on Dependable and Secure Computing. Volume 13, Number 4, July/August 2016, pages 424-436.
    Google Scholar Search 0*
  5. Lianshan Sun, Jaehong Park, Dang Nguyen, and Ravi Sandhu, A Provenance-Aware Access Control Framework with Typed Provenance. IEEE Transactions on Dependable and Secure Computing. Volume 13, Number 4, July/August 2016, pages 411-423.
    Google Scholar Search 0*
  6. 2015: 3

  7. Bao Liu and Ravi Sandhu, Fingerprint-Based Detection and Diagnosis of Malicious Programs in Hardware. IEEE Transactions on Reliability, Volume 64, Number 3, September 2015, pages 1068-1077.
    Google Scholar Search 0*
  8. Bo Tang, Ravi Sandhu and Qi Li, Multi-Tenancy Authorization Models for Collaborative Cloud Services. Concurrency and Computation: Practice and Experience, Volume 27, Number 11, August 2015, pages 2851-2868.
    Google Scholar Search 0.1*
  9. Qi Li, Xinwen Zhang, Qingji Zheng, Ravi Sandhu, and Xiaoming Fu. LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking, IEEE Transactions on Information Forensics and Security, Volume 10, Number 2, February 2015, pages 308-320.
    Google Scholar Search 0.1*
  10. 2014: 1

  11. Elisa Bertino, Gabriel Ghinita, Murat Kantarcioglu, Dang Nguyen, Jae Park, Ravi Sandhu, Salmin Sultana, Bhavani Thuraisingham, and Shouhuai Xu. A Roadmap for Privacy-Enhanced Secure Data Provenance, Journal of Intelligent Information Systems, Volume 43, Number 3, May 2014, pages 481-501.
    Google Scholar Search 0.1*
  12. 2013: 2

  13. Khalid Bijon, Ram Krishnan and Ravi Sandhu, Constraints Specification in Attribute Based Access Control, ASE Science Journal, Volume 2, Number 3, 14 pages.
    Google Scholar Search 0.1*
  14. Mukesh Singhal, Santosh Chandrasekhar, Tingjian Ge, Ravi Sandhu, Ram Krishnan, Gail-Joon Ahn and Elisa Bertino, Collaboration in Multicloud Computing Environments: Framework and Security Issues, IEEE Computer, Volume 46, Number 2, February 2013, pages 76-84.
    Google Scholar Search 0.5*
  15. 2012: 1

  16. Ravi Sandhu, Speculations on the Science of Web User Security, Computer Networks, Volume 56, Number 18, Dec. 2012, pages 3891-3895.
    Google Scholar Search 0*
  17. 2011: 3

  18. Ram Krishnan, Jianwei Niu, Ravi Sandhu and William H. Winsborough, Group-Centric Secure Information-Sharing Models for Isolated Groups, ACM TISSEC, Volume 14, Number 3, Nov. 2011, 29 pages.
    Google Scholar Search 0.1*
  19. Ludwig Fuchs, Gunther Pernul and Ravi Sandhu, Roles in Information Security-A Survey and Classification of the Research Area, Computers & Security, Volume 30, Number 8, November 2011, pages 748-769.
    Google Scholar Search 0.5*
  20. Jaehong Park, Ravi Sandhu and Yuan Cheng, A User-Activity-Centric Framework for Access Control in Online Social Networks , IEEE Internet Computing, 15(5): 62-65, September 2011.
    Google Scholar Search 0.1* ++
  21. 2010: 1

  22. Moo Nam Ko, Gorrell Cheek, Mohamed Shehab and Ravi Sandhu, Social-Networks Connect Services, IEEE Computer, Volume 43, Number 8 (Cover Article), August 2010, pages 37-43.
    Google Scholar Search 1*
  23. 2008: 1

  24. Zhang, X., Nakae, M., Covington, M., and Sandhu, R., Toward a Usage-Based Security Framework for Collaborative Computing Systems, ACM TISSEC, Volume 11, Number 1, Feb. 2008, pages 1-36.
    Google Scholar Search 1*
  25. 2007: 1

  26. David Ferraiolo, Rick Kuhn and Ravi Sandhu, RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control", IEEE Security & Privacy, Volume 5, Number 6, Nov./Dec. 2007, pages 51-53.
    Google Scholar Search 0.5*
  27. 2006: 3

