1. Ravi Sandhu and P. Samarati, Authentication, Access Control and Intrusion Detection, The Computer Science and Engineering Handbook, CRC Press 1997.
    Google Scholar Search ...26
  2. ·         Papers with 60+ citations at Google Scholar.

  3. Ravi Sandhu and Sushil Jajodia, Polyinstantiation for Cover Stories, ESORICS 1992. ?????
    Google Scholar Search ...62
  4. Ravi Sandhu and Venkata Bhamidipati, Role-Based Administration of User-Role Assignment: The URA97 Model and its Oracle Implementation, Journal of Computer Security, Volume 7, 1999.
    Google Scholar Search ...62
  5. ·         Papers with 50+ citations at Google Scholar.

  6. Ravi Sandhu and Joon S. Park, Decentralized User-Role Assignment for Web-based Intranets, ACM RBAC 1998.
    Google Scholar Search ...52
  7. Joon S. Park and Ravi Sandhu, Smart Certificates: Extending X.509 for Secure Attribute Service on the Web, NISSC 1999.
    Google Scholar Search ...52
  8. Ravi Sandhu, A Lattice Interpretation of the Chinese Wall Policy, NCSC 1992.
    Google Scholar Search ...57
  9. David Ferraiolo, Rick Kuhn and Ravi Sandhu, RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control", IEEE Security & Privacy, Volume 5, Number 6, Nov./Dec. 2007, pages 51-53.
    Google Scholar Search ...54
  10. Mohammad Al-Kahtani and  Ravi Sandhu, Rule-Based RBAC with Negative Authorization, ACSAC 2004.
    Google Scholar Search ...50
  11. Jaehong Park, Xinwen Zhang,  and Ravi Sandhu, Attribute Mutability in Usage Control, IFIP11.3 2004. Presentation
    Google Scholar Search ...56
  12. Ravi Sandhu, On Five Definitions of Data Integrity, IFIP11.3 1993.
    Google Scholar Search ...51


  13. ·         Papers with 40+ citations at Google Scholar.

  14. Paul Ammann and Ravi Sandhu, The Extended Schematic Protection Model, Journal of Computer Security, Volume 1, Number 4, 1992.
    Google Scholar Search ...43
  15. Ravi Sandhu and Qamar Munawer, The RRA97 Model for Role-Based Administration of Role Hierarchies, ACSAC 1998.
    Google Scholar Search ...53
  16. Xinwen Zhang, Jaehong Park and Ravi Sandhu, Schema Based XML Security: RBAC Approach, IFIP11.3 2003.
    Google Scholar Search ...41
  17. Ravi Sandhu, Mihir Bellare, and Ravi Ganesan, Password Enabled PKI: Virtual Smartcards vs. Virtual Soft Tokens, PKIRW 2002. Presentation
    Google Scholar Search ...43
  18. Ravi Sandhu, Lattice-Based Enforcement of Chinese Walls, Computers and Security, Volume 11, Number 8, December 1992.
    Google Scholar Search ...40
  19. Paul Ammann and Ravi Sandhu, Safety Analysis for the Extended Schematic Protection Model, OAKLAND 1991.
    Google Scholar Search ...48


  20. ·         Papers with 39- citations at Google Scholar listed by year.

    ·         2010:

  21. Ravi Sandhu, Ram Krishnan and Gregory White, Towards Secure Information Sharing Models for Community Cyber Security. In Proceedings 6th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Chicago, Illinois, October 9-12, 2010. Presentation(ppt) (pdf)
    Google Scholar Search
  22. Jaehong Park, Yuan Cheng and Ravi Sandhu, Towards A Framework for Cyber Social Status Based Trusted Open Collaboration. In Proceedings of the 5th IEEE International Workshop on Trusted Collaboration (TrustCol 2010), Chicago, Illinois, October 9, 2010. Presentation(ppt) (pdf)
    Google Scholar Search
  23. Ravi Sandhu, Raj Boppana, Ram Krishnan, Jeff Reich, Todd Wolff and Josh Zachary, Towards a Discipline of Mission-Aware Cloud Computing. In Proceedings of the 2nd ACM Cloud Computing Security Workshop (CCSW 10), Chicago, Illinois, October 08, 2010, pages 13-17. Presentation(ppt) (pdf)
    Google Scholar Search
  24. Ravi Sandhu, Ram Krishnan, Jianwei Niu and William Winsborough, Group-Centric Models for Secure and Agile Information Sharing. In Proceedings 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, pages 55-69. Published as Springer Lecture Notes in Computer Science Vol. 6258, Computer Network Security (Igor Kotenko and Victor Skormin, editors), 2010. Presentation(ppt) (pdf)
    Google Scholar Search
  25. Jose Morales, Erhan Kartaltepe, Shouhuai Xu and Ravi Sandhu, Symptoms-Based Detection of Bot Processes. In Proceedings 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, pages 229-241. Published as Springer Lecture Notes in Computer Science Vol. 6258, Computer Network Security (Igor Kotenko and Victor Skormin, editors), 2010. Presentation(ppt) (pdf)
    Google Scholar Search
  26. Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu and Ravi Sandhu, Analyzing and Exploiting Network Behaviors of Malware. In Proceedings 6th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2010), September 7-9, 2010, Singapore, pages 20-34. Published as Springer Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Vol. 50, Security and Privacy in Communication Networks (S. Jajodia and J. Zhou, editors), 2010. Presentation(ppt) (pdf)
    Google Scholar Search
  27. Shouhuai Xu, Haifeng Qian, FengyingWang, Zhenxin Zhan, Elisa Bertino and Ravi Sandhu, Trustworthy Information: Concepts and Mechanisms. In Proceedings 11th International Conference on Web-Age Information Management (WAIM 2010), Jiuzhaigou, China, July 15-17, 2010, pages 398-404. Published as Springer Lecture Notes in Computer Science Vol. 6184, Web-Age Information Management (Chen, L., Tang, C., Yang, J. and Gao, Y., editors), 2010. Presentation(pdf)
    Google Scholar Search
  28. Erhan Kartaltepe, Jose Andre Morales, Shouhuai Xu and Ravi Sandhu, Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures. In Proceedings of the 8th International Conference on Applied Cryptography and Network Security (ACNS 2010), Beijing, China, June 22-25, 2010, pages 511-528. Published as Springer Lecture Notes in Computer Science Vol. 6123, Applied Cryptography and Network Security (Jianying Zhou and Moti Yung, editors), 2010. Presentation(ppt) (pdf)
    Google Scholar Search
  29. ·         2009:

