dblp.uni-trier.dewww.uni-trier.de

Ravi S. Sandhu Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
164EERam Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough: A conceptual framework for Group-Centric secure information sharing. ASIACCS 2009: 384-387
163EERam Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough: Foundations for group-centric secure information sharing models. SACMAT 2009: 115-124
162EEQun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu, Weili Han: An Access Control Language for a General Provenance Model. Secure Data Management 2009: 68-88
2008
161EERam Krishnan, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough: Stale-safe security properties for group-based secure information sharing. FMSE 2008: 53-62
160EEVana Kalogeraki, Dimitrios Gunopulos, Ravi S. Sandhu, Bhavani M. Thuraisingham: QoS Aware Dependable Distributed Stream Processing. ISORC 2008: 69-75
159EEJong Hyuk Park, Bart Preneel, Ravi S. Sandhu, André Zúquete: IS 2008 PC Co-chairs' Message. OTM Conferences (2) 2008: 937
158EETimothy W. Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough, Bhavani M. Thuraisingham: ROWLBAC: representing role based access control in OWL. SACMAT 2008: 73-82
157EEXinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu: Security Enforcement Model for Distributed Usage Control. SUTC 2008: 10-18
156EEXinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu: Toward a Usage-Based Security Framework for Collaborative Computing Systems. ACM Trans. Inf. Syst. Secur. 11(1): (2008)
2007
155EEXinwen Zhang, Michael J. Covington, Songqing Chen, Ravi S. Sandhu: SecureBus: towards application-transparent trusted computing with mandatory access control. ASIACCS 2007: 117-126
154EEShouhuai Xu, Ravi S. Sandhu: A Scalable and Secure Cryptographic Service. DBSec 2007: 144-160
153EEBaoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin: Towards a Times-Based Usage Control Model. DBSec 2007: 227-242
152EEEzedin Barka, Ravi S. Sandhu: Framework for Agent-Based Role Delegation. ICC 2007: 1361-1367
151EERam Krishnan, Ravi S. Sandhu, Kumar Ranganathan: PEI models towards scalable, usable and high-assurance information sharing. SACMAT 2007: 145-150
150EEMin Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang: Towards a VMM-based usage control framework for OS kernel integrity protection. SACMAT 2007: 71-80
149EEDavid F. Ferraiolo, D. Richard Kuhn, Ravi S. Sandhu: RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control". IEEE Security & Privacy 5(6): 51-53 (2007)
2006
148EERavi S. Sandhu, Kumar Ranganathan, Xinwen Zhang: Secure information sharing enabled by Trusted Computing and PEI models. ASIACCS 2006: 2-12
147EEXinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Presicce: Safety analysis of usage control authorization models. ASIACCS 2006: 243-254
146EEMasayuki Nakae, Xinwen Zhang, Ravi S. Sandhu: A general design towards secure ad-hoc collaboration. ASIACCS 2006: 358
145EEXinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu: Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing. IWSEC 2006: 179-195
144EEXinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu: A usage-based authorization framework for collaborative computing systems. SACMAT 2006: 180-189
143EESejong Oh, Ravi S. Sandhu, Xinwen Zhang: An effective role administration model using organization structure. ACM Trans. Inf. Syst. Secur. 9(2): 113-137 (2006)
142EEElisa Bertino, L. R. Khan, Ravi S. Sandhu, Bhavani M. Thuraisingham: Secure knowledge management: confidentiality, trust, and privacy. IEEE Transactions on Systems, Man, and Cybernetics, Part A 36(3): 429-438 (2006)
