Conference Papers


Home
Publications
Most Cited Papers
Guide to Papers
Patents
Grants
PhD's Awarded
Invited Talks etc.
Teaching
Vitae etc.
Contact Me

Up Conference Papers Journal Papers Articles Miscellaneous Acronyms

    2017: 10

  1. Smriti Bhatt, Farhan Patwa and Ravi Sandhu, An Access Control Framework for Cloud-Enabled Wearable Internet of Things .... In Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing (CIC), San Jose, CA, October 15-17, 2017, 11 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  2. Tahmina Ahmed and Ravi Sandhu, Safety of ABACα is Decidable. In Proceedings of the 11th International Conference on Network and System Security (NSS), Helsinki, Finland, August 21-23, 2017, 15 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  3. Smriti Bhatt, Farhan Patwa and Ravi Sandhu, Access Control Model for AWS Internet of Things. In Proceedings of the 11th International Conference on Network and System Security (NSS), Helsinki, Finland, August 21-23, 2017, 15 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  4. Asma Alshehri and Ravi Sandhu, Access Control Models for Virtual Object Communication in Cloud-Enabled IoT In Proceedings of the 18th IEEE Conference on Information Reuse and Integration (IRI), San Diego, California, August 4-7, 2017, 10 pages. Presentation(pptx) (pdf)
    Google Scholar Search ???
  5. Maanak Gupta, Farhan Patwa and Ravi Sandhu, Object-Tagged RBAC Model for the Hadoop Ecosystem. In Proceedings 31st Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2017), Philadelphia, Pennsylvania, July 19-21, 2017, 18 pages. Presentation(pptx) (pdf)
    Google Scholar Search ???
  6. Mahmoud Abdelsalam, Ram Krishnan and Ravi Sandhu, Clustering-Based IaaS Cloud Monitoring. In Proceedings 10th IEEE International Conference on Cloud Computing (CLOUD), Honolulu, Hawaii, June 25-30, 2017, 8 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  7. Maanak Gupta, Farhan Patwa, James Benson and Ravi Sandhu, Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment. In Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies (SACMAT), Indianapolis, Indiana, June 21-23, 2017, pages 183-190. Presentation(pptx) (pdf)
    Google Scholar Search
  8. Tahmina Ahmed, Ravi Sandhu and Jaehong Park, Classifying and Comparing Attribute-Based and Relationship-Based Access Control. In Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY), March 22-24, 2017, Scottsdale, Arizona. Presentation(pptx) (pdf)
    Google Scholar Search
  9. Smriti Bhatt, Farhan Patwa and Ravi Sandhu, ABAC with Group Attributes and Attribute Hierarchies Utilizing the Policy Machine. In Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control (ABAC), March 24, 2017, Scottsdale, Arizona, 12 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  10. Prosunjit Biswas, Ravi Sandhu and Ram Krishnan, Attribute Transformation for Attribute-Based Access Control. In Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control (ABAC), March 24, 2017, Scottsdale, Arizona, 8 pages. Presentation(ppt) (pdf)
    Google Scholar Search
  11. 2016: 12

  12. Smriti Bhatt, Farhan Patwa and Ravi Sandhu, An Attribute-Based Access Control Extension for OpenStack and its Enforcement Utilizing the Policy Machine. In Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing (CIC), Pittsburgh, PA, November 1-3, 2016, 9 pages. Presentation(pptx) (pdf)
    Google Scholar Search -*
  13. Asma Alshehri and Ravi Sandhu, Access Control Models for Cloud-Enabled Internet of Things: A Proposed Architecture and Research Agenda. In Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing (CIC), Pittsburgh, PA, November 1-3, 2016, 9 pages. Presentation(pptx) (pdf)
    Google Scholar Search -*
  14. Maanak Gupta and Ravi Sandhu, The GURAG Administrative Model for User and Group Attribute Assignment. In Proceedings of the 10th International Conference on Network and System Security (NSS), Taipei, Taiwan, September 28-30, 2016, 15 pages. Presentation(pptx) (pdf)
    Google Scholar Search -*
  15. Prosunjit Biswas, Ravi Sandhu and Ram Krishnan, An Attribute-Based Protection Model for JSON Documents. In Proceedings of the 10th International Conference on Network and System Security (NSS), Taipei, Taiwan, September 28-30, 2016, 16 pages. Presentation(ppt) (pdf)
    Google Scholar Search -*
  16. Asma Alshehri and Ravi Sandhu, On the Relationship between Finite Domain ABAM and PreUCONA. In Proceedings of the 10th International Conference on Network and System Security (NSS), Taipei, Taiwan, September 28-30, 2016, 14 pages. Presentation(pptx) (pdf)
    Google Scholar Search -*
  17. Prosunjit Biswas, Ravi Sandhu and Ram Krishnan, Uni-ARBAC: A Unified Administrative Model for Role-Based Access Control. In Proceedings 19th Information Security Conference, (ISC 2016), Honolulu, Hawaii, September 7-9, 2016, 14 pages. Presentation(ppt) (pdf)
    Google Scholar Search -*
  18. Tahmina Ahmed, Farhan Patwa and Ravi Sandhu, Object-to-Object Relationship-Based Access Control: Model and Multi-Cloud Demonstration. In Proceedings of the 17th IEEE Conference on Information Reuse and Integration (IRI), Pittsburgh, Pennsylvania, July 28-30, 2016, 8 pages. Presentation(pptx) (pdf)
    Google Scholar Search -*
  19. Navid Pustchi and Ravi Sandhu, Role-Centric Circle of Trust in Multi-Tenant Cloud IaaS. In Proceedings 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016), Trento, Italy, July 18-21, 2016, 16 pages. Presentation(pptx) (pdf)
    Google Scholar Search 0*
  20. Prosunjit Biswas, Ravi Sandhu and Ram Krishnan, A Comparison of Logical Formula and Enumerated Authorization Policy ABAC Models (with addendum). In Proceedings 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016), Trento, Italy, July 18-21, 2016, 8 pages. Presentation(pptx) (pdf)
    Google Scholar Search -*
  21. Yuan Cheng, Khalid Bijon and Ravi Sandhu, Extended ReBAC Administrative Models with Cascading Revocation and Provenance Support. In Proc. 21st ACM Symposium on Access Control Models and Technologies (SACMAT), Shanghai, China, June 6-8, 2016, 10 pages. Presentation(pptx) (pdf)
    Google Scholar Search 0*
  22. Yun Zhang, Farhan Patwa and Ravi Sandhu, Community-Based Secure Information and Resource Sharing in Azure Cloud IaaS. In Proceedings of the 4th ACM Workshop on Security in Cloud Computing (SCC), May 30, 2016, Xi'an, China, 8 pages. Presentation(pdf)
    Google Scholar Search 0*
  23. Prosunjit Biswas, Ravi Sandhu and Ram Krishnan, Label-Based Access Control: An ABAC Model with Enumerated Authorization Policy. In Proceedings of the 1st ACM Workshop on Attribute-Based Access Control (ABAC), March 11, 2016, New Orleans, Louisiana, 12 pages. Presentation(pptx) (pdf)
    Google Scholar Search 0*
  24. 2015: 6

