Most Cited Papers
Guide to Papers
PhD's Awarded
Invited Talks etc.
Vitae etc.
Contact Me

Up Conference Papers Journal Papers Articles Miscellaneous Acronyms

  1. Samee Khan, Ravi Sandhu, Mark R. Hagerott, Martin Carlisle and Weisong Shi, Roundtable on Security Issues in the Cloud-Assisted Internet of Things, IEEE Cloud Computing, March/April, 2016.
  2. Tahmina Ahmed, Ravi Sandhu, Khalid Bijon and Ram Krishnan, Equivalence of Group-Centric Collaboration with Expedient Insiders (GEI) and LBAC with Collaborative Compartments (LCC). Technical Report CS-TR-2012-010, Department of Computer Science, University of Texas at San Antonio, August 2012.
  3. Sandro Etalle, Alexander Pretschner, Ravi Sandhu and Marianne Winslett, Dagstuhl Seminar 10141: Distributed Usage Control. Schloss Dagstuhl, Germany, April 7-9, 2010.
  4. Ravi Sandhu, Online Hygeine Helps Keep You Safe. Catalyst, Spring 2010, College of Sciences, UTSA.
  5. Tim Finin, Anupam Joshi, Hillol Kargupta, Yelena Yesha, Joel Sachs, Elisa Bertino, Ninghui Li, Chris Clifton, Gene Spafford, Bhavani Thuraisingham, Murat Kantarcioglu, Alain Bensoussan, Nathan Berg, Latifur Khan, Jiawei Han, ChengXiang Zhai, Ravi Sandhu, Shouhuai Xu, Jim Massaro and Lada Adamic, Assured Information Sharing Life Cycle. Proc. IEEE International Conference on Intelligence and Security Informatics (ISI-2009): Workshop on Assured Information Sharing (WAIS), June 8-11, 2009, Dallas, Texas, pages 307-309. Presentation (ppt) Presentation (pdf)
    Google Scholar Search
  6. S. Xu and R. Sandhu. Applying OM-AM to Analyze Digital Rights Management. 7th International Conference on E-Commerce Research, 2004.
  7. M. Bellare and R. Sandhu. The Security of Practical Two-Party RSA Signature Schemes. Unpublished manuscript, 2001.
  8. Ravi Sandhu, Design and Implementation of Multilevel Databases, RADC 1994.
    Google Scholar Search
  9. Ravi Sandhu, On Some Research Issues in Multilevel Database Security, RADC 1992.
  10. Ravi Sandhu, Evaluation by Parts of Trusted Database Management Systems, RADC 1991.
  11. Sushil Jajodia and Ravi Sandhu, Enforcing Primary Key Requirements in Multilevel Relations, RADC 1991.
  12. Sushil Jajodia and Ravi Sandhu, Key Problems in Multilevel-Secure Database Management Systems, RADC 1990.
  13. Ravi Sandhu and Sushil Jajodia, Restricted Polyinstantiation or How to Close Signalling Channels Without Duplicity, RADC 1990.
    Google Scholar Search
  14. Ravi Sandhu, Decentralized Management of Security in Distributed Systems, DSOM 1991.
  15. Duncan A. Buell and Ravi Sandhu, Identity Management, IEEE Internet Computing, November/December, 2003.
  16. Ravi S. Sandhu, The Technology of Trust, IEEE Internet Computing, Vol. 6, No. 6, 2002. 
  17. Li Gong and Ravi Sandhu, What makes security technologies relevant?, IEEE Internet Computing, 2000.
  18. Ravi Sandhu, ACM RBAC Workshop(1995) Summary, ACM RBAC 1995.
  19. B. Thuraisingham, Ravi Sandhu & T.C.Ting, Security for Object-Oriented Systems: An Editorial Overview, SOOS 1994.
  20. Ravi Sandhu, Role-Based Access Control: A Position Statement, NCSC 1994.
  21. R. Ganesan and Ravi Sandhu, Securing Cyberspace, Communications of the ACM, 1994.
  22. Ravi Sandhu, Security of OODBMSs (or Systems), ACM SIGPLAN Notices, Volume: 28, Issue: 10, Pages: 307-307, Oct 1993.
    Google Scholar Search
  23. Ravi Sandhu, Guest Editor's Preface, Journal of Computer Security, 1992.
  24. Ravi Sandhu, Report on the Computer Security Foundations Workshop III, Cipher - Newsletter of the IEEE Technical Committee on Security & Privacy, Winter 1991.
  25. Ravi Sandhu & G.W. Kincaid, Super Smart Cards Promise More Power and Versatility, Signal, AFCEA's Int. Journal of C4I, February 1991.
  26. Sushil Jajodia & Ravi Sandhu, Database Security: Current Status and Key Issues, ACM SIGMOD Record, December, 1990.
  27. Ravi Sandhu, Report on the 3rd NIST Invitational Workshop on Integrity, Data Security Newsletter / November, 1990.
  28. Ravi Sandhu, Multilevel Object-Oriented Database Systems, NCSC 1990.
  29. Discussion Summary, Ravi Sandhu, Database Security III: Status and Prospects, 1990.
  30. Ravi Sandhu, A Perspective on Integrity Mechanisms, ACSAC / 1989.
  31. Ravi Sandhu, Expressive Power of the Schematic Protection Model, CSFW 1988.
  32. Ravi Sandhu, Current Status of the Safety Problem in Access Control, Cipher---Newsletter of the IEEE Technical Committee on Security & Privacy, Fall 1989.