Most Cited Papers
Guide to Papers
PhD's Awarded
Invited Talks etc.
Vitae etc.
Contact Me

Up Conference Papers Journal Papers Articles Miscellaneous Acronyms

  1. Ravi Sandhu, NSF CREST Center for Security Privacy Enhanced Cloud Computing (C-SPECC) (pptx) (pdf). Poster presented at NSF INCLUDES Summit: Broadening Participation through Center-Scale Research Activities, January 8-10, 2018, Alexandria, VA.
  2. Smriti Bhatt, Farhan Patwa and Ravi Sandhu, Access Control Models for a Multi-Cloud IoT Architecture (pdf). Poster presented at Grace Hopper Celebration, October 4-6, 2017, Orlando, FL.
  3. Maanak Gupta, Farhan Patwa and Ravi Sandhu, Access Control Model for the Hadoop Ecosystem. In Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies (SACMAT) Poster Session, Indianapolis, Indiana, June 21-23, 2017, pages 125-127. Poster(pptx) (pdf)
    Google Scholar Search
  4. Rajkumar P.V. and Ravi Sandhu, Security Enhanced Administrative Role Based Access Control Models. In Proceedings of 23rd ACM Conference on Computer and Communications Security (CCS) Poster Session, Vienna, Austria, October 24-28, 2016, pages 1802-1804. Poster(pptx) (pdf)
    Google Scholar Search -*
  5. Navid Pustchi, Farhan Patwa and Ravi Sandhu, Multi Cloud IaaS with Domain Trust in OpenStack. In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY) Poster Session, March 9-11, 2016, New Orleans, Louisiana, 3 pages. Poster(pdf)
    Google Scholar Search -*
  6. Prosunjit Biswas, Farhan Patwa and Ravi Sandhu, Content Level Access Control for OpenStack Swift Storage. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (CODASPY) Poster Session, March 2-4, 2015, San Antonio, Texas, pages 123-126. Poster(pdf)
    Google Scholar Search 0*
  7. Yun Zhang, Ram Krishnan and Ravi Sandhu, Secure Information and Resource Sharing in Cloud. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (CODASPY) Poster Session, March 2-4, 2015, San Antonio, Texas, pages 131-133. Poster(pptx) (pdf)
    Google Scholar Search 0*
  8. Samee Khan, Ravi Sandhu, Mark R. Hagerott, Martin Carlisle and Weisong Shi, Roundtable on Security Issues in the Cloud-Assisted Internet of Things, IEEE Cloud Computing, March/April, 2016.
  9. Tahmina Ahmed, Ravi Sandhu, Khalid Bijon and Ram Krishnan, Equivalence of Group-Centric Collaboration with Expedient Insiders (GEI) and LBAC with Collaborative Compartments (LCC). Technical Report CS-TR-2012-010, Department of Computer Science, University of Texas at San Antonio, August 2012.
  10. Sandro Etalle, Alexander Pretschner, Ravi Sandhu and Marianne Winslett, Dagstuhl Seminar 10141: Distributed Usage Control. Schloss Dagstuhl, Germany, April 7-9, 2010.
  11. Ravi Sandhu, Online Hygeine Helps Keep You Safe. Catalyst, Spring 2010, College of Sciences, UTSA.
  12. Tim Finin, Anupam Joshi, Hillol Kargupta, Yelena Yesha, Joel Sachs, Elisa Bertino, Ninghui Li, Chris Clifton, Gene Spafford, Bhavani Thuraisingham, Murat Kantarcioglu, Alain Bensoussan, Nathan Berg, Latifur Khan, Jiawei Han, ChengXiang Zhai, Ravi Sandhu, Shouhuai Xu, Jim Massaro and Lada Adamic, Assured Information Sharing Life Cycle. Proc. IEEE International Conference on Intelligence and Security Informatics (ISI-2009): Workshop on Assured Information Sharing (WAIS), June 8-11, 2009, Dallas, Texas, pages 307-309. Presentation (ppt) Presentation (pdf)
    Google Scholar Search
  13. S. Xu and R. Sandhu. Applying OM-AM to Analyze Digital Rights Management. 7th International Conference on E-Commerce Research, 2004.
  14. M. Bellare and R. Sandhu. The Security of Practical Two-Party RSA Signature Schemes. Unpublished manuscript, 2001.
  15. Ravi Sandhu, Design and Implementation of Multilevel Databases, RADC 1994.
    Google Scholar Search
  16. Ravi Sandhu, On Some Research Issues in Multilevel Database Security, RADC 1992.
  17. Ravi Sandhu, Evaluation by Parts of Trusted Database Management Systems, RADC 1991.
  18. Sushil Jajodia and Ravi Sandhu, Enforcing Primary Key Requirements in Multilevel Relations, RADC 1991.
  19. Sushil Jajodia and Ravi Sandhu, Key Problems in Multilevel-Secure Database Management Systems, RADC 1990.
  20. Ravi Sandhu and Sushil Jajodia, Restricted Polyinstantiation or How to Close Signalling Channels Without Duplicity, RADC 1990.
    Google Scholar Search
  21. Ravi Sandhu, Decentralized Management of Security in Distributed Systems, DSOM 1991.
  22. Duncan A. Buell and Ravi Sandhu, Identity Management, IEEE Internet Computing, November/December, 2003.
  23. Ravi S. Sandhu, The Technology of Trust, IEEE Internet Computing, Vol. 6, No. 6, 2002. 
  24. Li Gong and Ravi Sandhu, What makes security technologies relevant?, IEEE Internet Computing, 2000.
  25. Ravi Sandhu, ACM RBAC Workshop(1995) Summary, ACM RBAC 1995.
  26. B. Thuraisingham, Ravi Sandhu & T.C.Ting, Security for Object-Oriented Systems: An Editorial Overview, SOOS 1994.
  27. Ravi Sandhu, Role-Based Access Control: A Position Statement, NCSC 1994.
  28. R. Ganesan and Ravi Sandhu, Securing Cyberspace, Communications of the ACM, 1994.
  29. Ravi Sandhu, Security of OODBMSs (or Systems), ACM SIGPLAN Notices, Volume: 28, Issue: 10, Pages: 307-307, Oct 1993.
    Google Scholar Search
  30. Ravi Sandhu, Guest Editor's Preface, Journal of Computer Security, 1992.
  31. Ravi Sandhu, Report on the Computer Security Foundations Workshop III, Cipher - Newsletter of the IEEE Technical Committee on Security & Privacy, Winter 1991.
  32. Ravi Sandhu & G.W. Kincaid, Super Smart Cards Promise More Power and Versatility, Signal, AFCEA's Int. Journal of C4I, February 1991.
  33. Sushil Jajodia & Ravi Sandhu, Database Security: Current Status and Key Issues, ACM SIGMOD Record, December, 1990.
  34. Ravi Sandhu, Report on the 3rd NIST Invitational Workshop on Integrity, Data Security Newsletter / November, 1990.
  35. Ravi Sandhu, Multilevel Object-Oriented Database Systems, NCSC 1990.
  36. Discussion Summary, Ravi Sandhu, Database Security III: Status and Prospects, 1990.
  37. Ravi Sandhu, A Perspective on Integrity Mechanisms, ACSAC / 1989.
  38. Ravi Sandhu, Expressive Power of the Schematic Protection Model, CSFW 1988.
  39. Ravi Sandhu, Current Status of the Safety Problem in Access Control, Cipher---Newsletter of the IEEE Technical Committee on Security & Privacy, Fall 1989.