Ravinderpal Singh Sandhu
#92,185
Most Influential Person Now
Ravinderpal Singh Sandhu's AcademicInfluence.com Rankings
Ravinderpal Singh Sandhucomputer-science Degrees
Computer Science
#3153
World Rank
#3304
Historical Rank
Information Security
#5
World Rank
#5
Historical Rank
Software Engineering
#79
World Rank
#79
Historical Rank
Database
#632
World Rank
#663
Historical Rank

Download Badge
Computer Science
Ravinderpal Singh Sandhu's Degrees
- PhD Computer Science University of California, Irvine
- Masters Computer Science University of California, Irvine
- Bachelors Computer Science University of California, Irvine
Similar Degrees You Can Earn
Why Is Ravinderpal Singh Sandhu Influential?
(Suggest an Edit or Addition)Ravinderpal Singh Sandhu's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Role-Based Access Control Models (1996) (6094)
- Proposed NIST standard for role-based access control (2001) (2653)
- Advances in Computing, Communications and Informatics (ICACCI) (2015) (1266)
- The NIST model for role-based access control: towards a unified standard (2000) (1031)
- The UCONABC usage control model (2004) (969)
- Lattice-based access control models (1993) (775)
- The ARBAC97 model for role-based administration of roles (1999) (638)
- Configuring role-based access control to enforce mandatory and discretionary access control policies (2000) (635)
- Access control: principles and practice (1994) (497)
- Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management (1997) (482)
- Database security - concepts, approaches, and challenges (2005) (476)
- Role-based authorization constraints specification (2000) (464)
- A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC (2012) (410)
- Towards usage control models: beyond traditional access control (2002) (406)
- Framework for role-based delegation models (2000) (310)
- The typed access matrix model (1992) (303)
- Cryptographic Implementation of a Tree Hierarchy for Access Control (1988) (276)
- Role-based access control on the web (2001) (265)
- Formal model and policy specification of usage control (2005) (264)
- ROWLBAC: representing role based access control in OWL (2008) (254)
- PBDM: a flexible delegation model in RBAC (2003) (240)
- Role Hierarchies and Constraints for Lattice-Based Access Controls (1996) (230)
- Usage Control: A Vision for Next Generation Access Control (2003) (225)
- Role-Based Access Control (1998) (225)
- A model for attribute-based user-role assignment (2002) (200)
- Toward a multilevel secure relational data model (1991) (192)
- A Role-Based Delegation Model and Some Extensions (2000) (182)
- How to do discretionary access control using roles (1998) (179)
- Role activation hierarchies (1998) (170)
- The ARBAC99 model for administration of roles (1999) (168)
- Authentication, access control, and audit (1996) (166)
- The schematic protection model: its definition and analysis for acyclic attenuating schemes (1988) (161)
- Separation of Duties in Computerized Information Systems (1990) (156)
- A model for role administration using organization structure (2002) (151)
- Peer-to-peer access control architecture using trusted computing technology (2005) (148)
- The RSL99 language for role-based separation of duty constraints (1999) (147)
- Collaboration in multicloud computing environments: Framework and security issues (2013) (140)
- Rationale for the RBAC96 family of access control models (1996) (138)
- Secure Cookies on the Web (2000) (134)
- The ARBAC97 model for role-based administration of roles: preliminary description and outline (1997) (127)
- ACM Transactions on Information and System Security: Editorial (2005) (122)
- Toward a Usage-Based Security Framework for Collaborative Computing Systems (2008) (121)
- A logical specification for usage control (2004) (120)
- Conceptual foundations for a model of task-based authorizations (1994) (119)
- Secure knowledge management: confidentiality, trust, and privacy (2006) (118)
- Polyinstantiation integrity in multilevel relations (1990) (111)
- Injecting RBAC to secure a Web-based workflow system (2000) (111)
- Towards a UML based approach to role engineering (1999) (109)
- RABAC: Role-Centric Attribute-Based Access Control (2012) (109)
- The multilevel relational (MLR) data model (1998) (108)
- Constraints for role-based access control (1996) (105)
- Role-Based Access Control Features in Commercial Database Management Systems (1998) (104)
- Relationship-Based Access Control for Online Social Networks: Beyond User-to-User Relationships (2012) (103)
- Secure information sharing enabled by Trusted Computing and PEI models (2006) (101)
- Role-based access control: a multi-dimensional view (1994) (100)
- A User-to-User Relationship-Based Access Control Model for Online Social Networks (2012) (100)
- Roles in information security - A survey and classification of the research area (2011) (98)
- A provenance-based access control model (2012) (95)
- Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures (2010) (94)
