| |
-
Ravi Sandhu and P. Samarati, Authentication,
Access Control and Intrusion Detection, The Computer Science and
Engineering Handbook, CRC Press 1997.
Google Scholar Search ...26
-
Ravi Sandhu and Sushil Jajodia, Polyinstantiation for Cover Stories,
ESORICS 1992. ?????
Google Scholar Search ...62
- Ravi Sandhu and Venkata Bhamidipati, Role-Based
Administration of User-Role Assignment: The URA97 Model and its Oracle
Implementation, Journal of Computer Security, Volume 7, 1999.
Google Scholar Search ...62
- Ravi Sandhu and Joon S. Park, Decentralized User-Role Assignment for
Web-based Intranets, ACM RBAC 1998.
Google Scholar Search ...52
- Joon S. Park and Ravi Sandhu, Smart
Certificates: Extending X.509 for Secure Attribute Service on the Web, NISSC 1999.
Google Scholar Search ...52
- Ravi Sandhu, A Lattice Interpretation of the
Chinese Wall Policy, NCSC 1992.
Google Scholar Search ...57
- David Ferraiolo, Rick Kuhn and Ravi Sandhu, RBAC Standard Rationale: Comments
on "A Critique of the ANSI Standard on Role-Based Access Control", IEEE Security & Privacy,
Volume 5, Number 6, Nov./Dec. 2007, pages 51-53.
Google Scholar Search ...54
- Mohammad Al-Kahtani and Ravi Sandhu, Rule-Based
RBAC with Negative Authorization, ACSAC 2004.
Google Scholar Search ...50
- Jaehong Park, Xinwen Zhang, and Ravi Sandhu, Attribute
Mutability in Usage Control, IFIP11.3 2004.
Presentation
Google Scholar Search ...56
- Ravi Sandhu, On Five Definitions of Data
Integrity, IFIP11.3 1993.
Google Scholar Search ...51
- Paul Ammann and Ravi Sandhu, The Extended Schematic Protection Model,
Journal of Computer Security, Volume 1, Number 4, 1992.
Google Scholar Search ...43
- Ravi Sandhu and Qamar Munawer, The
RRA97 Model for Role-Based Administration of Role Hierarchies, ACSAC 1998.
Google Scholar Search ...53
- Xinwen Zhang, Jaehong Park and Ravi Sandhu, Schema
Based XML Security: RBAC Approach, IFIP11.3 2003.
Google Scholar Search ...41
- Ravi Sandhu, Mihir Bellare, and Ravi Ganesan, Password
Enabled PKI: Virtual Smartcards vs. Virtual Soft Tokens, PKIRW
2002.
Presentation
Google Scholar Search ...43
- Ravi Sandhu, Lattice-Based
Enforcement of Chinese Walls,
Computers and Security, Volume 11, Number 8, December 1992.
Google Scholar Search ...40
-
Paul Ammann and Ravi Sandhu, Safety Analysis for the Extended
Schematic Protection Model, OAKLAND 1991.
Google Scholar Search ...48
- Ravi Sandhu, Ram Krishnan and Gregory White, Towards Secure Information Sharing Models for Community Cyber Security.
In Proceedings 6th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Chicago, Illinois, October 9-12, 2010.
Presentation(ppt) (pdf)
Google Scholar Search
- Jaehong Park, Yuan Cheng and Ravi Sandhu, Towards A Framework for Cyber Social Status Based Trusted Open Collaboration.
In Proceedings of the 5th IEEE International Workshop on Trusted Collaboration (TrustCol 2010), Chicago, Illinois, October 9, 2010.
Presentation(ppt) (pdf)
Google Scholar Search
- Ravi Sandhu, Raj Boppana, Ram Krishnan, Jeff Reich, Todd Wolff and Josh Zachary, Towards a Discipline of Mission-Aware Cloud Computing.
In Proceedings of the 2nd ACM Cloud Computing Security Workshop (CCSW 10), Chicago, Illinois, October 08, 2010, pages 13-17.
Presentation(ppt) (pdf)
Google Scholar Search
- Ravi Sandhu, Ram Krishnan, Jianwei Niu and William Winsborough, Group-Centric Models for Secure and Agile Information Sharing.
