Ravi Sandhu
Affiliations: | George Mason University, Washington, DC |
Area:
Computer ScienceGoogle:
"Ravi Sandhu"Children
Sign in to add traineeGail-Joon Ahn | grad student | 2000 | George Mason |
Qamar Munawer | grad student | 2000 | George Mason |
Ezedin S. Barka | grad student | 2002 | George Mason |
Pete A. Epstein | grad student | 2002 | George Mason |
Mohammad A. Al-Kahtani | grad student | 2003 | George Mason |
Xinwen Zhang | grad student | 2006 | George Mason |
Venkata R. Bhamidipati | grad student | 2008 | George Mason |
Zhixiong Zhang | grad student | 2008 | George Mason |
Ram N. Krishnan | grad student | 2009 | George Mason |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Gupta M, Awaysheh FM, Benson J, et al. (2020) An Attribute-Based Access Control for Cloud-Enabled Industrial Smart Vehicles Ieee Transactions On Industrial Informatics. 1-1 |
Li Q, Sandhu R, Zhang X, et al. (2017) Mandatory Content Access Control for Privacy Protection in Information Centric Networks Ieee Transactions On Dependable and Secure Computing. 14: 494-506 |
Rajkumar PV, Sandhu R. (2016) Safety Decidability for Pre-Authorization Usage Control with Finite Attribute Domains Ieee Transactions On Dependable and Secure Computing. 13: 582-590 |
Sun L, Park J, Nguyen D, et al. (2016) A Provenance-Aware Access Control Framework with Typed Provenance Ieee Transactions On Dependable and Secure Computing. 13: 411-423 |
Cheng Y, Park J, Sandhu R. (2016) An Access Control Model for Online Social Networks Using User-to-User Relationships Ieee Transactions On Dependable and Secure Computing. 13: 424-436 |
Pustchi N, Sandhu R. (2016) Role-centric circle-of-trust in multi-tenant cloud IaaS Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9766: 106-121 |
Jin X, Krishnan R, Sandhu R. (2015) Role and attribute based collaborative administration of intra-tenant cloud IaaS Collaboratecom 2014 - Proceedings of the 10th Ieee International Conference On Collaborative Computing: Networking, Applications and Worksharing. 261-274 |
Li Q, Zhang X, Zheng Q, et al. (2015) LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking Ieee Transactions On Information Forensics and Security. 10: 308-320 |
Pustchi N, Sandhu R. (2015) MT-ABAC: A multi-tenant attribute-based access control model with tenant trust Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9408: 206-220 |
Tang B, Sandhu R, Li Q. (2015) Multi-tenancy authorization models for collaborative cloud services Concurrency and Computation: Practice and Experience. 27: 2851-2868 |