141EERavi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, Michael J. Covington: Client-side access control enforcement using trusted computing and PEI models. J. High Speed Networks 15(3): 229-245 (2006)
2005
140EERavi S. Sandhu, Xinwen Zhang: Peer-to-peer access control architecture using trusted computing technology. SACMAT 2005: 147-158
139EERavi S. Sandhu: Editorial. ACM Trans. Inf. Syst. Secur. 8(1): 1 (2005)
138EEXinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu, Jaehong Park: Formal model and policy specification of usage control. ACM Trans. Inf. Syst. Secur. 8(4): 351-387 (2005)
137EEXinwen Zhang, Songqing Chen, Ravi S. Sandhu: Enhancing Data Authenticity and Integrity in P2P Systems. IEEE Internet Computing 9(6): 42-49 (2005)
136EEElisa Bertino, Ravi S. Sandhu: Database Security-Concepts, Approaches, and Challenges. IEEE Trans. Dependable Sec. Comput. 2(1): 2-19 (2005)
2004
135EEEzedin Barka, Ravi S. Sandhu: Role-Based Delegation Model/ Hierarchical Roles (RBDM1). ACSAC 2004: 396-404
134EEMohammad A. Al-Kahtani, Ravi S. Sandhu: Mohammad A. Al-Kahtani, Ravi Sandhu. ACSAC 2004: 405-415
133 Jaehong Park, Xinwen Zhang, Ravi S. Sandhu: Attribute Mutability in Usage Control. DBSec 2004: 15-29
132EERavi S. Sandhu: A Perspective on Graphs and Access Control Models. ICGT 2004: 2-12
131EEShouhuai Xu, William Robert Nelson Jr., Ravi S. Sandhu: Enhancing Anonymity via Market Competition. ITCC (1) 2004: 30-34
130EERoshan K. Thomas, Ravi S. Sandhu: Towards a Multi-dimensional Characterization of Dissemination Control. POLICY 2004: 197-200
129EERoshan K. Thomas, Ravi S. Sandhu: Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions. PerCom Workshops 2004: 164-170
128EEXinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi S. Sandhu: A logical specification for usage control. SACMAT 2004: 1-10
127EEElisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu: Security for grid-based computing systems issues and challenges. SACMAT 2004: 125
126EEJaehong Park, Ravi S. Sandhu: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1): 128-174 (2004)
2003
125EEShouhuai Xu, Ravi S. Sandhu: Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. CT-RSA 2003: 355-372
124 Xinwen Zhang, Jaehong Park, Ravi S. Sandhu: Schema Based XML Security: RBAC Approach. DBSec 2003: 330-343
123EERavi S. Sandhu, Jaehong Park: Usage Control: A Vision for Next Generation Access Control. MMM-ACNS 2003: 17-31
122EEMohammad A. Al-Kahtani, Ravi S. Sandhu: Induced role hierarchies with attribute-based RBAC. SACMAT 2003: 142-148
121EEXinwen Zhang, Sejong Oh, Ravi S. Sandhu: PBDM: a flexible delegation model in RBAC. SACMAT 2003: 149-157
120EERavi S. Sandhu: IEEE Internet Computing: Security Track - Good Enough Security. IEEE Distributed Systems Online 4(1): (2003)
119EEDuncan A. Buell, Ravi S. Sandhu: IEEE Internet Computing: Guest Editors' Introduction - Identity Management. IEEE Distributed Systems Online 4(12): (2003)
118EERavi S. Sandhu: Good-Enough Security: Toward a Pragmatic Business-Driven Discipline. IEEE Internet Computing 7(1): 66-68 (2003)
117EEDuncan A. Buell, Ravi S. Sandhu: Guest Editors' Introduction: Identity Management. IEEE Internet Computing 7(6): 26-28 (2003)
2002
116EEMohammad A. Al-Kahtani, Ravi S. Sandhu: A Model for Attribute-Based User-Role Assignment. ACSAC 2002: 353-364
115EEJaehong Park, Ravi S. Sandhu: Originator Control in Usage Control. POLICY 2002: 60-66