In Proceedings 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, pages 55-69. Published as Springer Lecture Notes in Computer Science Vol. 6258, Computer Network Security (Igor Kotenko and Victor Skormin, editors), 2010.
Presentation(ppt) (pdf)
Google Scholar Search
- Jose Morales, Erhan Kartaltepe, Shouhuai Xu and Ravi Sandhu, Symptoms-Based Detection of Bot Processes.
In Proceedings 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, pages 229-241. Published as Springer Lecture Notes in Computer Science Vol. 6258, Computer Network Security (Igor Kotenko and Victor Skormin, editors), 2010.
Presentation(ppt) (pdf)
Google Scholar Search
- Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu and Ravi Sandhu, Analyzing and Exploiting Network Behaviors of Malware.
In Proceedings 6th International ICST Conference on Security and
Privacy in Communication Networks (SecureComm 2010), September 7-9,
2010, Singapore, pages 20-34. Published as Springer Lecture Notes of
the Institute for Computer Sciences, Social Informatics and
Telecommunications Engineering Vol. 50, Security and Privacy in
Communication Networks (S. Jajodia and J. Zhou, editors), 2010.
Presentation(ppt) (pdf)
Google Scholar Search
- Shouhuai Xu, Haifeng Qian, FengyingWang, Zhenxin Zhan, Elisa Bertino and Ravi Sandhu, Trustworthy Information: Concepts and Mechanisms.
In Proceedings 11th International Conference on Web-Age Information Management (WAIM 2010), Jiuzhaigou, China, July 15-17, 2010, pages 398-404. Published as Springer Lecture Notes in Computer Science Vol. 6184, Web-Age Information Management (Chen, L., Tang, C., Yang, J. and Gao, Y., editors), 2010.
Presentation(pdf)
Google Scholar Search
- Erhan Kartaltepe, Jose Andre Morales, Shouhuai Xu and Ravi Sandhu, Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures.
In Proceedings of the 8th International Conference on Applied Cryptography and Network Security (ACNS 2010), Beijing, China, June 22-25, 2010, pages 511-528. Published as Springer Lecture Notes in Computer Science Vol. 6123, Applied Cryptography and Network Security (Jianying Zhou and Moti Yung, editors), 2010.
Presentation(ppt) (pdf)
Google Scholar Search
- Ravi Sandhu, The PEI Framework for Application-Centric Security.
In Proc. 5th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Crystal City, Virginia, November 11-14, 2009, pages 1-5.
Presentation(ppt) (pdf)
Google Scholar Search
- Ram Krishnan, Ravi Sandhu, Jianwei Niu and William Winsborough, Towards a Framework for Group-Centric Secure Collaboration.
In Proc. 5th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Crystal City, Virginia, November 11-14, 2009, pages 1-10.
Presentation(ppt w/animation) (pdf)
Google Scholar Search
- Jose Morales, Areej Al-Bataineh, Shouhuai Xu and Ravi Sandhu, Analyzing DNS Activities of Bot Processes.
Proc. 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009), Montreal, Quebec, Canada, October 13-14, 2009, pages 98-103.
Presentation(ppt) (pdf)
Google Scholar Search
- Ram Krishnan and Ravi Sandhu, A Hybrid Enforcement Model for Group-Centric Secure Information Sharing.
Proc. IEEE International Conference on Computational Science and Engineering (CSE-09), Vancouver, Canada, August 29-31, 2009, pages 189-194.
Full version Presentation(ppt) (pdf)
Google Scholar Search
- Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi Sandhu and Weilei Han, An Access Control Language for a General Provenance Model.
Proc. 6th VLDB Workshop on Secure Data Management (SDM'09), August 28, 2009, Lyon, France, pages 68-88. Published as Springer Lecture Notes in Computer Science Vol. 5776, SDM 2009 (W. Jonker and M. Petkovi4c, editors), 2009.
Presentation(ppt) Presentation(pdf)
Google Scholar Search ...32
- Shouhuai Xu, Ravi Sandhu, and Elisa Bertino, TIUPAM: A Framework for Trustworthiness-Centric Information Sharing.
