What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ravi S. Sandhu
Google Scholar
62
publications in security and cryptology related venues
Year
Venue
Title
2022
conf/esorics
Administration of Machine Learning Based Access Control.
Mohammad Nur Nobi
Ram Krishnan
Yufei Huang
Ravi S. Sandhu
2020
conf/wisa
On the Cost-Effectiveness of TrustZone Defense on ARM Platform.
Naiwei Liu
Meng Yu
Wanyu Zang
Ravi S. Sandhu
2016
conf/ccs
POSTER: Security Enhanced Administrative Role Based Access Control Models.
P. V. Rajkumar
Ravi S. Sandhu
2016
conf/ccs
Community-Based Secure Information and Resource Sharing in Azure Cloud IaaS.
Yun Zhang
Farhan Patwa
Ravi S. Sandhu
2015
journals/tifs
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking.
Qi Li
Xinwen Zhang
Qingji Zheng
Ravi S. Sandhu
Xiaoming Fu
2015
conf/ccs
Attribute-Based Access Control Models and Beyond.
Ravi S. Sandhu
2015
conf/ccs
Authorization Federation in IaaS Multi Cloud.
Navid Pustchi
Ram Krishnan
Ravi S. Sandhu
2014
conf/ccs
Secure Information and Resource Sharing in Cloud Infrastructure as a Service.
Yun Zhang
Ram Krishnan
Ravi S. Sandhu
2013
conf/ccs
The science, engineering and business of cyber security.
Ravi S. Sandhu
2013
conf/cns
A framework for risk-aware role based access control.
Khalid Zaman Bijon
Ram Krishnan
Ravi S. Sandhu
2012
conf/iciss
Risk-Aware RBAC Sessions.
Khalid Zaman Bijon
Ram Krishnan
Ravi S. Sandhu
2011
journals/compsec
Roles in information security - A survey and classification of the research area.
Ludwig Fuchs
Günther Pernul
Ravi S. Sandhu
2011
conf/iciss
Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing.
Ram Krishnan
Ravi S. Sandhu
2010
conf/ccs
Towards a discipline of mission-aware cloud computing.
Ravi S. Sandhu
Raj Boppana
Ram Krishnan
Jeff Reich
Todd Wolff
Josh Zachry
2010
conf/acns
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures.
Erhan J. Kartaltepe
Jose Andre Morales
Shouhuai Xu
Ravi S. Sandhu
2009
conf/ccs
A conceptual framework for Group-Centric secure information sharing.
Ram Krishnan
Ravi S. Sandhu
Jianwei Niu
William H. Winsborough
2008
conf/ccs
Stale-safe security properties for group-based secure information sharing.
Ram Krishnan
Jianwei Niu
Ravi S. Sandhu
William H. Winsborough
2007
conf/ccs
SecureBus: towards application-transparent trusted computing with mandatory access control.
Xinwen Zhang
Michael J. Covington
Songqing Chen
Ravi S. Sandhu
2006
conf/ccs
Secure information sharing enabled by Trusted Computing and PEI models.
Ravi S. Sandhu
Kumar Ranganathan
Xinwen Zhang
2006
conf/ccs
Safety analysis of usage control authorization models.
Xinwen Zhang
Ravi S. Sandhu
Francesco Parisi-Presicce
2006
conf/ccs
A general design towards secure ad-hoc collaboration.
Masayuki Nakae
Xinwen Zhang
Ravi S. Sandhu
2006
conf/iwsec
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing.
Xinwen Zhang
Francesco Parisi-Presicce
Ravi S. Sandhu
2004
conf/acsac
Mohammad A. Al-Kahtani, Ravi Sandhu.
Mohammad A. Al-Kahtani
Ravi S. Sandhu
2004
conf/acsac
Role-Based Delegation Model/ Hierarchical Roles (RBDM1).
Ezedin Barka
Ravi S. Sandhu
2003
conf/ctrsa
Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures.
Shouhuai Xu
Ravi S. Sandhu
2002
conf/acsac
A Model for Attribute-Based User-Role Assignment.
Mohammad A. Al-Kahtani
Ravi S. Sandhu
2001
conf/acsac
Engineering of Role/Permission Assignments.
Pete Epstein
Ravi S. Sandhu
2000
conf/acsac
Framework for Role-based Delegation Models.
Ezedin Barka
Ravi S. Sandhu
2000
conf/acsac
Security Architectures for Controlled Digital Information Dissemination.
Jaehong Park
Ravi S. Sandhu
J. Schifalacqua
2000
conf/acsac
Binding Identities and Attributes using Digitally Signed Certificates.
Joon S. Park
Ravi S. Sandhu
1999
conf/acsac
Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum).
Ron Ross
Cynthia E. Irvine
Charles Reynolds
Ravi S. Sandhu
Blaine Burnham
Rayford B. Vaughn
1999
conf/acsac
The ARBAC99 Model for Administration of Roles.
Ravi S. Sandhu
Qamar Munawer
1998
conf/acsac
Concentric Supervision of Security Applications: A New Security Management Paradigm.
P. C. Hyland
Ravi S. Sandhu
1998
conf/acsac
The RRA97 Model for Role-Based Administration of Role Hierarchies.
Ravi S. Sandhu
Qamar Munawer
1997
conf/acsac
Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System.
T. F. Himdi
Ravi S. Sandhu
1996
conf/acisp
Access Control: The Neglected Frontier.