  25. Navid Pustchi and Ravi Sandhu, MT-ABAC: A Multi-Tenant Attribute-Based Access Control Model with Tenant Trust. In Proceedings of the 9th International Conference on Network and System Security (NSS), New York, New York, November 3-5, 2015, 14 pages. Presentation(pptx) (pdf)
    Google Scholar Search 1+
  26. Yun Zhang, Farhan Patwa and Ravi Sandhu, Community-Based Secure Information and Resource Sharing in AWS Public Cloud. In Proceedings of the 1st IEEE International Conference on Collaboration and Internet Computing (CIC), Hangzhou, China, October 27-30, 2015, 8 pages. Presentation(pdf)
    Google Scholar Search 1+
  27. Yun Zhang, Farhan Patwa, Ravi Sandhu and Bo Tang, Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud. In Proceedings 16th IEEE Conference on Information Reuse and Integration (IRI), San Francisco, California, August 13-15, 2015, 8 pages. Presentation(pdf)
    Google Scholar Search 1+
  28. Khalid Bijon, Ram Krishnan and Ravi Sandhu, Mitigating Multi-Tenancy Risks in IaaS Cloud through Constraints-Driven Virtual Resource Scheduling. In Proc. 20th ACM Symposium on Access Control Models and Technologies (SACMAT), Vienna, Austria, June 1-3, 2015, pages 63-74. Presentation(pptx) (pdf)
    Google Scholar Search 1+
  29. Navid Pustchi, Ram Krishnan and Ravi Sandhu, Authorization Federation in IaaS Multi Cloud. In Proceedings of the 3rd ACM Workshop on Security in Cloud Computing (SCC), April 14, 2015, Singapore, 9 pages. Presentation(pptx) (pdf)
    Google Scholar Search 1+
  30. Khalid Bijon, Ram Krishnan and Ravi Sandhu, Virtual Resource Orchestration Constraints in Cloud Infrastructure as a Service. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (CODASPY), March 2-4, 2015, San Antonio, Texas, pages 183-194. Presentation(ppt) (pdf)
    Google Scholar Search 1+
  31. 2014: 7

  32. Yun Zhang, Ram Krishnan and Ravi Sandhu, Secure Information and Resource Sharing in Cloud Infrastructure as a Service. In Proceedings of ACM Workshop on Information Sharing and Collaborative Security (WISCS 2014), November 3, 2014, Scottsdale, AZ. Presentation(pptx) (pdf)
    Google Scholar Search 10+
  33. Xin Jin, Ram Krishnan and Ravi Sandhu, Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS. In Proceedings 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Miami, Florida, October 22-25, 2014, 14 pages. Presentation(pptx) (pdf)
    Google Scholar Search 10+
  34. Dang Nguyen, Jaehong Park and Ravi Sandhu, Adopting Provenance-Based Access Control in OpenStack Cloud IaaS. In Proceedings 8th International Conference on Network and System Security (NSS 2014), Xi'an, China, October 15-17, 2014, 15 pages. Presentation (pptx) (pdf)
    Google Scholar Search 10+
  35. Bo Tang and Ravi Sandhu, Extending OpenStack Access Control with Domain Trust. In Proceedings 8th International Conference on Network and System Security (NSS 2014), Xi'an, China, October 15-17, 2014, 15 pages. Presentation (pptx) (pdf)
    Google Scholar Search 20+
  36. Khalid Bijon, Ram Krishnan and Ravi Sandhu, A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service. In Proceedings 8th International Conference on Network and System Security (NSS 2014), Xi'an, China, October 15-17, 2014, 12 pages. Presentation (pptx) (pdf)
    Google Scholar Search 10+
  37. Yuan Cheng, Jaehong Park and Ravi Sandhu, Attribute-aware Relationship-based Access Control for Online Social Networks. In Proceedings 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2014), Vienna, Austria, July 14-16, 2014, 16 pages. Presentation (pptx) (pdf)
    Google Scholar Search 10+
  38. Lianshan Sun, Jaehong Park and Ravi Sandhu, Towards Provenance-Based Access Control with Feasible Overhead. In Proceedings 4th International Conference on Information Science, Electronics and Electrical Engineering (ISEEE), Sapporo, Japan, April 26-28, 2014, 5 pages.
    Google Scholar Search 1+
  39. 2013: 9

  40. Xin Jin, Ram Krishnan and Ravi Sandhu, Reachability Analysis for Role-based Administration of Attributes. In Proceedings ACM-CCS Workshop on Digital Identity Management (DIM), Berlin, Germany, November 8, 2013, 12 pages. Presentation(pdf)
    Google Scholar Search
  41. Khalid Bijon, Ram Krishnan and Ravi Sandhu, A Framework for Risk-Aware Role Based Access Control. In Proceedings 6th IEEE-CNS Symposium on Security Analytics and Automation (SAFECONFIG), Washington, DC, October 16, 2013, 8 pages. Presentation(ppt) (pdf)
    Google Scholar Search
  42. Khalid Bijon, Ram Krishnan and Ravi Sandhu, Towards An Attribute Based Constraints Specification Language. In Proceedings 5th IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT), Washington, DC, September 8-14, 2013, 6 pages. Presentation(ppt) (pdf)
    Google Scholar Search
  43. Bo Tang and Ravi Sandhu, Cross-Tenant Trust Models in Cloud Computing. In Proceedings 14th IEEE Conference on Information Reuse and Integration (IRI), San Francisco, California, August 14-16, 2013, pages 129-136. Presentation(pptx) (pdf)
    Google Scholar Search
  44. Dang Nguyen, Jaehong Park and Ravi Sandhu, A Provenance-based Access Control Model for Dynamic Separation of Duties (Winner of Best Student Paper Award). In Proceedings 11th IEEE Conference on Privacy, Security and Trust (PST), Tarragona, Spain, July 10-12, 2013, 10 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  45. Bo Tang, Qi Li and Ravi Sandhu, A Multi-Tenant RBAC Model for Collaborative Cloud Services. In Proceedings 11th IEEE Conference on Privacy, Security and Trust (PST), Tarragona, Spain, July 10-12, 2013, 10 pages. Presentation(pptx) (pdf)
    Google Scholar Search
    Notable non-academic citations: Amazon patent 2015.
  46. Bo Tang, Ravi Sandhu and Qi Li, Multi-Tenancy Authorization Models for Collaborative Cloud Services. In Proceedings 14th IEEE Conference on Collaboration Technologies and Systems (CTS), San Diego, California, May 20-24, 2013, 7 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  47. Yuan Cheng, Jaehong Park and Ravi Sandhu, Preserving User Privacy from Third-party Applications in Online Social Networks. In Proceedings 2nd W3C Workshop on Privacy and Security in Online Social Media (PSOSM), Rio de Janeiro, Brazil, May 14, 2013, 6 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  48. Lianshan Sun, Jaehong Park, and Ravi Sandhu, Engineering Access Control Policies for Provenance-Aware Systems. In Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy (CODASPY), February 18-20, 2013, San Antonio, Texas, pages 285-292. Presentation(pdf)
    Google Scholar Search
  49. 2012: 14

