2009 | ||
---|---|---|
168 | Justin Leonard, Shouhuai Xu, Ravi S. Sandhu: A First Step towards Characterizing Stealthy Botnets. ARES 2009: 106-113 | |
167 | Justin Leonard, Shouhuai Xu, Ravi S. Sandhu: A Framework for Understanding Botnets. ARES 2009: 917-922 | |
166 | Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough: A conceptual framework for Group-Centric secure information sharing. ASIACCS 2009: 384-387 | |
165 | Ram Krishnan, Ravi S. Sandhu: A Hybrid Enforcement Model for Group-centric Secure Information Sharing. CSE (3) 2009: 189-194 | |
164 | Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough: Foundations for group-centric secure information sharing models. SACMAT 2009: 115-124 | |
163 | Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu, Weili Han: An Access Control Language for a General Provenance Model. Secure Data Management 2009: 68-88 | |
2008 | ||
162 | Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough: Stale-safe security properties for group-based secure information sharing. FMSE 2008: 53-62 | |
161 | Roshan K. Thomas, Ravi S. Sandhu, Elisa Bertino, Budak Arpinar, Shouhuai Xu: Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). ISIPS 2008: 115-121 | |
160 | Vana Kalogeraki, Dimitrios Gunopulos, Ravi S. Sandhu, Bhavani M. Thuraisingham: QoS Aware Dependable Distributed Stream Processing. ISORC 2008: 69-75 | |
159 | Jong Hyuk Park, Bart Preneel, Ravi S. Sandhu, André Zúquete: IS 2008 PC Co-chairs' Message. OTM Conferences (2) 2008: 937 | |
158 | Timothy W. Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough, Bhavani M. Thuraisingham: ROWLBAC: representing role based access control in OWL. SACMAT 2008: 73-82 | |
157 | Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu: Security Enforcement Model for Distributed Usage Control. SUTC 2008: 10-18 | |
156 | Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu: Toward a Usage-Based Security Framework for Collaborative Computing Systems. ACM Trans. Inf. Syst. Secur. 11(1): (2008) | |
2007 | ||
155 | Xinwen Zhang, Michael J. Covington, Songqing Chen, Ravi S. Sandhu: SecureBus: towards application-transparent trusted computing with mandatory access control. ASIACCS 2007: 117-126 | |
154 | Shouhuai Xu, Ravi S. Sandhu: A Scalable and Secure Cryptographic Service. DBSec 2007: 144-160 | |
153 | Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin: Towards a Times-Based Usage Control Model. DBSec 2007: 227-242 | |
152 | Ezedin Barka, Ravi S. Sandhu: Framework for Agent-Based Role Delegation. ICC 2007: 1361-1367 | |
151 | Ram Krishnan, Ravi S. Sandhu, Kumar Ranganathan: PEI models towards scalable, usable and high-assurance information sharing. SACMAT 2007: 145-150 | |
150 | Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang: Towards a VMM-based usage control framework for OS kernel integrity protection. SACMAT 2007: 71-80 | |
149 | David F. Ferraiolo, D. Richard Kuhn, Ravi S. Sandhu: RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control". IEEE Security & Privacy 5(6): 51-53 (2007) | |
2006 | ||
148 | Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang: Secure information sharing enabled by Trusted Computing and PEI models. ASIACCS 2006: 2-12 | |
147 | Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Presicce: Safety analysis of usage control authorization models. ASIACCS 2006: 243-254 | |