- Social-Networks Connect Services (2010) (94)
- Role-based delegation model/hierarchical roles (RBDM1) (2004) (92)
- Security architectures for controlled digital information dissemination (2000) (89)
- An Attribute Based Framework for Risk-Adaptive Access Control Models (2011) (88)
- RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control" (2007) (88)
- Identity management (2003) (82)
- A usage-based authorization framework for collaborative computing systems (2006) (82)
- Towards a VMM-based usage control framework for OS kernel integrity protection (2007) (81)
- An Access Control Language for a General Provenance Model (2009) (79)
- Good-Enough Security: Toward a Pragmatic Business-Driven Discipline (2003) (79)
- Originator control in usage control (2002) (78)
- An effective role administration model using organization structure (2006) (77)
- The UCON ABC Usage Control Model JAEHONG (2004) (76)
- Engineering authority and trust in cyberspace: the OM-AM and RBAC way (2000) (76)
- Engineering of role/permission assignments (2001) (73)
- Towards a task-based paradigm for flexible and adaptable access control in distributed applications (1993) (72)
- Multi-tenancy authorization models for collaborative cloud services (2013) (69)
- Secure Role-Based Workflow Models (2001) (69)
- IoT Passport: A Blockchain-Based Trust Framework for Collaborative Internet-of-Things (2019) (68)
- LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking (2015) (68)
- Binding identities and attributes using digitally signed certificates (2000) (67)
- Attribute Mutability in Usage Control (2004) (66)
- Induced role hierarchies with attribute-based RBAC (2003) (62)
- Access Control: The Neglected Frontier (1996) (61)
- RBAC on the Web by smart certificates (1999) (61)
- Expressive Power of the Schematic Protection Model (1992) (59)
- Lattice-based enforcement of Chinese Walls (1992) (59)
- Access Control Model for AWS Internet of Things (2017) (57)
- On Five Definitions of Data Integrity (1993) (56)
- Safety analysis for the extended schematic protection model (1991) (55)
- Rule-based RBAC with negative authorization (2004) (54)
- An Attribute-Based Access Control Model for Secure Big Data Processing in Hadoop Ecosystem (2018) (53)
- Decentralized user-role assignment for Web-based intranets (1998) (53)
- Polyinstantation for Cover Stories (1992) (50)
- A Lattice Interpretation Of The Chinese Wall Policy (1992) (50)
- The Security of Practical Two-Party RSA Signature Schemes (2001) (50)
- A multi-tenant RBAC model for collaborative cloud services (2013) (50)
- Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things (2018) (50)
- The URA97 Model for Role-Based User-Role Assignment (1997) (49)
- Foundations for group-centric secure information sharing models (2009) (49)
- Malware Detection in Cloud Infrastructures Using Convolutional Neural Networks (2018) (49)
- Future Directions in Role-Based Access Control Models (2001) (49)
- The rcl 2000 language for specifying role-based authorization constraints (2000) (49)
- A framework for risk-aware role based access control (2013) (48)
- Preserving user privacy from third-party applications in online social networks (2013) (48)
- A User-Activity-Centric Framework for Access Control in Online Social Networks (2011) (47)
- Access Control (2014) (47)
- The Extended Schematic Protection Model (1992) (46)
- An Access Control Framework for Cloud-Enabled Wearable Internet of Things (2017) (44)
- Enhancing data authenticity and integrity in P2P systems (2005) (44)
- Role-based Administration of User-Role Assignment: The URA97 Model and its Oracle Implementation (1999) (44)
- Usage control: a unified framework for next generation access control (2003) (44)
- Models, protocols, and architectures for secure pervasive computing: challenges and research directions (2004) (44)
- Attribute-Aware Relationship-Based Access Control for Online Social Networks (2014) (44)
- The authorization leap from rights to attributes: maturation or chaos? (2012) (44)
- Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart Cars (2019) (43)
- An Access Control Model for Online Social Networks Using User-to-User Relationships (2016) (40)
- Safety analysis of usage control authorization models (2006) (40)
- Access Control Models for Cloud-Enabled Internet of Things: A Proposed Architecture and Research Agenda (2016) (40)
- Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem (2020) (40)
- Secure V2V and V2I Communication in Intelligent Transportation using Cloudlets (2020) (39)
- Label-Based Access Control: An ABAC Model with Enumerated Authorization Policy (2016) (39)
- Roles versus groups (1996) (39)
- On some cryptographic solutions for access control in a tree hierarchy (1987) (39)
- Access Control Models for Virtual Object Communication in Cloud-Enabled IoT (2017) (38)
- Dependency Path Patterns as the Foundation of Access Control in Provenance-aware Systems (2012) (38)
- Cyber Attacks on Smart Farming Infrastructure (2020) (38)
