Ravi Sandhu - Publications

Affiliations: 
George Mason University, Washington, DC 
Area:
Computer Science

69 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Gupta M, Awaysheh FM, Benson J, Azab MA, Patwa F, Sandhu R. An Attribute-Based Access Control for Cloud-Enabled Industrial Smart Vehicles Ieee Transactions On Industrial Informatics. 1-1. DOI: 10.1109/Tii.2020.3022759  0.398
2017 Li Q, Sandhu R, Zhang X, Xu M. Mandatory Content Access Control for Privacy Protection in Information Centric Networks Ieee Transactions On Dependable and Secure Computing. 14: 494-506. DOI: 10.1109/Tdsc.2015.2494049  0.557
2016 Rajkumar PV, Sandhu R. Safety Decidability for Pre-Authorization Usage Control with Finite Attribute Domains Ieee Transactions On Dependable and Secure Computing. 13: 582-590. DOI: 10.1109/Tdsc.2015.2427834  0.34
2016 Sun L, Park J, Nguyen D, Sandhu R. A Provenance-Aware Access Control Framework with Typed Provenance Ieee Transactions On Dependable and Secure Computing. 13: 411-423. DOI: 10.1109/Tdsc.2015.2410793  0.43
2016 Cheng Y, Park J, Sandhu R. An Access Control Model for Online Social Networks Using User-to-User Relationships Ieee Transactions On Dependable and Secure Computing. 13: 424-436. DOI: 10.1109/Tdsc.2015.2406705  0.504
2016 Pustchi N, Sandhu R. Role-centric circle-of-trust in multi-tenant cloud IaaS Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9766: 106-121. DOI: 10.1007/978-3-319-41483-6_8  0.451
2015 Jin X, Krishnan R, Sandhu R. Role and attribute based collaborative administration of intra-tenant cloud IaaS Collaboratecom 2014 - Proceedings of the 10th Ieee International Conference On Collaborative Computing: Networking, Applications and Worksharing. 261-274. DOI: 10.4108/icst.collaboratecom.2014.257591  0.328
2015 Li Q, Zhang X, Zheng Q, Sandhu R, Fu X. LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking Ieee Transactions On Information Forensics and Security. 10: 308-320. DOI: 10.1109/Tifs.2014.2365742  0.554
2015 Pustchi N, Sandhu R. MT-ABAC: A multi-tenant attribute-based access control model with tenant trust Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9408: 206-220. DOI: 10.1007/978-3-319-25645-0_14  0.47
2015 Tang B, Sandhu R, Li Q. Multi-tenancy authorization models for collaborative cloud services Concurrency and Computation: Practice and Experience. 27: 2851-2868. DOI: 10.1002/Cpe.3446  0.495
2014 Bhargava B, Khalil I, Sandhu R. Securing Big Data Applications in the Cloud [Guest editors' introduction] Ieee Cloud Computing. 1: 24-26. DOI: 10.1109/Mcc.2014.65  0.317
2014 Sandhu R. The future of access control: Attributes, automation, and adaptation Advances in Intelligent Systems and Computing. 246: 45. DOI: 10.1007/978-81-322-1680-3_5  0.366
2014 Tang B, Sandhu R. Extending openstack access control with domain trust Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8792: 54-69.  0.349
2013 Bijon KZ, Krishnan R, Sandhu R. Towards an attribute based constraints specification language Proceedings - Socialcom/Passat/Bigdata/Econcom/Biomedcom 2013. 108-113. DOI: 10.1109/SocialCom.2013.23  0.348
2013 Singhal M, Chandrasekhar S, Ge T, Sandhu R, Krishnan R, Ahn GJ, Bertino E. Collaboration in multicloud computing environments: Framework and security issues Computer. 46: 76-84. DOI: 10.1109/Mc.2013.46  0.757
2012 Sandhu R. The authorization leap from rights to attributes: Maturation or chaos? Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 69-70. DOI: 10.1145/2295136.2295150  0.352
2012 Sandhu RS, Share ME. Some owner based schemes with dynamic groups in the schematic protection model Proceedings - Ieee Symposium On Security and Privacy. 61-70. DOI: 10.1109/SP.1986.10005  0.319
2012 Bijon KZ, Sandhu R, Krishnan R. A group-centric model for collaboration with expedient insiders in multilevel systems Proceedings of the 2012 International Conference On Collaboration Technologies and Systems, Cts 2012. 419-426. DOI: 10.1109/CTS.2012.6261086  0.358
2012 Sandhu R. Speculations on the science of web user security Computer Networks. 56: 3891-3895. DOI: 10.1016/J.Comnet.2012.10.010  0.43
2011 Krishnan R, Niu J, Sandhu R, Winsborough WH. Group-centric secure information-sharing models for isolated groups Acm Transactions On Information and System Security. 14. DOI: 10.1145/2043621.2043623  0.773
