Ravi S. Sandhu
Orcid: 0000-0002-3165-1813Affiliations:
- University of Texas at San Antonio
According to our database1,
Ravi S. Sandhu
authored at least 355 papers
between 1985 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2001, "For technical contributions to the field of information and system security, notably access control models and systems, and professional leaderhip in research journals and conferences.".
IEEE Fellow
IEEE Fellow 2002, "For contributions to the field of information and system security.".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
The $\mathrm {ACAC_{D}}$ model for mutable activity control and chain of dependencies in smart and connected systems.
Int. J. Inf. Sec., October, 2024
ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model.
ACM Trans. Priv. Secur., August, 2024
CoRR, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
The ACAC_D Model for Mutable Activity Control and Chain of Dependencies in Smart and Collaborative Systems.
CoRR, 2023
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
2022
IEEE Trans. Serv. Comput., 2022
An Attribute-Based Approach toward a Secured Smart-Home IoT Access Control and a Comparison with a Role-Based Approach.
Inf., 2022
Proceedings of the 4th IEEE International Conference on Trust, 2022
BlueSky: Activity Control: A Vision for "Active" Security Models for Smart Collaborative Systems.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
BlueSky: Towards Convergence of Zero Trust Principles and Score-Based Authorization for IoT Enabled Smart Systems.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
Proceedings of the 1st Italian Conference on Big Data and Data Science (itaDATA 2022), 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the 8th IEEE International Conference on Collaboration and Internet Computing, 2022
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Springer, ISBN: 978-3-030-81088-7, 2022
2021
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Dependable Secur. Comput., 2021
Activity Control Design Principles: Next Generation Access Control for Smart and Collaborative Systems.
IEEE Access, 2021
Recurrent Neural Networks Based Online Behavioural Malware Detection Techniques for Cloud Infrastructure.
IEEE Access, 2021
Attribute-Based Access Control for AWS Internet of Things and Secure Industries of the Future.
IEEE Access, 2021
Proceedings of the 3rd IEEE International Conference on Trust, 2021
Access Control Convergence: Challenges and Opportunities.
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
Proceedings of the SAT-CPS@CODASPY 2021, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Proceedings of the SAT-CPS@CODASPY 2021, 2021
2020
Safety Decidability for Pre-Authorization Usage Control with Identifier Attribute Domains.
IEEE Trans. Dependable Secur. Comput., 2020
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020
Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem.
IEEE Access, 2020
Proceedings of the Information Security Applications - 21st International Conference, 2020
Proceedings of the Second IEEE International Conference on Trust, 2020
A Model for the Administration of Access Control in Software Defined Networking using Custom Permissions.
Proceedings of the Second IEEE International Conference on Trust, 2020
ABAC-CC: Attribute-Based Access Control and Communication Control for Internet of Things.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
Proceedings of the 21st International Conference on Information Reuse and Integration for Data Science, 2020
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020
ParaSDN: An Access Control Model for SDN Applications based on Parameterized Roles and Permissions.
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020
2019
EAI Endorsed Trans. Security Safety, 2019
Dynamic trust evaluation model based on bidding and multi-attributes for social networks.
Int. J. High Perform. Comput. Netw., 2019
Secure Cloud Assisted Smart Cars Using Dynamic Groups and Attribute Based Access Control.
CoRR, 2019
Proceedings of the First IEEE International Conference on Trust, 2019
Proceedings of the Secure Knowledge Management In Artificial Intelligence Era, 2019
IoT Passport: A Blockchain-Based Trust Framework for Collaborative Internet-of-Things.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Safety and Consistency of Subject Attributes for Attribute-Based Pre-Authorization Systems.
Proceedings of the National Cyber Summit, 2019
Proceedings of the 20th IEEE International Conference on Information Reuse and Integration for Data Science, 2019
Proceedings of the 2019 4th International Conference on Computing, 2019
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019
Online Malware Detection in Cloud Auto-scaling Systems Using Shallow Convolutional Neural Networks.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Proceedings of the SDN-NFV@CODASPY 2019, 2019
2018
Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Access Control Model for Virtual Objects (Shadows) Communication for AWS Internet of Things.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
2017
Mandatory Content Access Control for Privacy Protection in Information Centric Networks.
IEEE Trans. Dependable Secur. Comput., 2017
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, 2017
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
IEEE Trans. Dependable Secur. Comput., 2016
Safety Decidability for Pre-Authorization Usage Control with Finite Attribute Domains.
IEEE Trans. Dependable Secur. Comput., 2016
IEEE Trans. Dependable Secur. Comput., 2016
Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Extended ReBAC Administrative Models with Cascading Revocation and Provenance Support.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
The \mathrm GURA_G GURA G Administrative Model for User and Group Attribute Assignment.
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the Information Security - 19th International Conference, 2016
Object-to-Object Relationship-Based Access Control: Model and Multi-Cloud Demonstration (Invited Paper).
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
An Attribute-Based Access Control Extension for OpenStack and Its Enforcement Utilizing the Policy Machine.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Access Control Models for Cloud-Enabled Internet of Things: A Proposed Architecture and Research Agenda.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
IEEE Trans. Reliab., 2015
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking.
IEEE Trans. Inf. Forensics Secur., 2015
Concurr. Comput. Pract. Exp., 2015
Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015
2014
IEEE Cloud Comput., 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014
Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, 2014
Access Control.
Proceedings of the Computing Handbook, 2014
2013
Computer, 2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013
Proceedings of the DIM'13, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Dependency Path Patterns as the Foundation of Access Control in Provenance-aware Systems.
Proceedings of the 4th Workshop on the Theory and Practice of Provenance, 2012
Relationship-Based Access Control for Online Social Networks: Beyond User-to-User Relationships.
Proceedings of the 2012 International Conference on Privacy, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
Proceedings of the Computer Network Security, 2012
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012
Proceedings of the Information Systems Security, 8th International Conference, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
A group-centric model for collaboration with expedient insiders in multilevel systems.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
2011
Proceedings of the Encyclopedia of Information Assurance, 2011
Proceedings of the Encyclopedia of Information Assurance, 2011
ACM Trans. Inf. Syst. Secur., 2011
IEEE Internet Comput., 2011
Comput. Secur., 2011
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011
Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing.
Proceedings of the Information Systems Security - 7th International Conference, 2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Proceedings of the Sixth International Conference on Availability, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
Proceedings of the Web-Age Information Management, 11th International Conference, 2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Proceedings of the Computer Network Security, 2010
Proceedings of the Computer Network Security, 2010
Evaluating detection and treatment effectiveness of commercial anti-malware programs.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010
Proceedings of the Distributed Usage Control, 06.04. - 09.04.2010, 2010
Proceedings of the Distributed Usage Control, 06.04. - 09.04.2010, 2010
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Proceedings of the The Forth International Conference on Availability, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
ACM Trans. Inf. Syst. Secur., 2008
Proceedings of the IEEE International Conference on Sensor Networks, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the Fourth OWLED Workshop on OWL: Experiences and Directions, 2008
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008
Proceedings of the 11th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2008), 2008
Proceedings of the Protecting Persons While Protecting the People, 2008
Proceedings of the 2008 International Symposium on Collaborative Technologies and Systems, 2008
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008
2007
RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control".
IEEE Secur. Priv., 2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the Data and Applications Security XXI, 2007
Proceedings of the Data and Applications Security XXI, 2007
SecureBus: towards application-transparent trusted computing with mandatory access control.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
2006
IEEE Trans. Syst. Man Cybern. Part A, 2006
ACM Trans. Inf. Syst. Secur., 2006
J. High Speed Networks, 2006
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing.
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
ACM Trans. Inf. Syst. Secur., 2005
IEEE Trans. Dependable Secur. Comput., 2005
IEEE Internet Comput., 2005
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005
2004
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004
Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the Graph Transformations, Second International Conference, 2004
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
IEEE Internet Comput., 2003
IEEE Internet Computing: Security Track - Good Enough Security.
IEEE Distributed Syst. Online, 2003
IEEE Internet Computing: Guest Editors' Introduction - Identity Management.
IEEE Distributed Syst. Online, 2003
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
Proceedings of the Computer Network Security, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
Proceedings of the Topics in Cryptology, 2003
2002
IEEE Internet Computing: Guest Editor's Introduction - The Technology of Trust.
IEEE Distributed Syst. Online, 2002
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002
2001
ACM Trans. Inf. Syst. Secur., 2001
IACR Cryptol. ePrint Arch., 2001
Designing an IT College.
Proceedings of the Networking the Learner: Computers in Education, 2001
Panel: The next generation of acess control models (panel session): do we need them and what should they be?
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001
Proceedings of the Information Assurance in Computer Networks: Methods, 2001
Role-based Access Control on the Web Using LDAP.
Proceedings of the Database and Application Security XV, 2001
Secure Role-Based Workflow Models.
Proceedings of the Database and Application Security XV, 2001
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
2000
Configuring role-based access control to enforce mandatory and discretionary access control policies.
ACM Trans. Inf. Syst. Secur., 2000
ACM Trans. Inf. Syst. Secur., 2000
IEEE Internet Comput., 2000
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
1999
ACM Trans. Inf. Syst. Secur., 1999
J. Netw. Comput. Appl., 1999
Role-based Administration of User-Role Assignment: The URA97 Model and its Oracle Implementation.
J. Comput. Secur., 1999
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999
RBAC on the Web by Secure Cookies.
Proceedings of the Research Advances in Database and Information Systems Security, 1999
Extending The BFA Workflow Authorization Model to Express Weighted Voting.
Proceedings of the Research Advances in Database and Information Systems Security, 1999
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum).
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
1998
Proceedings of the Third ACM Workshop on Role-Based Access Control, 1998
Proceedings of the Third ACM Workshop on Role-Based Access Control, 1998
Proceedings of the Third ACM Workshop on Role-Based Access Control, 1998
Proceedings of the Third ACM Workshop on Role-Based Access Control, 1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
1997
The ARBAC97 model for role-based administration of roles: preliminary description and outline.
Proceedings of the Second Workshop on Role-Based Access Control, 1997
SNMP-based Network Security Management.
Proceedings of the Integrated Network Management V, 1997
Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management.
Proceedings of the Database Securty XI: Status and Prospects, 1997
The URA97 Model for Role-Based User-Role Assignment.
Proceedings of the Database Securty XI: Status and Prospects, 1997
Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997
Authentication, Access Controls, and Intrusion Detection.
Proceedings of the Computer Science and Engineering Handbook, 1997
1996
IEEE Trans. Knowl. Data Eng., 1996
J. Comput. Secur., 1996
Proceedings of the Computer Security, 1996
Implementation Experiences and Prospects.
Proceedings of the Database Security Volume X, 1996
Open Issues in Database Security.
Proceedings of the Database Security Volume X, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
1995
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995
Panel Discussion: Role-Based Access Control and Next-Generation Security Models.
Proceedings of the Database Security IX: Status and Prospects, 1995
1994
Proceedings of the Addendum to the Proceedings on Object-Oriented Programming Systems, 1994
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994
Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture.
Proceedings of the Computer Security, 1994
Proceedings of the Computer Security, 1994
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994
Proceedings of the 10th Annual Computer Security Applications Conference, 1994
1993
Proceedings of the Addendum to the Proceedings on Object-Oriented Programming Systems, 1993
Proceedings of the Addendum to the Proceedings on Object-Oriented Programming Systems, 1993
A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up.
J. Comput. Secur., 1993
Inf. Secur. J. A Glob. Perspect., 1993
Comput. Secur., 1993
Security for Object-Oriented Systems: An Editorial Overview.
Proceedings of the Security for Object-Oriented Systems, 1993
Concurrency, Synchronization, and Scheduling to Support High-Assurance Write-Up in Multilevel Object-Based Computing.
Proceedings of the Security for Object-Oriented Systems, 1993
Proceedings of the Eighth Annual Conference on Object-Oriented Programming Systems, 1993
Towards a task-based paradigm for flexible and adaptable access control in distributed applications.
Proceedings of the Proceedings on the 1992-1993 Workshop on New Security Paradigms, 1993
Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Transactions in Multilevel databases.
Proceedings of the Database Security, 1993
On Five Definitions of Data Integrity.
Proceedings of the Database Security, 1993
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993
1992
J. Comput. Syst. Sci., 1992
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992
Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects.
Proceedings of the Database Security, 1992
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992
Implementing transaction control expressions by checking for absence of access rights.
Proceedings of the Eighth Annual Computer Security Applications Conference, 1992
1991
Comput. Secur., 1991
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991
Proceedings of the 1991 ACM SIGMOD International Conference on Management of Data, 1991
Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases.
Proceedings of the Database Security, 1991
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991
A single-level scheduler for the replicated architecture for multilevel-secure databases.
Proceedings of the Seventh Annual Computer Security Applications Conference, 1991
Proceedings of the Seventh Annual Computer Security Applications Conference, 1991
1990
Database Security: Current Status and Key Issues.
SIGMOD Rec., 1990
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990
Separation of Duties in Computerized Information Systems.
Proceedings of the Database Security, 1990
Polyinstantiation Integrity in Multilevel Relations Revisited.
Proceedings of the Database Security, 1990
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990
1989
Recognizing Immediacy in an N-Tree Hierarchy and Its Application to Protection Groups.
IEEE Trans. Software Eng., 1989
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989
Discussion Summary.
Proceedings of the Database Security, 1989
Mandatory Controls for Database Integrity.
Proceedings of the Database Security, 1989
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989
1988
ACM Trans. Comput. Syst., 1988
The schematic protection model: its definition and analysis for acyclic attenuating schemes.
J. ACM, 1988
Inf. Process. Lett., 1988
1987
Proceedings of the 1987 Fall Joint Computer Conference on Exploring technology: today and tomorrow, 1987
1986
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986
1985
Proceedings of the 1985 IEEE Symposium on Security and Privacy, 1985