Year |
Citation |
Score |
2020 |
Gupta M, Awaysheh FM, Benson J, Azab MA, Patwa F, Sandhu R. An Attribute-Based Access Control for Cloud-Enabled Industrial Smart Vehicles Ieee Transactions On Industrial Informatics. 1-1. DOI: 10.1109/Tii.2020.3022759 |
0.398 |
|
2017 |
Li Q, Sandhu R, Zhang X, Xu M. Mandatory Content Access Control for Privacy Protection in Information Centric Networks Ieee Transactions On Dependable and Secure Computing. 14: 494-506. DOI: 10.1109/Tdsc.2015.2494049 |
0.557 |
|
2016 |
Rajkumar PV, Sandhu R. Safety Decidability for Pre-Authorization Usage Control with Finite Attribute Domains Ieee Transactions On Dependable and Secure Computing. 13: 582-590. DOI: 10.1109/Tdsc.2015.2427834 |
0.34 |
|
2016 |
Sun L, Park J, Nguyen D, Sandhu R. A Provenance-Aware Access Control Framework with Typed Provenance Ieee Transactions On Dependable and Secure Computing. 13: 411-423. DOI: 10.1109/Tdsc.2015.2410793 |
0.43 |
|
2016 |
Cheng Y, Park J, Sandhu R. An Access Control Model for Online Social Networks Using User-to-User Relationships Ieee Transactions On Dependable and Secure Computing. 13: 424-436. DOI: 10.1109/Tdsc.2015.2406705 |
0.504 |
|
2016 |
Pustchi N, Sandhu R. Role-centric circle-of-trust in multi-tenant cloud IaaS Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9766: 106-121. DOI: 10.1007/978-3-319-41483-6_8 |
0.451 |
|
2015 |
Jin X, Krishnan R, Sandhu R. Role and attribute based collaborative administration of intra-tenant cloud IaaS Collaboratecom 2014 - Proceedings of the 10th Ieee International Conference On Collaborative Computing: Networking, Applications and Worksharing. 261-274. DOI: 10.4108/icst.collaboratecom.2014.257591 |
0.328 |
|
2015 |
Li Q, Zhang X, Zheng Q, Sandhu R, Fu X. LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking Ieee Transactions On Information Forensics and Security. 10: 308-320. DOI: 10.1109/Tifs.2014.2365742 |
0.554 |
|
2015 |
Pustchi N, Sandhu R. MT-ABAC: A multi-tenant attribute-based access control model with tenant trust Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9408: 206-220. DOI: 10.1007/978-3-319-25645-0_14 |
0.47 |
|
2015 |
Tang B, Sandhu R, Li Q. Multi-tenancy authorization models for collaborative cloud services Concurrency and Computation: Practice and Experience. 27: 2851-2868. DOI: 10.1002/Cpe.3446 |
0.495 |
|
2014 |
Bhargava B, Khalil I, Sandhu R. Securing Big Data Applications in the Cloud [Guest editors' introduction] Ieee Cloud Computing. 1: 24-26. DOI: 10.1109/Mcc.2014.65 |
0.317 |
|
2014 |
Sandhu R. The future of access control: Attributes, automation, and adaptation Advances in Intelligent Systems and Computing. 246: 45. DOI: 10.1007/978-81-322-1680-3_5 |
0.366 |
|
2014 |
Tang B, Sandhu R. Extending openstack access control with domain trust Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8792: 54-69. |
0.349 |
|
2013 |
Bijon KZ, Krishnan R, Sandhu R. Towards an attribute based constraints specification language Proceedings - Socialcom/Passat/Bigdata/Econcom/Biomedcom 2013. 108-113. DOI: 10.1109/SocialCom.2013.23 |
0.348 |
|
2013 |
Singhal M, Chandrasekhar S, Ge T, Sandhu R, Krishnan R, Ahn GJ, Bertino E. Collaboration in multicloud computing environments: Framework and security issues Computer. 46: 76-84. DOI: 10.1109/Mc.2013.46 |
0.757 |
|
2012 |
