Journal Papers


Home
Publications
Most Cited Papers
Guide to Papers
Patents
Grants
PhD's Awarded
Invited Talks etc.
Teaching
Vitae etc.
Contact Me

Up Conference Papers Journal Papers Articles Miscellaneous Acronyms

    Early Access: 1

  1. Qi Li, Ravi Sandhu, Xinwen Zhang and Mingwei Xu, Mandatory Content Access Control for Privacy Protection in Information Centric Networks. IEEE Transactions on Dependable and Secure Computing. Accepted 2015.
    Google Scholar Search
  2. 2016: 3

  3. Rajkumar P.V. and Ravi Sandhu, Safety Decidability for Pre-Authorization Usage Control with Finite Attribute Domains. IEEE Transactions on Dependable and Secure Computing. Accepted 2015.
    Google Scholar Search
  4. Yuan Cheng, Jae Park and Ravi Sandhu, An Access Control Model for Online Social Networks Using User-to-User Relationships. IEEE Transactions on Dependable and Secure Computing. Volume 13, Number 4, July/August 2016, pages 424-436.
    Google Scholar Search
  5. Lianshan Sun, Jaehong Park, Dang Nguyen, and Ravi Sandhu, A Provenance-Aware Access Control Framework with Typed Provenance. IEEE Transactions on Dependable and Secure Computing. Volume 13, Number 4, July/August 2016, pages 411-423.
    Google Scholar Search
  6. 2015: 3

  7. Bao Liu and Ravi Sandhu, Fingerprint-Based Detection and Diagnosis of Malicious Programs in Hardware. IEEE Transactions on Reliability, Volume 64, Number 3, September 2015, pages 1068-1077.
    Google Scholar Search
  8. Bo Tang, Ravi Sandhu and Qi Li, Multi-Tenancy Authorization Models for Collaborative Cloud Services. Concurrency and Computation: Practice and Experience, Volume 27, Number 11, August 2015, pages 2851-2868.
    Google Scholar Search
  9. Qi Li, Xinwen Zhang, Qingji Zheng, Ravi Sandhu, and Xiaoming Fu. LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking, IEEE Transactions on Information Forensics and Security, Volume 10, Number 2, February 2015, pages 308-320.
    Google Scholar Search
  10. 2014: 1

  11. Elisa Bertino, Gabriel Ghinita, Murat Kantarcioglu, Dang Nguyen, Jae Park, Ravi Sandhu, Salmin Sultana, Bhavani Thuraisingham, and Shouhuai Xu. A Roadmap for Privacy-Enhanced Secure Data Provenance, Journal of Intelligent Information Systems, Volume 43, Number 3, May 2014, pages 481-501.
    Google Scholar Search
  12. 2013: 2

  13. Khalid Bijon, Ram Krishnan and Ravi Sandhu, Constraints Specification in Attribute Based Access Control, ASE Science Journal, Volume 2, Number 3, 14 pages.
    Google Scholar Search
  14. Mukesh Singhal, Santosh Chandrasekhar, Tingjian Ge, Ravi Sandhu, Ram Krishnan, Gail-Joon Ahn and Elisa Bertino, Collaboration in Multicloud Computing Environments: Framework and Security Issues, IEEE Computer, Volume 46, Number 2, February 2013, pages 76-84.
    Google Scholar Search
  15. 2012: 1

  16. Ravi Sandhu, Speculations on the Science of Web User Security, Computer Networks, Volume 56, Number 18, Dec. 2012, pages 3891-3895.
    Google Scholar Search
  17. 2011: 3

  18. Ram Krishnan, Jianwei Niu, Ravi Sandhu and William H. Winsborough, Group-Centric Secure Information-Sharing Models for Isolated Groups, ACM TISSEC, Volume 14, Number 3, Nov. 2011, 29 pages.
    Google Scholar Search
  19. Ludwig Fuchs, Gunther Pernul and Ravi Sandhu, Roles in Information Security-A Survey and Classification of the Research Area, Computers & Security, Volume 30, Number 8, November 2011, pages 748-769.
    Google Scholar Search
  20. Jaehong Park, Ravi Sandhu and Yuan Cheng, A User-Activity-Centric Framework for Access Control in Online Social Networks , IEEE Internet Computing, 15(5): 62-65, September 2011.
    Google Scholar Search
  21. 2010: 1

  22. Moo Nam Ko, Gorrell Cheek, Mohamed Shehab and Ravi Sandhu, Social-Networks Connect Services, IEEE Computer, Volume 43, Number 8 (Cover Article), August 2010, pages 37-43.
    Google Scholar Search
  23. 2008: 1