Proc. 3rd IFIP WG 11.11 International Conference on Trust Management (IFIPTM), Purdue University, West Lafayette, June 15-19, 2009, pages 164-175. Published as Springer IFIP Advances in Information and Communication Technology Vol. 300, Trust Management III (E. Ferrari, N. Li, E. Bertino and Y. Karabulut, editors), 2009.
Presentation (ppt) Presentation (pdf)
Google Scholar Search
- Shouhuai Xu, Qun Ni, Elisa Bertino and Ravi Sandhu, A Characterization of the Problem of Secure Provenance Management.
Proc. IEEE International Conference on Intelligence and Security Informatics (ISI-2009): Workshop on Assured Information Sharing (WAIS), June 8-11, 2009, Dallas, Texas, pages 310-314.
Presentation (ppt) Presentation (pdf)
Google Scholar Search
- Ram Krishnan, Ravi Sandhu, Jianwei Niu and William Winsborough, Foundations for Group-Centric Secure Information Sharing Models.
Proc. 14th ACM Symposium on Access Control Models and Technologies (SACMAT), Stresa, Italy, June 3-5, 2009, pages 115-124.
Presentation(ppt) Presentation(pdf)
Techreport(citation [19])
Google Scholar Search
- Ravi Sandhu, The PEI Framework for Application-Centric Security.
Proc. 1st IEEE International Workshop on Security and Communication Networks (IWSCN), Trondheim, Norway, May 20-22, 2009. Invited Lecture
Presentation
Google Scholar Search
- Ram Krishnan and Ravi Sandhu, Enforcement Architecture and Implementation Model for Group-Centric Information Sharing.
Proc. 1st IEEE International Workshop on Security and Communication Networks (IWSCN), Trondheim, Norway, May 20-22, 2009.
Presentation
Google Scholar Search
- Justin Leonard, Shouhuai Xu, and Ravi Sandhu, A First Step Towards Characterizing Stealthy Botnets.
Proc. of 4th International Conference on Availability, Reliability and Security (ARES), Fukuoka Institute of Technology, Fukuoka, Japan, March 16-19, 2009, pages 106-113.
Presentation
Google Scholar Search
- Justin Leonard, Shouhuai Xu, and Ravi Sandhu, A Framework for Understanding Botnets.
Proc. of 3rd International Workshop on Advances in Information Security (WAIS at ARES), Fukuoka Institute of Technology, Fukuoka, Japan, March 16-19, 2009, pages 917-922.
Presentation
Google Scholar Search
- Ram Krishnan, Ravi Sandhu, Jianwei Niu and William Winsborough, A Conceptual Framework for Group-Centric Secure Information Sharing.
Proc. 4th ACM Symposium on Information, Computer and Communications Security (AsiaCCS), Sydney, Australia, March 10-12, 2009, pages 384-387.
Full version.
Presentation
Google Scholar Search
- Zhixiong Zhang, Xinwen Zhang, and Ravi Sandhu, Towards a Scalable Role and Organization
Based Access Control Model with Decentralized Security
Administration,
Handbook of Research on Social and Organizational Liabilities in
Information Security, edited by M. Gupta and R. Sharman, IGI Global,
pages 94-117, 2009.
Google Scholar Search
- Xinwen Zhang, Jean-Pierre Seifert and Ravi Sandhu, Security Enforcement Model for Distributed Usage Control , SUTC 2008.
Presentation
Google Scholar Search
- Vana Kalogeraki, Dimitrios Gunopulos, Ravi Sandhu and Bhavani Thuraisingham, QoS Aware Dependable Distributed Stream Processing, ISORC 2008.
Presentation
Google Scholar Search
- Ravi Sandhu and Venkata Bhamidipati, The ASCAA Principles for Next-Generation Role-Based Access Control , ARES 2008.
Presentation
Google Scholar Search
- Xinwen Zhang, Dongyu Liu, Songqing Chen, Zhao Zhang and Ravi Sandhu, Towards Digital Rights Protection in BitTorrent-like P2P Systems, SPIE MMCN 2008.
Google Scholar Search
- Ram Krishnan, Ravi Sandhu and Kumar Ranganathan, PEI Models towards Scalable, Usable and High-Assurance Information Sharing, SACMAT 2007.