  30. Ravi Sandhu, The PEI Framework for Application-Centric Security. In Proc. 5th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Crystal City, Virginia, November 11-14, 2009, pages 1-5. Presentation(ppt) (pdf)
    Google Scholar Search
  31. Ram Krishnan, Ravi Sandhu, Jianwei Niu and William Winsborough, Towards a Framework for Group-Centric Secure Collaboration. In Proc. 5th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Crystal City, Virginia, November 11-14, 2009, pages 1-10. Presentation(ppt w/animation) (pdf)
    Google Scholar Search
  32. Jose Morales, Areej Al-Bataineh, Shouhuai Xu and Ravi Sandhu, Analyzing DNS Activities of Bot Processes. Proc. 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009), Montreal, Quebec, Canada, October 13-14, 2009, pages 98-103. Presentation(ppt) (pdf)
    Google Scholar Search
  33. Ram Krishnan and Ravi Sandhu, A Hybrid Enforcement Model for Group-Centric Secure Information Sharing. Proc. IEEE International Conference on Computational Science and Engineering (CSE-09), Vancouver, Canada, August 29-31, 2009, pages 189-194. Full version Presentation(ppt) (pdf)
    Google Scholar Search
  34. Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi Sandhu and Weilei Han, An Access Control Language for a General Provenance Model. Proc. 6th VLDB Workshop on Secure Data Management (SDM'09), August 28, 2009, Lyon, France, pages 68-88. Published as Springer Lecture Notes in Computer Science Vol. 5776, SDM 2009 (W. Jonker and M. Petkovi4c, editors), 2009. Presentation(ppt) Presentation(pdf)
    Google Scholar Search ...32
  35. Shouhuai Xu, Ravi Sandhu, and Elisa Bertino, TIUPAM: A Framework for Trustworthiness-Centric Information Sharing. Proc. 3rd IFIP WG 11.11 International Conference on Trust Management (IFIPTM), Purdue University, West Lafayette, June 15-19, 2009, pages 164-175. Published as Springer IFIP Advances in Information and Communication Technology Vol. 300, Trust Management III (E. Ferrari, N. Li, E. Bertino and Y. Karabulut, editors), 2009. Presentation (ppt) Presentation (pdf)
    Google Scholar Search
  36. Shouhuai Xu, Qun Ni, Elisa Bertino and Ravi Sandhu, A Characterization of the Problem of Secure Provenance Management. Proc. IEEE International Conference on Intelligence and Security Informatics (ISI-2009): Workshop on Assured Information Sharing (WAIS), June 8-11, 2009, Dallas, Texas, pages 310-314. Presentation (ppt) Presentation (pdf)
    Google Scholar Search
  37. Ram Krishnan, Ravi Sandhu, Jianwei Niu and William Winsborough, Foundations for Group-Centric Secure Information Sharing Models. Proc. 14th ACM Symposium on Access Control Models and Technologies (SACMAT), Stresa, Italy, June 3-5, 2009, pages 115-124. Presentation(ppt) Presentation(pdf) Techreport(citation [19])
    Google Scholar Search
  38. Ravi Sandhu, The PEI Framework for Application-Centric Security. Proc. 1st IEEE International Workshop on Security and Communication Networks (IWSCN), Trondheim, Norway, May 20-22, 2009. Invited Lecture Presentation
    Google Scholar Search
  39. Ram Krishnan and Ravi Sandhu, Enforcement Architecture and Implementation Model for Group-Centric Information Sharing. Proc. 1st IEEE International Workshop on Security and Communication Networks (IWSCN), Trondheim, Norway, May 20-22, 2009. Presentation
    Google Scholar Search
  40. Justin Leonard, Shouhuai Xu, and Ravi Sandhu, A First Step Towards Characterizing Stealthy Botnets. Proc. of 4th International Conference on Availability, Reliability and Security (ARES), Fukuoka Institute of Technology, Fukuoka, Japan, March 16-19, 2009, pages 106-113. Presentation
    Google Scholar Search
  41. Justin Leonard, Shouhuai Xu, and Ravi Sandhu, A Framework for Understanding Botnets. Proc. of 3rd International Workshop on Advances in Information Security (WAIS at ARES), Fukuoka Institute of Technology, Fukuoka, Japan, March 16-19, 2009, pages 917-922. Presentation
    Google Scholar Search
  42. Ram Krishnan, Ravi Sandhu, Jianwei Niu and William Winsborough, A Conceptual Framework for Group-Centric Secure Information Sharing. Proc. 4th ACM Symposium on Information, Computer and Communications Security (AsiaCCS), Sydney, Australia, March 10-12, 2009, pages 384-387. Full version. Presentation
    Google Scholar Search
  43. Zhixiong Zhang, Xinwen Zhang, and Ravi Sandhu, Towards a Scalable Role and Organization Based Access Control Model with Decentralized Security Administration, Handbook of Research on Social and Organizational Liabilities in Information Security, edited by M. Gupta and R. Sharman, IGI Global, pages 94-117, 2009.
    Google Scholar Search

    ·         2008

  44. Xinwen Zhang, Jean-Pierre Seifert and Ravi Sandhu, Security Enforcement Model for Distributed Usage Control (Keynote Lecture), SUTC 2008. Presentation
    Google Scholar Search
  45. Vana Kalogeraki, Dimitrios Gunopulos, Ravi Sandhu and Bhavani Thuraisingham, QoS Aware Dependable Distributed Stream Processing, ISORC 2008. Presentation
    Google Scholar Search
  46. Ravi Sandhu and Venkata Bhamidipati, The ASCAA Principles for Next-Generation Role-Based Access Control (Keynote Lecture), ARES 2008. Presentation
    Google Scholar Search
  47. Xinwen Zhang, Dongyu Liu, Songqing Chen, Zhao Zhang and Ravi Sandhu, Towards Digital Rights Protection in BitTorrent-like P2P Systems, SPIE MMCN 2008.
    Google Scholar Search
  48. ·         2007