114EEShouhuai Xu, Ravi S. Sandhu: Authenticated multicast immune to denial-of-service attack. SAC 2002: 196-200
113EESejong Oh, Ravi S. Sandhu: A model for role administration using organization structure. SACMAT 2002: 155-162
112EEJaehong Park, Ravi S. Sandhu: Towards usage control models: beyond traditional access control. SACMAT 2002: 57-64
111EERavi S. Sandhu: IEEE Internet Computing: Guest Editor's Introduction - The Technology of Trust. IEEE Distributed Systems Online 3(11): (2002)
110EERavi S. Sandhu: Guest Editor's Introduction: The Technology of Trust. IEEE Internet Computing 6(6): 28-29 (2002)
2001
109EEPete Epstein, Ravi S. Sandhu: Engineering of Role/Permission Assignments. ACSAC 2001: 127-136
108 Joon S. Park, Gail-Joon Ahn, Ravi S. Sandhu: Role-based Access Control on the Web Using LDAP. DBSec 2001: 19-30
107 Savith Kandala, Ravi S. Sandhu: Secure Role-Based Workflow Models. DBSec 2001: 45-58
106EERavi S. Sandhu: Future Directions in Role-Based Access Control Models. MMM-ACNS 2001: 22-26
105EERavi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr: Panel: The next generation of acess control models (panel session): do we need them and what should they be? SACMAT 2001: 53
104 Peter J. Denning, Ravi Athale, Nada Dabbagh, Daniel A. Menascé, Jeff Offutt, J. Mark Pullen, Steve Ruth, Ravi S. Sandhu: Designing an IT College. WCCE 2001: 541-550
103EEJoon S. Park, Ravi S. Sandhu, Gail-Joon Ahn: Role-based access control on the web. ACM Trans. Inf. Syst. Secur. 4(1): 37-71 (2001)
102EEDavid F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn, Ramaswamy Chandramouli: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3): 224-274 (2001)
101EEGail-Joon Ahn, Ravi S. Sandhu: Decentralized user group assignment in Windows NT. Journal of Systems and Software 56(1): 39-49 (2001)
2000
100EEGail-Joon Ahn, Ravi S. Sandhu, Myong H. Kang, Joon S. Park: Injecting RBAC to secure a Web-based workflow system. ACM Workshop on Role-Based Access Control 2000: 1-10
99EERavi S. Sandhu: Engineering authority and trust in cyberspace: the OM-AM and RBAC way. ACM Workshop on Role-Based Access Control 2000: 111-119
98EERavi S. Sandhu, David F. Ferraiolo, D. Richard Kuhn: The NIST model for role-based access control: towards a unified standard. ACM Workshop on Role-Based Access Control 2000: 47-63
97EEJoon S. Park, Ravi S. Sandhu: Binding Identities and Attributes using Digitally Signed Certificates. ACSAC 2000: 120-127
96EEEzedin Barka, Ravi S. Sandhu: Framework for Role-based Delegation Models. ACSAC 2000: 168-
95EEJaehong Park, Ravi S. Sandhu, J. Schifalacqua: Security Architectures for Controlled Digital Information Dissemination. ACSAC 2000: 224-
94EESylvia L. Osborn, Ravi S. Sandhu, Qamar Munawer: Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Secur. 3(2): 85-106 (2000)
93EEGail-Joon Ahn, Ravi S. Sandhu: Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3(4): 207-226 (2000)
92EEJoon S. Park, Ravi S. Sandhu: Secure Cookies on the Web. IEEE Internet Computing 4(4): 36-44 (2000)
91EELi Gong, Ravi S. Sandhu: Guest Editors' Introduction: What Makes Security Technologies Relevant? IEEE Internet Computing 4(6): 38-41 (2000)
1999
90EEJoon S. Park, Ravi S. Sandhu: RBAC on the Web by Smart Certificates. ACM Workshop on Role-Based Access Control 1999: 1-9
89EEPete Epstein, Ravi S. Sandhu: Towards a UML Based Approach to Role Engineering. ACM Workshop on Role-Based Access Control 1999: 135-143
88EEGail-Joon Ahn, Ravi S. Sandhu: The RSL99 Language for Role-Based Separation of Duty Constraints. ACM Workshop on Role-Based Access Control 1999: 43-54
