2020 - Fellow, National Academy of Inventors
2008 - Fellow of the American Association for the Advancement of Science (AAAS)
2002 - IEEE Fellow For contributions to the field of information and system security.
2001 - ACM Fellow For technical contributions to the field of information and system security, notably access control models and systems, and professional leaderhip in research journals and conferences.
His primary areas of investigation include Access control, Computer security, Role-based access control, Authorization and Information security. His work on Computer access control is typically connected to Delegation as part of general Access control study, connecting several disciplines of science. His Computer security study frequently draws connections to other fields, such as Task.
His study in the field of Role hierarchy is also linked to topics like Permission and Lattice. Ravi Sandhu combines subjects such as Standardization and Standard model with his study of Authorization. His Discretionary access control research includes elements of Mandatory access control and Distributed System Security Architecture.
Ravi Sandhu mainly focuses on Access control, Computer security, Role-based access control, Authorization and Cloud computing. In his works, Ravi Sandhu conducts interdisciplinary research on Access control and Permission. His Computer security study which covers Cloud computing security that intersects with Security service and Computer security model.
His study in the field of Role hierarchy and Discretionary access control also crosses realms of Flexibility. Ravi Sandhu studies Attribute-based access control which is a part of Authorization. His research in Cloud computing intersects with topics in Shared resource and Service.
His primary areas of study are Access control, Cloud computing, Computer security, Role-based access control and Authorization. In general Access control study, his work on Attribute-based access control often relates to the realm of Enforcement, thereby connecting several areas of interest. His Attribute-based access control research is multidisciplinary, incorporating elements of Computer access control and Expressive power.
A large part of his Computer security studies is devoted to Security policy. His study in Role-based access control is interdisciplinary in nature, drawing from both Home automation, Scalability, Database and Software-defined networking. His study focuses on the intersection of Authorization and fields such as Theoretical computer science with connections in the field of Inheritance and Set.
His main research concerns Access control, Cloud computing, Computer security, Role-based access control and The Internet. His Access control study is related to the wider topic of Computer network. He has included themes like Virtual machine, Layer, Artificial intelligence, Information sharing and Internet privacy in his Cloud computing study.
His study on Authorization and Security policy is often connected to Intelligent transportation system as part of broader study in Computer security. His study connects Scalability and Role-based access control. Ravi Sandhu interconnects Market fragmentation, Edge computing, End user and Vendor in the investigation of issues within The Internet.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Role-based access control models
R.S. Sandhu;E.J. Coyne;H.L. Feinstein;H.L. Feinstein;C.E. Youman.
IEEE Computer (1996)
Proposed NIST standard for role-based access control
David F. Ferraiolo;Ravi Sandhu;Serban Gavrila;D. Richard Kuhn.
ACM Transactions on Information and System Security (2001)
Access control: principle and practice
R.S. Sandhu;P. Samarati.
IEEE Communications Magazine (1994)
The NIST model for role-based access control: towards a unified standard
Ravi Sandhu;David Ferraiolo;Richard Kuhn.
Proceedings of the fifth ACM workshop on Role-based access control (2000)
The UCON ABC usage control model
Jaehong Park;Ravi Sandhu.
ACM Transactions on Information and System Security (2004)
Lattice-based access control models
R.S. Sandhu.
IEEE Computer (1993)
Configuring role-based access control to enforce mandatory and discretionary access control policies
Sylvia Osborn;Ravi Sandhu;Qamar Munawer.
ACM Transactions on Information and System Security (2000)
The ARBAC97 model for role-based administration of roles
Ravi Sandhu;Venkata Bhamidipati;Qamar Munawer.
ACM Transactions on Information and System Security (1999)
Role-based authorization constraints specification
Gail-Joon Ahn;Ravi Sandhu.
ACM Transactions on Information and System Security (2000)
Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management
Roshan K. Thomas;Ravi S. Sandhu.
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects (1997)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Samsung (South Korea)
Purdue University West Lafayette
George Mason University
University of Colorado Colorado Springs
Arizona State University
Beihang University
Syracuse University
The University of Texas at Dallas
University of Milan
George Mason University
Western Sydney University
Swiss Tropical and Public Health Institute
University of Antwerp
University of Helsinki
Northwestern University
University of Paris-Saclay
Vrije Universiteit Brussel
Spanish National Research Council
University of Waterloo
Oregon Health & Science University
Geneva College
National Institutes of Health
Monash University
University of Maryland, Baltimore
Icahn School of Medicine at Mount Sinai
Intermountain Healthcare