- A Framework for Understanding Botnets (2009) (38)
- A conceptual framework for Group-Centric secure information sharing (2009) (37)
- Authentication, Access Controls, and Intrusion Detection (2004) (36)
- Extending OpenStack Access Control with Domain Trust (2014) (36)
- The ASCAA principles for next-generation role-based access control (2008) (35)
- An Attribute-Based Access Control for Cloud Enabled Industrial Smart Vehicles (2021) (35)
- The RRA97 model for role-based administration of role hierarchies (1998) (35)
- Mandatory Content Access Control for Privacy Protection in Information Centric Networks (2017) (34)
- Security Enforcement Model for Distributed Usage Control (2008) (34)
- Group-Centric Secure Information-Sharing Models for Isolated Groups (2011) (33)
- Formal model and analysis of usage control (2006) (33)
- Towards a discipline of mission-aware cloud computing (2010) (33)
- Smart Certi cates: Extending X.509 for Secure Attribute Services on the Web (1999) (32)
- A roadmap for privacy-enhanced secure data provenance (2014) (31)
- Towards an Attribute Based Constraints Specification Language (2013) (31)
- Password-Enabled PKI : Virtual Smartcards versus Virtual Soft Tokens (2002) (30)
- ROBAC: Scalable Role and Organization Based Access Control Models (2006) (30)
- Discretionary Access Control In Object-Oriented Databases: Issues And Research Directions (1993) (30)
- ABAC with Group Attributes and Attribute Hierarchies Utilizing the Policy Machine (2017) (30)
- A novel decomposition of multilevel relations into single-level relations (1991) (30)
- A provenance-based access control model for dynamic separation of duties (2013) (30)
- PEI models towards scalable, usable and high-assurance information sharing (2007) (29)
- Risk-Aware RBAC Sessions (2012) (29)
- ACON: Activity-Centric Access Control for Social Computing (2011) (28)
- An Oracle implementation of the PRA97 model for permission-role assignment (1998) (28)
- Solutions to the Polyinstantiation Problem (1994) (28)
- Undecidability of Safety for the Schematic Protection Model with Cyclic Creates (1992) (28)
- Transformation of access rights (1989) (28)
- RBAC on the Web by Secure Cookies (1999) (28)
- Analyzing and Exploiting Network Behaviors of Malware (2010) (27)
- The semantics and expressive power of the MLR data model (1995) (26)
- Object-Tagged RBAC Model for the Hadoop Ecosystem (2017) (26)
- Clustering-Based IaaS Cloud Monitoring (2017) (25)
- A role-based administration model for attributes (2012) (25)
- Stale-safe security properties for group-based secure information sharing (2008) (25)
- The NTree: a two dimension partial order for protection groups (1988) (25)
- A new polyinstantiation integrity constraint for multilevel relations (1990) (25)
- Password-Enabled PKI : Virtual Smartcards vs. Virtual Soft Tokens (2002) (25)
- A Characterization of the problem of secure provenance management (2009) (24)
- Extending the creation operation in the Schematic Protection Model (1990) (24)
- Cross-tenant trust models in cloud computing (2013) (24)
- Community-Based Secure Information and Resource Sharing in AWS Public Cloud (2015) (24)
- Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling (2015) (24)
- On testing for absence of rights in access control models (1993) (24)
- SecureBus: towards application-transparent trusted computing with mandatory access control (2007) (23)
- Honest Databases That Can Keep Secrets (1991) (23)
- ABAC-CC: Attribute-Based Access Control and Communication Control for Internet of Things (2020) (23)
- A single-level scheduler for the replicated architecture for multilevel-secure databases (1991) (23)
- Attribute-Based Access Control for AWS Internet of Things and Secure Industries of the Future (2021) (23)
- Safety Decidability for Pre-Authorization Usage Control with Finite Attribute Domains (2016) (22)
- Role and attribute based collaborative administration of intra-tenant cloud IaaS (2014) (22)
- Adopting Provenance-Based Access Control in OpenStack Cloud IaaS (2014) (21)
- Simulation of the Augmented Typed Access Matrix Model (ATAM) using Roles (1999) (21)
- The \mathrm GURA_G GURA G Administrative Model for User and Group Attribute Assignment (2016) (21)
- Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment (2017) (21)
- Towards a multi-dimensional characterization of dissemination control (2004) (21)
- Online Malware Detection in Cloud Auto-scaling Systems Using Shallow Convolutional Neural Networks (2019) (21)
- Update semantics for multilevel relations (1990) (21)
- Towards a framework for group-centric secure collaboration (2009) (21)
- Towards a Multilevel Secure Relational Data Model (1991) (20)
- The expressive power of multi-parent creation in monotonic access control models (1992) (20)
- Recurrent Neural Networks Based Online Behavioural Malware Detection Techniques for Cloud Infrastructure (2021) (20)
- Decentralized Group Hierarchies in UNIX: An Experiment and Lessons Learned (1998) (20)
- Mandatory Controls for Database Integrity (1989) (20)
