Ravi S. Sandhu

Author: Ravi S. Sandhu


Publication period start: 1993
Publication period end: 2008
Number of co-authors: 11


Number of publications with favourite co-authors
Ravi Ganesan
Roshan K. Thomas
Xinwen Zhang

Productive Colleagues

Most productive colleagues in number of publications
Duncan A. Buell
Ravi Ganesan
Li Gong


Zhang, Xinwen, Chen, Songqing, Sandhu, Ravi S. (2005): Enhancing Data Authenticity and Integrity in P2P Systems. In IEEE Internet Computing, 9 (6) pp. 42-49. https://doi.ieeecomputersociety.org/10.1109/MIC.2005.124

Sandhu, Ravi S. (2003): Good-Enough Security: Toward a Pragmatic Business-Driven Discipline. In IEEE Internet Computing, 7 (1) pp. 66-68. https://csdl.computer.org/comp/mags/ic/2003/01/w1066abs.htm

Buell, Duncan A., Sandhu, Ravi S. (2003): Guest Editors\' Introduction: Identity Management. In IEEE Internet Computing, 7 (6) pp. 26-28. https://csdl.computer.org/comp/mags/ic/2003/06/w6026abs.htm

Sandhu, Ravi S. (2002): Guest Editor\'s Introduction: The Technology of Trust. In IEEE Internet Computing, 6 (6) pp. 28-29. https://csdl.computer.org/comp/mags/ic/2002/06/w6028abs.htm

Park, Joon S., Sandhu, Ravi S. (2000): Secure Cookies on the Web. In IEEE Internet Computing, 4 (4) pp. 36-44. https://csdl.computer.org/comp/mags/ic/2000/04/w4036abs.htm

Gong, Li, Sandhu, Ravi S. (2000): Guest Editors\' Introduction: What Makes Security Technologies Relevant?. In IEEE Internet Computing, 4 (6) pp. 38-41. https://csdl.computer.org/comp/mags/ic/2000/06/w6038abs.htm

Sandhu, Ravi S., Coyne, Edward J., Feinstein, Hal L., Youman, Charles E. (1996): Role-Based Access Control Models. In IEEE Computer, 29 (2) pp. 38-47.

Ganesan, Ravi, Sandhu, Ravi S. (1994): Securing Cyberspace - Introduction to the Special Section. In Communications of the ACM, 37 (11) pp. 28-31.

Sandhu, Ravi S. (1993): Lattice-Based Access Control Models. In IEEE Computer, 26 (11) pp. 9-19.

Zhang, Xinwen, Seifert, Jean-Pierre, Sandhu, Ravi S. (2008): Security Enforcement Model for Distributed Usage Control. In: Singhal, Mukesh, Serugendo, Giovanna Di Marzo, Tsai, Jeffrey J. P., Lee, Wang-Chien, Romer, Kay, Tseng, Yu-Chee, Hsiao, Han C. W. (eds.) SUTC 2008 - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing 11-13 June, 2008, Taichung, Taiwan. pp. 10-18. https://doi.ieeecomputersociety.org/10.1109/SUTC.2008.79

Thomas, Roshan K., Sandhu, Ravi S. (2004): Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Resear. In: 2nd IEEE Conference on Pervasive Computing and Communications Workshops PerCom 2004 Workshops 14-17 March, 2004, Orlando, FL, USA. pp. 164-170. https://csdl.computer.org/comp/proceedings/percomw/2004/2106/00/21060164abs.htm