  28. Sejong Oh, Ravi Sandhu and Xinwen Zhang, An Effective Role Administration Model Using Organization Structure, ACM Transactions on Information and System Security, Volume 9, Number 2, May 2006, pages 113-137.
    Google Scholar Search 0.5*
  29. Elisa Bertino, Latifur Khan, Ravi Sandhu and Bhavani Thuraisingham, Secure Knowledge Management: Confidentiality, Trust, and Privacy, IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 36(3):429-438, May 2006.
    Google Scholar Search 1*
  30. Ravi Sandhu, Xinwen Zhang, Kumar Ranganathan and Michael J. Covington, Client-side Access Control Enforcement Using Trusted Computing and PEI Models, Journal of High Speed Networks, Volume 15, Number 3, 2006, Pages 229-245.
    Google Scholar Search 0.1*
  31. 2005: 3

  32. Xinwen Zhang, Francesco Parisi-Presicce, Ravi Sandhu, and Jaehong Park, Formal Model and Policy Specification of Usage Control, ACM Transactions on Information and System Security (TISSEC), 8(4): 351-387, 2005
    Google Scholar Search 2*
  33. Xinwen Zhang, Songqing Chen, and Ravi Sandhu, Enhancing Data Authenticity and Integrity in P2P Systems, IEEE Internet Computing, Special Issue on Security for P2P/Ad Hoc Networks, 9(6): 42-49, November 2005.
    Google Scholar Search 0.5*
  34. Elisa Bertino and Ravi Sandhu, Database Security-Concepts, Approaches, and Challenges. IEEE Trans. Dependable Sec. Comput. 2(1): 2-19, 2005.
    Google Scholar Search 4*
  35. 2004: 1

  36. Jaehong Park and Ravi Sandhu, The UCONABC Usage Control Model, ACM Transactions on Information and System Security, Volume 7, Number 1, February 2004, pages 128-174.
    Google Scholar Search 10*
  37. 2003: 1

  38. Ravi Sandhu, Good-Enough Security: Toward a Pragmatic Business-Driven Discipline, IEEE Internet Computing, Vol. 7, No.1, January/February 2003.
    Google Scholar Search 0.5*
  39. 2001: 3

  40. David F. Ferraiolo, Ravi Sandhu, Serban Gavrila, D. Richard Kuhn and Ramaswamy Chandramouli, Proposed NIST Standard for Role-Based Access Control, ACM Transactions on Information and Systems Security (TISSEC), Volume 4, Number 3, August 2001. Highlights
    Google Scholar Search 31*
    Also see ANSI INCITS 359-2004 Standard for Role Based Access Control
  41. Joon Park, Ravi Sandhu and Gail-Joon Ahn, Role-Based Access Control on the Web, ACM Transactions on Information and Systems Security (TISSEC), Volume 4, Number 1, February 2001.
    Google Scholar Search 3*
  42. Gail-Joon Ahn and Ravi Sandhu, Decentralized User Group Assignment in Windows NT, Journal of Systems and Software. Volume 56, Issue 1, February 2001, pages 39-49.
    Google Scholar Search 0*
  43. 2000: 3

  44. Gail-Joon Ahn and Ravi Sandhu, Role-Based Authorization Constraints Specification, ACM Transactions on Information and Systems Security (TISSEC), Volume 3, Number 4, November 2000. Errata
    Google Scholar Search
  45. Joon S. Park and Ravi Sandhu, Secure Cookies on the Web, IEEE Internet Computing, July 2000.
    Google Scholar Search
  46. Sylvia Osborn, Ravi Sandhu and Qamar Munawer, Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies, ACM Transactions on Information and Systems Security (TISSEC), Volume 3, Number 2, February 2000.
    Google Scholar Search
  47. 1999: 3

  48. Ravi Sandhu and Bhamidipati, Role-Based Administration of User-Role Assignment: The URA97 Model and its Oracle Implementation, Journal of Computer Security, Volume 7, 1999.
    Google Scholar Search
  49. Gail-Joon Ahn and Ravi Sandhu, Towards Role-Based Administration in Network Information Services, Journal of Network and Computer Applications, Volume 22,Number 3, July 1999.
    Google Scholar Search
  50. Ravi Sandhu, Venkata Bhamidipati and Qamar Munawer, The ARBAC97 Model for Role-Based Administration of Roles, ACM Transactions on Information and Systems Security (TISSEC), Volume 2, Number, February 1999.
    Google Scholar Search
  51. 1998: 1