Full version.
Presentation
Google Scholar Search ...30
- Manoj Sastry, Ram Krishnan and Ravi Sandhu, A New Modeling Paradigm for
Dynamic Authorization in Multi-domain Systems, MMM-ACNS 2007.
Full version.
Google Scholar Search
- Shouhuai Xu and Ravi Sandhu, A Scalable and Secure Cryptographic Service, IFIP11.3 2007.
Google Scholar Search
- Baoxian Zhao, Ravi Sandhu, Xinwen Zhang and Xiaolin Qin, Towards a Times-Based Usage Control Model, IFIP11.3 2007.
Presentation
Google Scholar Search
- Ezedin Barka and Ravi Sandhu, Framework for Agent-Based Role Delegation, ICC 2007.
Google Scholar Search
- Xinwen Zhang, Michael Covington, Songqing Chen and Ravi Sandhu, SecureBus: Towards Application-Transparent Trusted Computing with Mandatory Access Control, AsiaCCS 2007. Presentation
Google Scholar Search
- Ravi Sandhu, Xinwen Zhang, Kumar Ranganathan and Michael
J. Covington, Client-side Access Control Enforcement Using
Trusted Computing and PEI Models, Journal of High Speed
Networks, Volume 15, Number 3, 2006, Pages 229-245.
Google Scholar Search ...14
- Xinwen Zhang, Ravi Sandhu, and Francesco Parisi-Presicce, Safety
Analysis of Usage Control Authorization Models, AsiaCCS 2006. Presentation
Google Scholar Search ...12
- Xinwen Zhang, Francesco Parisi-Presicce, and Ravi Sandhu,
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing, IWSEC 2006.
Presentation
Google Scholar Search
- Masayuki Nakae, Xinwen Zhang and Ravi Sandhu, A General Design Towards Secure Ad-Hoc Collaboration, AsiaCCS, 2006.
Google Scholar Search
- Zhixiong Zhang, Xinwen Zhang and Ravi Sandhu,
ROBAC: Scalable Role and Organization Based Access Control Models, Proceedings of the 1st IEEE International Workshop on Trusted Collaboration (TrustCol 2006), Atlanta, Georgia, November 17, 2006, 9 pages.
Google Scholar Search
- Xinwen Zhang, Songqing Chen, and Ravi Sandhu, Enhancing Data Authenticity and Integrity in
P2P Systems, IEEE Internet Computing, Special Issue on Security for
P2P/Ad Hoc Networks, 9(6): 42-49, November 2005.
Google Scholar Search ...27
- Roshan Thomas and Ravi Sandhu, Models,
Protocols, and Architectures for Secure Pervasive Computing: Challenges
and Research Directions, IEEE PerSec'04.
Google Scholar Search ...20
- Ravi Sandhu, A Perspective on
Graphs and Access Control Models , ICGT 2004.
Google Scholar Search
- Roshan Thomas and Ravi Sandhu, Towards a Multi-dimensional Characterization of Dissemination Control, POLICY, 2004.
Google Scholar Search
- S. Xu, W. Nelson Jr. and R. Sandhu, Enhancing
Anonymity via Market Competition, Information Assurance and Security
-- IEEE ITCC 2004.
Google Scholar Search
- Shouhuai Xu and Ravi Sandhu. Two
Efficient and Provably Secure Schemes for Server-Assisted Threshold
Signatures, RSA-CT 2003.
Google Scholar Search
- Ravi Sandhu, Mihir Bellare, and Ravi Ganesan, Password
Enabled PKI: Virtual Smartcards vs. Virtual Soft Tokens, PKIRW
2002.
Presentation
Google Scholar Search ...43
- Shouhuai Xu and Ravi Sandhu, Authenticated
Multicast Immune to Denial-of-Service Attack, SAC 2002.
Google Scholar Search
- Joon Park, Gail-Joon Ahn and
Ravi Sandhu, Role-based Access
Control on the Web Using LDAP, IFIP11.3 2001.
Google Scholar Search
- Gail-Joon Ahn and Ravi Sandhu, Decentralized
User Group Assignment in Windows NT, Journal of Systems and Software. Volume 56, Issue 1, February 2001, pages 39-49.