- Non-monotonic transformation of access rights (1992) (20)
- Toward digital rights protection in BitTorrent-like P2P systems (2008) (20)
- Content Level Access Control for OpenStack Swift Storage (2015) (19)
- An Attribute-Based Access Control Extension for OpenStack and Its Enforcement Utilizing the Policy Machine (2016) (19)
- Proceedings of the First ACM Workshop on Role-Based Access Control, RBAC 1995, Gaithersburg, MD, USA, November 30 - December 2, 1995 (1996) (19)
- Schema Based XML Security: RBAC Approach (2003) (19)
- Client-side access control enforcement using trusted computing and PEI models (2006) (19)
- Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud (2015) (18)
- Integrity Mechanisms in Database Management Systems (2006) (18)
- Analyzing DNS activities of bot processes (2009) (18)
- Implementing transaction control expressions by checking for absence of access rights (1992) (18)
- Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures (2003) (17)
- Polyinstantiation Integrity in Multilevel Relations Revisited (1990) (17)
- Authorization Federation in IaaS Multi Cloud (2015) (17)
- Towards a Times-Based Usage Control Model (2007) (17)
- POSTER: Security Enhanced Administrative Role Based Access Control Models (2016) (17)
- Classifying and Comparing Attribute-Based and Relationship-Based Access Control (2017) (16)
- Referential Integrity In Multilevel Secure Databases (1993) (16)
- Role Based Access Control and OWL (2008) (16)
- Some Owner Based Schemes With Dynamic Groups In The Schematic Protection Model (1986) (16)
- TIUPAM: A Framework for Trustworthiness-Centric Information Sharing (2009) (16)
- Engineering access control policies for provenance-aware systems (2013) (16)
- Towards Activity-Centric Access Control for Smart Collaborative Ecosystems (2021) (16)
- Proceedings of the 1st ACM conference on Computer and communications security (1993) (16)
- DATA AND DATABASE SECURITY AND CONTROLS (1999) (16)
- Attribute-Based Access Control Models and Beyond (2015) (16)
- POSTER: Access Control Model for the Hadoop Ecosystem (2017) (16)
- Authenticated multicast immune to denial-of-service attack (2002) (15)
- Expressive power of access control models based on propagation of rights (1996) (15)
- Discussion Summary (1989) (15)
- The PEI framework for application-centric security (2009) (15)
- Towards Secure Information Sharing models for community Cyber Security (2010) (14)
- MT-ABAC: A Multi-Tenant Attribute-Based Access Control Model with Tenant Trust (2015) (14)
- A Provenance-Aware Access Control Framework with Typed Provenance (2016) (14)
- On the Feasibility of Attribute-Based Access Control Policy Mining (2019) (14)
- The EGRBAC Model for Smart Home IoT (2020) (14)
- A Three Tier Architecture for Role-Based Access Control (1994) (14)
- The future of access control: Attributes, automation and adaptation (2013) (14)
- Secure attribute services on the web (1999) (13)
- A Perspective on Graphs and Access Control Models (2004) (13)
- Evaluating detection and treatment effectiveness of commercial anti-malware programs (2010) (13)
- Framework for Agent-Based Role Delegation (2007) (13)
- Integrity principles and mechanisms in database management systems (1991) (13)
- Reachability analysis for role-based administration of attributes (2013) (13)
- NetWare 4 as an example of role-based access control (1996) (13)
- Database Security: Current Status and Key Issues (1990) (13)
- Role-based Access Control on the Web Using LDAP (2001) (13)
- Trustworthy Information: Concepts and Mechanisms (2010) (13)
- Virtual Resource Orchestration Constraints in Cloud Infrastructure as a Service (2015) (13)
- Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing (2006) (12)
- Safety Decidability for Pre-Authorization Usage Control with Identifier Attribute Domains (2020) (12)
- Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases (1991) (12)
- A family of models for rule-based user-role assignment (2003) (12)
- On data provenance in group-centric secure collaboration (2011) (12)
- On the minimality of testing for rights in transformation models (1994) (12)
- The Demand Operation in the Schematic Protection Model (1989) (11)
- A distributed implementation of the extended schematic protection model (1991) (11)
- Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects (1993) (11)
- Attribute Transformation for Attribute-Based Access Control (2017) (11)
- A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service (2014) (11)
- A new modeling paradigm for dynamic authorization in multi-domain systems (2007) (11)
- Issues in RBAC (1996) (11)
- Implementation Considerations for the Typed Access Matrix Model in a Distributed Environment (1992) (11)
- Group-Centric Models for Secure and Agile Information Sharing (2010) (11)
- Uni-ARBAC: A Unified Administrative Model for Role-Based Access Control (2016) (10)
- Administrative models for role-based access control (2000) (10)
- On the Expressive Power of the Unary Transformation Model (1994) (10)