87EERavi S. Sandhu, Qamar Munawer: The ARBAC99 Model for Administration of Roles. ACSAC 1999: 229-
86EEBlaine Burnham, Cynthia E. Irvine, Charles Reynolds, Ravi S. Sandhu, Rayford B. Vaughn: Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum). ACSAC 1999: 265-
85 Savith Kandala, Ravi S. Sandhu: Extending The BFA Workflow Authorization Model to Express Weighted Voting. DBSec 1999: 145-159
84 Joon S. Park, Ravi S. Sandhu, SreeLatha Ghanta: RBAC on the Web by Secure Cookies. DBSec 1999: 49-62
83EERavi S. Sandhu: Editorial. ACM Trans. Inf. Syst. Secur. 2(1): 1-2 (1999)
82EERavi S. Sandhu, Venkata Bhamidipati, Qamar Munawer: The ARBAC97 Model for Role-Based Administration of Roles. ACM Trans. Inf. Syst. Secur. 2(1): 105-135 (1999)
81 Ravi S. Sandhu, Venkata Bhamidipati: Role-based Administration of User-Role Assignment: The URA97 Model and its Oracle Implementation. Journal of Computer Security 7(4): (1999)
1998
80EERavi S. Sandhu, Joon S. Park: Decentralized User-role Assignment for Web-based Intranets. ACM Workshop on Role-Based Access Control 1998: 1-12
79EERavi S. Sandhu, Venkata Bhamidipati: An Oracle Implementation of the PRA97 Model for Permission-Role Assignment. ACM Workshop on Role-Based Access Control 1998: 13-21
78EERavi S. Sandhu: Role Activation Hierarchies. ACM Workshop on Role-Based Access Control 1998: 33-40
77EERavi S. Sandhu, Qamar Munawer: How to Do Discretionary Access Control Using Roles. ACM Workshop on Role-Based Access Control 1998: 47-54
76EERavi S. Sandhu, Qamar Munawer: The RRA97 Model for Role-Based Administration of Role Hierarchies. ACSAC 1998: 39-49
75EEP. C. Hyland, Ravi S. Sandhu: Concentric Supervision of Security Applications: A New Security Management Paradigm. ACSAC 1998: 59-
74EERavi S. Sandhu: Editorial. ACM Trans. Inf. Syst. Secur. 1(1): 1-2 (1998)
73EERavi S. Sandhu, Fang Chen: The Multilevel Relational (MLR) Data Model. ACM Trans. Inf. Syst. Secur. 1(1): 93-132 (1998)
72 Ravi S. Sandhu: Role-Based Access Control. Advances in Computers 46: 238-287 (1998)
1997
71 Pierangela Samarati, Ravi S. Sandhu: Database Security Volume X, Status and Prospects, IFIP TC11 / WG11.3 Tenth International Conference on Database Security, 22-24 July 1996, Como, Italy Chapman & Hall 1997
70EERavi S. Sandhu, Venkata Bhamidipati, Edward J. Coyne, Srinivas Ganta, Charles E. Youman: The ARBAC97 model for role-based administration of roles: preliminary description and outline. ACM Workshop on Role-Based Access Control 1997: 41-50
69EET. F. Himdi, Ravi S. Sandhu: Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System. ACSAC 1997: 164-174
68 Roshan K. Thomas, Ravi S. Sandhu: Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. DBSec 1997: 166-181
67 Ravi S. Sandhu, Venkata Bhamidipati: The URA97 Model for Role-Based User-Role Assignment. DBSec 1997: 262-275
66 P. C. Hyland, Ravi S. Sandhu: SNMP-based Network Security Management. Integrated Network Management 1997: 787-787
65 Ravi S. Sandhu, Pierangela Samarati: Authentication, Access Controls, and Intrusion Detection. The Computer Science and Engineering Handbook 1997: 1929-1948
1996
64 Ravi S. Sandhu: Access Control: The Neglected Frontier. ACISP 1996: 219-227
63 Ravi S. Sandhu, J. Campbell: Open Issues in Database Security. DBSec 1996: 169-173
62 Ravi S. Sandhu, LouAnna Notargiacomo, D. Thomas, Jesse C. Worthington: Implementation Experiences and Prospects. DBSec 1996: 261-271
61EERavi S. Sandhu: Role Hierarchies and Constraints for Lattice-Based Access Controls. ESORICS 1996: 65-79