  50. Khalid Bijon, Ram Krishnan and Ravi Sandhu, Risk-Aware RBAC Sessions. In Proceedings 8th International Conference on Information Systems Security (ICISS 2012), December 15-19, 2012, IIT, Guwahati, India, pages 59-74. Presentation(pptx) (pdf)
    Google Scholar Search
  51. Jose Morales, Shouhuai Xu and Ravi Sandhu, Analyzing Malware Detection Efficiency with Multiple Anti-Malware Programs. In Proceedings of the 1st ASE International Conference on Cyber Security (ASE 2012), December 14-16, 2012, Washington, DC, pages 56-66. Presentation(pptx) (pdf)
    Google Scholar Search
  52. Xin Jin, Ravi Sandhu and Ram Krishnan, RABAC: Role-Centric Attribute-Based Access Control. In Proceedings 6th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-20, 2012, pages 84-96. Published as Springer Lecture Notes in Computer Science Vol. 7531, Computer Network Security (Igor Kotenko and Victor Skormin, editors), 2012. Presentation(pptx) (pdf)
    Google Scholar Search *
  53. Khalid Bijon, Tahmina Ahmed, Ravi Sandhu and Ram Krishnan, A Lattice Interpretation of Group-Centric Collaboration with Expedient Insiders. In Proceedings 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Pittsburgh, Pennsylvania, October 14-17, 2012, pages 200-209. Cited Technical Report Presentation(ppt) (pdf)
    Google Scholar Search
  54. Xin Jin, Ram Krishnan and Ravi Sandhu, A Role-Based Administration Model for Attributes. In Proceedings of the First ACM International Workshop on Secure and Resilient Architectures and Systems (SRAS '12), Minneapolis, Minnesota, September 19, 2012, pages 7-12. Presentation(pptx) (pdf)
    Google Scholar Search
  55. Yuan Cheng, Dang Nguyen, Khalid Bijon, Ram Krishnan, Jaehong Park and Ravi Sandhu, Towards Provenance and Risk-Awareness in Social Computing. In Proceedings of the First ACM International Workshop on Secure and Resilient Architectures and Systems (SRAS '12), Minneapolis, Minnesota, September 19, 2012, pages 25-30. Presentation(pptx) (pdf)
    Google Scholar Search
  56. Yuan Cheng, Jaehong Park and Ravi Sandhu, Relationship-based Access Control for Online Social Networks: Beyond User-to-User Relationships (Winner of Best Paper Award). In Proceedings 4th IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT), Amsterdam, Netherlands, September 3-5, 2012, 10 pages. Presentation(pptx) (pdf)
    Google Scholar Search *
  57. Dang Nguyen, Jaehong Park and Ravi Sandhu, Integrated Provenance Data for Access Control in Group-Centric Collaboration. In Proceedings 13th IEEE Conference on Information Reuse and Integration (IRI), Las Vegas, Nevada, August 8-10, 2012, 8 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  58. Jaehong Park, Dang Nguyen and Ravi Sandhu, A Provenance-Based Access Control Model. In Proceedings 10th IEEE Conference on Privacy, Security and Trust (PST), Paris, France, July 16-18, 2012, 8 pages. Presentation(pptx) (pdf)
    Google Scholar Search *
  59. Xin Jin, Ram Krishnan and Ravi Sandhu, A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC In Proceedings 26th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2012), Paris, France, July 11-13, 2012, pages 41-55. Presentation(pptx) (pdf)
    Google Scholar Search **
  60. Yuan Cheng, Jaehong Park and Ravi Sandhu, A User-to-User Relationship-based Access Control Model for Online Social Networks In Proceedings 26th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2012), Paris, France, July 11-13, 2012, pages 8-24. Presentation(pptx) (pdf)
    Google Scholar Search *
  61. Ravi Sandhu, The Authorization Leap from Rights to Attributes: Maturation or Chaos? In Proceedings 17th ACM Symposium on Access Control Models and Technologies (SACMAT), Newark, NJ, June 20-22, 2012, 2 pages. Presentation(pptx) (pdf)
    Google Scholar Search ...
  62. Dang Nguyen, Jaehong Park and Ravi Sandhu, Dependency Path Patterns as the Foundation of Access Control in Provenance-Aware Systems. In Proceedings 4th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2012), Boston, MA, June 14-15, 2012, 4 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  63. Khalid Bijon, Ravi Sandhu and Ram Krishnan, A Group-Centric Model for Collaboration with Expedient Insiders in Multilevel Systems. In Proceedings IEEE International Symposium on Security in Collaboration Technologies and Systems (SECOTS 2012), Denver, CO, May 24th, 2012, 8 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  64. 2011: 7

  65. Ram Krishnan and Ravi Sandhu, Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing. In Proceedings 7th International Conference on Information Systems Security (ICISS 2011), December 15-19, 2011, Jadavpur University, Kolkata, 14 pages. Full version Presentation(pptx) (pdf)
    Google Scholar Search
  66. Jose Morales, Michael Main, Weiliang Luo, Shouhuai Xu and Ravi Sandhu, Building Malware Infection Trees. In Proceedings 6th International Conference on Malicious and Unwanted Software (MALWARE), October 18-19, 2011, Fajardo, Puerto Rico. Presentation(pptx) (pdf)
    Google Scholar Search
  67. Jaehong Park, Dang Nguyen and Ravi Sandhu, On Data Provenance in Group-centric Secure Collaboration. In Proceedings 7th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Orlando, Florida, October 15-18, 2011, 10 pages. Presentation(pptx) (pdf) (pdf as published in conference)
    Google Scholar Search
  68. Ravi Sandhu, Khalid Zaman Bijon, Xin Jin and Ram Krishnan, RT-Based Administrative Models for Community Cyber Security Information Sharing. In Proceedings of the 6th IEEE International Workshop on Trusted Collaboration (TrustCol 2011), Orlando, Florida, October 15, 2011, 6 pages. Presentation(pptx) (pdf)
    Google Scholar Search
  69. Savith Kandala, Ravi Sandhu and Venkata Bhamidipati, An Attribute Based Framework for Risk-Adaptive Access Control Models. In Proceedings 5th International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, August 22-26, 2011, 6 pages. Presentation (ppt) (pdf)
    Google Scholar Search ...
  70. Jaehong Park, Ravi Sandhu and Yuan Cheng, ACON: Activity-Centric Access Control for Social Computing. In Proceedings 5th International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, August 22-26, 2011, 6 pages. Presentation (pptx) (pdf)
    Google Scholar Search
  71. Ravi Sandhu, The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? In Proceedings 1st ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, Texas, February 21-23, 2011, 2 pages. (Inaugural Keynote Talk.) Presentation(ppt) (pdf)
    Google Scholar Search
  72. 2010: 9