- TERMINOLOGY, CRITERIA AND SYSTEM ARCHITECTURES FOR DATA INTEGRITY (1989) (10)
- A formal framework for single level decomposition of multilevel relations (1990) (10)
- Extending The BFA Workflow Authorization Model to Express Weighted Voting (1999) (10)
- Extended ReBAC Administrative Models with Cascading Revocation and Provenance Support (2016) (10)
- A Hybrid Enforcement Model for Group-centric Secure Information Sharing (2009) (9)
- Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges (2016) (9)
- Secure Information and Resource Sharing in Cloud Infrastructure as a Service (2014) (9)
- One-representative safety analysis in the non-monotonic transform model (1994) (9)
- On the Feasibility of RBAC to ABAC Policy Mining: A Formal Analysis (2019) (9)
- Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing (2011) (9)
- The next generation of access control models: Do we need them and what should they be? (2001) (9)
- The HABAC Model for Smart Home IoT and Comparison to EGRBAC (2021) (9)
- Eliminating polyinstantiation securely (1992) (9)
- Proceedings of the sixth ACM symposium on Access control models and technologies (2001) (9)
- RT-based administrative models for community cyber security information sharing (2011) (8)
- Intrusion Detection (2013) (8)
- A group-centric model for collaboration with expedient insiders in multilevel systems (2012) (8)
- An Attribute-Based Approach toward a Secured Smart-Home IoT Access Control and a Comparison with a Role-Based Approach (2022) (8)
- Cost and Effectiveness of TrustZone Defense and Side-Channel Attack on ARM Platform (2020) (8)
- Design and Analysis of Protection Schemes Based on the Send-Receive Transport Mechanism (1983) (8)
- Fingerprint-Based Detection and Diagnosis of Malicious Programs in Hardware (2015) (8)
- Symptoms-Based Detection of Bot Processes (2010) (8)
- Securing cyberspace (1994) (8)
- Safety of ABAC α Is Decidable (2017) (8)
- Quantify Co-Residency Risks in the Cloud Through Deep Learning (2021) (8)
- A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases (1996) (8)
- A Multilevel Secure Object- Oriented Data Model (2006) (8)
- QoS Aware Dependable Distributed Stream Processing (2008) (7)
- Guest Editor's Introduction: The Technology of Trust (2002) (7)
- A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up (1993) (7)
- Lattice-based models for controlled sharing of confidential information in the Saudi Hajj system (1997) (7)
- An Attribute-Based Protection Model for JSON Documents (2016) (7)
- Integrated provenance data for access control in group-centric collaboration (2012) (7)
- Building malware infection trees (2011) (7)
- Relational Database Access Controls Using SQL (1999) (7)
- Decentralized user group assignment in Windows NT (2001) (7)
- A Formal Access Control Model for SE-Floodlight Controller (2019) (7)
- Push Architectures for User Role Assignment (2000) (6)
- Proceedings of the third ACM conference on Data and application security and privacy (2013) (6)
- Secure Cloud Assisted Smart Cars Using Dynamic Groups and Attribute Based Access Control (2019) (6)
- Recognizing Immediacy in an N-Tree Hierarchy and Its Application to Protection Groups (1989) (6)
- Analysis of Acyclic Attenuating Systems for the SSR Protection Model (1985) (6)
- Limitations of Relational Data Base Access Controls (1993) (6)
- Secure Information and Resource Sharing in Cloud (2015) (6)
- Assured Information Sharing Life Cycle (2009) (6)
- Access Control Model for Virtual Objects (Shadows) Communication for AWS Internet of Things (2018) (6)
- A Comparison of Logical-Formula and Enumerated Authorization Policy ABAC Models (2016) (6)
- Group Hierarchies With Decentralized User Assignment In Windows Nt (1998) (6)
- Enforcing Primary Key Requirements in Multilevel Relations (1991) (6)
- A secure kernelized architecture for multilevel object-oriented databases (1991) (6)
- Object-to-Object Relationship-Based Access Control: Model and Multi-Cloud Demonstration (Invited Paper) (2016) (6)
- Community-Based Secure Information and Resource Sharing in Azure Cloud IaaS (2016) (5)
- Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Transactions in Multilevel databases (1993) (5)
- Convergent Access Control to Enable Secure Smart Communities (2020) (5)
- Connguring Role-based Access Control to Enforce Mandatory and Discretionary Access Control Policies (2000) (5)
- SSR MODEL FOR SPECIFICATION OF AUTHORIZATION POLICIES: A CASE STUDY IN PROJECT CONTROL. (1984) (5)
- Using OWL to Model Role Based Access Control (2008) (5)
- Towards a Scalable Role and Organization Based Access Control Model with Decentralized Security Administration (2009) (5)
- Towards a framework for cyber social status based trusted open collaboration (2010) (5)
- Towards provenance and risk-awareness in social computing (2012) (5)
- The ABC Core Model for Usage Control: Integrating Authorizations, oBligations, and Conditions (2002) (5)
- Guest Editors' Introduction: What Makes Security Technologies Relevant? (2000) (5)