146 | Masayuki Nakae, Xinwen Zhang, Ravi S. Sandhu: A general design towards secure ad-hoc collaboration. ASIACCS 2006: 358 | |
145 | Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu: Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing. IWSEC 2006: 179-195 | |
144 | Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu: A usage-based authorization framework for collaborative computing systems. SACMAT 2006: 180-189 | |
143 | Sejong Oh, Ravi S. Sandhu, Xinwen Zhang: An effective role administration model using organization structure. ACM Trans. Inf. Syst. Secur. 9(2): 113-137 (2006) | |
142 | Elisa Bertino, L. R. Khan, Ravi S. Sandhu, Bhavani M. Thuraisingham: Secure knowledge management: confidentiality, trust, and privacy. IEEE Transactions on Systems, Man, and Cybernetics, Part A 36(3): 429-438 (2006) | |
141 | Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, Michael J. Covington: Client-side access control enforcement using trusted computing and PEI models. J. High Speed Networks 15(3): 229-245 (2006) | |
2005 | ||
140 | Ravi S. Sandhu, Xinwen Zhang: Peer-to-peer access control architecture using trusted computing technology. SACMAT 2005: 147-158 | |
139 | Ravi S. Sandhu: Editorial. ACM Trans. Inf. Syst. Secur. 8(1): 1 (2005) | |
138 | Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu, Jaehong Park: Formal model and policy specification of usage control. ACM Trans. Inf. Syst. Secur. 8(4): 351-387 (2005) | |
137 | Xinwen Zhang, Songqing Chen, Ravi S. Sandhu: Enhancing Data Authenticity and Integrity in P2P Systems. IEEE Internet Computing 9(6): 42-49 (2005) | |
136 | Elisa Bertino, Ravi S. Sandhu: Database Security-Concepts, Approaches, and Challenges. IEEE Trans. Dependable Sec. Comput. 2(1): 2-19 (2005) | |
2004 | ||
135 | Ezedin Barka, Ravi S. Sandhu: Role-Based Delegation Model/ Hierarchical Roles (RBDM1). ACSAC 2004: 396-404 | |
134 | Mohammad A. Al-Kahtani, Ravi S. Sandhu: Mohammad A. Al-Kahtani, Ravi Sandhu. ACSAC 2004: 405-415 | |
133 | Jaehong Park, Xinwen Zhang, Ravi S. Sandhu: Attribute Mutability in Usage Control. DBSec 2004: 15-29 | |
132 | Ravi S. Sandhu: A Perspective on Graphs and Access Control Models. ICGT 2004: 2-12 | |
131 | Shouhuai Xu, William Robert Nelson Jr., Ravi S. Sandhu: Enhancing Anonymity via Market Competition. ITCC (1) 2004: 30-34 | |
130 | Roshan K. Thomas, Ravi S. Sandhu: Towards a Multi-dimensional Characterization of Dissemination Control. POLICY 2004: 197-200 | |
129 | Roshan K. Thomas, Ravi S. Sandhu: Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions. PerCom Workshops 2004: 164-170 | |
128 | Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi S. Sandhu: A logical specification for usage control. SACMAT 2004: 1-10 | |
127 | Elisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu: Security for grid-based computing systems issues and challenges. SACMAT 2004: 125 | |
126 | Jaehong Park, Ravi S. Sandhu: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1): 128-174 (2004) | |
2003 | ||
125 | Shouhuai Xu, Ravi S. Sandhu: Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. CT-RSA 2003: 355-372 | |
124 | Xinwen Zhang, Jaehong Park, Ravi S. Sandhu: Schema Based XML Security: RBAC Approach. DBSec 2003: 330-343 | |