60 Ravi S. Sandhu, Pierangela Samarati: Authetication, Access Control, and Audit. ACM Comput. Surv. 28(1): 241-243 (1996)
59 Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman: Role-Based Access Control Models. IEEE Computer 29(2): 38-47 (1996)
58EERoshan K. Thomas, Ravi S. Sandhu: A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases. IEEE Trans. Knowl. Data Eng. 8(1): 16-31 (1996)
57 Paul Ammann, Richard J. Lipton, Ravi S. Sandhu: The Expressive Power of Multi-parent Creation in Monotonic Access Control Models. Journal of Computer Security 4(2/3): 149-166 (1996)
1995
56EEFang Chen, Ravi S. Sandhu: Constraints for role-based access control. ACM Workshop on Role-Based Access Control 1995
55EERavi S. Sandhu: Issues in RBAC. ACM Workshop on Role-Based Access Control 1995
54EEJeremy Epstein, Ravi S. Sandhu: NetWare 4 as an example of role-based access control. ACM Workshop on Role-Based Access Control 1995
53EERavi S. Sandhu: Rationale for the RBAC96 family of access control models. ACM Workshop on Role-Based Access Control 1995
52EERavi S. Sandhu: Roles versus groups. ACM Workshop on Role-Based Access Control 1995
51EERavi S. Sandhu: Workshop summary. ACM Workshop on Role-Based Access Control 1995
50 Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting: Panel Discussion: Role-Based Access Control and Next-Generation Security Models. DBSec 1995: 289-298
1994
49 Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting: Security for Object-Oriented Systems, Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993 Springer 1994
48 Ravi S. Sandhu, Paul Ammann: One-Representative Safety Analysis in the Non-Monotonic Transform Model. CSFW 1994: 139-149
47 Ravi S. Sandhu, Roshan K. Thomas: Conceptual Foundations for a Model of Task-based Authorizations. CSFW 1994: 66-79
46EERavi S. Sandhu, Srinivas Ganta: On the Expressive Power of the Unary Transformation Model. ESORICS 1994: 301-318
45EERoshan K. Thomas, Ravi S. Sandhu: Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture. ESORICS 1994: 403-428
44 Ravi Ganesan, Ravi S. Sandhu: Securing Cyberspace - Introduction to the Special Section. Commun. ACM 37(11): 28-31 (1994)
43 Bhavani M. Thuraisingham, T. C. Ting, Peter J. Sell, Ravi S. Sandhu, Thomas F. Keefe: Integrating security technology and object-oriented technology (panel). OOPS Messenger 5(2): 59-61 (1994)
42 Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting: Security for object-oriented systems. OOPS Messenger 5(2): 77-78 (1994)
41 William R. Herndon, Ravi S. Sandhu, Steve Demurjian: The standards are coming! Standards for security in object-oriented systems. OOPS Messenger 5(4): 92-95 (1994)
1993
40 Ravi S. Sandhu, Srinivas Ganta: On Testing for Absence of Rights in Access Control Models. CSFW 1993: 109-118
39 Ravi S. Sandhu: On Five Definitions of Data Integrity. DBSec 1993: 257-267
38 Roshan K. Thomas, Ravi S. Sandhu: Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Transactions in Multilevel databases. DBSec 1993: 309-328
37 Ravi S. Sandhu: Security for OODBMS (Or Systems) - Panel. OOPSLA 1993: 307
36 Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting: Security for Object-Oriented Systems: An Editorial Overview. Security for Object-Oriented Systems 1993: 1-7
35 Roshan K. Thomas, Ravi S. Sandhu: Concurrency, Synchronization, and Scheduling to Support High-Assurance Write-Up in Multilevel Object-Based Computing. Security for Object-Oriented Systems 1993: 218-228
34EERavi S. Sandhu, Gurpreet S. Suri: A distributed capability-based architecture for the transform model. Computers & Security 12(3): 285-303 (1993)