- A First Step towards Characterizing Stealthy Botnets (2009) (5)
- SDN-RBAC: An Access Control Model for SDN Controller Applications (2019) (5)
- Formal Models for Group-Centric Secure Information Sharing (2009) (4)
- Ruledger: Ensuring Execution Integrity in Trigger-Action IoT Platforms (2021) (4)
- Activity Control Design Principles: Next Generation Access Control for Smart and Collaborative Systems (2021) (4)
- Enforceable and Verifiable Stale-Safe Security Properties in Distributed Systems (2011) (4)
- Using Traces of Procedure Calls to Reason About Composability (1992) (4)
- Dynamic trust evaluation model based on bidding and multi-attributes for social networks (2019) (4)
- Safety of ABAC _\alpha Is Decidable (2017) (4)
- Edge Centric Secure Data Sharing with Digital Twins in Smart Ecosystems (2021) (4)
- Toward Deep Learning Based Access Control (2022) (4)
- Safety and Consistency of Subject Attributes for Attribute-Based Pre-Authorization Systems (2019) (4)
- Report on the first ACM workshop on role-based access control (1996) (4)
- Microsoft.NET Framework security (2002) (4)
- Towards an Engineering Framework for Usage Control and Digital Rights Management (2001) (4)
- Role-Based Administration of Role-Based Smart Home IoT (2021) (4)
- Expressive power of the single-object typed access matrix model (1993) (4)
- Task-based Authorization: a Paradigm for Flexible and Adaptable Access Control in Distributed Applications Extended Abstract (1993) (4)
- Multi Cloud IaaS with Domain Trust in OpenStack (2016) (4)
- Towards role-based administration in network information services (1999) (4)
- On the Cost-Effectiveness of TrustZone Defense on ARM Platform (2020) (3)
- A lattice interpretation of group-centric collaboration with expedient insiders (2012) (3)
- Network and System Security : 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings (2013) (3)
- Enforcement architecture and implementation model for group-centric Information Sharing (2009) (3)
- Securing Big Data Applications in the Cloud [Guest editors' introduction] (2014) (3)
- A perspective on integrity mechanisms (1989) (3)
- Reachability Analysis for Attributes in ABAC With Group Hierarchy (2021) (3)
- BlueSky: Activity Control: A Vision for "Active" Security Models for Smart Collaborative Systems (2022) (3)
- Adaptive Noise Injection against Side-Channel Attacks on ARM Platform (2019) (3)
- On Feasibility of Attribute-Aware Relationship-Based Access Control Policy Mining (2021) (3)
- Security for object-oriented systems (1993) (3)
- Concentric supervision of security applications: a new security management paradigm (1998) (3)
- RBAC Model for SCADA (2007) (3)
- A general design towards secure ad-hoc collaboration (2006) (2)
- Chemical incidents. (2021) (2)
- Challenge-Response Authentication (2011) (2)
- Towards provenance-based access control with feasible overhead (2014) (2)
- Access Control Policy Generation from User Stories Using Machine Learning (2021) (2)
- A Scalable and Secure Cryptographic Service (2007) (2)
- Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture (1994) (2)
- Poster : Access Control Needs in Smart Cars (2018) (2)
- RolemBased Access Control Models (1996) (2)
- On the Relationship Between Finite Domain ABAM and PreUCON \mathrm _A A (2016) (2)
- BlueSky: Towards Convergence of Zero Trust Principles and Score-Based Authorization for IoT Enabled Smart Systems (2022) (2)
- Access control constrains what a user can do directly, as well as what programs executing on behalf of the users are allowed to do. In this way access control seeks to prevent activity that could lead to breach of security. (1994) (2)
- The challenge of data and application security and privacy (DASPY): are we up to it (2011) (2)
- Logical Model and Specification of Usage Control (2005) (2)
- Nested categories for access control (1988) (2)
- IEEE Internet Computing: Security Track - Good Enough Security (2003) (2)
- The Reflected Tree Hierarchy for Protection and Sharing (1989) (2)
- Blockchain-Based Administration of Access in Smart Home IoT (2022) (2)
- On the Relationship Between Finite Domain ABAM and PreUCON A (2016) (2)
- Relational Database Access Controls (1999) (2)
- The Security of a Family of Two-Party RSA Signature Schemes (2001) (2)
- Security for grid-based computing systems issues and challenges (2004) (2)
- Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22-24, 2011 (2011) (2)
- Malicious Code: The Threat, Detection, and Protection (2006) (1)
- EVALUATION BY PARTS OF TRUSTED DATABASE MANAGEMENT SYSTEMS (1991) (1)
- Access Control Models and Architectures For IoT and Cyber Physical Systems (2022) (1)
- Restricted Polyinstantiation or How to Close Signaling Channels Without Duplicity (1990) (1)
- Decentralized Management of Security in Distributed Systems (1991) (1)
- The ASCAA Principles for access control interpreted for collaboration systems (2008) (1)
- Access Control in Cloud IaaS (2019) (1)