  73. Jose Morales, Ravi Sandhu and Shouhuai Xu, Evaluating Detection and Treatment Effectiveness of Commercial Anti-malware Programs. In Proceedings 5th International Conference on Malicious and Unwanted Software (MALWARE), October 19-20 2010, Nancy, France, pages 31-38. Presentation(pptx) (pdf)
    Google Scholar Search
  74. Ravi Sandhu, Ram Krishnan and Gregory White, Towards Secure Information Sharing Models for Community Cyber Security. In Proceedings 6th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Chicago, Illinois, October 9-12, 2010, 6 pages. Presentation(ppt) (pdf)
    Google Scholar Search
  75. Jaehong Park, Yuan Cheng and Ravi Sandhu, Towards a Framework for Cyber Social Status Based Trusted Open Collaboration. In Proceedings of the 5th IEEE International Workshop on Trusted Collaboration (TrustCol 2010), Chicago, Illinois, October 9, 2010, 8 pages. Presentation(ppt) (pdf)
    Google Scholar Search
  76. Ravi Sandhu, Raj Boppana, Ram Krishnan, Jeff Reich, Todd Wolff and Josh Zachary, Towards a Discipline of Mission-Aware Cloud Computing. In Proceedings of the 2nd ACM Cloud Computing Security Workshop (CCSW 10), Chicago, Illinois, October 08, 2010, pages 13-17. Presentation(ppt) (pdf)
    Google Scholar Search ...
  77. Ravi Sandhu, Ram Krishnan, Jianwei Niu and William Winsborough, Group-Centric Models for Secure and Agile Information Sharing. In Proceedings 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, pages 55-69. Published as Springer Lecture Notes in Computer Science Vol. 6258, Computer Network Security (Igor Kotenko and Victor Skormin, editors), 2010. Presentation(ppt) (pdf)
    Google Scholar Search
  78. Jose Morales, Erhan Kartaltepe, Shouhuai Xu and Ravi Sandhu, Symptoms-Based Detection of Bot Processes. In Proceedings 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, pages 229-241. Published as Springer Lecture Notes in Computer Science Vol. 6258, Computer Network Security (Igor Kotenko and Victor Skormin, editors), 2010. Presentation(ppt) (pdf)
    Google Scholar Search
  79. Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu and Ravi Sandhu, Analyzing and Exploiting Network Behaviors of Malware. In Proceedings 6th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2010), September 7-9, 2010, Singapore, pages 20-34. Published as Springer Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Vol. 50, Security and Privacy in Communication Networks (S. Jajodia and J. Zhou, editors), 2010. Presentation(ppt) (pdf)
    Google Scholar Search ...
  80. Shouhuai Xu, Haifeng Qian, FengyingWang, Zhenxin Zhan, Elisa Bertino and Ravi Sandhu, Trustworthy Information: Concepts and Mechanisms. In Proceedings 11th International Conference on Web-Age Information Management (WAIM 2010), Jiuzhaigou, China, July 15-17, 2010, pages 398-404. Published as Springer Lecture Notes in Computer Science Vol. 6184, Web-Age Information Management (Chen, L., Tang, C., Yang, J. and Gao, Y., editors), 2010. Presentation(pdf)
    Google Scholar Search
  81. Erhan Kartaltepe, Jose Andre Morales, Shouhuai Xu and Ravi Sandhu, Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures. In Proceedings of the 8th International Conference on Applied Cryptography and Network Security (ACNS 2010), Beijing, China, June 22-25, 2010, pages 511-528. Published as Springer Lecture Notes in Computer Science Vol. 6123, Applied Cryptography and Network Security (Jianying Zhou and Moti Yung, editors), 2010. Presentation(ppt) (pdf)
    Google Scholar Search *
  82. 2009: 12

  83. Ram Krishnan, Ravi Sandhu, Jianwei Niu and William Winsborough, Towards a Framework for Group-Centric Secure Collaboration. In Proceedings 5th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Crystal City, Virginia, November 11-14, 2009, pages 1-10. Presentation(ppt w/animation) (pdf)
    Google Scholar Search 0.1*
  84. Jose Morales, Areej Al-Bataineh, Shouhuai Xu and Ravi Sandhu, Analyzing DNS Activities of Bot Processes. In Proceedings 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009), Montreal, Quebec, Canada, October 13-14, 2009, pages 98-103. Presentation(ppt) (pdf)
    Google Scholar Search 0.1*
  85. Ram Krishnan and Ravi Sandhu, A Hybrid Enforcement Model for Group-Centric Secure Information Sharing. In Proceedings IEEE International Conference on Computational Science and Engineering (CSE-09), Vancouver, Canada, August 29-31, 2009, pages 189-194. Full version Presentation(ppt) (pdf)
    Google Scholar Search 0*
  86. Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi Sandhu and Weilei Han, An Access Control Language for a General Provenance Model. In Proceedings 6th VLDB Workshop on Secure Data Management (SDM'09), August 28, 2009, Lyon, France, pages 68-88. Published as Springer Lecture Notes in Computer Science Vol. 5776, SDM 2009 (W. Jonker and M. Petkovi4c, editors), 2009. Presentation(ppt) Presentation(pdf)
    Google Scholar Search 0.5*
  87. Shouhuai Xu, Ravi Sandhu, and Elisa Bertino, TIUPAM: A Framework for Trustworthiness-Centric Information Sharing. In Proceedings 3rd IFIP WG 11.11 International Conference on Trust Management (IFIPTM), Purdue University, West Lafayette, June 15-19, 2009, pages 164-175. Published as Springer IFIP Advances in Information and Communication Technology Vol. 300, Trust Management III (E. Ferrari, N. Li, E. Bertino and Y. Karabulut, editors), 2009. Presentation (ppt) Presentation (pdf)
    Google Scholar Search 0.1*
  88. Shouhuai Xu, Qun Ni, Elisa Bertino and Ravi Sandhu, A Characterization of the Problem of Secure Provenance Management. In Proceedings IEEE International Conference on Intelligence and Security Informatics (ISI-2009): Workshop on Assured Information Sharing (WAIS), June 8-11, 2009, Dallas, Texas, pages 310-314. Presentation (ppt) Presentation (pdf)
    Google Scholar Search 0.1*
  89. Ram Krishnan, Ravi Sandhu, Jianwei Niu and William Winsborough, Foundations for Group-Centric Secure Information Sharing Models. In Proceedings 14th ACM Symposium on Access Control Models and Technologies (SACMAT), Stresa, Italy, June 3-5, 2009, pages 115-124. Presentation(ppt) Presentation(pdf) Techreport(citation [19])
    Google Scholar Search 0.1* +++
  90. Ravi Sandhu, The PEI Framework for Application-Centric Security. In Proceedings 1st IEEE International Workshop on Security and Communication Networks (IWSCN), Trondheim, Norway, May 20-22, 2009. Invited Lecture Presentation
    Google Scholar Search 0.1*
    Also published as: Ravi Sandhu, The PEI Framework for Application-Centric Security. In Proceedings 5th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Crystal City, Virginia, November 11-14, 2009, pages 1-5. Presentation(ppt) (pdf)
    Google Scholar Search -*
  91. Ram Krishnan and Ravi Sandhu, Enforcement Architecture and Implementation Model for Group-Centric Information Sharing. In Proceedings 1st IEEE International Workshop on Security and Communication Networks (IWSCN), Trondheim, Norway, May 20-22, 2009. Presentation
    Google Scholar Search 0*
  92. Justin Leonard, Shouhuai Xu, and Ravi Sandhu, A First Step Towards Characterizing Stealthy Botnets. In Proceedings of 4th International Conference on Availability, Reliability and Security (ARES), Fukuoka Institute of Technology, Fukuoka, Japan, March 16-19, 2009, pages 106-113. Presentation
    Google Scholar Search 0*
  93. Justin Leonard, Shouhuai Xu, and Ravi Sandhu, A Framework for Understanding Botnets. In Proceedings of 3rd International Workshop on Advances in Information Security (WAIS at ARES), Fukuoka Institute of Technology, Fukuoka, Japan, March 16-19, 2009, pages 917-922. Presentation
    Google Scholar Search 0.1*
  94. Ram Krishnan, Ravi Sandhu, Jianwei Niu and William Winsborough, A Conceptual Framework for Group-Centric Secure Information Sharing. In Proceedings 4th ACM Symposium on Information, Computer and Communications Security (AsiaCCS), Sydney, Australia, March 10-12, 2009, pages 384-387. Full version. Presentation
    Google Scholar Search 0.1*
  95. 2008: 6

