Follow
Ravi Sandhu
Title
Cited by
Year
‘Role-Based Access Control on the Web Using LDAP
JS Park, GJ Ahn, R Sandhu
Proceedings of the fifteenth annual working conference on Database and …, 2002
292002
„Chandramouli, R
DF Ferraiolo, R Sandhu, S Gavrila, DR Kuhn
Proposed NIST Standard for Role-Based Access Control”. ACM–ISS, 2001
7*2001
(Oracle Corporation), Dan Thomsen (Secure Computing Corporation) and Jess Worthington (Informix Software, Inc.)
R Sandhu, LA Notargiacomo
Database Security X: Status and prospects, 261, 1997
1997
1 Access Control and Other Security Services
RS Sandhu, P Samaratiy
1. What is a role?
R Sandhu
21996
10141 Abstracts Collection–Distributed Usage Control
S Etalle, A Pretschner, RS Sandhu, M Winslett
Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2010
2010
10141 Summary –Distributed Usage Control
S Etalle, A Pretschner, RS Sandhu, M Winslett
Proceedings of the Dagstuhl Seminar Proceedings, Volume 10141, 1-4, 2010
2010
1991 IEEE Symposium on Research in Security and Privacy
D Kemmerer, J Wray, S Lipner, PA Karger, J Jacob, M Gasser, JC Fabre, ...
IEEE Symposium on Research in Security and Privacy May 19, 22, 1991
1991
2022 IEEE 8th International Conference on Collaboration and Internet Computing (CIC)| 978-1-6654-7300-2/22/$31.00© 2022 IEEE| DOI: 10.1109/CIC56439. 2022.00029
S Ameer, A Arora, K Aslett, J Baggio, R Bassily, E Bertino, C Buntain, ...
A case-study of security policy for manual and automated systems
EH Sibley, JB Michael, RS Sandhu
COMPASS'91, Proceedings of the Sixth Annual Conference on Computer Assurance …, 1991
61991
A characterization of the problem of secure provenance management
S Xu, Q Ni, E Bertino, R Sandhu
2009 IEEE International Conference on Intelligence and Security Informatics …, 2009
292009
A comparison of logical-formula and enumerated authorization policy ABAC models
P Biswas, R Sandhu, R Krishnan
Data and Applications Security and Privacy XXX: 30th Annual IFIP WG 11.3 …, 2016
122016
A conceptual framework for group-centric secure information sharing
R Krishnan, R Sandhu, J Niu, WH Winsborough
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
432009
A distributed capability-based architecture for the Transform model
RS Sandhu, GS Suri
Computers & Security 12 (3), 285-303, 1993
1993
A Distributed Implementation of the
P Ammann, RS Sandhu, GS Suri
A distributed implementation of the extended schematic protection model.
P Ammann, RS Sandhu, GS Suri
ACSAC, 152-164, 1991
101991
A distributed implementation of the transform model
RS Sandhu, GS Suri
14th National Computer Security Conference, Washington, DC, 177-187, 1991
61991
A first step towards characterizing stealthy botnets
J Leonard, S Xu, R Sandhu
2009 International Conference on Availability, Reliability and Security, 106-113, 2009
102009
A formal access control model for se-floodlight controller
A Al-Alaj, R Sandhu, R Krishnan
Proceedings of the ACM International Workshop on Security in Software …, 2019
102019
A formal framework for single level decomposition of multilevel relations
S Jajodia, R Sandhu
[1990] Proceedings. The Computer Security Foundations Workshop III, 152-158, 1990
81990
The system can't perform the operation now. Try again later.
Articles 1–20