2011 Park J, Sandhu R, Cheng Y. A User-Activity-Centric Framework for Access Control in Online Social Networks Ieee Internet Computing. 15: 62-65. DOI: 10.1109/Mic.2011.30  0.467
2011 Fuchs L, Pernul G, Sandhu R. Roles in information security - A survey and classification of the research area Computers & Security. 30: 748-769. DOI: 10.1016/J.Cose.2011.08.002  0.438
2010 Sandhu R. IEEE Transactions on Dependable and Secure Computing: Editorial Ieee Transactions On Dependable and Secure Computing. 7: 4. DOI: 10.1109/Tdsc.2010.32  0.324
2010 Ko MN, Cheek GP, Shehab M, Sandhu R. Social-networks connect services Computer. 43: 37-43. DOI: 10.1109/Mc.2010.239  0.304
2010 Krishnan R, Sandhu R. Enforcement architecture and implementation model for group-centric information sharing 2009 Proceedings of the 1st International Workshop On Security and Communication Networks, Iwscn 2009 0.343
2009 Thomas RK, Sandhu R, Bertino E, Arpinar B, Xu S. Privacy-preserving accountable accuracy management systems (PAAMS) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5661: 115-121. DOI: 10.1007/978-3-642-10233-2_11  0.377
2008 Zhang Z, Zhang X, Sandhu R. Towards a scalable role and organization based access control model with decentralized security administration Handbook of Research On Social and Organizational Liabilities in Information Security. 94-117. DOI: 10.4018/978-1-60566-132-2.ch006  0.432
2008 Zhang X, Nakae M, Covington MJ, Sandhu R. Toward a usage-based security framework for collaborative computing systems Acm Transactions On Information and System Security. 11. DOI: 10.1145/1330295.1330298  0.621
2008 Sandhu R, Bhamidipati V. The ASCAA principles for next-generation role-based access control Ares 2008 - 3rd International Conference On Availability, Security, and Reliability, Proceedings. DOI: 10.1109/ARES.2008.211  0.485
2007 Ferraiolo D, Sandhu R. RBAC standard rationale: Comments on "a critique of the ANSI standard on role-based access control", Ieee Security and Privacy. 5: 51-53. DOI: 10.1109/MSP.2007.173  0.398
2007 Barka E, Sandhu R. Framework for agent-based role delegation Ieee International Conference On Communications. 1361-1367. DOI: 10.1109/ICC.2007.229  0.418
2007 Xu S, Sandhu R. A scalable and secure cryptographic service Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4602: 144-160.  0.314
2006 Oh S, Sandhu R, Zhang X. An effective role administration model using organization structure Acm Transactions On Information and System Security. 9: 113-137. DOI: 10.1145/1151414.1151415  0.689
2005 Zhang X, Parisi-Presicce F, Sandhu R, Park J. Formal model and policy specification of usage control Acm Transactions On Information and System Security. 8: 351-387. DOI: 10.1145/1108906.1108908  0.589
2005 Sandhu R, Zhang X. Peer-to-peer access control architecture using trusted computing technology Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 147-158. DOI: 10.1145/1063979.1064005  0.405
2005 Sandhu R. ACM Transactions on Information and System Security: Editorial Acm Transactions On Information and System Security. 8: 1. DOI: 10.1145/1053283.1053284  0.315
2005 Bertino E, Sandhu R. Database security-concepts, approaches, and challenges Ieee Transactions On Dependable and Secure Computing. 2: 2-18. DOI: 10.1109/Tdsc.2005.9  0.453
2005 Zhang X, Chen S, Sandhu R. Enhancing data authenticity and integrity in P2P systems Ieee Internet Computing. 9: 42-49. DOI: 10.1109/Mic.2005.124  0.542
2004 Park J, Sandhu R. The UCON ABC usage control model Acm Transactions On Information and System Security. 7: 128-174. DOI: 10.1145/984334.984339  0.451
2004 Thomas RK, Sandhu R. Towards a multi-dimensional characterization of dissemination control Proceedings - Fifth Ieee International Workshop On Policies For Distributed Systems and Networks, Policy 2004. 197-200. DOI: 10.1109/POLICY.2004.1309168  0.317
2004 Barka E, Sandhu R. Role-Based Delegation Model/Hierarchical Roles (RBDM1) Proceedings - Annual Computer Security Applications Conference, Acsac. 396-404. DOI: 10.1109/CSAC.2004.31  0.521
2004 Park J, Zhang X, Sandhu R. Attribute mutability in usage control Ifip Advances in Information and Communication Technology. 144: 15-30.  0.335
2003 Sandhu R. Good-enough security: Toward a pragmatic business-driven dicipline Ieee Internet Computing. 7: 66-68. DOI: 10.1109/Mic.2003.1167341  0.406