  96. Ram Krishnan, Jianwei Niu, Ravi Sandhu and William Winsborough, Stale-Safe Security Properties for Group-Based Secure Information Sharing. In Proceedings 6th ACM-CCS Workshop on Formal Methods in Security Engineering (FMSE), Alexandria, Virginia, October 27, 2008, pages 53-62. Full version. Presentation
    Google Scholar Search 0.1*
  97. Tim Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi Sandhu, William Winsborough and Bhavani Thuraisingham, ROWLBAC: Representing Role Based Access Control in OWL. In Proceedings 13th ACM Symposium on Access Control Models and Technologies (SACMAT), Estes Park, Colorado, June 11-13, 2008, pages 73-82. Presentation
    Google Scholar Search 2*
  98. Xinwen Zhang, Jean-Pierre Seifert and Ravi Sandhu, Security Enforcement Model for Distributed Usage Control In Proceedings 2nd IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), Taichung, Taiwan, June 11-13, 2008, pages 10-18. Presentation Keynote Lecture
    Google Scholar Search 0.1*
  99. Vana Kalogeraki, Dimitrios Gunopulos, Ravi Sandhu and Bhavani Thuraisingham, QoS Aware Dependable Distributed Stream Processing. In Proceedings 11th IEEE Symposium on Object Oriented Real-Time Distributed Computing (ISORC), Orlando, Florida, May 5-7, 2008, pages 69-75. Presentation
    Google Scholar Search 0*
  100. Ravi Sandhu and Venkata Bhamidipati, The ASCAA Principles for Next-Generation Role-Based Access Control . In Proceedings 3rd International Conference on Availability, Reliability and Security (ARES), Barcelona, Spain, March 4-7, 2008, pages xxvii-xxxii. Presentation Keynote Lecture
    Google Scholar Search 0.1*
  101. Xinwen Zhang, Dongyu Liu, Songqing Chen, Zhao Zhang and Ravi Sandhu, Towards Digital Rights Protection in BitTorrent-like P2P Systems. In Proceedings15th SPIE/ACM Multimedia Computing and Networking (MMCN), San Jose, CA USA, January 30-31, 2008, pages 68180F 1-12. Presentation
    Google Scholar Search 0.1*

    2007: 7

  102. Manoj Sastry, Ram Krishnan and Ravi Sandhu, A New Modeling Paradigm for Dynamic Authorization in Multi-domain Systems. In Proceedings Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS, Saint Petersburg, Russia, September 13-15, 2007. Published as Springer-Verlag Communications in Computer and Information Science, Volume 1, pages 153-158. Full version. Presentation
    Google Scholar Search
  103. Shouhuai Xu and Ravi Sandhu, A Scalable and Secure Cryptographic Service. In Proceedings 21st IFIP WG 11.3 Working Conf. on Data and Applications Security, Redondo Beach, CA, July 8-11, 2007, pages 144-160. Published as Springer-Verlag Lecture Notes in Computer Science Vol. 4602, Data and Applications Security XXI (S. Barker and G. Ahn, editors), 2007. Full version. Presentation
    Google Scholar Search
  104. Baoxian Zhao, Ravi Sandhu, Xinwen Zhang and Xiaolin Qin, Towards a Times-Based Usage Control Model. In Proceedings 21st IFIP WG 11.3 Working Conf. on Data and Applications Security, Redondo Beach, CA, July 8-11, 2007, pages 227-242. Published as Springer-Verlag Lecture Notes in Computer Science Vol. 4602, Data and Applications Security XXI (S. Barker and G. Ahn, editors), 2007. Presentation
    Google Scholar Search
  105. Ezedin Barka and Ravi Sandhu, Framework for Agent-Based Role Delegation. In Proceedings IEEE International Conference on Communications (ICC), Glasgow, Scotland, June 24-28, 2007, pages 1361-1367. Presentation
    Google Scholar Search
  106. Min Xu, Xuxian Jiang, Ravi Sandhu and Xinwen Zhang, Towards a VMM-based Usage Control Framework for OS Kernel Integrity Protection. In Proceedings 12th ACM Symposium on Access Control Models and Technologies (SACMAT), June 20-22, 2007, Sophia Antipolis, France, pages 71-80. Presentation
    Google Scholar Search **
  107. Ram Krishnan, Ravi Sandhu and Kumar Ranganathan, PEI Models towards Scalable, Usable and High-Assurance Information Sharing. In Proceedings 12th ACM Symposium on Access Control Models and Technologies (SACMAT), June 20-22, 2007, Sophia Antipolis, France, pages 145-150. Full version. Presentation
    Google Scholar Search ...
  108. Xinwen Zhang, Michael Covington, Songqing Chen and Ravi Sandhu, SecureBus: Towards Application-Transparent Trusted Computing with Mandatory Access Control, AsiaCCS 2007. Presentation
    Google Scholar Search
  109. 2006: 6