- Refresh Instead of Revoke Enhances Safety and Availability: A Formal Analysis (2019) (1)
- Access Control Models in Cloud IoT Services (2012) (1)
- A Model for the Administration of Access Control in Software Defined Networking using Custom Permissions (2020) (1)
- Safety and Consistency of Mutable Attributes Using Quotas: A Formal Analysis (2019) (1)
- DESIGN AND IMPLEMENTATION OF MULTILEVEL DATABASES (1994) (1)
- Role-Centric Circle-of-Trust in Multi-tenant Cloud IaaS (2016) (1)
- ParaSDN: An Access Control Model for SDN Applications based on Parameterized Roles and Permissions (2020) (1)
- Speculations on the science of web user security (2012) (1)
- Equivalence of Group-Centric Collaboration with Expedient Insiders ( GEI ) and LBAC with Collaborative Compartments ( LCC ) (2012) (1)
- ON SOME RESEARCH ISSUES IN MULTILEVEL DATABASE SECURITY (1999) (1)
- Identification and Authentication (2015) (1)
- Polyinstantiation for Cover Stories (2013) (1)
- Formal Analysis of ReBAC Policy Mining Feasibility (2021) (1)
- Enhancing anonymity via market competition (2004) (1)
- Panel: The next generation of acess control models (panel session): do we need them and what should they be? (2001) (1)
- How to Close Signaling Channels Without Duplicity (1990) (1)
- Proc. of the 13th NIST-NCSC National Computer Security Conference, Washington D.C., October 1990, pages 526-540 INTEGRITY MECHANISMS IN DATABASE MANAGEMENT SYSTEMS (1990) (1)
- Report on the computer security foundations workshop III (1991) (1)
- Designing an IT College (2001) (0)
- The standards are coming! Standards for security in object-oriented systems (1994) (0)
- Editorial (2010) (0)
- Lattice-Based Enforcement of (1992) (0)
- Do Pungra, For Remarkable Energy (2015) (0)
- Session details: Access control policy implementation (2004) (0)
- Session details: Keynote Address 2 (2014) (0)
- Rav Sandhu: The 6 Thought-Provoking Articles I Read This Week (2016) (0)
- Implementation of the Extended Schematic Protection Model (1999) (0)
- Essay 21 Solutions to the Polyinstantiation Problem (2006) (0)
- IVRS Latch with Security System (2018) (0)
- Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT: Message from the steering committee chair (2008) (0)
- Security for Object-Oriented Systems: An Editorial Overview (1993) (0)
- Why I Built The Market Mogul (2016) (0)
- IEEE Internet Computing: Guest Editors' Introduction - Identity Management (2003) (0)
- Panel Discussion: Role-Based Access Control and Next-Generation Security Models (1995) (0)
- Editorial (2012) (0)
- A proposed proxy-based multicloud computing framework allows dynamic, on- the-fly collaborations and resource sharing among cloud-based services, addressing trust, policy, and privacy issues without preestablished collabora- tion agreements or standardized interfaces. (2013) (0)
- Privacy-Preserving Accountable Accuracy Management Systems (PAAMS) (2009) (0)
- Conclusions and Future Work (2012) (0)
- Utilizing The DLBAC Approach Toward a ZT Score-based Authorization for IoT Systems (2023) (0)
- Malware Detection in Cloud Auto-Scaling Systems Using Shallow Convolutional Neural Networks (2019) (0)
- Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011: Message from the program chairs (2011) (0)
- Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, ABAC@CODASPY 2016, New Orleans, Louisiana, USA, March 11, 2016 (2016) (0)
- Authorization Frameworks for Smart and Connected Ecosystems (2012) (0)
- Access Control Convergence: Challenges and Opportunities (2021) (0)
- A distributed capability-based architecture for the transform model (1993) (0)
- Foreword (2016) (0)
- Implementation Experiences and Prospects (1996) (0)
- CRiSIS 2013 : 8th International Conference on Risks and Security of Internet and Systems, 23-25 October 2013, La Rochelle, France (2013) (0)
- What I Learned From The Founder Of Metro & Atom Bank (2016) (0)
- 10141 Summary - Distributed Usage Control (2010) (0)
- Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control (2017) (0)
- Role-based access control and next-generation security models (panel) (1996) (0)
- Secure Virtual Objects Communication (2012) (0)
- Access Control Systems and Methodology (2000) (0)
- Securing Cyberspace - Introduction to the Special Section. (1994) (0)
- Administration of Machine Learning Based Access Control (2022) (0)
- Four Years Of The Market Mogul: Lessons Learned (2017) (0)
- Method and system for authorization-generation of the asymmetric crypto-key (2001) (0)
- Mohammad A. Al-Kahtani, Ravi Sandhu (2004) (0)
- CACHE-BASED ATTACK AND DEFENSE ON ARM PLATFORM (2020) (0)
- The PEI + UCON Framework for Application Security (2009) (0)
- Applications and System Development Security (2000) (0)
- Access Control Oriented Architectures Supporting IoT and CPS (2012) (0)
- A scaleable extended dgsa scheme for confidentiality of shared data in multidomain organizations (1998) (0)
- Role-Based Access Control Features in Commercial Database Management Systems | NIST (1998) (0)
- 1 Role-Based Access Control Features in Commercial Database Management Systems (1999) (0)
