Journal Papers


Home
Publications
Most Cited Papers
Guide to Papers
Patents
Grants
PhD's Awarded
Invited Talks etc.
Teaching
Vitae etc.
Contact Me

Up Conference Papers Journal Papers Articles Miscellaneous Acronyms

    2023: 2

  1. Safwa Ameer, James Benson and Ravi Sandhu, Hybrid Approaches (ABAC and RBAC) Toward Secure Access Control in Smart Home IoT. IEEE Transactions on Dependable and Secure Computing, Volume 20, Number 5, September/October 2023, pages 4032-4051.
    Google Scholar Search 1+
  2. Maanak Gupta, Ravi Sandhu, Tanjila Mawla and James Benson, Reachability Analysis for Attributes in ABAC with Group Hierarchy. IEEE Transactions on Dependable and Secure Computing, January/February 2023, pages 841-858.
    Google Scholar Search 1+
  3. 2022: 2

  4. Maanak Gupta, James Benson, Farhan Patwa and Ravi Sandhu, Secure V2V and V2I Communication in Intelligent Transportation using Cloudlets. IEEE Transactions on Services Computing, Volume 15, Number 4, July/August 2022, pages 14.
    Google Scholar Search 50+
  5. Safwa Ameer, James Benson and Ravi Sandhu, An Attribute-Based Approach toward a Secured Smart-Home IoT Access Control and a Comparison with a Role-Based Approach. Information, Volume 13, Number 2, January 2022, pages 33.
    Google Scholar Search 1+
  6. 2021: 5

  7. Jaehong Park, Ravi Sandhu, Maanak Gupta and Smriti Bhatt, Activity Control Design Principles: Next Generation Access Control for Smart and Collaborative Systems. IEEE Access, Volume 9, November 2021, pages 19.
    Google Scholar Search 1+
  8. Jin Han, Wanyu Zang, Meng Yu and Ravi Sandhu, Quantify Co-Residency Risks in the Cloud through Deep Learning. IEEE Transactions on Dependable and Secure Computing, Volume 18, Number 4, July 2021, pages 12.
    Google Scholar Search 5+
  9. Smriti Bhatt, Thanh Kim Pham, Maanak Gupta, James Benson, Jaehong Park and Ravi Sandhu, Attribute-Based Access Control for AWS Internet of Things and Secure Industries of the Future. IEEE Access, Volume 9, July 2021, pages 24.
    Google Scholar Search 10+
  10. Maanak Gupta, Feras Awaysheh, James Benson, Mamoun Alazab, Farhan Patwa and Ravi Sandhu, An Attribute-Based Access Control for Cloud Enabled Industrial Smart Vehicles. IEEE Transactions on Industrial Informatics, Volume 17, Number 6, June 2021, pages 10.
    Google Scholar Search 25+
  11. Jeffrey Kimmell, Andrew McDole, Mahmoud Abdelsalam, Maanak Gupta and Ravi Sandhu, Recurrent Neural Networks Based Online Behavioural Malware Detection Techniques for Cloud Infrastructure. IEEE Access, Volume 9, May 2021, pages 15.
    Google Scholar Search 5+
  12. 2020: 3

  13. Naiwei Liu, Meng Yu, Wanyu Zang, and Ravi Sandhu, Cost and Effectiveness of TrustZone Defense and Side-Channel Attack on ARM Platform. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Volume 11, Number 4, Dec. 2020, pages 1-15.
    Google Scholar Search 5+
  14. Sai Chukkapalli, Sudip Mittal, Maanak Gupta, Mahmoud Abdelsalam, Anupam Joshi, Ravi Sandhu and Karuna Joshi, Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem. IEEE Access, Volume 8, September 2020, pages 20.
    Google Scholar Search 25+
  15. Rajkumar P.V. and Ravi Sandhu, Safety Decidability for Pre-Authorization Usage Control with Identifier Attribute Domains. IEEE Transactions on Dependable and Secure Computing, Volume 17, Number 3, May/June 2020, pages 465-478.
    Google Scholar Search 5+
  16. 2019: 2

  17. Naiwei Liu, Wanyu Zang, Songqing Chen, Meng Yu and Ravi Sandhu, Adaptive Noise Injection against Side-Channel Attacks on ARM Platform. EAI Endorsed Transactions on Security and Safety: Online First, July 2019, 15 pages.
    Google Scholar Search 1+
  18. Gang Wang, Jaehong Park, Ravi Sandhu, Jun Wang and Xiaolin Gui, Dynamic Trust Evaluation Model Based on Bidding and Multi-Attributes for Social Networks. International Journal High Performance Computing and Networking, Volume 13, Number 4, 2019, pages 436-454.
    Google Scholar Search 1+
  19. 2017: 1

  20. Qi Li, Ravi Sandhu, Xinwen Zhang and Mingwei Xu, Mandatory Content Access Control for Privacy Protection in Information Centric Networks. IEEE Transactions on Dependable and Secure Computing. Volume 14, Number 5, Sept./Oct. 2017, pages 494-506.
    Google Scholar Search 25+
  21. 2016: 3

  22. Rajkumar P.V. and Ravi Sandhu, Safety Decidability for Pre-Authorization Usage Control with Finite Attribute Domains. IEEE Transactions on Dependable and Secure Computing. Volume 13, Number 5, Sept./Oct. 2016, pages 582-590.
    Google Scholar Search 10+
  23. Yuan Cheng, Jae Park and Ravi Sandhu, An Access Control Model for Online Social Networks Using User-to-User Relationships. IEEE Transactions on Dependable and Secure Computing. Volume 13, Number 4, July/August 2016, pages 424-436.
    Google Scholar Search 25+
  24. Lianshan Sun, Jaehong Park, Dang Nguyen, and Ravi Sandhu, A Provenance-Aware Access Control Framework with Typed Provenance. IEEE Transactions on Dependable and Secure Computing. Volume 13, Number 4, July/August 2016, pages 411-423.
    Google Scholar Search 10+
  25. 2015: 3

  26. Bao Liu and Ravi Sandhu, Fingerprint-Based Detection and Diagnosis of Malicious Programs in Hardware. IEEE Transactions on Reliability, Volume 64, Number 3, September 2015, pages 1068-1077.
    Google Scholar Search 10+
  27. Bo Tang, Ravi Sandhu and Qi Li, Multi-Tenancy Authorization Models for Collaborative Cloud Services. Concurrency and Computation: Practice and Experience, Volume 27, Number 11, August 2015, pages 2851-2868.
    Google Scholar Search 75+
  28. Qi Li, Xinwen Zhang, Qingji Zheng, Ravi Sandhu, and Xiaoming Fu. LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking, IEEE Transactions on Information Forensics and Security, Volume 10, Number 2, February 2015, pages 308-320.
    Google Scholar Search 50+
  29. 2014: 1

  30. Elisa Bertino, Gabriel Ghinita, Murat Kantarcioglu, Dang Nguyen, Jae Park, Ravi Sandhu, Salmin Sultana, Bhavani Thuraisingham, and Shouhuai Xu. A Roadmap for Privacy-Enhanced Secure Data Provenance, Journal of Intelligent Information Systems, Volume 43, Number 3, May 2014, pages 481-501.
    Google Scholar Search 25+
  31. 2013: 2

  32. Khalid Bijon, Ram Krishnan and Ravi Sandhu, Constraints Specification in Attribute Based Access Control, ASE Science Journal, Volume 2, Number 3, 14 pages.
    Google Scholar Search 25+
  33. Mukesh Singhal, Santosh Chandrasekhar, Tingjian Ge, Ravi Sandhu, Ram Krishnan, Gail-Joon Ahn and Elisa Bertino, Collaboration in Multicloud Computing Environments: Framework and Security Issues, IEEE Computer, Volume 46, Number 2, February 2013, pages 76-84.
    Google Scholar Search 100+
  34. 2012: 1

  35. Ravi Sandhu, Speculations on the Science of Web User Security, Computer Networks, Volume 56, Number 18, Dec. 2012, pages 3891-3895.
    Google Scholar Search 1+
  36. 2011: 3

  37. Ram Krishnan, Jianwei Niu, Ravi Sandhu and William H. Winsborough, Group-Centric Secure Information-Sharing Models for Isolated Groups, ACM TISSEC, Volume 14, Number 3, Nov. 2011, 29 pages.
    Google Scholar Search 25+
  38. Ludwig Fuchs, Gunther Pernul and Ravi Sandhu, Roles in Information Security-A Survey and Classification of the Research Area, Computers & Security, Volume 30, Number 8, November 2011, pages 748-769.
    Google Scholar Search 100+
  39. Jaehong Park, Ravi Sandhu and Yuan Cheng, A User-Activity-Centric Framework for Access Control in Online Social Networks , IEEE Internet Computing, 15(5): 62-65, September 2011.
    Google Scholar Search 50+
  40. 2010: 1

  41. Moo Nam Ko, Gorrell Cheek, Mohamed Shehab and Ravi Sandhu, Social-Networks Connect Services, IEEE Computer, Volume 43, Number 8 (Cover Article), August 2010, pages 37-43.
    Google Scholar Search 150+
  42. 2008: 1

  43. Zhang, X., Nakae, M., Covington, M., and Sandhu, R., Toward a Usage-Based Security Framework for Collaborative Computing Systems, ACM TISSEC, Volume 11, Number 1, Feb. 2008, pages 1-36.
    Google Scholar Search 100+
  44. 2007: 1

  45. David Ferraiolo, Rick Kuhn and Ravi Sandhu, RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control", IEEE Security & Privacy, Volume 5, Number 6, Nov./Dec. 2007, pages 51-53.
    Google Scholar Search 100+
  46. 2006: 3

  47. Sejong Oh, Ravi Sandhu and Xinwen Zhang, An Effective Role Administration Model Using Organization Structure, ACM Transactions on Information and System Security, Volume 9, Number 2, May 2006, pages 113-137.
    Google Scholar Search 75+
  48. Elisa Bertino, Latifur Khan, Ravi Sandhu and Bhavani Thuraisingham, Secure Knowledge Management: Confidentiality, Trust, and Privacy, IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 36(3):429-438, May 2006.
    Google Scholar Search 150+
  49. Ravi Sandhu, Xinwen Zhang, Kumar Ranganathan and Michael J. Covington, Client-side Access Control Enforcement Using Trusted Computing and PEI Models, Journal of High Speed Networks, Volume 15, Number 3, 2006, Pages 229-245.
    Google Scholar Search 25+
  50. 2005: 3

  51. Xinwen Zhang, Francesco Parisi-Presicce, Ravi Sandhu, and Jaehong Park, Formal Model and Policy Specification of Usage Control, ACM Transactions on Information and System Security (TISSEC), 8(4): 351-387, 2005
    Google Scholar Search 300+
  52. Xinwen Zhang, Songqing Chen, and Ravi Sandhu, Enhancing Data Authenticity and Integrity in P2P Systems, IEEE Internet Computing, Special Issue on Security for P2P/Ad Hoc Networks, 9(6): 42-49, November 2005.
    Google Scholar Search 50+
  53. Elisa Bertino and Ravi Sandhu, Database Security-Concepts, Approaches, and Challenges. IEEE Trans. Dependable Sec. Comput. 2(1): 2-19, 2005.
    Google Scholar Search 500+
  54. 2004: 1

  55. Jaehong Park and Ravi Sandhu, The UCONABC Usage Control Model, ACM Transactions on Information and System Security, Volume 7, Number 1, February 2004, pages 128-174.
    Google Scholar Search 1200+
  56. 2003: 1

  57. Ravi Sandhu, Good-Enough Security: Toward a Pragmatic Business-Driven Discipline, IEEE Internet Computing, Vol. 7, No.1, January/February 2003.
    Google Scholar Search 100+
  58. 2001: 3

  59. David F. Ferraiolo, Ravi Sandhu, Serban Gavrila, D. Richard Kuhn and Ramaswamy Chandramouli, Proposed NIST Standard for Role-Based Access Control, ACM Transactions on Information and Systems Security (TISSEC), Volume 4, Number 3, August 2001. Highlights
    Google Scholar Search 3700+
    Also see ANSI INCITS 359-2004 Standard for Role Based Access Control
  60. Joon Park, Ravi Sandhu and Gail-Joon Ahn, Role-Based Access Control on the Web, ACM Transactions on Information and Systems Security (TISSEC), Volume 4, Number 1, February 2001.
    Google Scholar Search 300+
  61. Gail-Joon Ahn and Ravi Sandhu, Decentralized User Group Assignment in Windows NT, Journal of Systems and Software. Volume 56, Issue 1, February 2001, pages 39-49.
    Google Scholar Search 1+
  62. 2000: 3

  63. Gail-Joon Ahn and Ravi Sandhu, Role-Based Authorization Constraints Specification, ACM Transactions on Information and Systems Security (TISSEC), Volume 3, Number 4, November 2000. Errata
    Google Scholar Search 600+
  64. Joon S. Park and Ravi Sandhu, Secure Cookies on the Web, IEEE Internet Computing, July 2000.
    Google Scholar Search 200+
  65. Sylvia Osborn, Ravi Sandhu and Qamar Munawer, Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies, ACM Transactions on Information and Systems Security (TISSEC), Volume 3, Number 2, February 2000.
    Google Scholar Search 900+
  66. 1999: 3

  67. Ravi Sandhu and Bhamidipati, Role-Based Administration of User-Role Assignment: The URA97 Model and its Oracle Implementation, Journal of Computer Security, Volume 7, 1999.
    Google Scholar Search 75+
  68. Gail-Joon Ahn and Ravi Sandhu, Towards Role-Based Administration in Network Information Services, Journal of Network and Computer Applications, Volume 22,Number 3, July 1999.
    Google Scholar Search 1+
  69. Ravi Sandhu, Venkata Bhamidipati and Qamar Munawer, The ARBAC97 Model for Role-Based Administration of Roles, ACM Transactions on Information and Systems Security (TISSEC), Volume 2, Number, February 1999.
    Google Scholar Search 900+
  70. 1998: 1

  71. Ravi Sandhu and Fang Chen, The Multilevel Relational (MLR) Data Model, ACM Transactions on Information and Systems Security (TISSEC), Volume 1, Number 1,  June 1998.
    Google Scholar Search 150+
  72. 1996: 4

  73. Ravi Sandhu and P. Samarati, Authentication, Access Control and Audit, ACM Computing Surveys, 50th anniversary commemorative issue, Volume 28, Number 1, March 1996.
    Google Scholar Search 200+
  74. Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman, Role-Based Access Control Models, IEEE Computer, Volume 29, Number 2, February 1996.
    Google Scholar Search 9400+
  75. Roshan Thomas and Ravi Sandhu, A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases, IEEE Transactions on Knowledge and Data Engineering, Volume 8, Number 1, February 1996.
    Google Scholar Search 10+
  76. Paul Ammann, Ravi Sandhu and Richard Lipton, The Expressive Power of Multi-Parent Creation in Monotonic Access Control Models, Journal of Computer Security, Volume 4, Numbers 2-3, January 1996, 149-165.
    Google Scholar Search 25+
  77. 1994: 1

  78. Ravi Sandhu and P. Samarati, Access Control: Principles and Practice, IEEE Communications, Volume 32, Number 9, September 1994.
    Google Scholar Search 1700+
  79. 1993: 3

  80. Ravi Sandhu, Lattice-Based Access Control Models, IEEE Computer, Volume 26, Number 11 (Cover Article), November 1993.
    Google Scholar Search 1000+
  81. Roshan Thomas and Ravi Sandhu, A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up, Journal of Computer Security, Volume 2, Number 3, 1993.
    Google Scholar Search 1+
  82. Ravi Sandhu and Gurpreet Suri, A Distributed Capability-Based Architecture for the Transform Model, Computers and Security, Volume 12, Number 3, May 1993.
    Google Scholar Search 0
  83. 1992: 5

  84. Paul Ammann and Ravi Sandhu, The Extended Schematic Protection Model, Journal of Computer Security, Volume 1, Number 4, 1992.
    Google Scholar Search 25+
  85. Ravi Sandhu, Lattice-Based Enforcement of Chinese Walls, Computers and Security, Volume 11, Number 8, December 1992.
    Google Scholar Search 50+
  86. Ravi Sandhu and Sushil Jajodia, Eliminating Polyinstantiation Securely, Computers and Security, Volume 11, Number 6, October 1992.
    Google Scholar Search 10+
  87. Ravi Sandhu, Undecidability of Safety for the Schematic Protection Model with Cyclic Creates, Journal of Computer and System Sciences, Volume 44, Number 1, February 1992.
    Google Scholar Search 25+
  88. Ravi Sandhu, Expressive Power of the Schematic Protection Model, Journal of Computer Security, Volume 1, Number 1, 1992.
    Google Scholar Search 75+
  89. 1991: 1

  90. Ravi Sandhu and Sushil Jajodia, Integrity Principles and Mechanisms in Database Management Systems, Computers and Security, Volume 10, Number 5, August 1991.
    Google Scholar Search 10+
  91. 1989: 3

  92. Ravi Sandhu, Recognizing Immediacy in an NTree and its Application to Protection Groups, IEEE Transactions on Software Engineering, Volume 15, Number 12, December 1989.
    Google Scholar Search 1+
  93. Ravi Sandhu, The Demand Operation in the Schematic Protection Model, Information Processing Letters, Volume 32, Number 4, September 1989.
    Google Scholar Search 10+
  94. Ravi Sandhu, The Reflected Tree Hierarchy for Protection and Sharing, Information Processing Letters, Volume 30, Number 1, January 1989.
    Google Scholar Search 1+
  95. 1988: 4

  96. Ravi Sandhu, Nested Categories for Access Control, Computers and Security, Volume 7, Number 6, December 1988.
    Google Scholar Search 1+
  97. Ravi Sandhu, The NTree: A Two Dimension Partial Order for Protection Groups, ACM Transactions on Computer Systems, Volume 6, Number 2, May 1988.
    Google Scholar Search 25+
  98. Ravi Sandhu, The Schematic Protection Model: Its Definition and Analysis for Acyclic Attenuating Schemes , Journal of the ACM, Volume 35, Number 2, April 1988.
    Google Scholar Search 200+
  99. Ravi Sandhu, Cryptographic Implementation of a Tree Hierarchy for Access Control, Information Processing Letters, Volume 27, Number 2, February 1988.
    Google Scholar Search 300+