  24. Zhang, X., Nakae, M., Covington, M., and Sandhu, R., Toward a Usage-Based Security Framework for Collaborative Computing Systems, ACM TISSEC, Volume 11, Number 1, Feb. 2008, pages 1-36.
    Google Scholar Search
  25. 2007: 1

  26. David Ferraiolo, Rick Kuhn and Ravi Sandhu, RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control", IEEE Security & Privacy, Volume 5, Number 6, Nov./Dec. 2007, pages 51-53.
    Google Scholar Search
  27. 2006: 3

  28. Sejong Oh, Ravi Sandhu and Xinwen Zhang, An Effective Role Administration Model Using Organization Structure, ACM Transactions on Information and System Security, Volume 9, Number 2, May 2006, pages 113-137.
    Google Scholar Search
  29. Elisa Bertino, Latifur Khan, Ravi Sandhu and Bhavani Thuraisingham, Secure Knowledge Management: Confidentiality, Trust, and Privacy, IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 36(3):429-438, May 2006.
    Google Scholar Search
  30. Ravi Sandhu, Xinwen Zhang, Kumar Ranganathan and Michael J. Covington, Client-side Access Control Enforcement Using Trusted Computing and PEI Models, Journal of High Speed Networks, Volume 15, Number 3, 2006, Pages 229-245.
    Google Scholar Search
  31. 2005: 3

  32. Xinwen Zhang, Francesco Parisi-Presicce, Ravi Sandhu, and Jaehong Park, Formal Model and Policy Specification of Usage Control, ACM Transactions on Information and System Security (TISSEC), 8(4): 351-387, 2005
    Google Scholar Search
  33. Xinwen Zhang, Songqing Chen, and Ravi Sandhu, Enhancing Data Authenticity and Integrity in P2P Systems, IEEE Internet Computing, Special Issue on Security for P2P/Ad Hoc Networks, 9(6): 42-49, November 2005.
    Google Scholar Search
  34. Elisa Bertino and Ravi Sandhu, Database Security-Concepts, Approaches, and Challenges. IEEE Trans. Dependable Sec. Comput. 2(1): 2-19, 2005.
    Google Scholar Search
  35. 2004: 1

  36. Jaehong Park and Ravi Sandhu, The UCONABC Usage Control Model, ACM Transactions on Information and System Security, Volume 7, Number 1, February 2004, pages 128-174.
    Google Scholar Search
  37. 2003: 1

  38. Ravi Sandhu, Good-Enough Security: Toward a Pragmatic Business-Driven Discipline, IEEE Internet Computing, Vol. 7, No.1, January/February 2003.
    Google Scholar Search
  39. 2001: 3

  40. David F. Ferraiolo, Ravi Sandhu, Serban Gavrila, D. Richard Kuhn and Ramaswamy Chandramouli, Proposed NIST Standard for Role-Based Access Control, ACM Transactions on Information and Systems Security (TISSEC), Volume 4, Number 3, August 2001. Highlights
    Google Scholar Search
    Also see ANSI INCITS 359-2004 Standard for Role Based Access Control
  41. Joon Park, Ravi Sandhu and Gail-Joon Ahn, Role-Based Access Control on the Web, ACM Transactions on Information and Systems Security (TISSEC), Volume 4, Number 1, February 2001.
    Google Scholar Search
  42. Gail-Joon Ahn and Ravi Sandhu, Decentralized User Group Assignment in Windows NT, Journal of Systems and Software. Volume 56, Issue 1, February 2001, pages 39-49.
    Google Scholar Search
  43. 2000: 3

  44. Gail-Joon Ahn and Ravi Sandhu, Role-Based Authorization Constraints Specification, ACM Transactions on Information and Systems Security (TISSEC), Volume 3, Number 4, November 2000. Errata
    Google Scholar Search
  45. Joon S. Park and Ravi Sandhu, Secure Cookies on the Web, IEEE Internet Computing, July 2000.
    Google Scholar Search
  46. Sylvia Osborn, Ravi Sandhu and Qamar Munawer, Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies, ACM Transactions on Information and Systems Security (TISSEC), Volume 3, Number 2, February 2000.
    Google Scholar Search
  47. 1999: 3

  48. Ravi Sandhu and Bhamidipati, Role-Based Administration of User-Role Assignment: The URA97 Model and its Oracle Implementation, Journal of Computer Security, Volume 7, 1999.
    Google Scholar Search
  49. Gail-Joon Ahn and Ravi Sandhu, Towards Role-Based Administration in Network Information Services, Journal of Network and Computer Applications, Volume 22,Number 3, July 1999.
    Google Scholar Search
  50. Ravi Sandhu, Venkata Bhamidipati and Qamar Munawer, The ARBAC97 Model for Role-Based Administration of Roles, ACM Transactions on Information and Systems Security (TISSEC), Volume 2, Number, February 1999.
    Google Scholar Search
  51. 1998: 1