- The PEI + UCON Framework for Application Security (2009) (0)
- On Five Deenitions of Data Integrity 1 (1993) (0)
- Analysis of DAC MAC RBAC Access Control based Models for Security (2018) (0)
- The science, engineering and business of cyber security (2013) (0)
- Security and Privacy for Emerging IoT and CPS Domains (2022) (0)
- Relational Database Access Controls: SQL (2011) (0)
- Network and System Security (2013) (0)
- Proceedings of the 7th International Conference on Network and System Security (NSS 2013) (2013) (0)
- Integrating security technology and object-oriented technology (panel) (1993) (0)
- Reconsidering the role of the reference monitor [computer system security] (1994) (0)
- Machine Learning in Access Control: A Taxonomy and Survey (2022) (0)
- IS 2008 PC Co-chairs' Message (2008) (0)
- A roadmap for privacy-enhanced secure data provenance (2014) (0)
- Attribute Based Access Control for Intelligent Transportation (2012) (0)
- Proceedings of Sixth ACM Symposium on Access Control Models and Technologies (SACMAT 2001): Foreword (2001) (0)
- Why The Media Has Failed Us (2016) (0)
- DRAFT: NOT FOR GENERAL DISTRIBUTION The EGRBAC Model for Smart Home IoT Access Control (2020) (0)
- Relational Database Security: Availability, Integrity, & Confidentiality (2000) (0)
- Session details: Keynote Address I (2013) (0)
- Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies (2017) (0)
- Security for Object-Oriented Systems, Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993 (1994) (0)
- General chair and PC chairs' welcome (2017) (0)
- Task-Based Authorizations (1999) (0)
- Message from the Program Committee Co-chairs: ARES 2013 (2013) (0)
- 53 Designing an IT College (2002) (0)
- Concurrency, Synchronization, and Scheduling to Support High-Assurance Write-Up in Multilevel Object-Based Computing (1993) (0)
- Proceedings of the tenth annual IFIP TC11/WG11.3 international conference on Database security: volume X : status and prospects: status and prospects (1997) (0)
- Security for OODBMS (Or Systems) - Panel (1993) (0)
- SNMP-based Network Security Management (1997) (0)
- Session details: Sharing Network and Application Data (2014) (0)
- Fine Grained Communication Control for IoT and CPS (2012) (0)
- Editorial (2010) (0)
- Database Security Volume X, Status and Prospects, IFIP TC11 / WG11.3 Tenth International Conference on Database Security, 22-24 July 1996, Como, Italy (1997) (0)
- 3 Access Control in OpenStack Cloud IaaS (2019) (0)
- Attributes Aware Relationship-based Access Control for Smart IoT Systems (2022) (0)
- Chapter 1 Access Control (2012) (0)
- Secure V2V and V2I Communication in Intelligent Transportation Using Cloudlets (2022) (0)
- Architectures and Models for Administration of User-Role Assignment in Role Based Access Control A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy at George Mason University (2008) (0)
- Message from the Workshop Co-chairs (2019) (0)
- DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things (2021) (0)
- Book Reviews (1997) (0)
- Introduction: Requirements for Access Control in IoT and CPS (2021) (0)
- Concentric supervision of security applications: an assurance methodology (1999) (0)
- Session details: Secure provenance (2011) (0)
- 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA, USA, October 14-17, 2012 (2012) (0)
- Discretionary a Ccess Control in Object-oriented Databases: Issues and Research Directions (1993) (0)
- 1 Information Operations Across Infospheres (0)
- Message from the IRI 2016 program co-chairs (2016) (0)
- IEEE Transactions on Dependable and Secure Computing: Editorial (2010) (0)
- 10141 Abstracts Collection - Distributed Usage Control (2010) (0)
- Workshop summary (1996) (0)
- Open Issues in Database Security (1996) (0)
- Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002 (2002) (0)
- Laboratory for Information Security Technology (LIST) (2003) (0)
- Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum) (1999) (0)
- CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy: Foreword (2011) (0)
- Author ' s personal copy Roles in information security e A survey and classification of the research area (2011) (0)
- Session details: New basic technologies for DIM (2005) (0)
- Scenario-Driven Device-to-Device Access Control in Smart Home IoT (2022) (0)
- 16 Implementation Experiences and Prospects (2015) (0)
- Keynote talk #1: Attribute-based access control: Insights and challenges (2017) (0)
- (1) Workshop Summary 1.0 Overview 1.1 Purpose (0)
- Understanding Click Fraud (2007) (0)
- Hybrid Approaches (ABAC and RBAC) Toward Secure Access Control in Smart Home IoT (2022) (0)
- Relational Database Security (2011) (0)
- Making access control more usable (2002) (0)
- Security for OODBMS (or systems) (1993) (0)
- Program Transformation Techniques for Enhancing Software Security (2012) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Ravinderpal Singh Sandhu?
Ravinderpal Singh Sandhu is affiliated with the following schools: