| |
- Yun Zhang, Ram Krishnan, Farhan Patwa and Ravi Sandhu, Access Control in Cloud IaaS,
Security, Privacy, and Digital Forensics in the Cloud, edited by Lei Chen, Hassan Takabi and Nhien-An Le-Khac. John Wiley, pages 81-108, 2019.
Google Scholar Search
- Zhixiong Zhang, Xinwen Zhang, and Ravi Sandhu, Towards a Scalable Role and Organization
Based Access Control Model with Decentralized Security
Administration,
Handbook of Research on Social and Organizational Liabilities in
Information Security, edited by M. Gupta and R. Sharman, IGI Global,
pages 94-117, 2009.
Google Scholar Search
- Munir Majdalawieh, Francesco Parisi-Presicce and Ravi Sandhu, RBAC Model for SCADA,
Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications, Springer, pages 329-335, 2007.
Google Scholar Search
- Ravi Sandhu, Role-Based Access
Control, Advances in Computers, Vol.46, Academic Press 1998.
Google Scholar Search
- Ravi Sandhu and P. Samarati, Authentication,
Access Control and Intrusion Detection, The Computer Science and
Engineering Handbook, CRC Press 1997.
Google Scholar Search
- Ravi Sandhu and Sushil Jajodia, Integrity
Mechanisms in Database Management Systems, Information Security: An
Integrated Collection of Essays, IEEE Computer Society Press 1994.
- Sushil Jajodia and Ravi Sandhu, Toward
A Multilevel Secure Relational Data Model,, Information Security: An
Integrated Collection of Essays, IEEE Computer Society Press 1994.
- Sushil Jajodia, Ravi Sandhu and B.T. Blaustein, Solutions
to the Polyinstantiation Problem,, Information Security: An Integrated
Collection of Essays, IEEE Computer Society Press 1994.
- Sushil Jajodia, B. Kogan and Ravi Sandhu, A
Multilevel-Secure Object-Oriented Data Model, Information Security: An
Integrated Collection of Essays, IEEE Computer Society Press 1994.
- Ravi Sandhu, Relational Database
Access Controls Using SQL, Handbook of Information Security Management
(1994-95 Yearbook), Auerbach 1994.
- Ravi Sandhu and Sushil Jajodia, Data
and Database Security and Controls, Handbook of Information Security
Management, Auerbach, 1993.
|