  52. Ravi Sandhu and Fang Chen, The Multilevel Relational (MLR) Data Model, ACM Transactions on Information and Systems Security (TISSEC), Volume 1, Number 1,  June 1998.
    Google Scholar Search
  53. 1996: 4

  54. Ravi Sandhu and P. Samarati, Authentication, Access Control and Audit, ACM Computing Surveys, 50th anniversary commemorative issue, Volume 28, Number 1, March 1996.
    Google Scholar Search
  55. Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman, Role-Based Access Control Models, IEEE Computer, Volume 29, Number 2, February 1996.
    Google Scholar Search
  56. Roshan Thomas and Ravi Sandhu, A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases, IEEE Transactions on Knowledge and Data Engineering, Volume 8, Number 1, February 1996.
    Google Scholar Search
  57. Paul Ammann, Ravi Sandhu and Richard Lipton, The Expressive Power of Multi-Parent Creation in Monotonic Access Control Models, Journal of Computer Security, Volume 4, Numbers 2-3, January 1996, 149-165.

  58. 1994: 1

  59. Ravi Sandhu and P. Samarati, Access Control: Principles and Practice, IEEE Communications, Volume 32, Number 9, September 1994.
    Google Scholar Search
  60. 1993: 3

  61. Ravi Sandhu, Lattice-Based Access Control Models, IEEE Computer, Volume 26, Number 11 (Cover Article), November 1993.
    Google Scholar Search
  62. Roshan Thomas and Ravi Sandhu, A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up, Journal of Computer Security, Volume 2, Number 3, 1993.
    Google Scholar Search
  63. Ravi Sandhu and Gurpreet Suri, A Distributed Capability-Based Architecture for the Transform Model, Computers and Security, Volume 12, Number 3, May 1993.
    Google Scholar Search
  64. 1992: 5

  65. Paul Ammann and Ravi Sandhu, The Extended Schematic Protection Model, Journal of Computer Security, Volume 1, Number 4, 1992.
    Google Scholar Search
  66. Ravi Sandhu, Lattice-Based Enforcement of Chinese Walls, Computers and Security, Volume 11, Number 8, December 1992.
    Google Scholar Search
  67. Ravi Sandhu and Sushil Jajodia, Eliminating Polyinstantiation Securely, Computers and Security, Volume 11, Number 6, October 1992.
    Google Scholar Search
  68. Ravi Sandhu, Undecidability of Safety for the Schematic Protection Model with Cyclic Creates, Journal of Computer and System Sciences, Volume 44, Number 1, February 1992.
    Google Scholar Search
  69. Ravi Sandhu, Expressive Power of the Schematic Protection Model, Journal of Computer Security, Volume 1, Number 1, 1992.
    Google Scholar Search
  70. 1991: 1

  71. Ravi Sandhu and Sushil Jajodia, Integrity Principles and Mechanisms in Database Management Systems, Computers and Security, Volume 10, Number 5, August 1991.
    Google Scholar Search
  72. 1989: 3

  73. Ravi Sandhu, Recognizing Immediacy in an NTree and its Application to Protection Groups, IEEE Transactions on Software Engineering, Volume 15, Number 12, December 1989.
    Google Scholar Search
  74. Ravi Sandhu, The Demand Operation in the Schematic Protection Model, Information Processing Letters, Volume 32, Number 4, September 1989.
    Google Scholar Search
  75. Ravi Sandhu, The Reflected Tree Hierarchy for Protection and Sharing, Information Processing Letters, Volume 30, Number 1, January 1989.
    Google Scholar Search
  76. 1988: 4

  77. Ravi Sandhu, Nested Categories for Access Control, Computers and Security, Volume 7, Number 6, December 1988.
    Google Scholar Search
  78. Ravi Sandhu, The NTree: A Two Dimension Partial Order for Protection Groups, ACM Transactions on Computer Systems, Volume 6, Number 2, May 1988.
    Google Scholar Search
  79. Ravi Sandhu, The Schematic Protection Model: Its Definition and Analysis for Acyclic Attenuating Schemes , Journal of the ACM, Volume 35, Number 2, April 1988.
    Google Scholar Search
  80. Ravi Sandhu, Cryptographic Implementation of a Tree Hierarchy for Access Control, Information Processing Letters, Volume 27, Number 2, February 1988.
    Google Scholar Search