Author: Ravi S. Sandhu

Publication Overview

Publication period start: 2004
Number of co-authors: 11

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Zhang, Xinwen, Chen, Songqing, Sandhu, Ravi S. (2005): Enhancing Data Authenticity and Integrity in P2P Systems. In IEEE Internet Computing, 9 (6) pp. 42-49. https://doi.ieeecomputersociety.org/10.1109/MIC.2005.124
Sandhu, Ravi S. (2003): Good-Enough Security: Toward a Pragmatic Business-Driven Discipline. In IEEE Internet Computing, 7 (1) pp. 66-68. https://csdl.computer.org/comp/mags/ic/2003/01/w1066abs.htm
Buell, Duncan A., Sandhu, Ravi S. (2003): Guest Editors\' Introduction: Identity Management. In IEEE Internet Computing, 7 (6) pp. 26-28. https://csdl.computer.org/comp/mags/ic/2003/06/w6026abs.htm
Sandhu, Ravi S. (2002): Guest Editor\'s Introduction: The Technology of Trust. In IEEE Internet Computing, 6 (6) pp. 28-29. https://csdl.computer.org/comp/mags/ic/2002/06/w6028abs.htm
Park, Joon S., Sandhu, Ravi S. (2000): Secure Cookies on the Web. In IEEE Internet Computing, 4 (4) pp. 36-44. https://csdl.computer.org/comp/mags/ic/2000/04/w4036abs.htm
Gong, Li, Sandhu, Ravi S. (2000): Guest Editors\' Introduction: What Makes Security Technologies Relevant?. In IEEE Internet Computing, 4 (6) pp. 38-41. https://csdl.computer.org/comp/mags/ic/2000/06/w6038abs.htm
Sandhu, Ravi S., Coyne, Edward J., Feinstein, Hal L., Youman, Charles E. (1996): Role-Based Access Control Models. In IEEE Computer, 29 (2) pp. 38-47.
Ganesan, Ravi, Sandhu, Ravi S. (1994): Securing Cyberspace - Introduction to the Special Section. In Communications of the ACM, 37 (11) pp. 28-31.
Sandhu, Ravi S. (1993): Lattice-Based Access Control Models. In IEEE Computer, 26 (11) pp. 9-19.
Zhang, Xinwen, Seifert, Jean-Pierre, Sandhu, Ravi S. (2008): Security Enforcement Model for Distributed Usage Control. In: Singhal, Mukesh, Serugendo, Giovanna Di Marzo, Tsai, Jeffrey J. P., Lee, Wang-Chien, Romer, Kay, Tseng, Yu-Chee, Hsiao, Han C. W. (eds.) SUTC 2008 - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing 11-13 June, 2008, Taichung, Taiwan. pp. 10-18. https://doi.ieeecomputersociety.org/10.1109/SUTC.2008.79
Thomas, Roshan K., Sandhu, Ravi S. (2004): Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Resear. In: 2nd IEEE Conference on Pervasive Computing and Communications Workshops PerCom 2004 Workshops 14-17 March, 2004, Orlando, FL, USA. pp. 164-170. https://csdl.computer.org/comp/proceedings/percomw/2004/2106/00/21060164abs.htm
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Get one powerful email each week, like 326,032 others.

Learn to design a life you love.

Next email in
6
days
4
hrs
45
mins
32
secs