  49. Ram Krishnan, Ravi Sandhu and Kumar Ranganathan, PEI Models towards Scalable, Usable and High-Assurance Information Sharing, SACMAT 2007. Full version. Presentation
    Google Scholar Search ...30
  50. Manoj Sastry, Ram Krishnan and Ravi Sandhu, A New Modeling Paradigm for Dynamic Authorization in Multi-domain Systems, MMM-ACNS 2007. Full version.
    Google Scholar Search
  51. Shouhuai Xu and Ravi Sandhu, A Scalable and Secure Cryptographic Service, IFIP11.3 2007.
    Google Scholar Search
  52. Baoxian Zhao, Ravi Sandhu, Xinwen Zhang and Xiaolin Qin, Towards a Times-Based Usage Control Model, IFIP11.3 2007. Presentation
    Google Scholar Search
  53. Ezedin Barka and Ravi Sandhu, Framework for Agent-Based Role Delegation, ICC 2007.
    Google Scholar Search
  54. Xinwen Zhang, Michael Covington, Songqing Chen and Ravi Sandhu, SecureBus: Towards Application-Transparent Trusted Computing with Mandatory Access Control, AsiaCCS 2007. Presentation
    Google Scholar Search
  55. ·         2006

  56. Ravi Sandhu, Xinwen Zhang, Kumar Ranganathan and Michael J. Covington, Client-side Access Control Enforcement Using Trusted Computing and PEI Models, Journal of High Speed Networks, Volume 15, Number 3, 2006, Pages 229-245.
    Google Scholar Search ...14
  57. Xinwen Zhang, Ravi Sandhu, and Francesco Parisi-Presicce, Safety Analysis of Usage Control Authorization Models, AsiaCCS 2006. Presentation
    Google Scholar Search ...12
  58. Xinwen Zhang, Francesco Parisi-Presicce, and Ravi Sandhu, Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing, IWSEC 2006. Presentation
    Google Scholar Search
  59. Masayuki Nakae, Xinwen Zhang and Ravi Sandhu, A General Design Towards Secure Ad-Hoc Collaboration, AsiaCCS, 2006.
    Google Scholar Search
  60. Zhixiong Zhang, Xinwen Zhang and Ravi Sandhu, ROBAC: Scalable Role and Organization Based Access Control Models, Proceedings of the 1st IEEE International Workshop on Trusted Collaboration (TrustCol 2006), Atlanta, Georgia, November 17, 2006, 9 pages.
    Google Scholar Search
  61. ·         2005

  62. Xinwen Zhang, Songqing Chen, and Ravi Sandhu, Enhancing Data Authenticity and Integrity in P2P Systems, IEEE Internet Computing, Special Issue on Security for P2P/Ad Hoc Networks, 9(6): 42-49, November 2005.
    Google Scholar Search ...27
  63. ·         2004

  64. Roshan Thomas and Ravi Sandhu, Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions, IEEE PerSec'04.
    Google Scholar Search ...20
  65. Ravi Sandhu, A Perspective on Graphs and Access Control Models (Invited Talk), ICGT 2004.
    Google Scholar Search
  66. Roshan Thomas and Ravi Sandhu, Towards a Multi-dimensional Characterization of Dissemination Control, POLICY, 2004.
    Google Scholar Search
  67. S. Xu, W. Nelson Jr. and R. Sandhu, Enhancing Anonymity via Market Competition, Information Assurance and Security -- IEEE ITCC 2004.
    Google Scholar Search
  68. ·         2003

  69. Shouhuai Xu and Ravi Sandhu. Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures, RSA-CT 2003.
    Google Scholar Search
  70. ·         2002

  71. Ravi Sandhu, Mihir Bellare, and Ravi Ganesan, Password Enabled PKI: Virtual Smartcards vs. Virtual Soft Tokens, PKIRW 2002. Presentation
    Google Scholar Search ...43
  72. Shouhuai Xu and Ravi Sandhu, Authenticated Multicast Immune to Denial-of-Service Attack, SAC 2002.
    Google Scholar Search
  73. Joon Park, Gail-Joon Ahn and Ravi Sandhu, Role-based Access Control on the Web Using LDAP, IFIP11.3 2001.
    Google Scholar Search
  74. ·         2001

  75. Gail-Joon Ahn and Ravi Sandhu, Decentralized User Group Assignment in Windows NT, Journal of Systems and Software. Volume 56, Issue 1, February 2001, pages 39-49.
    Google Scholar Search
  76. ·         2000

