Ravi S. Sandhu

Publication Statistics

Publication period start
Publication period end
Number of co-authors


Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications


Zhang, Xinwen, Chen, Songqing, Sandhu, Ravi S. (2005): Enhancing Data Authenticity and Integrity in P2P Systems. In IEEE Internet Computing, 9 (6) pp. 42-49. http://doi.ieeecomputersociety.org/10.1109/MIC.2005.124

Sandhu, Ravi S. (2003): Good-Enough Security: Toward a Pragmatic Business-Driven Discipline. In IEEE Internet Computing, 7 (1) pp. 66-68. http://csdl.computer.org/comp/mags/ic/2003/01/w1066abs.htm

Buell, Duncan A., Sandhu, Ravi S. (2003): Guest Editors\' Introduction: Identity Management. In IEEE Internet Computing, 7 (6) pp. 26-28. http://csdl.computer.org/comp/mags/ic/2003/06/w6026abs.htm

Sandhu, Ravi S. (2002): Guest Editor\'s Introduction: The Technology of Trust. In IEEE Internet Computing, 6 (6) pp. 28-29. http://csdl.computer.org/comp/mags/ic/2002/06/w6028abs.htm

Park, Joon S., Sandhu, Ravi S. (2000): Secure Cookies on the Web. In IEEE Internet Computing, 4 (4) pp. 36-44. http://csdl.computer.org/comp/mags/ic/2000/04/w4036abs.htm

Gong, Li, Sandhu, Ravi S. (2000): Guest Editors\' Introduction: What Makes Security Technologies Relevant?. In IEEE Internet Computing, 4 (6) pp. 38-41. http://csdl.computer.org/comp/mags/ic/2000/06/w6038abs.htm

Sandhu, Ravi S., Coyne, Edward J., Feinstein, Hal L., Youman, Charles E. (1996): Role-Based Access Control Models. In IEEE Computer, 29 (2) pp. 38-47.

Ganesan, Ravi, Sandhu, Ravi S. (1994): Securing Cyberspace - Introduction to the Special Section. In Communications of the ACM, 37 (11) pp. 28-31.

Sandhu, Ravi S. (1993): Lattice-Based Access Control Models. In IEEE Computer, 26 (11) pp. 9-19.

Zhang, Xinwen, Seifert, Jean-Pierre, Sandhu, Ravi S. (2008): Security Enforcement Model for Distributed Usage Control. In: Singhal, Mukesh, Serugendo, Giovanna Di Marzo, Tsai, Jeffrey J. P., Lee, Wang-Chien, Romer, Kay, Tseng, Yu-Chee, Hsiao, Han C. W. (eds.) SUTC 2008 - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing 11-13 June, 2008, Taichung, Taiwan. pp. 10-18. http://doi.ieeecomputersociety.org/10.1109/SUTC.2008.79

Thomas, Roshan K., Sandhu, Ravi S. (2004): Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Resear. In: 2nd IEEE Conference on Pervasive Computing and Communications Workshops PerCom 2004 Workshops 14-17 March, 2004, Orlando, FL, USA. pp. 164-170. http://csdl.computer.org/comp/proceedings/percomw/2004/2106/00/21060164abs.htm