Ravi S. Sandhu
1996
conf/esorics
Role Hierarchies and Constraints for Lattice-Based Access Controls.
Ravi S. Sandhu
1995
conf/sp
The semantics and expressive power of the MLR data model.
Fang Chen
Ravi S. Sandhu
1994
conf/sp
On the minimality of testing for rights in transformation models.
Ravi S. Sandhu
Srinivas Ganta
1994
conf/esorics
On the Expressive Power of the Unary Transformation Model.
Ravi S. Sandhu
Srinivas Ganta
1994
conf/esorics
Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture.
Roshan K. Thomas
Ravi S. Sandhu
1994
conf/acsac
Role-based access control: a multi-dimensional view.
Ravi S. Sandhu
Edward J. Coyne
Hal L. Feinstein
Charles E. Youman
1993
journals/compsec
A distributed capability-based architecture for the transform model.
Ravi S. Sandhu
Gurpreet S. Suri
1993
conf/nspw
Towards a task-based paradigm for flexible and adaptable access control in distributed applications.
Roshan K. Thomas
Ravi S. Sandhu
1993
conf/acsac
Expressive power of the single-object typed access matrix model.
Ravi S. Sandhu
Srinivas Ganta
1992
journals/compsec
Eliminating polyinstantiation securely.
Ravi S. Sandhu
Sushil Jajodia
1992
journals/compsec
Lattice-based enforcement of Chinese Walls.
Ravi S. Sandhu
1992
conf/sp
Non-monotonic transformation of access rights.
Ravi S. Sandhu
Gurpreet S. Suri
1992
conf/sp
The typed access matrix model.
Ravi S. Sandhu
1992
conf/esorics
Polyinstantation for Cover Stories.
Ravi S. Sandhu
Sushil Jajodia
1992
conf/acsac
Implementing transaction control expressions by checking for absence of access rights.
Paul Ammann
Ravi S. Sandhu
1991
journals/compsec
Integrity principles and mechanisms in database management systems.
Ravi S. Sandhu
Sushil Jajodia
1991
conf/sp
Safety Analysis for the Extended Schematic Protection Model.
Paul Ammann
Ravi S. Sandhu
1991
conf/sp
A Novel Decomposition of Multilevel Relations into Single-Level Relations.
Sushil Jajodia
Ravi S. Sandhu
1991
conf/acsac
A distributed implementation of the extended schematic protection model.
Paul Ammann
Ravi S. Sandhu
Gurpreet S. Suri
1991
conf/acsac
A single-level scheduler for the replicated architecture for multilevel-secure databases.
John P. McDermott
Sushil Jajodia
Ravi S. Sandhu
1990
conf/sp
Polyinstantiation Integrity in Multilevel Relations.
Sushil Jajodia
Ravi S. Sandhu
1990
conf/acsac
Extending the creation operation in the Schematic Protection Model.
Paul Ammann
Ravi S. Sandhu
1990
conf/acsac
Update semantics for multilevel relations.
Sushil Jajodia
Ravi S. Sandhu
Edgar H. Sibley
1989
conf/sp
Transformation of Access Rights.
Ravi S. Sandhu
1989
conf/acsac
A perspective on integrity mechanisms.
Ravi S. Sandhu
1986
conf/sp
Some Owner Based Schemes with Dynamic Groups in the Schematic Protection Model.
Ravi S. Sandhu
M. E. Share
Coauthors
Blaine Burnham
(1)
Charles E. Youman
(1)
Charles Reynolds
(1)
Cynthia E. Irvine
(1)
Edgar H. Sibley
(1)
Edward J. Coyne
(1)
Erhan J. Kartaltepe
(1)
Ezedin Barka
(2)
Fang Chen
(1)
Farhan Patwa
(1)
Francesco Parisi-Presicce
(2)
Günther Pernul
(1)
Gurpreet S. Suri
(3)
Hal L. Feinstein
(1)
J. Schifalacqua
(1)
Jaehong Park
(1)
Jeff Reich
(1)
Jianwei Niu
(2)
John P. McDermott
(1)
Joon S. Park
(1)
Jose Andre Morales
(1)
Josh Zachry
(1)
Khalid Zaman Bijon
(2)
Kumar Ranganathan
(1)
Ludwig Fuchs
(1)
M. E. Share
(1)
Masayuki Nakae
(1)
Meng Yu
(1)
Michael J. Covington
(1)
Mohammad A. Al-Kahtani
(2)
Mohammad Nur Nobi
(1)
Naiwei Liu
(1)
Navid Pustchi
(1)
P. C. Hyland
(1)
P. V. Rajkumar
(1)
Paul Ammann
(4)
Pete Epstein
(1)
Qamar Munawer
(2)
Qi Li
(1)
Qingji Zheng
(1)
Raj Boppana
(1)
Ram Krishnan
(9)
Ravi S. Sandhu
(62)
Rayford B. Vaughn
(1)
Ron Ross
(1)
Roshan K. Thomas
(2)
Shouhuai Xu
(2)
Songqing Chen
(1)
Srinivas Ganta
(3)
Sushil Jajodia
(7)
T. F. Himdi
(1)
Todd Wolff
(1)
Wanyu Zang
(1)
William H. Winsborough
(2)
Xiaoming Fu
(1)
Xinwen Zhang
(6)
Yufei Huang
(1)
Yun Zhang
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to