  77. Venkata Bhamidipat and Ravi Sandhu, Push Architectures for User-Role Assignment, NISSC 2000.
    Google Scholar Search
  78. ·         1999

  79. Joon Park, Ravi Sandhu, and SreeLatha Ghanta, RBAC on the Web by Secure Cookies, IFIP11.3 1999.
    Google Scholar Search ...38
  80. Ravi Sandhu and Qamar Munawer, Simulation of the Augmented Typed Access Matrix Model (ATAM) Using Roles, INFOSECU 1999.
    Google Scholar Search ...23
  81. Savith Kandala and Ravi Sandhu, Extending the BFA Workflow Authorization Model to Express Weighted Voting, IFIP11.3 1999.
    Google Scholar Search
  82. Gail-Joon Ahn and Ravi Sandhu, Towards Role-Based Administration in Network Information Services, Journal of Network and Computer Applications, Volume 22,Number 3, July 1999.
    Google Scholar Search
  83. ·         1998

  84. Ravi Sandhu and Gail-Joon Ahn, Decentralized Group Hierarchies in UNIX: An Experiment and Lessons Learned, NISSC 1998.
    Google Scholar Search ...28
  85. Ravi Sandhu and Venkata Bhamidipadi, An Oracle Implementation of the PRA97 Model for Permission-Role Assignment, ACM RBAC 1998.
    Google Scholar Search ...20
  86. Philip Hyland and Ravi Sandhu, Management of Network Security Applications, NISSC 1998.
    Google Scholar Search
  87. Ravi Sandhu and Gail-Joon Ahn, Group Hierarchies with Decentralized User Assignment in Windows NT, IASTED-CSE 1998.
    Google Scholar Search
  88. Philip Hyland and Ravi Sandhu, Concentric Supervision of Security Applications: A New Security Management Paradigm, ACSAC 1998.
    Google Scholar Search
  89. ·         1997

  90. Tarik Himdi and Ravi Sandhu, Lattice Based Models for Controlled Sharing of Confidential Information in The Saudi Hajj System, ACSAC 1997.
    Google Scholar Search
  91. ·         1996

  92. Roshan Thomas and Ravi Sandhu, A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases, IEEE Transactions on Knowledge and Data Engineering, Volume 8, Number 1, February 1996.
    Google Scholar Search
  93. ·         1995

  94. Ravi Sandhu, Roles Versus Groups, ACM RBAC 1995.
    Google Scholar Search ...29
  95. Fang Chen and Ravi Sandhu, The Semantics and Expressive Power of the MLR Data Model, OAKLAND 1995.
    Google Scholar Search ...31
  96. Ravi Sandhu, Issues in RBAC, ACM RBAC 1995.
    Google Scholar Search
  97. Jeremy Epstein and Ravi Sandhu, NetWare 4 as an Example of Role-Based Access Control, ACM RBAC 1995.
    Google Scholar Search
  98. ·         1994

  99. Ravi Sandhu and Hal Feinstein, A Three Tier Architecture for Role-Based Access Control, NCSC 1994.
    Google Scholar Search ...24
  100. Ravi Sandhu and Srinivas Ganta, On the Minimality of Testing for Rights in Transformation Models, OAKLAND 1994.
    Google Scholar Search ...12
  101. Ravi Sandhu and Srinivas Ganta, On the Expressive Power of the Unary Transformation Model, ESORICS 1994.
    Google Scholar Search
  102. Roshan Thomas and Ravi Sandhu, Supporting Object-based High-assurance Write-up in Multilevel databases for the Replicted Architecture, ESORICS 1994.
    Google Scholar Search
  103. Paul Ammann and Ravi Sandhu, One-Representative Safety Analysis in the Non-Monotonic Transform Model, CSFW 1994.
    Google Scholar Search
  104. Ravi Sandhu and Sushil Jajodia, Integrity Mechanisms in Database Management Systems, Information Security: An Integrated Collection of Essays, IEEE Computer Society Press 1994.
    ???
  105. Sushil Jajodia and Ravi Sandhu, Toward A Multilevel Secure Relational Data Model,, Information Security: An Integrated Collection of Essays, IEEE Computer Society Press 1994.
    ???
  106. Sushil Jajodia, Ravi Sandhu and B.T. Blaustein, Solutions to the Polyinstantiation Problem,, Information Security: An Integrated Collection of Essays, IEEE Computer Society Press 1994.
    ???
  107. Sushil Jajodia, B. Kogan and Ravi Sandhu, A Multilevel-Secure Object-Oriented Data Model, Information Security: An Integrated Collection of Essays, IEEE Computer Society Press 1994.
    ???
  108. Ravi Sandhu, Relational Database Access Controls Using SQL, Handbook of Information Security Management (1994-95 Yearbook), Auerbach 1994.
    Google Scholar Search ???
  109. ·         1993

