Articles


Home
Publications
Most Cited Papers
Guide to Papers
Patents
Grants
PhD's Awarded
Invited Talks etc.
Teaching
Vitae etc.
Contact Me

Up Conference Papers Journal Papers Articles Miscellaneous Acronyms

  1. Zhixiong Zhang, Xinwen Zhang, and Ravi Sandhu, Towards a Scalable Role and Organization Based Access Control Model with Decentralized Security Administration, Handbook of Research on Social and Organizational Liabilities in Information Security, edited by M. Gupta and R. Sharman, IGI Global, pages 94-117, 2009.
    Google Scholar Search
  2. Munir Majdalawieh, Francesco Parisi-Presicce and Ravi Sandhu, RBAC Model for SCADA, Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications, Springer, pages 329-335, 2007.
    Google Scholar Search
  3. Ravi Sandhu, Role-Based Access Control, Advances in Computers, Vol.46, Academic Press 1998.
    Google Scholar Search
  4. Ravi Sandhu and P. Samarati, Authentication, Access Control and Intrusion Detection, The Computer Science and Engineering Handbook, CRC Press 1997.
    Google Scholar Search
  5. Ravi Sandhu and Sushil Jajodia, Integrity Mechanisms in Database Management Systems, Information Security: An Integrated Collection of Essays, IEEE Computer Society Press 1994.
  6. Sushil Jajodia and Ravi Sandhu, Toward A Multilevel Secure Relational Data Model,, Information Security: An Integrated Collection of Essays, IEEE Computer Society Press 1994.
  7. Sushil Jajodia, Ravi Sandhu and B.T. Blaustein, Solutions to the Polyinstantiation Problem,, Information Security: An Integrated Collection of Essays, IEEE Computer Society Press 1994.
  8. Sushil Jajodia, B. Kogan and Ravi Sandhu, A Multilevel-Secure Object-Oriented Data Model, Information Security: An Integrated Collection of Essays, IEEE Computer Society Press 1994.
  9. Ravi Sandhu, Relational Database Access Controls Using SQL, Handbook of Information Security Management (1994-95 Yearbook), Auerbach 1994.
  10. Ravi Sandhu and Sushil Jajodia, Data and Database Security and Controls, Handbook of Information Security Management, Auerbach, 1993.