Google Scholar Search
- Venkata Bhamidipat and Ravi Sandhu, Push
Architectures for User-Role Assignment, NISSC
2000.
Google Scholar Search
- Joon Park, Ravi Sandhu, and SreeLatha Ghanta, RBAC
on the Web by Secure Cookies, IFIP11.3 1999.
Google Scholar Search ...38
- Ravi Sandhu and Qamar Munawer, Simulation
of the Augmented Typed Access Matrix Model (ATAM) Using Roles, INFOSECU 1999.
Google Scholar Search ...23
- Savith Kandala and Ravi Sandhu, Extending
the BFA Workflow Authorization Model to Express Weighted Voting, IFIP11.3 1999.
Google Scholar Search
- Gail-Joon Ahn and Ravi Sandhu, Towards
Role-Based Administration in Network Information Services, Journal of
Network and Computer Applications, Volume 22,Number 3, July 1999.
Google Scholar Search
- Ravi Sandhu and Gail-Joon Ahn, Decentralized Group Hierarchies in
UNIX: An Experiment and Lessons Learned, NISSC 1998.
Google Scholar Search ...28
- Ravi Sandhu and Venkata Bhamidipadi, An Oracle Implementation of the PRA97
Model for Permission-Role Assignment, ACM RBAC 1998.
Google Scholar Search ...20
- Philip Hyland and Ravi Sandhu, Management of Network Security
Applications, NISSC 1998.
Google Scholar Search
- Ravi Sandhu and Gail-Joon Ahn, Group
Hierarchies with Decentralized User Assignment in Windows NT, IASTED-CSE 1998.
Google Scholar Search
- Philip Hyland and Ravi Sandhu, Concentric
Supervision of Security Applications: A New Security Management Paradigm,
ACSAC 1998.
Google Scholar Search
- Tarik Himdi and Ravi Sandhu, Lattice Based Models for Controlled
Sharing of Confidential Information in The Saudi Hajj System,
ACSAC 1997.
Google Scholar Search
- Roshan Thomas and Ravi Sandhu, A Trusted Subject Architecture for Multilevel Secure
Object-Oriented Databases, IEEE Transactions on Knowledge and Data Engineering, Volume 8,
Number 1, February 1996.
Google Scholar Search
- Ravi Sandhu, Roles Versus Groups, ACM
RBAC 1995.
Google Scholar Search ...29
-
Fang Chen and Ravi Sandhu, The Semantics and Expressive Power of
the MLR Data Model, OAKLAND 1995.
Google Scholar Search ...31
- Ravi Sandhu, Issues in RBAC, ACM RBAC
1995.
Google Scholar Search
-
Jeremy Epstein and Ravi Sandhu, NetWare 4 as an Example of Role-Based Access Control,
ACM RBAC 1995.
Google Scholar Search
-
Ravi Sandhu and Hal Feinstein, A Three Tier Architecture for
Role-Based Access Control, NCSC 1994.
Google Scholar Search ...24
-
Ravi Sandhu and Srinivas Ganta, On the Minimality of Testing for
Rights in Transformation Models, OAKLAND 1994.
Google Scholar Search ...12
-
Ravi Sandhu and Srinivas Ganta, On the Expressive Power of the Unary
Transformation Model, ESORICS 1994.
Google Scholar Search
-
Roshan Thomas and Ravi Sandhu, Supporting Object-based High-assurance
Write-up in Multilevel databases for the Replicted Architecture,
ESORICS 1994.
Google Scholar Search
-
Paul Ammann and Ravi Sandhu, One-Representative Safety Analysis in
the Non-Monotonic Transform Model, CSFW 1994.
Google Scholar Search
- Ravi Sandhu and Sushil Jajodia, Integrity
Mechanisms in Database Management Systems, Information Security: An
Integrated Collection of Essays, IEEE Computer Society Press 1994.
???
- Sushil Jajodia and Ravi Sandhu, Toward
A Multilevel Secure Relational Data Model,, Information Security: An
Integrated Collection of Essays, IEEE Computer Society Press 1994.
???