  110. Roshan Thomas and Ravi Sandhu, Discretionary Access Control in Object-Oriented Databases: Issues and Research Directions, NCSC 1993.
    Google Scholar Search ...27
  111. Ravi Sandhu and Srinivas Ganta, On Testing for Absence of Rights in Access Control Models, CSFW 1993.
    Google Scholar Search ...17
  112. Ravi Sandhu and Sushil Jajodia, Referential Integrity in Multilevel Secure Databases, NCSC 1993.
    Google Scholar Search
  113. Roshan Thomas and Ravi Sandhu, Concurrency, Synchronization, and Scheduling to Support High-assurance Write-up in Multilevel Object-based Computing, OOPSLA Workshop 1993.
    Google Scholar Search
  114. Ravi Sandhu and Srinivas Ganta, Expressive Power of the Single-Object Typed Access Matrix Model, ACSAC 1993.
    Google Scholar Search
  115. Roshan Thomas and Ravi Sandhu, Task Based Authorization: A Paradigm for Flexible and Adaptable Access Control in Distributed Applications, NCSC 1993.
    Google Scholar Search
  116. Roshan Thomas and Ravi Sandhu, A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up, Journal of Computer Security, Volume 2, Number 3, 1993.
    Google Scholar Search
  117. Ravi Sandhu and Gurpreet Suri, A Distributed Capability-Based Architecture for the Transform Model, Computers and Security, Volume 12, Number 3, May 1993.
    Google Scholar Search
  118. Roshan Thomas and Ravi Sandhu, Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Multilevel Transactions, IFIP11.3 1993.
    Google Scholar Search
  119. Ravi Sandhu and Sushil Jajodia, Data and Database Security and Controls, Handbook of Information Security Management, Auerbach, 1993.
    Google Scholar Search
  120. ·         1992

  121. Ravi Sandhu, Undecidability of Safety for the Schematic Protection Model with Cyclic Creates, Journal of Computer and System Sciences, Volume 44, Number 1, February 1992.
    Google Scholar Search ...36
  122. Ravi Sandhu and Gurpreet Suri, Non-Monotonic Transformations of Access Rights, OAKLAND 1992.
    Google Scholar Search ...24
  123. Paul Ammann and Ravi Sandhu, Implementing Transaction Control Expressions by Checking for Absence of Access Rights, ACSAC 1992.
    Google Scholar Search ...19
  124. Ravi Sandhu and Gurpreet Suri, Implementation Considerations for the Typed Access Matrix Model in a Distributed Environment (Winner of Outstanding Paper Award), NCSC 1992.
    Google Scholar Search ...14
  125. Roshan Thomas and Ravi Sandhu, Implementing the Message Filter Object-oriented Security Model without Trusted Subjects, IFIP11.3 1992.
    Google Scholar Search
  126. Ravi Sandhu and Sushil Jajodia, Eliminating Polyinstantiation Securely, Computers and Security, Volume 11, Number 6, October 1992.
    Google Scholar Search
  127. Paul Ammann, Richard Lipton and Ravi Sandhu, The Expressive Power of Multi-Parent Creation in Monotonic Access Control Models, CSFW 1992.
    Google Scholar Search
  128. ·         1991