  110. Zhixiong Zhang, Xinwen Zhang and Ravi Sandhu, ROBAC: Scalable Role and Organization Based Access Control Models, Proceedings of the 1st IEEE International Workshop on Trusted Collaboration (TrustCol 2006), Atlanta, Georgia, November 17, 2006, 9 pages.
    Google Scholar Search
  111. Xinwen Zhang, Francesco Parisi-Presicce, and Ravi Sandhu, Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing, IWSEC 2006. Presentation
    Google Scholar Search
  112. Xinwen Zhang, Masayuki Nakae, Michael Covington and Ravi Sandhu, A Usage-based Authorization Framework for Collaborative Computing Systems, SACMAT 2006. Presentation
    Google Scholar Search *
  113. Ravi Sandhu, Kumar Ranganathan and Xinwen Zhang, Secure Information Sharing Enabled by Trusted Computing and PEI Models (Invited Talk), AsiaCCS 2006. Presentation
    Google Scholar Search *
  114. Xinwen Zhang, Ravi Sandhu, and Francesco Parisi-Presicce, Safety Analysis of Usage Control Authorization Models, AsiaCCS 2006. Presentation
    Google Scholar Search ...
  115. Masayuki Nakae, Xinwen Zhang and Ravi Sandhu, A General Design Towards Secure Ad-Hoc Collaboration, AsiaCCS, 2006.
    Google Scholar Search
  116. 2005: 1

  117. Ravi Sandhu and Xinwen Zhang, Peer-to-Peer Access Control Architecture Using Trusted Computing Technology, SACMAT 2005. Presentation
    Google Scholar Search **
  118. 2004: 8

  119. Ezedin Barka and Ravi Sandhu, Role-Based Delegation Model/ Hierarchical Roles (RBDM1), ACSAC 2004.
    Google Scholar Search *
  120. Mohammad Al-Kahtani and  Ravi Sandhu, Rule-Based RBAC with Negative Authorization, ACSAC 2004.
    Google Scholar Search *
  121. Ravi Sandhu, A Perspective on Graphs and Access Control Models (Invited Talk), ICGT 2004. Presentation
    Google Scholar Search
  122. Jaehong Park, Xinwen Zhang,  and Ravi Sandhu, Attribute Mutability in Usage Control, IFIP11.3 2004. Presentation
    Google Scholar Search *
  123. Roshan Thomas and Ravi Sandhu, Towards a Multi-dimensional Characterization of Dissemination Control, POLICY, 2004.
    Google Scholar Search
  124. Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi Sandhu, A Logical Specification for Usage Control, SACMAT 2004. Presentation
    Google Scholar Search **
  125. S. Xu, W. Nelson Jr. and R. Sandhu, Enhancing Anonymity via Market Competition, Information Assurance and Security -- IEEE ITCC 2004.
    Google Scholar Search
  126. Roshan Thomas and Ravi Sandhu, Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions, IEEE PerSec'04.
    Google Scholar Search ...
  127. 2003: 5

  128. Ravi Sandhu and Jaehong Park, Usage Control: A Vision for Next Generation Access Control, MMM-ACNS 2003. Presentation
    Google Scholar Search ***
  129. Xinwen Zhang, Jaehong Park and Ravi Sandhu, Schema based XML Security: RBAC Approach, IFIP11.3 2003.
    Google Scholar Search ...
  130. Xinwen Zhang, Sejong Oh and Ravi Sandhu, PBDM: A Flexible Delegation Model in RBAC, SACMAT 2003. Presentation
    Google Scholar Search ***
  131. Mohammad A. Al-Kahtani and Ravi Sandhu, Induced Role Hierarchies with Attribute-Based RBAC, SACMAT 2003. Presentation
    Google Scholar Search *
  132. Shouhuai Xu and Ravi Sandhu. Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures, RSA-CT 2003. Presentation
    Google Scholar Search
  133. 2002: 6

  134. Ravi Sandhu, Mihir Bellare, and Ravi Ganesan, Password Enabled PKI: Virtual Smartcards vs. Virtual Soft Tokens, PKIRW 2002. Presentation
    Google Scholar Search 0.5*
  135. Mohammad A. Al-Kahtani and Ravi Sandhu, A Model for Attribute-Based User-Role Assignment, ACSAC 2002. Presentation
    Google Scholar Search 2*
  136. Sejong Oh, Ravi S. Sandhu, A Model for Role Administration Using Organization Structure, SACMAT 2002. Presentation
    Google Scholar Search 2*
  137. Jaehong Park and Ravi Sandhu, Towards Usage Control Models: Beyond Traditional Access Control, SACMAT 2002. Presentation
    Google Scholar Search 4*
  138. Jaehong Park and Ravi Sandhu, Originator Control in Usage Control, POLICY 2002.
    Google Scholar Search 0.5*
  139. Shouhuai Xu and Ravi Sandhu, Authenticated Multicast Immune to Denial-of-Service Attack, SAC 2002.
    Google Scholar Search 0.1*
  140. 2001: 4

  141. Pete Epstein and Ravi Sandhu, Engineering of Role-Permission Assignments, ACSAC 2001.
    Google Scholar Search 0.5*
  142. Joon Park, Gail-Joon Ahn and Ravi Sandhu, Role-based Access Control on the Web Using LDAP, IFIP11.3 2001.
    Google Scholar Search 0*
  143. Savith Kandala and Ravi Sandhu, Secure Role-Based Workflow Models, IFIP11.3 2001.
    Google Scholar Search 0.5*
  144. Ravi Sandhu, Future Directions in Role-Based Access Control Models (Keynote Lecture), MMM-ACNS 2001. Presentation
    Google Scholar Search 0.5*
  145. 2000: 8

  146. Ezedin Barka and Ravi Sandhu, Framework for Role-Based Delegation Models, ACSAC 2000. Presentation
    Google Scholar Search
  147. Jaehong Park, Ravi Sandhu and James Schifalacqua, Security Architectures for Controlled Digital Information Dissemination, ACSAC 2000. Presentation
    Google Scholar Search
  148. Joon S. Park and Ravi Sandhu, Binding Identities and Attributes Using Digitally Signed Certificates, ACSAC 2000.
    Google Scholar Search
  149. Ezedin Barka and Ravi Sandhu, A Role-Based Delegation Model and Some Extensions, NISSC 2000. Presentation
    Google Scholar Search
  150. Venkata Bhamidipati and Ravi Sandhu, Push Architectures for User-Role Assignment, NISSC 2000.
    Google Scholar Search
  151. Ravi Sandhu, Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way, ACM RBAC 2000. Presentation
    Google Scholar Search
  152. Ravi Sandhu, David Ferraiolo and Richard Kuhn, The NIST Model for Role-Based Access Control: Towards A Unified Standard, ACM RBAC 2000.
    Google Scholar Search
  153. Gail-Joon Ahn, Myong Kang, Joon Park and Ravi Sandhu, Injecting RBAC to Secure a Web-Based Workflow System, ACM RBAC 2000. Presentation
    Google Scholar Search
  154. 1999: 8