- Sushil Jajodia, Ravi Sandhu and B.T. Blaustein, Solutions
to the Polyinstantiation Problem,, Information Security: An Integrated
Collection of Essays, IEEE Computer Society Press 1994.
???
- Sushil Jajodia, B. Kogan and Ravi Sandhu, A
Multilevel-Secure Object-Oriented Data Model, Information Security: An
Integrated Collection of Essays, IEEE Computer Society Press 1994.
???
- Ravi Sandhu, Relational Database
Access Controls Using SQL, Handbook of Information Security Management
(1994-95 Yearbook), Auerbach 1994.
Google Scholar Search ???
-
Roshan Thomas and Ravi Sandhu, Discretionary Access Control in
Object-Oriented Databases: Issues and Research Directions, NCSC
1993.
Google Scholar Search ...27
-
Ravi Sandhu and Srinivas Ganta, On Testing for Absence of Rights in
Access Control Models, CSFW 1993.
Google Scholar Search ...17
-
Ravi Sandhu and Sushil Jajodia, Referential Integrity in Multilevel
Secure Databases, NCSC 1993.
Google Scholar Search
- Roshan Thomas and Ravi Sandhu, Concurrency,
Synchronization, and Scheduling to Support High-assurance Write-up in
Multilevel Object-based Computing, OOPSLA Workshop 1993.
Google Scholar Search
-
Ravi Sandhu and Srinivas Ganta, Expressive Power of the Single-Object
Typed Access Matrix Model, ACSAC 1993.
Google Scholar Search
-
Roshan Thomas and Ravi Sandhu, Task Based Authorization: A Paradigm
for Flexible and Adaptable Access Control in Distributed
Applications, NCSC 1993.
Google Scholar Search
- Roshan Thomas and Ravi Sandhu, A Kernelized Architecture for Multilevel Secure Object-Oriented
Databases Supporting Write-Up, Journal of Computer Security, Volume 2, Number 3,
1993.
Google Scholar Search
- Ravi Sandhu and Gurpreet Suri, A Distributed Capability-Based Architecture for the Transform
Model, Computers and Security, Volume 12, Number 3, May 1993.
Google Scholar Search
- Roshan Thomas and Ravi Sandhu, Towards a
Unified Framework and Theory for Reasoning about Security and Correctness of
Multilevel Transactions, IFIP11.3 1993.
Google Scholar Search
- Ravi Sandhu and Sushil Jajodia, Data
and Database Security and Controls, Handbook of Information Security
Management, Auerbach, 1993.
Google Scholar Search
- Ravi Sandhu, Undecidability of Safety for the Schematic Protection Model with
Cyclic Creates, Journal of Computer and System Sciences, Volume 44, Number
1, February 1992.
Google Scholar Search ...36
-
Ravi Sandhu and Gurpreet Suri, Non-Monotonic Transformations of
Access Rights, OAKLAND 1992.
Google Scholar Search ...24
-
Paul Ammann and Ravi Sandhu, Implementing Transaction Control
Expressions by Checking for Absence of Access Rights, ACSAC 1992.
Google Scholar Search ...19
-
Ravi Sandhu and Gurpreet Suri, Implementation Considerations for the
Typed Access Matrix Model in a Distributed Environment , NCSC 1992.
Google Scholar Search ...14
- Roshan Thomas and Ravi Sandhu, Implementing
the Message Filter Object-oriented Security Model without Trusted Subjects, IFIP11.3 1992.
Google Scholar Search
- Ravi Sandhu and Sushil Jajodia, Eliminating Polyinstantiation Securely,
Computers and Security, Volume 11, Number 6, October 1992.
Google Scholar Search
-
Paul Ammann, Richard Lipton and Ravi
Sandhu, The Expressive Power of Multi-Parent
Creation in Monotonic Access Control Models, CSFW 1992.
Google Scholar Search
- Ravi Sandhu and Sushil Jajodia, Integrity Principles and Mechanisms in Database Management
Systems,
Computers and Security, Volume 10, Number 5, August 1991.
Google Scholar Search ...29
-
Sushil Jajodia and Ravi Sandhu, A Novel Decomposition of Multilevel
Relations into Single-Level Relations, OAKLAND 1991.