33 Ravi S. Sandhu: Lattice-Based Access Control Models. IEEE Computer 26(11): 9-19 (1993)
32 Roshan K. Thomas, Ravi S. Sandhu: A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up. Journal of Computer Security 2(2-3): 231-275 (1993)
1992
31 Paul Ammann, Richard J. Lipton, Ravi S. Sandhu: The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model. CSFW 1992: 148-156
30 Roshan K. Thomas, Ravi S. Sandhu: Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects. DBSec 1992: 15-34
29EERavi S. Sandhu, Sushil Jajodia: Polyinstantation for Cover Stories. ESORICS 1992: 307-328
28EERavi S. Sandhu, Sushil Jajodia: Eliminating polyinstantiation securely. Computers & Security 11(6): 547-562 (1992)
27EERavi S. Sandhu: Lattice-based enforcement of Chinese Walls. Computers & Security 11(8): 753-763 (1992)
26 Ravi S. Sandhu: Undecidability of Safety for the Schematic Protection Model with Cyclic Creates. J. Comput. Syst. Sci. 44(1): 141-159 (1992)
25 Ravi S. Sandhu: Expressive Power of the Schematic Protection Model. Journal of Computer Security 1(1): 59-98 (1992)
24 Paul Ammann, Ravi S. Sandhu: The Extended Schematic Protection Model Journal of Computer Security 1(3-4): 335-384 (1992)
1991
23 Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia: A Secure Kernelized Architecture for Multiple Object-Oriented Databases. CSFW 1991: 139-152
22 Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia: Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases. DBSec 1991: 297-314
21 Sushil Jajodia, Ravi S. Sandhu: A Novel Decomposition of Multilevel Relations into Single-Level Relations. IEEE Symposium on Security and Privacy 1991: 300-315
20 Paul Ammann, Ravi S. Sandhu: Safety Analysis for the Extended Schematic Protection Model. IEEE Symposium on Security and Privacy 1991: 87-97
19EESushil Jajodia, Ravi S. Sandhu: Towards a Multilevel Secure Relational Data Model. SIGMOD Conference 1991: 50-59
18EERavi S. Sandhu, Sushil Jajodia: Integrity principles and mechanisms in database management systems. Computers & Security 10(5): 413-427 (1991)
1990
17 Sushil Jajodia, Ravi S. Sandhu: A Formal Framework for Single Level Decomposition of Multilevel Relations. CSFW 1990: 152-158
16 Ravi S. Sandhu, Sushil Jajodia, Teresa F. Lunt: A New Polyinstantiation Integrity Constraint for Multilevel Relations. CSFW 1990: 159-165
15 Ravi S. Sandhu: Separation of Duties in Computerized Information Systems. DBSec 1990: 179-190
14 Sushil Jajodia, Ravi S. Sandhu: Polyinstantiation Integrity in Multilevel Relations Revisited. DBSec 1990: 297-308
13 Sushil Jajodia, Ravi S. Sandhu: Polyinstantiation Integrity in Multilevel Relations. IEEE Symposium on Security and Privacy 1990: 104-115
12EESushil Jajodia, Ravi S. Sandhu: Database Security: Current Status and Key Issues. SIGMOD Record 19(4): 123-126 (1990)
1989
11 Ravi S. Sandhu: Mandatory Controls for Database Integrity. DBSec 1989: 143-150
10 Ravi S. Sandhu: Discussion Summary. DBSec 1989: 353-365
9 Ravi S. Sandhu: Transformation of Access Rights. IEEE Symposium on Security and Privacy 1989: 259-268
8EERavi S. Sandhu: Recognizing Immediacy in an N-Tree Hierarchy and Its Application to Protection Groups. IEEE Trans. Software Eng. 15(12): 1518-1525 (1989)
7 Ravi S. Sandhu: The Reflected Tree Hierarchy for Protection and Sharing. Inf. Process. Lett. 30(1): 21-26 (1989)
6 Ravi S. Sandhu: The Demand Operation in the Schematic Protection Model. Inf. Process. Lett. 32(4): 213-219 (1989)
1988
5 Ravi S. Sandhu: Expressive Power of the Schematic Protection Model. CSFW 1988: 188-193