  155. Gail-Joon Ahn and Ravi Sandhu, The RSL99 Language for Role-Based Separation of Duty Constraints, ACM RBAC 1999.
    Google Scholar Search
  156. Pete Epstein and Ravi Sandhu, Towards a UML Based Approach to Role Engineering, ACM RBAC 1999.
    Google Scholar Search
  157. Joon S. Park and Ravi Sandhu, RBAC on the Web by Smart Certificates, ACM RBAC 1999.
    Google Scholar Search
  158. Ravi Sandhu and Qamar Munawer, Simulation of the Augmented Typed Access Matrix Model (ATAM) Using Roles, INFOSECU 1999.
    Google Scholar Search
  159. Ravi Sandhu and Qamar Munawer, The ARBAC99 Model for Administration of Roles, ACSAC 1999. Presentation
    Google Scholar Search
  160. Joon S. Park and Ravi Sandhu, Smart Certificates: Extending X.509 for Secure Attribute Service on the Web, NISSC 1999. Presentation
    Google Scholar Search
  161. Joon Park, Ravi Sandhu, and SreeLatha Ghanta, RBAC on the Web by Secure Cookies, IFIP11.3 1999.
    Google Scholar Search
  162. Savith Kandala and Ravi Sandhu, Extending the BFA Workflow Authorization Model to Express Weighted Voting, IFIP11.3 1999.
    Google Scholar Search
  163. 1998: 10

  164. Philip Hyland and Ravi Sandhu, Concentric Supervision of Security Applications: A New Security Management Paradigm, ACSAC 1998.
    Google Scholar Search
  165. Ravi Sandhu and Gail-Joon Ahn, Group Hierarchies with Decentralized User Assignment in Windows NT, IASTED-CSE 1998.
    Google Scholar Search
  166. Ravi Sandhu and Qamar Munawer, The RRA97 Model for Role-Based Administration of Role Hierarchies, ACSAC 1998.
    Google Scholar Search
  167. Ravi Sandhu and Qamar Munawer, How to do Discretionary Access Control Using Roles, ACM RBAC 1998. Presentation
    Google Scholar Search
  168. Ravi Sandhu, Role Activation Hierarchies, ACM RBAC 1998. Presentation
    Google Scholar Search
  169. Ravi Sandhu and Venkata Bhamidipati, An Oracle Implementation of the PRA97 Model for Permission-Role Assignment, ACM RBAC 1998. Presentation
    Google Scholar Search
  170. Ravi Sandhu and Joon S. Park, Decentralized User-Role Assignment for Web-based Intranets, ACM RBAC 1998.
    Google Scholar Search
  171. Philip Hyland and Ravi Sandhu, Management of Network Security Applications, NISSC 1998.
    Google Scholar Search
  172. Ravi Sandhu and Gail-Joon Ahn, Decentralized Group Hierarchies in UNIX: An Experiment and Lessons Learned, NISSC 1998.
    Google Scholar Search
  173. Chandramouli Ramaswamy and Ravi Sandhu, Role-Based Access Control Features in Commercial Database Management Systems (Winner of Best Paper Award), NISSC 1998.
    Google Scholar Search
  174. 1997: 4

  175. Tarik Himdi and Ravi Sandhu, Lattice Based Models for Controlled Sharing of Confidential Information in The Saudi Hajj System, ACSAC 1997.
    Google Scholar Search
  176. Ravi Sandhu, Venkata Bhamidipati, Edward Coyne, Srinivas Ganta and Charles Youman, The ARBAC97 Model for Role-Based Administration of Roles: Preliminary Description and Outline, ACM RBAC 1997. Presentation
    Google Scholar Search
  177. Ravi Sandhu and Venkata Bhamidipati, The URA97 Model for Role-Based User-Role Assignment, IFIP11.3 1997. Presentation
    Google Scholar Search
  178. Roshan Thomas and Ravi Sandhu, Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management, IFIP11.3 1997.
    Google Scholar Search
  179. 1996: 2

  180. Ravi Sandhu, Role Hierarchies and Constraints for Lattice-Based Access Controls, ESORICS 1996. Presentation
    Google Scholar Search
  181. Ravi Sandhu, Access Control: The Neglected Frontier (Keynote Lecture), ACISP 1996. Presentation
    Google Scholar Search
  182. 1995: 6

  183. Ravi Sandhu, Issues in RBAC, ACM RBAC 1995.
    Google Scholar Search
  184. Ravi Sandhu, Roles Versus Groups, ACM RBAC 1995.
    Google Scholar Search
  185. Ravi Sandhu, Rationale for the RBAC96 Family of Access Control Models, ACM RBAC 1995.
    Google Scholar Search
  186. Fang Chen and Ravi Sandhu, Constraints for Role-Based Access Control, ACM RBAC 1995.
    Google Scholar Search
  187. Jeremy Epstein and Ravi Sandhu, NetWare 4 as an Example of Role-Based Access Control, ACM RBAC 1995.
    Google Scholar Search
  188. Fang Chen and Ravi Sandhu, The Semantics and Expressive Power of the MLR Data Model, OAKLAND 1995.
    Google Scholar Search
  189. 1994: 7

  190. Roshan Thomas and Ravi Sandhu, Conceptual Foundations for a Model of Task-based Authorizations, CSFW 1994.
    Google Scholar Search
  191. Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman, Role-Based Access Control: A Multi-Dimensional View, ACSAC 1994. Presentation
    Google Scholar Search
  192. Ravi Sandhu and Srinivas Ganta, On the Expressive Power of the Unary Transformation Model, ESORICS 1994. Presentation
    Google Scholar Search
  193. Roshan Thomas and Ravi Sandhu, Supporting Object-based High-assurance Write-up in Multilevel databases for the Replicted Architecture, ESORICS 1994.
    Google Scholar Search
  194. Ravi Sandhu and Hal Feinstein, A Three Tier Architecture for Role-Based Access Control, NCSC 1994. Presentation
    Google Scholar Search
  195. Paul Ammann and Ravi Sandhu, One-Representative Safety Analysis in the Non-Monotonic Transform Model, CSFW 1994.
    Google Scholar Search
  196. Ravi Sandhu and Srinivas Ganta, On the Minimality of Testing for Rights in Transformation Models, OAKLAND 1994.
    Google Scholar Search
  197. 1993: 9

