Author: Ravi S. Sandhu

Publications

Publication period start: 2004
Number of co-authors: 11

Co-authors

Number of publications with favourite co-authors
Ravi Ganesan
1
Roshan K. Thomas
1
Xinwen Zhang
2

Productive Colleagues

Most productive colleagues in number of publications
Duncan A. Buell
5
Ravi Ganesan
5
Li Gong
24

Publications

Zhang, Xinwen, Chen, Songqing, Sandhu, Ravi S. (2005): Enhancing Data Authenticity and Integrity in P2P Systems. In IEEE Internet Computing, 9 (6) pp. 42-49. https://doi.ieeecomputersociety.org/10.1109/MIC.2005.124

Sandhu, Ravi S. (2003): Good-Enough Security: Toward a Pragmatic Business-Driven Discipline. In IEEE Internet Computing, 7 (1) pp. 66-68. https://csdl.computer.org/comp/mags/ic/2003/01/w1066abs.htm

Buell, Duncan A., Sandhu, Ravi S. (2003): Guest Editors\' Introduction: Identity Management. In IEEE Internet Computing, 7 (6) pp. 26-28. https://csdl.computer.org/comp/mags/ic/2003/06/w6026abs.htm

Sandhu, Ravi S. (2002): Guest Editor\'s Introduction: The Technology of Trust. In IEEE Internet Computing, 6 (6) pp. 28-29. https://csdl.computer.org/comp/mags/ic/2002/06/w6028abs.htm

Park, Joon S., Sandhu, Ravi S. (2000): Secure Cookies on the Web. In IEEE Internet Computing, 4 (4) pp. 36-44. https://csdl.computer.org/comp/mags/ic/2000/04/w4036abs.htm

Gong, Li, Sandhu, Ravi S. (2000): Guest Editors\' Introduction: What Makes Security Technologies Relevant?. In IEEE Internet Computing, 4 (6) pp. 38-41. https://csdl.computer.org/comp/mags/ic/2000/06/w6038abs.htm

Sandhu, Ravi S., Coyne, Edward J., Feinstein, Hal L., Youman, Charles E. (1996): Role-Based Access Control Models. In IEEE Computer, 29 (2) pp. 38-47.

Ganesan, Ravi, Sandhu, Ravi S. (1994): Securing Cyberspace - Introduction to the Special Section. In Communications of the ACM, 37 (11) pp. 28-31.

Sandhu, Ravi S. (1993): Lattice-Based Access Control Models. In IEEE Computer, 26 (11) pp. 9-19.

Zhang, Xinwen, Seifert, Jean-Pierre, Sandhu, Ravi S. (2008): Security Enforcement Model for Distributed Usage Control. In: Singhal, Mukesh, Serugendo, Giovanna Di Marzo, Tsai, Jeffrey J. P., Lee, Wang-Chien, Romer, Kay, Tseng, Yu-Chee, Hsiao, Han C. W. (eds.) SUTC 2008 - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing 11-13 June, 2008, Taichung, Taiwan. pp. 10-18. https://doi.ieeecomputersociety.org/10.1109/SUTC.2008.79

Thomas, Roshan K., Sandhu, Ravi S. (2004): Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Resear. In: 2nd IEEE Conference on Pervasive Computing and Communications Workshops PerCom 2004 Workshops 14-17 March, 2004, Orlando, FL, USA. pp. 164-170. https://csdl.computer.org/comp/proceedings/percomw/2004/2106/00/21060164abs.htm

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
314,869 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
314,869 designers enjoy our newsletter—sure you don’t want to receive it?