  52. Ravi Sandhu and Fang Chen, The Multilevel Relational (MLR) Data Model, ACM Transactions on Information and Systems Security (TISSEC), Volume 1, Number 1,  June 1998.
    Google Scholar Search
  53. 1996: 4

  54. Ravi Sandhu and P. Samarati, Authentication, Access Control and Audit, ACM Computing Surveys, 50th anniversary commemorative issue, Volume 28, Number 1, March 1996.
    Google Scholar Search
  55. Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman, Role-Based Access Control Models, IEEE Computer, Volume 29, Number 2, February 1996.
    Google Scholar Search
  56. Roshan Thomas and Ravi Sandhu, A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases, IEEE Transactions on Knowledge and Data Engineering, Volume 8, Number 1, February 1996.
    Google Scholar Search
  57. Paul Ammann, Ravi Sandhu and Richard Lipton, The Expressive Power of Multi-Parent Creation in Monotonic Access Control Models, Journal of Computer Security, Volume 4, Numbers 2-3, January 1996, 149-165.

  58. 1994: 1

  59. Ravi Sandhu and P. Samarati, Access Control: Principles and Practice, IEEE Communications, Volume 32, Number 9, September 1994.
    Google Scholar Search
  60. 1993: 3

  61. Ravi Sandhu, Lattice-Based Access Control Models, IEEE Computer, Volume 26, Number 11 (Cover Article), November 1993.
    Google Scholar Search
  62. Roshan Thomas and Ravi Sandhu, A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up, Journal of Computer Security, Volume 2, Number 3, 1993.
    Google Scholar Search
  63. Ravi Sandhu and Gurpreet Suri, A Distributed Capability-Based Architecture for the Transform Model, Computers and Security, Volume 12, Number 3, May 1993.
    Google Scholar Search
  64. 1992: 5

  65. Paul Ammann and Ravi Sandhu, The Extended Schematic Protection Model, Journal of Computer Security, Volume 1, Number 4, 1992.
    Google Scholar Search 50+
  66. Ravi Sandhu, Lattice-Based Enforcement of Chinese Walls, Computers and Security, Volume 11, Number 8, December 1992.
    Google Scholar Search 60+
  67. Ravi Sandhu and Sushil Jajodia, Eliminating Polyinstantiation Securely, Computers and Security, Volume 11, Number 6, October 1992.
    Google Scholar Search 10+
  68. Ravi Sandhu, Undecidability of Safety for the Schematic Protection Model with Cyclic Creates, Journal of Computer and System Sciences, Volume 44, Number 1, February 1992.
    Google Scholar Search 30+
  69. Ravi Sandhu, Expressive Power of the Schematic Protection Model, Journal of Computer Security, Volume 1, Number 1, 1992.
    Google Scholar Search 75+
  70. 1991: 1

  71. Ravi Sandhu and Sushil Jajodia, Integrity Principles and Mechanisms in Database Management Systems, Computers and Security, Volume 10, Number 5, August 1991.
    Google Scholar Search 10+
  72. 1989: 3

  73. Ravi Sandhu, Recognizing Immediacy in an NTree and its Application to Protection Groups, IEEE Transactions on Software Engineering, Volume 15, Number 12, December 1989.
    Google Scholar Search 1+
  74. Ravi Sandhu, The Demand Operation in the Schematic Protection Model, Information Processing Letters, Volume 32, Number 4, September 1989.
    Google Scholar Search 1+
  75. Ravi Sandhu, The Reflected Tree Hierarchy for Protection and Sharing, Information Processing Letters, Volume 30, Number 1, January 1989.
    Google Scholar Search 1+
  76. 1988: 4

  77. Ravi Sandhu, Nested Categories for Access Control, Computers and Security, Volume 7, Number 6, December 1988.
    Google Scholar Search 1+
  78. Ravi Sandhu, The NTree: A Two Dimension Partial Order for Protection Groups, ACM Transactions on Computer Systems, Volume 6, Number 2, May 1988.
    Google Scholar Search 40+
  79. Ravi Sandhu, The Schematic Protection Model: Its Definition and Analysis for Acyclic Attenuating Schemes , Journal of the ACM, Volume 35, Number 2, April 1988.
    Google Scholar Search 200+
  80. Ravi Sandhu, Cryptographic Implementation of a Tree Hierarchy for Access Control, Information Processing Letters, Volume 27, Number 2, February 1988.
    Google Scholar Search 250+