123 | Ravi S. Sandhu, Jaehong Park: Usage Control: A Vision for Next Generation Access Control. MMM-ACNS 2003: 17-31 | |
122 | Mohammad A. Al-Kahtani, Ravi S. Sandhu: Induced role hierarchies with attribute-based RBAC. SACMAT 2003: 142-148 | |
121 | Xinwen Zhang, Sejong Oh, Ravi S. Sandhu: PBDM: a flexible delegation model in RBAC. SACMAT 2003: 149-157 | |
120 | Ravi S. Sandhu: IEEE Internet Computing: Security Track - Good Enough Security. IEEE Distributed Systems Online 4(1): (2003) | |
119 | Duncan A. Buell, Ravi S. Sandhu: IEEE Internet Computing: Guest Editors' Introduction - Identity Management. IEEE Distributed Systems Online 4(12): (2003) | |
118 | Ravi S. Sandhu: Good-Enough Security: Toward a Pragmatic Business-Driven Discipline. IEEE Internet Computing 7(1): 66-68 (2003) | |
117 | Duncan A. Buell, Ravi S. Sandhu: Guest Editors' Introduction: Identity Management. IEEE Internet Computing 7(6): 26-28 (2003) | |
2002 | ||
116 | Mohammad A. Al-Kahtani, Ravi S. Sandhu: A Model for Attribute-Based User-Role Assignment. ACSAC 2002: 353-364 | |
115 | Jaehong Park, Ravi S. Sandhu: Originator Control in Usage Control. POLICY 2002: 60-66 | |
114 | Shouhuai Xu, Ravi S. Sandhu: Authenticated multicast immune to denial-of-service attack. SAC 2002: 196-200 | |
113 | Sejong Oh, Ravi S. Sandhu: A model for role administration using organization structure. SACMAT 2002: 155-162 | |
112 | Jaehong Park, Ravi S. Sandhu: Towards usage control models: beyond traditional access control. SACMAT 2002: 57-64 | |
111 | Ravi S. Sandhu: IEEE Internet Computing: Guest Editor's Introduction - The Technology of Trust. IEEE Distributed Systems Online 3(11): (2002) | |
110 | Ravi S. Sandhu: Guest Editor's Introduction: The Technology of Trust. IEEE Internet Computing 6(6): 28-29 (2002) | |
2001 | ||
109 | Pete Epstein, Ravi S. Sandhu: Engineering of Role/Permission Assignments. ACSAC 2001: 127-136 | |
108 | Joon S. Park, Gail-Joon Ahn, Ravi S. Sandhu: Role-based Access Control on the Web Using LDAP. DBSec 2001: 19-30 | |
107 | Savith Kandala, Ravi S. Sandhu: Secure Role-Based Workflow Models. DBSec 2001: 45-58 | |
106 | Ravi S. Sandhu: Future Directions in Role-Based Access Control Models. MMM-ACNS 2001: 22-26 | |
105 | Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr: Panel: The next generation of acess control models (panel session): do we need them and what should they be? SACMAT 2001: 53 | |
104 | Peter J. Denning, Ravi Athale, Nada Dabbagh, Daniel A. Menascé, Jeff Offutt, J. Mark Pullen, Steve Ruth, Ravi S. Sandhu: Designing an IT College. WCCE 2001: 541-550 | |
103 | Joon S. Park, Ravi S. Sandhu, Gail-Joon Ahn: Role-based access control on the web. ACM Trans. Inf. Syst. Secur. 4(1): 37-71 (2001) | |
102 | David F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn, Ramaswamy Chandramouli: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3): 224-274 (2001) | |
101 | Gail-Joon Ahn, Ravi S. Sandhu: Decentralized user group assignment in Windows NT. Journal of Systems and Software 56(1): 39-49 (2001) | |
2000 | ||
100 | Gail-Joon Ahn, Ravi S. Sandhu, Myong H. Kang, Joon S. Park: Injecting RBAC to secure a Web-based workflow system. ACM Workshop on Role-Based Access Control 2000: 1-10 | |
99 | Ravi S. Sandhu: Engineering authority and trust in cyberspace: the OM-AM and RBAC way. ACM Workshop on Role-Based Access Control 2000: 111-119 | |