Sandhu R. The authorization leap from rights to attributes: Maturation or chaos? Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 69-70. DOI: 10.1145/2295136.2295150 |
0.352 |
|
2012 |
Sandhu RS, Share ME. Some owner based schemes with dynamic groups in the schematic protection model Proceedings - Ieee Symposium On Security and Privacy. 61-70. DOI: 10.1109/SP.1986.10005 |
0.319 |
|
2012 |
Bijon KZ, Sandhu R, Krishnan R. A group-centric model for collaboration with expedient insiders in multilevel systems Proceedings of the 2012 International Conference On Collaboration Technologies and Systems, Cts 2012. 419-426. DOI: 10.1109/CTS.2012.6261086 |
0.358 |
|
2012 |
Sandhu R. Speculations on the science of web user security Computer Networks. 56: 3891-3895. DOI: 10.1016/J.Comnet.2012.10.010 |
0.43 |
|
2011 |
Krishnan R, Niu J, Sandhu R, Winsborough WH. Group-centric secure information-sharing models for isolated groups Acm Transactions On Information and System Security. 14. DOI: 10.1145/2043621.2043623 |
0.773 |
|
2011 |
Park J, Sandhu R, Cheng Y. A User-Activity-Centric Framework for Access Control in Online Social Networks Ieee Internet Computing. 15: 62-65. DOI: 10.1109/Mic.2011.30 |
0.467 |
|
2011 |
Fuchs L, Pernul G, Sandhu R. Roles in information security - A survey and classification of the research area Computers & Security. 30: 748-769. DOI: 10.1016/J.Cose.2011.08.002 |
0.438 |
|
2010 |
Sandhu R. IEEE Transactions on Dependable and Secure Computing: Editorial Ieee Transactions On Dependable and Secure Computing. 7: 4. DOI: 10.1109/Tdsc.2010.32 |
0.324 |
|
2010 |
Ko MN, Cheek GP, Shehab M, Sandhu R. Social-networks connect services Computer. 43: 37-43. DOI: 10.1109/Mc.2010.239 |
0.304 |
|
2010 |
Krishnan R, Sandhu R. Enforcement architecture and implementation model for group-centric information sharing 2009 Proceedings of the 1st International Workshop On Security and Communication Networks, Iwscn 2009. |
0.343 |
|
2009 |
Thomas RK, Sandhu R, Bertino E, Arpinar B, Xu S. Privacy-preserving accountable accuracy management systems (PAAMS) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5661: 115-121. DOI: 10.1007/978-3-642-10233-2_11 |
0.377 |
|
2008 |
Zhang Z, Zhang X, Sandhu R. Towards a scalable role and organization based access control model with decentralized security administration Handbook of Research On Social and Organizational Liabilities in Information Security. 94-117. DOI: 10.4018/978-1-60566-132-2.ch006 |
0.432 |
|
2008 |
Zhang X, Nakae M, Covington MJ, Sandhu R. Toward a usage-based security framework for collaborative computing systems Acm Transactions On Information and System Security. 11. DOI: 10.1145/1330295.1330298 |
0.621 |
|
2008 |
Sandhu R, Bhamidipati V. The ASCAA principles for next-generation role-based access control Ares 2008 - 3rd International Conference On Availability, Security, and Reliability, Proceedings. DOI: 10.1109/ARES.2008.211 |
0.485 |
|
2007 |
Ferraiolo D, Sandhu R. RBAC standard rationale: Comments on "a critique of the ANSI standard on role-based access control", Ieee Security and Privacy. 5: 51-53. DOI: 10.1109/MSP.2007.173 |
0.398 |
|
2007 |
Barka E, Sandhu R. Framework for agent-based role delegation Ieee International Conference On Communications. 1361-1367. DOI: 10.1109/ICC.2007.229 |
0.418 |
|
2007 |