  129. Ravi Sandhu and Sushil Jajodia, Integrity Principles and Mechanisms in Database Management Systems, Computers and Security, Volume 10, Number 5, August 1991.
    Google Scholar Search ...29
  130. Sushil Jajodia and Ravi Sandhu, A Novel Decomposition of Multilevel Relations into Single-Level Relations, OAKLAND 1991.
    Google Scholar Search ...34
  131. Ravi Sandhu and Sushil Jajodia, Honest Databases That Can Keep Secrets, NCSC 1991.
    Google Scholar Search ...20
  132. Ravi Sandhu, Roshan Thomas and Sushil Jajodia, Supporting Timing Channel Free Computations in Multilevel Secure Object-Oriented Databases, IFIP11.3 1991.
    Google Scholar Search ...16
  133. Ravi Sandhu, Roshan Thomas and Sushil Jajodia, A Secure Kernelized Architecture for Multilevel Object-Oriented Databases, CSFW 1991.
    Google Scholar Search
  134. Paul Ammann, Ravi Sandhu and Gurpreet Suri, A Distributed Implementation of the Extended Schematic Protection Model, ACSAC 1991.
    Google Scholar Search
  135. Edgar Sibley, James Michael and Ravi Sandhu, A Case Study of Security Policy for Manual and Automated Systems, COMPASS 1991.
    Google Scholar Search
  136. Ravi Sandhu and Gurpreet Suri, A Distributed Implementation of the Transform Model, NCSC 1991.
    Google Scholar Search
  137. ·         1990

  138. Ravi Sandhu and Sushil Jajodia, Integrity Mechanisms in Database Management Systems, NCSC 1990.
    Google Scholar Search ...29
  139. Ravi Sandhu, Sushil Jajodia and Teresa Lunt, A New Polyinstantiation Integrity Constraint for Multilevel Relations, CSFW 1990.
    Google Scholar Search ...24
  140. Sushil Jajodia, Ravi Sandhu and Edgar Sibley, Update Semantics for Multilevel Relations, ACSAC 1990.
    Google Scholar Search ...24
  141. Paul Ammann and Ravi Sandhu, Extending the Creation Operation in the Schematic Protection Model, ACSAC 1990.
    Google Scholar Search ...20
  142. Sushil Jajodia and Ravi Sandhu, A Formal Framework for Single Level Decomposition of Multilevel Relations, CSFW 1990.
    Google Scholar Search
  143. Sushil Jajodia and Ravi Sandhu, Polyinstantiation Integrity in Multilevel Relations Revisited,, IFIP11.3 1990.
    Google Scholar Search
  144. ·         1989

  145. Ravi Sandhu, Transformation of Access Rights, OAKLAND 1989.
    Google Scholar Search ...27
  146. Ravi Sandhu, Mandatory Controls for Database Integrity, IFIP11.3 1989.
    Google Scholar Search ...19
  147. Ravi Sandhu, The Demand Operation in the Schematic Protection Model, Information Processing Letters, Volume 32, Number 4, September 1989.
    Google Scholar Search ...12
  148. Ravi Sandhu, Recognizing Immediacy in an NTree and its Application to Protection Groups, IEEE Transactions on Software Engineering, Volume 15, Number 12, December 1989.
    Google Scholar Search ...11
  149. Ravi Sandhu, Terminology, Criteria and System Architectures for Data Integrity, IWDI 1989.
    Google Scholar Search ...8
  150. Ravi Sandhu, The Reflected Tree Hierarchy for Protection and Sharing, Information Processing Letters, Volume 30, Number 1, January 1989.
    Google Scholar Search ...1
  151. ·         1988

  152. Ravi Sandhu, The NTree: A Two Dimension Partial Order for Protection Groups, ACM Transactions on Computer Systems, Volume 6, Number 2, May 1988.
    Google Scholar Search ...35
  153. Ravi Sandhu, Nested Categories for Access Control, Computers and Security, Volume 7, Number 6, December 1988.
    Google Scholar Search
  154. ·         1987

  155. Ravi Sandhu, On Some Cryptographic Solutions for Access Control in a Tree Hierarchy, ACM-IEEE 1987.
    Google Scholar Search ...24
  156. ·         1986

  157. Ravi Sandhu and Micheal Share, Some Owner-Based Schemes with Dynamic Groups in the Schematic Protection Model, OAKLAND 1986.
    Google Scholar Search ...17
  158. ·         1985

  159. Ravi Sandhu, Analysis of Acyclic Attenuating Systems for the SSR Protection Model, OAKLAND 1985.
    Google Scholar Search ...5
  160. ·         1984

  161. Ravi Sandhu, The SSR Model for Specification of Authorization Policies: A Case Study in Project Control, COMPSAC 1984.
    Google Scholar Search ...5