98 | Ravi S. Sandhu, David F. Ferraiolo, D. Richard Kuhn: The NIST model for role-based access control: towards a unified standard. ACM Workshop on Role-Based Access Control 2000: 47-63 | |
97 | Joon S. Park, Ravi S. Sandhu: Binding Identities and Attributes using Digitally Signed Certificates. ACSAC 2000: 120-127 | |
96 | Ezedin Barka, Ravi S. Sandhu: Framework for Role-based Delegation Models. ACSAC 2000: 168- | |
95 | Jaehong Park, Ravi S. Sandhu, J. Schifalacqua: Security Architectures for Controlled Digital Information Dissemination. ACSAC 2000: 224- | |
94 | Sylvia L. Osborn, Ravi S. Sandhu, Qamar Munawer: Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Secur. 3(2): 85-106 (2000) | |
93 | Gail-Joon Ahn, Ravi S. Sandhu: Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3(4): 207-226 (2000) | |
92 | Joon S. Park, Ravi S. Sandhu: Secure Cookies on the Web. IEEE Internet Computing 4(4): 36-44 (2000) | |
91 | Li Gong, Ravi S. Sandhu: Guest Editors' Introduction: What Makes Security Technologies Relevant? IEEE Internet Computing 4(6): 38-41 (2000) | |
1999 | ||
90 | Joon S. Park, Ravi S. Sandhu: RBAC on the Web by Smart Certificates. ACM Workshop on Role-Based Access Control 1999: 1-9 | |
89 | Pete Epstein, Ravi S. Sandhu: Towards a UML Based Approach to Role Engineering. ACM Workshop on Role-Based Access Control 1999: 135-143 | |
88 | Gail-Joon Ahn, Ravi S. Sandhu: The RSL99 Language for Role-Based Separation of Duty Constraints. ACM Workshop on Role-Based Access Control 1999: 43-54 | |
87 | Ravi S. Sandhu, Qamar Munawer: The ARBAC99 Model for Administration of Roles. ACSAC 1999: 229- | |
86 | Blaine Burnham, Cynthia E. Irvine, Charles Reynolds, Ravi S. Sandhu, Rayford B. Vaughn: Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum). ACSAC 1999: 265- | |
85 | Savith Kandala, Ravi S. Sandhu: Extending The BFA Workflow Authorization Model to Express Weighted Voting. DBSec 1999: 145-159 | |
84 | Joon S. Park, Ravi S. Sandhu, SreeLatha Ghanta: RBAC on the Web by Secure Cookies. DBSec 1999: 49-62 | |
83 | Ravi S. Sandhu: Editorial. ACM Trans. Inf. Syst. Secur. 2(1): 1-2 (1999) | |
82 | Ravi S. Sandhu, Venkata Bhamidipati, Qamar Munawer: The ARBAC97 Model for Role-Based Administration of Roles. ACM Trans. Inf. Syst. Secur. 2(1): 105-135 (1999) | |
81 | Ravi S. Sandhu, Venkata Bhamidipati: Role-based Administration of User-Role Assignment: The URA97 Model and its Oracle Implementation. Journal of Computer Security 7(4): (1999) | |
1998 | ||
80 | Ravi S. Sandhu, Joon S. Park: Decentralized User-role Assignment for Web-based Intranets. ACM Workshop on Role-Based Access Control 1998: 1-12 | |
79 | Ravi S. Sandhu, Venkata Bhamidipati: An Oracle Implementation of the PRA97 Model for Permission-Role Assignment. ACM Workshop on Role-Based Access Control 1998: 13-21 | |
78 | Ravi S. Sandhu: Role Activation Hierarchies. ACM Workshop on Role-Based Access Control 1998: 33-40 | |
77 | Ravi S. Sandhu, Qamar Munawer: How to Do Discretionary Access Control Using Roles. ACM Workshop on Role-Based Access Control 1998: 47-54 | |
76 | Ravi S. Sandhu, Qamar Munawer: The RRA97 Model for Role-Based Administration of Role Hierarchies. ACSAC 1998: 39-49 | |
75 | P. C. Hyland, Ravi S. Sandhu: Concentric Supervision of Security Applications: A New Security Management Paradigm. ACSAC 1998: 59- | |
74 | Ravi S. Sandhu: Editorial. ACM Trans. Inf. Syst. Secur. 1(1): 1-2 (1998) | |
73 | Ravi S. Sandhu, Fang Chen: The Multilevel Relational (MLR) Data Model. ACM Trans. Inf. Syst. Secur. 1(1): 93-132 (1998) | |
72 | Ravi S. Sandhu: Role-Based Access Control. Advances in Computers 46: 238-287 (1998) | |
1997 | ||
71 | Pierangela Samarati, Ravi S. Sandhu: Database Security Volume X, Status and Prospects, IFIP TC11 / WG11.3 Tenth International Conference on Database Security, 22-24 July 1996, Como, Italy Chapman & Hall 1997 | |
70 | Ravi S. Sandhu, Venkata Bhamidipati, Edward J. Coyne, Srinivas Ganta, Charles E. Youman: The ARBAC97 model for role-based administration of roles: preliminary description and outline. ACM Workshop on Role-Based Access Control 1997: 41-50 | |
69 | T. F. Himdi, Ravi S. Sandhu: Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System. ACSAC 1997: 164-174 | |
68 | Roshan K. Thomas, Ravi S. Sandhu: Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. DBSec 1997: 166-181 | |
67 | Ravi S. Sandhu, Venkata Bhamidipati: The URA97 Model for Role-Based User-Role Assignment. DBSec 1997: 262-275 | |
66 | P. C. Hyland, Ravi S. Sandhu: SNMP-based Network Security Management. Integrated Network Management 1997: 787-787 | |
65 | Ravi S. Sandhu, Pierangela Samarati: Authentication, Access Controls, and Intrusion Detection. The Computer Science and Engineering Handbook 1997: 1929-1948 | |
1996 | ||
64 | Ravi S. Sandhu: Access Control: The Neglected Frontier. ACISP 1996: 219-227 | |
63 | Ravi S. Sandhu, J. Campbell: Open Issues in Database Security. DBSec 1996: 169-173 | |
62 | Ravi S. Sandhu, LouAnna Notargiacomo, D. Thomas, Jesse C. Worthington: Implementation Experiences and Prospects. DBSec 1996: 261-271 | |
61 | Ravi S. Sandhu: Role Hierarchies and Constraints for Lattice-Based Access Controls. ESORICS 1996: 65-79 | |
60 | Ravi S. Sandhu, Pierangela Samarati: Authetication, Access Control, and Audit. ACM Comput. Surv. 28(1): 241-243 (1996) | |
59 | Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman: Role-Based Access Control Models. IEEE Computer 29(2): 38-47 (1996) | |
58 | Roshan K. Thomas, Ravi S. Sandhu: A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases. IEEE Trans. Knowl. Data Eng. 8(1): 16-31 (1996) | |
57 | Paul Ammann, Richard J. Lipton, Ravi S. Sandhu: The Expressive Power of Multi-parent Creation in Monotonic Access Control Models. Journal of Computer Security 4(2/3): 149-166 (1996) | |
1995 | ||
56 | Fang Chen, Ravi S. Sandhu: Constraints for role-based access control. ACM Workshop on Role-Based Access Control 1995 | |
55 | Ravi S. Sandhu: Issues in RBAC. ACM Workshop on Role-Based Access Control 1995 | |
54 | Jeremy Epstein, Ravi S. Sandhu: NetWare 4 as an example of role-based access control. ACM Workshop on Role-Based Access Control 1995 | |
53 | Ravi S. Sandhu: Rationale for the RBAC96 family of access control models. ACM Workshop on Role-Based Access Control 1995 | |
52 | Ravi S. Sandhu: Roles versus groups. ACM Workshop on Role-Based Access Control 1995 | |
51 | Ravi S. Sandhu: Workshop summary. ACM Workshop on Role-Based Access Control 1995 | |
50 | Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting: Panel Discussion: Role-Based Access Control and Next-Generation Security Models. DBSec 1995: 289-298 | |
1994 | ||
49 | Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting: Security for Object-Oriented Systems, Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993 Springer 1994 | |
48 | Ravi S. Sandhu, Paul Ammann: One-Representative Safety Analysis in the Non-Monotonic Transform Model. CSFW 1994: 139-149 | |
47 | Ravi S. Sandhu, Roshan K. Thomas: Conceptual Foundations for a Model of Task-based Authorizations. CSFW 1994: 66-79 | |
46 | Ravi S. Sandhu, Srinivas Ganta: On the Expressive Power of the Unary Transformation Model. ESORICS 1994: 301-318 | |
45 | Roshan K. Thomas, Ravi S. Sandhu: Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture. ESORICS 1994: 403-428 | |
44 | Ravi Ganesan, Ravi S. Sandhu: Securing Cyberspace - Introduction to the Special Section. Commun. ACM 37(11): 28-31 (1994) | |
43 | Bhavani M. Thuraisingham, T. C. Ting, Peter J. Sell, Ravi S. Sandhu, Thomas F. Keefe: Integrating security technology and object-oriented technology (panel). OOPS Messenger 5(2): 59-61 (1994) | |
42 | Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting: Security for object-oriented systems. OOPS Messenger 5(2): 77-78 (1994) | |
41 | William R. Herndon, Ravi S. Sandhu, Steve Demurjian: The standards are coming! Standards for security in object-oriented systems. OOPS Messenger 5(4): 92-95 (1994) | |
1993 | ||
40 | Ravi S. Sandhu, Srinivas Ganta: On Testing for Absence of Rights in Access Control Models. CSFW 1993: 109-118 | |
39 | Ravi S. Sandhu: On Five Definitions of Data Integrity. DBSec 1993: 257-267 | |
38 | Roshan K. Thomas, Ravi S. Sandhu: Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Transactions in Multilevel databases. DBSec 1993: 309-328 | |
37 | Ravi S. Sandhu: Security for OODBMS (Or Systems) - Panel. OOPSLA 1993: 307 | |
36 | Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting: Security for Object-Oriented Systems: An Editorial Overview. Security for Object-Oriented Systems 1993: 1-7 | |
35 | Roshan K. Thomas, Ravi S. Sandhu: Concurrency, Synchronization, and Scheduling to Support High-Assurance Write-Up in Multilevel Object-Based Computing. Security for Object-Oriented Systems 1993: 218-228 | |
34 | Ravi S. Sandhu, Gurpreet S. Suri: A distributed capability-based architecture for the transform model. Computers & Security 12(3): 285-303 (1993) | |
33 | Ravi S. Sandhu: Lattice-Based Access Control Models. IEEE Computer 26(11): 9-19 (1993) | |
32 | Roshan K. Thomas, Ravi S. Sandhu: A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up. Journal of Computer Security 2(2-3): 231-275 (1993) | |
1992 | ||
31 | Paul Ammann, Richard J. Lipton, Ravi S. Sandhu: The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model. CSFW 1992: 148-156 | |
30 | Roshan K. Thomas, Ravi S. Sandhu: Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects. DBSec 1992: 15-34 | |
29 | Ravi S. Sandhu, Sushil Jajodia: Polyinstantation for Cover Stories. ESORICS 1992: 307-328 | |
28 | Ravi S. Sandhu, Sushil Jajodia: Eliminating polyinstantiation securely. Computers & Security 11(6): 547-562 (1992) | |
27 | Ravi S. Sandhu: Lattice-based enforcement of Chinese Walls. Computers & Security 11(8): 753-763 (1992) | |
26 | Ravi S. Sandhu: Undecidability of Safety for the Schematic Protection Model with Cyclic Creates. J. Comput. Syst. Sci. 44(1): 141-159 (1992) | |
25 | Ravi S. Sandhu: Expressive Power of the Schematic Protection Model. Journal of Computer Security 1(1): 59-98 (1992) | |
24 | Paul Ammann, Ravi S. Sandhu: The Extended Schematic Protection Model Journal of Computer Security 1(3-4): 335-384 (1992) | |
1991 | ||
23 | Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia: A Secure Kernelized Architecture for Multiple Object-Oriented Databases. CSFW 1991: 139-152 | |
22 | Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia: Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases. DBSec 1991: 297-314 | |
21 | Sushil Jajodia, Ravi S. Sandhu: A Novel Decomposition of Multilevel Relations into Single-Level Relations. IEEE Symposium on Security and Privacy 1991: 300-315 | |
20 | Paul Ammann, Ravi S. Sandhu: Safety Analysis for the Extended Schematic Protection Model. IEEE Symposium on Security and Privacy 1991: 87-97 | |
19 | Sushil Jajodia, Ravi S. Sandhu: Towards a Multilevel Secure Relational Data Model. SIGMOD Conference 1991: 50-59 | |
18 | Ravi S. Sandhu, Sushil Jajodia: Integrity principles and mechanisms in database management systems. Computers & Security 10(5): 413-427 (1991) | |
1990 | ||
17 | Sushil Jajodia, Ravi S. Sandhu: A Formal Framework for Single Level Decomposition of Multilevel Relations. CSFW 1990: 152-158 | |
16 | Ravi S. Sandhu, Sushil Jajodia, Teresa F. Lunt: A New Polyinstantiation Integrity Constraint for Multilevel Relations. CSFW 1990: 159-165 | |
15 | Ravi S. Sandhu: Separation of Duties in Computerized Information Systems. DBSec 1990: 179-190 | |
14 | Sushil Jajodia, Ravi S. Sandhu: Polyinstantiation Integrity in Multilevel Relations Revisited. DBSec 1990: 297-308 | |
13 | Sushil Jajodia, Ravi S. Sandhu: Polyinstantiation Integrity in Multilevel Relations. IEEE Symposium on Security and Privacy 1990: 104-115 | |
12 | Sushil Jajodia, Ravi S. Sandhu: Database Security: Current Status and Key Issues. SIGMOD Record 19(4): 123-126 (1990) | |
1989 | ||
11 | Ravi S. Sandhu: Mandatory Controls for Database Integrity. DBSec 1989: 143-150 | |
10 | Ravi S. Sandhu: Discussion Summary. DBSec 1989: 353-365 | |
9 | Ravi S. Sandhu: Transformation of Access Rights. IEEE Symposium on Security and Privacy 1989: 259-268 | |
8 | Ravi S. Sandhu: Recognizing Immediacy in an N-Tree Hierarchy and Its Application to Protection Groups. IEEE Trans. Software Eng. 15(12): 1518-1525 (1989) | |
7 | Ravi S. Sandhu: The Reflected Tree Hierarchy for Protection and Sharing. Inf. Process. Lett. 30(1): 21-26 (1989) | |
6 | Ravi S. Sandhu: The Demand Operation in the Schematic Protection Model. Inf. Process. Lett. 32(4): 213-219 (1989) | |
1988 | ||
5 | Ravi S. Sandhu: Expressive Power of the Schematic Protection Model. CSFW 1988: 188-193 | |
4 | Ravi S. Sandhu: The NTree: A Two Dimension Partial Order for Protection Groups. ACM Trans. Comput. Syst. 6(2): 197-222 (1988) | |
3 | Ravi S. Sandhu: Cryptographic Implementation of a Tree Hierarchy for Access Control. Inf. Process. Lett. 27(2): 95-98 (1988) | |
2 | Ravi S. Sandhu: The schematic protection model: its definition and analysis for acyclic attenuating schemes. J. ACM 35(2): 404-432 (1988) | |
1986 | ||
1 | Ravi S. Sandhu, M. E. Share: Some Owner Based Schemes with Dynamic Groups in the Schematic Protection Model. IEEE Symposium on Security and Privacy 1986: 61-70 |