Author: Ravi S. Sandhu
Publications
Co-authors
Productive Colleagues
- Duncan A. Buell
- Ravi Ganesan
- Li Gong
- 5
- 5
- 24
Publications
Zhang, Xinwen, Chen, Songqing, Sandhu, Ravi S. (2005): Enhancing Data Authenticity and Integrity in P2P Systems. In IEEE Internet Computing, 9 (6) pp. 42-49. https://doi.ieeecomputersociety.org/10.1109/MIC.2005.124
Sandhu, Ravi S. (2003): Good-Enough Security: Toward a Pragmatic Business-Driven Discipline. In IEEE Internet Computing, 7 (1) pp. 66-68. https://csdl.computer.org/comp/mags/ic/2003/01/w1066abs.htm
Buell, Duncan A., Sandhu, Ravi S. (2003): Guest Editors\' Introduction: Identity Management. In IEEE Internet Computing, 7 (6) pp. 26-28. https://csdl.computer.org/comp/mags/ic/2003/06/w6026abs.htm
Sandhu, Ravi S. (2002): Guest Editor\'s Introduction: The Technology of Trust. In IEEE Internet Computing, 6 (6) pp. 28-29. https://csdl.computer.org/comp/mags/ic/2002/06/w6028abs.htm
Park, Joon S., Sandhu, Ravi S. (2000): Secure Cookies on the Web. In IEEE Internet Computing, 4 (4) pp. 36-44. https://csdl.computer.org/comp/mags/ic/2000/04/w4036abs.htm
Gong, Li, Sandhu, Ravi S. (2000): Guest Editors\' Introduction: What Makes Security Technologies Relevant?. In IEEE Internet Computing, 4 (6) pp. 38-41. https://csdl.computer.org/comp/mags/ic/2000/06/w6038abs.htm
Sandhu, Ravi S., Coyne, Edward J., Feinstein, Hal L., Youman, Charles E. (1996): Role-Based Access Control Models. In IEEE Computer, 29 (2) pp. 38-47.
Ganesan, Ravi, Sandhu, Ravi S. (1994): Securing Cyberspace - Introduction to the Special Section. In Communications of the ACM, 37 (11) pp. 28-31.
Sandhu, Ravi S. (1993): Lattice-Based Access Control Models. In IEEE Computer, 26 (11) pp. 9-19.
Zhang, Xinwen, Seifert, Jean-Pierre, Sandhu, Ravi S. (2008): Security Enforcement Model for Distributed Usage Control. In: Singhal, Mukesh, Serugendo, Giovanna Di Marzo, Tsai, Jeffrey J. P., Lee, Wang-Chien, Romer, Kay, Tseng, Yu-Chee, Hsiao, Han C. W. (eds.) SUTC 2008 - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing 11-13 June, 2008, Taichung, Taiwan. pp. 10-18. https://doi.ieeecomputersociety.org/10.1109/SUTC.2008.79
Thomas, Roshan K., Sandhu, Ravi S. (2004): Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Resear. In: 2nd IEEE Conference on Pervasive Computing and Communications Workshops PerCom 2004 Workshops 14-17 March, 2004, Orlando, FL, USA. pp. 164-170. https://csdl.computer.org/comp/proceedings/percomw/2004/2106/00/21060164abs.htm