2003 Sandhu R, Park J. Usage control: A vision for next generation access control Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2776: 17-31.  0.36
2002 Sandhu R. Guest editor's introduction - the technology of trust Ieee Internet Computing. 6: 28-29. DOI: 10.1109/Mic.2002.1067733  0.388
2002 Park J, Sandhu R. Towards usage control models: Beyond traditional access control Proceedings of Acm Symposium On Access Control Models and Technologies (Sacmat 2002). 57-64.  0.426
2002 Oh S, Sandhu R. A model for role administration using organization structure Proceedings of Acm Symposium On Access Control Models and Technologies (Sacmat 2002). 155-162.  0.484
2001 Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R. Proposed NIST standard for role-based access control Acm Transactions On Information and System Security. 4: 224-274. DOI: 10.1145/501978.501980  0.501
2001 Park JS, Sandhu R, Ahn G. Role-based access control on the web Acm Transactions On Information and System Security. 4: 37-71. DOI: 10.1145/383775.383777  0.627
2001 Epstein P, Sandhu R. Engineering of role/permission assignments Proceedings - Annual Computer Security Applications Conference, Acsac. 2001: 127-136. DOI: 10.1109/ACSAC.2001.991529  0.323
2001 Ahn GJ, Sandhu R. Decentralized user group assignment in Windows NT Journal of Systems and Software. 56: 39-49. DOI: 10.1016/S0164-1212(00)00084-4  0.603
2001 Sandhu R. Future directions in role-based access control models Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2052: 22-26.  0.329
2000 Ahn G, Sandhu R. Role-based authorization constraints specification Acm Transactions On Information and System Security. 3: 207-226. DOI: 10.1145/382912.382913  0.596
2000 Osborn S, Sandhu R, Munawer Q. Configuring role-based access control to enforce mandatory and discretionary access control policies Acm Transactions On Information and System Security. 3: 85-106. DOI: 10.1145/354876.354878  0.714
2000 Park JS, Sandhu R. Secure cookies on the web Ieee Internet Computing. 4: 36-44. DOI: 10.1109/4236.865085  0.487
1999 Sandhu R, Bhamidipati V. Role-based administration of user-role assignment: The URA97 model and its Oracle implementation Journal of Computer Security. 7: 317-342. DOI: 10.3233/Jcs-1999-7404  0.751
1999 Sandhu R, Bhamidipati V, Munawer Q. The ARBAC97 model for role-based administration of roles Acm Transactions On Information and System Security. 2: 105-135. DOI: 10.1145/300830.300839  0.614
1999 Ahn GJ, Sandhu R. Towards role-based administration in network information services Journal of Network and Computer Applications. 22: 199-213. DOI: 10.1006/Jnca.1999.0091  0.569
1998 Sandhu R, Chen F. The multilevel relational (MLR) data model Acm Transactions On Information and System Security. 1: 93-132. DOI: 10.1145/290163.290171  0.398
1998 Sandhu RS. Role-based Access Control Advances in Computers. 46: 237-286. DOI: 10.1016/S0065-2458(08)60206-5  0.5
1996 Sandhu R, Samarati P. Authentication, access control, and audit Acm Computing Surveys. 28: 240-243. DOI: 10.1145/234313.234412  0.451
1996 Sandhu R. Report on the first ACM workshop on role-based access control Acm Sigsac Review. 14: 2-4. DOI: 10.1145/228292.228293  0.487
1996 Sandhu R. Role hierarchies and constraints for lattice-based access controls Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1146: 65-79.  0.465
1996 Sandhu R. Access control: The neglected frontier Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1172: 219-227.  0.324
1993 Thomas RK, Sandhu RS. A kernelized architecture for multilevel secure object-oriented databases supporting write-up Journal of Computer Security. 2: 231-275. DOI: 10.3233/JCS-1993-22-309  0.355
1993 Sandhu RS. Lattice-Based Access Control Models Computer. 26: 9-19. DOI: 10.1109/2.241422  0.333
1992 Ammann PE, Sandhu RS. The extended schematic protection model Journal of Computer Security. 1: 335-383. DOI: 10.3233/JCS-1992-13-408  0.303
1991 Sandhu R, Jajodia S. Integrity principles and mechanisms in database management systems Computers and Security. 10: 413-427. DOI: 10.1016/0167-4048(91)90068-O  0.345
1988 Sandhu RS. Cryptographic implementation of a tree hierarchy for access control Information Processing Letters. 27: 95-98. DOI: 10.1016/0020-0190(88)90099-3  0.357
Show low-probability matches.