4EERavi S. Sandhu: The NTree: A Two Dimension Partial Order for Protection Groups. ACM Trans. Comput. Syst. 6(2): 197-222 (1988)
3 Ravi S. Sandhu: Cryptographic Implementation of a Tree Hierarchy for Access Control. Inf. Process. Lett. 27(2): 95-98 (1988)
2EERavi S. Sandhu: The schematic protection model: its definition and analysis for acyclic attenuating schemes. J. ACM 35(2): 404-432 (1988)
1986
1 Ravi S. Sandhu, M. E. Share: Some Owner Based Schemes with Dynamic Groups in the Schematic Protection Model. IEEE Symposium on Security and Privacy 1986: 61-70

Coauthor Index

1Gail-Joon Ahn [88] [93] [100] [101] [103] [108]
2Mohammad A. Al-Kahtani [116] [122] [134]
3Paul Ammann [20] [24] [31] [48] [57]
4Ravi Athale [104]
5Ezedin Barka [96] [135] [152]
6Elisa Bertino [50] [105] [127] [136] [142] [162]
7Venkata Bhamidipati [67] [70] [79] [81] [82]
8Hans Hermann Brüggemann [50]
9Duncan A. Buell [117] [119]
10Blaine Burnham [86]
11J. Campbell [63]
12Ramaswamy Chandramouli [102]
13Fang Chen [56] [73]
14Songqing Chen [137] [155]
15Michael J. Covington [141] [144] [155] [156]
16Edward J. Coyne [59] [70]
17Bruno Crispo [127]
18Nada Dabbagh [104]
19Steve Demurjian [41]
20Peter J. Denning [104]
21Wengliang (Kevin) Du [127]
22Jeremy Epstein [54]
23Pete Epstein [89] [109]
24Hal L. Feinstein [59]
25David F. Ferraiolo [98] [102] [149]
26Timothy W. Finin (Tim Finin) [158]
27Ravi Ganesan [44]
28Srinivas Ganta [40] [46] [70]
29Serban I. Gavrila [102]
30SreeLatha Ghanta [84]
31Li Gong [91]
32Dimitrios Gunopulos [160]
33Weili Han [162]
34Bret Hartman [50]
35William R. Herndon [41]
36T. F. Himdi [69]
37P. C. Hyland [66] [75]
38Cynthia E. Irvine [86]
39Trent Jaeger [105]
40Sushil Jajodia [12] [13] [14] [16] [17] [18] [19] [21] [22] [23] [28] [29]
41Xuxian Jiang [150]
42Anupam Joshi [158]
43James Joshi [127]
44Lalana Kagal [158]
45Vana Kalogeraki [160]
46Savith Kandala [85] [107]
47Myong H. Kang [100]
48Thomas F. Keefe [43]
49L. R. Khan [142]
50Ram Krishnan [151] [161] [163] [164]
51D. Richard Kuhn [98] [102] [105] [149]
52Carl E. Landwehr [105]
53Richard J. Lipton [31] [57]
54Teresa F. Lunt [16]
55Daniel A. Menascé [104]
56Qamar Munawer [76] [77] [82] [87] [94]
57Masayuki Nakae [144] [146] [156]
58William Robert Nelson Jr. [131]
59Qun Ni [162]
60Jianwei Niu [158] [161] [163] [164]
61LouAnna Notargiacomo [62]
62A. Jefferson Offutt (Jeff Offutt) [104]
63Sejong Oh [113] [121] [143]
64Sylvia L. Osborn [94]
65Francesco Parisi-Presicce [128] [138] [145] [147]
66Jaehong Park [95] [112] [115] [123] [124] [126] [128] [133] [138]
67Jong Hyuk Park [159]
68Joon S. Park [80] [84] [90] [92] [97] [100] [103] [108]
69Bart Preneel [159]
70J. Mark Pullen [104]
71Xiaolin Qin [153]
72Kumar Ranganathan [141] [148] [151]
73Charles Reynolds [86]
74Steve Ruth [104]
75Pierangela Samarati [50] [60] [65] [71]
76J. Schifalacqua [95]
77Jean-Pierre Seifert [157]
78Peter J. Sell [43]
79M. E. Share [1]
80Gurpreet S. Suri [34]
81D. Thomas [62]
82Roshan K. Thomas [22] [23] [30] [32] [35] [38] [45] [47] [50] [58] [68] [129] [130]
83Bhavani M. Thuraisingham [36] [42] [43] [49] [142] [158] [160]
84T. C. Ting [36] [42] [43] [49] [50]
85Rayford B. Vaughn [86]
86William H. Winsborough [158] [161] [163] [164]
87Jesse C. Worthington [62]
88Min Xu [150]
89Shouhuai Xu [114] [125] [131] [154] [162]
90Charles E. Youman [59] [70]
91Xinwen Zhang [121] [124] [128] [133] [137] [138] [140] [141] [143] [144] [145] [146] [147] [148] [150] [153] [155] [156] [157]
92Baoxian Zhao [153]
93André Zúquete (Andre Zuquete) [159]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)