  198. Roshan Thomas and Ravi Sandhu, Towards a Task-Based Paradigm for Flexible and Adaptable Access Control in Distributed Applications, NSP 1993.
    Google Scholar Search
  199. Roshan Thomas and Ravi Sandhu, Concurrency, Synchronization, and Scheduling to Support High-assurance Write-up in Multilevel Object-based Computing, OOPSLA Workshop 1993.
    Google Scholar Search
  200. Ravi Sandhu and Srinivas Ganta, Expressive Power of the Single-Object Typed Access Matrix Model, ACSAC 1993.
    Google Scholar Search
  201. Ravi Sandhu and Sushil Jajodia, Referential Integrity in Multilevel Secure Databases, NCSC 1993.
    Google Scholar Search
  202. Roshan Thomas and Ravi Sandhu, Discretionary Access Control in Object-Oriented Databases: Issues and Research Directions, NCSC 1993.
    Google Scholar Search
  203. Roshan Thomas and Ravi Sandhu, Task Based Authorization: A Paradigm for Flexible and Adaptable Access Control in Distributed Applications, NCSC 1993.
    Google Scholar Search
  204. Ravi Sandhu, On Five Definitions of Data Integrity, IFIP11.3 1993. Presentation
    Google Scholar Search
  205. Roshan Thomas and Ravi Sandhu, Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Multilevel Transactions, IFIP11.3 1993.
    Google Scholar Search
  206. Ravi Sandhu and Srinivas Ganta, On Testing for Absence of Rights in Access Control Models, CSFW 1993.
    Google Scholar Search
  207. 1992: 8

  208. Paul Ammann and Ravi Sandhu, Implementing Transaction Control Expressions by Checking for Absence of Access Rights, ACSAC 1992.
    Google Scholar Search
  209. Ravi Sandhu and Sushil Jajodia, Polyinstantiation for Cover Stories, ESORICS 1992.
    Google Scholar Search
  210. Ravi Sandhu, A Lattice Interpretation of the Chinese Wall Policy, NCSC 1992.
    Google Scholar Search
  211. Ravi Sandhu and Gurpreet Suri, Implementation Considerations for the Typed Access Matrix Model in a Distributed Environment (Winner of Outstanding Paper Award), NCSC 1992.
    Google Scholar Search
  212. Ravi Sandhu, The Typed Access Matrix Model, OAKLAND 1992.
    Google Scholar Search
  213. Ravi Sandhu and Gurpreet Suri, Non-Monotonic Transformations of Access Rights, OAKLAND 1992.
    Google Scholar Search
  214. Roshan Thomas and Ravi Sandhu, Implementing the Message Filter Object-oriented Security Model without Trusted Subjects, IFIP11.3 1992.
    Google Scholar Search
  215. Paul Ammann, Richard Lipton and Ravi Sandhu, The Expressive Power of Multi-Parent Creation in Monotonic Access Control Models, CSFW 1992.
    Google Scholar Search
  216. 1991: 10

  217. John McDermott, Sushil Jajodia and Ravi Sandhu, A Single-Level Scheduler for the Replicated Architecture for Multilevel Secure Databases, ACSAC 1991.
    Google Scholar Search 1*
  218. Paul Ammann, Ravi Sandhu and Gurpreet Suri, A Distributed Implementation of the Extended Schematic Protection Model, ACSAC 1991.
    Google Scholar Search 0*
  219. Ravi Sandhu, Roshan Thomas and Sushil Jajodia, Supporting Timing Channel Free Computations in Multilevel Secure Object-Oriented Databases, IFIP11.3 1991.
    Google Scholar Search
  220. Ravi Sandhu and Sushil Jajodia, Honest Databases That Can Keep Secrets, NCSC 1991.
    Google Scholar Search
  221. Ravi Sandhu and Gurpreet Suri, A Distributed Implementation of the Transform Model, NCSC 1991.
    Google Scholar Search
  222. Ravi Sandhu, Roshan Thomas and Sushil Jajodia, A Secure Kernelized Architecture for Multilevel Object-Oriented Databases, CSFW 1991.
    Google Scholar Search
  223. Edgar Sibley, James Michael and Ravi Sandhu, A Case Study of Security Policy for Manual and Automated Systems, COMPASS 1991.
    Google Scholar Search
  224. Sushil Jajodia and Ravi Sandhu, Toward a Multilevel Secure Relational Data Model, SIGMOD 1991.
    Google Scholar Search
  225. Paul Ammann and Ravi Sandhu, Safety Analysis for the Extended Schematic Protection Model, OAKLAND 1991.
    Google Scholar Search
  226. Sushil Jajodia and Ravi Sandhu, A Novel Decomposition of Multilevel Relations into Single-Level Relations, OAKLAND 1991.
    Google Scholar Search
  227. 1990: 8

  228. Paul Ammann and Ravi Sandhu, Extending the Creation Operation in the Schematic Protection Model, ACSAC 1990.
    Google Scholar Search 26+
  229. Sushil Jajodia, Ravi Sandhu and Edgar Sibley, Update Semantics for Multilevel Relations, ACSAC 1990.
    Google Scholar Search 30+
  230. Ravi Sandhu and Sushil Jajodia, Integrity Mechanisms in Database Management Systems, NCSC 1990.
    Google Scholar Search 40+
  231. Ravi Sandhu and Sushil Jajodia, Polyinstantiation Integrity in Multilevel Relations, OAKLAND 1990.
    Google Scholar Search 140+
  232. Ravi Sandhu, Separation of Duties in Computerized Information Systems, IFIP11.3 1990.
    Google Scholar Search 170+
  233. Sushil Jajodia and Ravi Sandhu, Polyinstantiation Integrity in Multilevel Relations Revisited,, IFIP11.3 1990.
    Google Scholar Search 3+
  234. Ravi Sandhu, Sushil Jajodia and Teresa Lunt, A New Polyinstantiation Integrity Constraint for Multilevel Relations, CSFW 1990.
    Google Scholar Search 30+
  235. Sushil Jajodia and Ravi Sandhu, A Formal Framework for Single Level Decomposition of Multilevel Relations, CSFW 1990.
    Google Scholar Search 10+
  236. 1989: 3

  237. Ravi Sandhu, Mandatory Controls for Database Integrity, IFIP11.3 1989.
    Google Scholar Search 20+
  238. Ravi Sandhu, Transformation of Access Rights, OAKLAND 1989.
    Google Scholar Search 20+
  239. Ravi Sandhu, Terminology, Criteria and System Architectures for Data Integrity, IWDI 1989.
    Google Scholar Search 10+
  240. 1988: 1

  241. Ravi Sandhu, Transaction Control Expressions for Separation of Duties, ACSAC 1988.
    Google Scholar Search 220+
  242. 1987: 1

  243. Ravi Sandhu, On Some Cryptographic Solutions for Access Control in a Tree Hierarchy, ACM-IEEE 1987.
    Google Scholar Search 50+
  244. 1986: 1

  245. Ravi Sandhu and Micheal Share, Some Owner-Based Schemes with Dynamic Groups in the Schematic Protection Model, OAKLAND 1986.
    Google Scholar Search 20+
  246. 1985: 1

  247. Ravi Sandhu, Analysis of Acyclic Attenuating Systems for the SSR Protection Model, OAKLAND 1985.
    Google Scholar Search 1+
  248. 1984: 1

  249. Ravi Sandhu, The SSR Model for Specification of Authorization Policies: A Case Study in Project Control, COMPSAC 1984.
    Google Scholar Search 0+