Author: Ravi S. Sandhu
Publication Overview
Publication period start: 2004
Number of co-authors: 11
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Zhang,
Xinwen,
Chen,
Songqing,
Sandhu,
Ravi S.
(2005):
Enhancing Data Authenticity and Integrity in P2P Systems.
In
IEEE Internet Computing,
9
(6)
pp. 42-49.
https://doi.ieeecomputersociety.org/10.1109/MIC.2005.124
Sandhu,
Ravi S.
(2003):
Good-Enough Security: Toward a Pragmatic Business-Driven Discipline.
In
IEEE Internet Computing,
7
(1)
pp. 66-68.
https://csdl.computer.org/comp/mags/ic/2003/01/w1066abs.htm
Buell,
Duncan A.,
Sandhu,
Ravi S.
(2003):
Guest Editors\' Introduction: Identity Management.
In
IEEE Internet Computing,
7
(6)
pp. 26-28.
https://csdl.computer.org/comp/mags/ic/2003/06/w6026abs.htm
Sandhu,
Ravi S.
(2002):
Guest Editor\'s Introduction: The Technology of Trust.
In
IEEE Internet Computing,
6
(6)
pp. 28-29.
https://csdl.computer.org/comp/mags/ic/2002/06/w6028abs.htm
Park,
Joon S.,
Sandhu,
Ravi S.
(2000):
Secure Cookies on the Web.
In
IEEE Internet Computing,
4
(4)
pp. 36-44.
https://csdl.computer.org/comp/mags/ic/2000/04/w4036abs.htm
Gong,
Li,
Sandhu,
Ravi S.
(2000):
Guest Editors\' Introduction: What Makes Security Technologies Relevant?.
In
IEEE Internet Computing,
4
(6)
pp. 38-41.
https://csdl.computer.org/comp/mags/ic/2000/06/w6038abs.htm
Sandhu,
Ravi S.,
Coyne,
Edward J.,
Feinstein,
Hal L.,
Youman,
Charles E.
(1996):
Role-Based Access Control Models.
In
IEEE Computer,
29
(2)
pp. 38-47.
Ganesan,
Ravi,
Sandhu,
Ravi S.
(1994):
Securing Cyberspace - Introduction to the Special Section.
In
Communications of the ACM,
37
(11)
pp. 28-31.
Sandhu,
Ravi S.
(1993):
Lattice-Based Access Control Models.
In
IEEE Computer,
26
(11)
pp. 9-19.
Zhang,
Xinwen,
Seifert,
Jean-Pierre,
Sandhu,
Ravi S.
(2008):
Security Enforcement Model for Distributed Usage Control.
In:
Singhal,
Mukesh,
Serugendo,
Giovanna Di Marzo,
Tsai,
Jeffrey J. P.,
Lee,
Wang-Chien,
Romer,
Kay,
Tseng,
Yu-Chee,
Hsiao,
Han C. W.
(eds.)
SUTC 2008 - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
11-13 June,
2008,
Taichung, Taiwan.
pp. 10-18.
https://doi.ieeecomputersociety.org/10.1109/SUTC.2008.79
Thomas,
Roshan K.,
Sandhu,
Ravi S.
(2004):
Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Resear.
In:
2nd IEEE Conference on Pervasive Computing and Communications Workshops PerCom 2004 Workshops
14-17 March,
2004,
Orlando, FL, USA.
pp. 164-170.
https://csdl.computer.org/comp/proceedings/percomw/2004/2106/00/21060164abs.htm