Xu S, Sandhu R. A scalable and secure cryptographic service Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4602: 144-160. |
0.314 |
|
2006 |
Oh S, Sandhu R, Zhang X. An effective role administration model using organization structure Acm Transactions On Information and System Security. 9: 113-137. DOI: 10.1145/1151414.1151415 |
0.689 |
|
2005 |
Zhang X, Parisi-Presicce F, Sandhu R, Park J. Formal model and policy specification of usage control Acm Transactions On Information and System Security. 8: 351-387. DOI: 10.1145/1108906.1108908 |
0.589 |
|
2005 |
Sandhu R, Zhang X. Peer-to-peer access control architecture using trusted computing technology Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 147-158. DOI: 10.1145/1063979.1064005 |
0.405 |
|
2005 |
Sandhu R. ACM Transactions on Information and System Security: Editorial Acm Transactions On Information and System Security. 8: 1. DOI: 10.1145/1053283.1053284 |
0.315 |
|
2005 |
Bertino E, Sandhu R. Database security-concepts, approaches, and challenges Ieee Transactions On Dependable and Secure Computing. 2: 2-18. DOI: 10.1109/Tdsc.2005.9 |
0.453 |
|
2005 |
Zhang X, Chen S, Sandhu R. Enhancing data authenticity and integrity in P2P systems Ieee Internet Computing. 9: 42-49. DOI: 10.1109/Mic.2005.124 |
0.542 |
|
2004 |
Park J, Sandhu R. The UCON ABC usage control model Acm Transactions On Information and System Security. 7: 128-174. DOI: 10.1145/984334.984339 |
0.451 |
|
2004 |
Thomas RK, Sandhu R. Towards a multi-dimensional characterization of dissemination control Proceedings - Fifth Ieee International Workshop On Policies For Distributed Systems and Networks, Policy 2004. 197-200. DOI: 10.1109/POLICY.2004.1309168 |
0.317 |
|
2004 |
Barka E, Sandhu R. Role-Based Delegation Model/Hierarchical Roles (RBDM1) Proceedings - Annual Computer Security Applications Conference, Acsac. 396-404. DOI: 10.1109/CSAC.2004.31 |
0.521 |
|
2004 |
Park J, Zhang X, Sandhu R. Attribute mutability in usage control Ifip Advances in Information and Communication Technology. 144: 15-30. |
0.335 |
|
2003 |
Sandhu R. Good-enough security: Toward a pragmatic business-driven dicipline Ieee Internet Computing. 7: 66-68. DOI: 10.1109/Mic.2003.1167341 |
0.406 |
|
2003 |
Sandhu R, Park J. Usage control: A vision for next generation access control Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2776: 17-31. |
0.36 |
|
2002 |
Sandhu R. Guest editor's introduction - the technology of trust Ieee Internet Computing. 6: 28-29. DOI: 10.1109/Mic.2002.1067733 |
0.388 |
|
2002 |
Park J, Sandhu R. Towards usage control models: Beyond traditional access control Proceedings of Acm Symposium On Access Control Models and Technologies (Sacmat 2002). 57-64. |
0.426 |
|
2002 |
Oh S, Sandhu R. A model for role administration using organization structure Proceedings of Acm Symposium On Access Control Models and Technologies (Sacmat 2002). 155-162. |
0.484 |
|
2001 |
Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R. Proposed NIST standard for role-based access control Acm Transactions On Information and System Security. 4: 224-274. DOI: 10.1145/501978.501980 |
0.501 |
|
2001 |
Park JS, Sandhu R, Ahn G. Role-based access control on the web Acm Transactions On Information and System Security. 4: 37-71. DOI: 10.1145/383775.383777 |
0.627 |
|
2001 |
Epstein P, Sandhu R. Engineering of role/permission assignments Proceedings - Annual Computer Security Applications Conference, Acsac. 2001: 127-136. DOI: 10.1109/ACSAC.2001.991529 |
0.323 |
|
2001 |
Ahn GJ, Sandhu R. Decentralized user group assignment in Windows NT Journal of Systems and Software. 56: 39-49. DOI: 10.1016/S0164-1212(00)00084-4 |
0.603 |
|
2001 |
Sandhu R. Future directions in role-based access control models Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2052: 22-26. |
0.329 |
|
2000 |
Ahn G, Sandhu R. Role-based authorization constraints specification Acm Transactions On Information and System Security. 3: 207-226. DOI: 10.1145/382912.382913 |
0.596 |
|
2000 |
Osborn S, Sandhu R, Munawer Q. Configuring role-based access control to enforce mandatory and discretionary access control policies Acm Transactions On Information and System Security. 3: 85-106. DOI: 10.1145/354876.354878 |
0.714 |
|
2000 |
Park JS, Sandhu R. Secure cookies on the web Ieee Internet Computing. 4: 36-44. DOI: 10.1109/4236.865085 |
0.487 |
|
1999 |
Sandhu R, Bhamidipati V. Role-based administration of user-role assignment: The URA97 model and its Oracle implementation Journal of Computer Security. 7: 317-342. DOI: 10.3233/Jcs-1999-7404 |
0.751 |
|
1999 |
Sandhu R, Bhamidipati V, Munawer Q. The ARBAC97 model for role-based administration of roles Acm Transactions On Information and System Security. 2: 105-135. DOI: 10.1145/300830.300839 |
0.614 |
|
1999 |
Ahn GJ, Sandhu R. Towards role-based administration in network information services Journal of Network and Computer Applications. 22: 199-213. DOI: 10.1006/Jnca.1999.0091 |
0.569 |
|
1998 |
Sandhu R, Chen F. The multilevel relational (MLR) data model Acm Transactions On Information and System Security. 1: 93-132. DOI: 10.1145/290163.290171 |
0.398 |
|
1998 |
Sandhu RS. Role-based Access Control Advances in Computers. 46: 237-286. DOI: 10.1016/S0065-2458(08)60206-5 |
0.5 |
|
1996 |
Sandhu R, Samarati P. Authentication, access control, and audit Acm Computing Surveys. 28: 240-243. DOI: 10.1145/234313.234412 |
0.451 |
|
1996 |
Sandhu R. Report on the first ACM workshop on role-based access control Acm Sigsac Review. 14: 2-4. DOI: 10.1145/228292.228293 |
0.487 |
|
1996 |
Sandhu R. Role hierarchies and constraints for lattice-based access controls Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1146: 65-79. |
0.465 |
|
1996 |
Sandhu R. Access control: The neglected frontier Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1172: 219-227. |
0.324 |
|
1993 |
Thomas RK, Sandhu RS. A kernelized architecture for multilevel secure object-oriented databases supporting write-up Journal of Computer Security. 2: 231-275. DOI: 10.3233/JCS-1993-22-309 |
0.355 |
|
1993 |
Sandhu RS. Lattice-Based Access Control Models Computer. 26: 9-19. DOI: 10.1109/2.241422 |
0.333 |
|
1992 |
Ammann PE, Sandhu RS. The extended schematic protection model Journal of Computer Security. 1: 335-383. DOI: 10.3233/JCS-1992-13-408 |
0.303 |
|
1991 |
Sandhu R, Jajodia S. Integrity principles and mechanisms in database management systems Computers and Security. 10: 413-427. DOI: 10.1016/0167-4048(91)90068-O |
0.345 |
|
1988 |
Sandhu RS. Cryptographic implementation of a tree hierarchy for access control Information Processing Letters. 27: 95-98. DOI: 10.1016/0020-0190(88)90099-3 |
0.357 |
|
Show low-probability matches. |