Google Scholar Search ...34
-
Ravi Sandhu and Sushil Jajodia, Honest Databases That Can Keep Secrets,
NCSC 1991.
Google Scholar Search ...20
- Ravi Sandhu, Roshan Thomas and Sushil Jajodia, Supporting
Timing Channel Free Computations in Multilevel Secure Object-Oriented
Databases, IFIP11.3 1991.
Google Scholar Search ...16
-
Ravi Sandhu, Roshan Thomas and Sushil
Jajodia, A Secure Kernelized Architecture for
Multilevel Object-Oriented Databases, CSFW 1991.
Google Scholar Search
-
Paul Ammann, Ravi Sandhu and Gurpreet Suri, A Distributed Implementation of the
Extended Schematic Protection Model, ACSAC 1991.
Google Scholar Search
-
Edgar Sibley, James Michael and Ravi
Sandhu, A Case Study of Security Policy for
Manual and Automated Systems, COMPASS 1991.
Google Scholar Search
-
Ravi Sandhu and Gurpreet Suri, A Distributed Implementation of the
Transform Model, NCSC 1991.
Google Scholar Search
-
Ravi Sandhu and Sushil Jajodia, Integrity Mechanisms in Database
Management Systems, NCSC 1990.
Google Scholar Search ...29
-
Ravi Sandhu, Sushil Jajodia and Teresa
Lunt, A New Polyinstantiation Integrity
Constraint for Multilevel Relations, CSFW 1990.
Google Scholar Search ...24
-
Sushil Jajodia, Ravi Sandhu and Edgar
Sibley, Update Semantics for Multilevel
Relations, ACSAC 1990.
Google Scholar Search ...24
-
Paul Ammann and Ravi Sandhu, Extending the Creation Operation in
the Schematic Protection Model, ACSAC 1990.
Google Scholar Search ...20
-
Sushil Jajodia and Ravi Sandhu, A Formal Framework for Single Level
Decomposition of Multilevel Relations, CSFW 1990.
Google Scholar Search
- Sushil Jajodia and Ravi Sandhu, Polyinstantiation Integrity in Multilevel
Relations Revisited,, IFIP11.3 1990.
Google Scholar Search
-
Ravi Sandhu, Transformation of Access Rights,
OAKLAND 1989.
Google Scholar Search ...27
- Ravi Sandhu, Mandatory Controls for
Database Integrity, IFIP11.3 1989.
Google Scholar Search ...19
- Ravi Sandhu, The Demand Operation in the Schematic Protection Model,
Information Processing Letters, Volume 32, Number 4, September
1989.
Google Scholar Search ...12
- Ravi Sandhu, Recognizing Immediacy in an NTree and its Application to
Protection Groups, IEEE Transactions on Software Engineering, Volume 15, Number 12,
December 1989.
Google Scholar Search ...11
-
Ravi Sandhu, Terminology, Criteria and System
Architectures for Data Integrity, IWDI 1989.
Google Scholar Search ...8
- Ravi Sandhu, The
Reflected Tree Hierarchy for Protection and Sharing, Information
Processing Letters, Volume 30, Number 1, January 1989.
Google Scholar Search ...1
- Ravi Sandhu, The
NTree: A Two Dimension Partial Order for Protection Groups, ACM
Transactions on Computer Systems, Volume 6, Number 2, May 1988.
Google Scholar Search ...35
- Ravi Sandhu, Nested Categories for Access
Control, Computers and Security, Volume 7, Number 6, December 1988.
Google Scholar Search
-
Ravi Sandhu, On Some Cryptographic Solutions for
Access Control in a Tree Hierarchy, ACM-IEEE 1987.
Google Scholar Search ...24
-
Ravi Sandhu and Micheal Share, Some Owner-Based Schemes with Dynamic
Groups in the Schematic Protection Model, OAKLAND 1986.
Google Scholar Search ...17
-
Ravi Sandhu, Analysis of Acyclic Attenuating
Systems for the SSR Protection Model, OAKLAND 1985.
Google Scholar Search ...5
-
Ravi Sandhu, The SSR Model for Specification of
Authorization Policies: A Case Study in Project Control, COMPSAC 1984.
Google Scholar Search ...5
|