2009 | ||
---|---|---|
36 | Roshan K. Thomas, Giovanni Russello, Simon Tsang: Realizing the CDL Cross-Domain Language in the Ponder2 Policy Framework: Experiences and Research Directions. POLICY 2009: 76-83 | |
35 | Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas: E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks. Ad Hoc Networks 7(6): 1156-1168 (2009) | |
34 | Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas: Accurately Measuring Denial of Service in Simulation and Testbed Experiments. IEEE Trans. Dependable Sec. Comput. 6(2): 81-95 (2009) | |
2008 | ||
33 | Roshan K. Thomas, Ravi S. Sandhu, Elisa Bertino, Budak Arpinar, Shouhuai Xu: Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). ISIPS 2008: 115-121 | |
2007 | ||
32 | Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas, Wei-Min Yao, Stephen Schwab: Towards user-centric metrics for denial-of-service measurement. Experimental Computer Science 2007: 8 | |
31 | Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Wei-Min Yao, Peter L. Reiher, Stephen Schwab, Roshan K. Thomas: When is service really denied?: a user-centric dos metric. SIGMETRICS 2007: 357-358 | |
30 | Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas: Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs. Journal of Computer Security 15(1): 3-38 (2007) | |
2006 | ||
29 | Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko: Measuring denial Of service. QoP 2006: 53-58 | |
28 | Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas: Robust cooperative trust establishment for MANETs. SASN 2006: 23-34 | |
2005 | ||
27 | Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas: A Denial-of-Service Resistant Quality-of-Service Signaling Protocol for Mobile Ad Hoc Networks. QSHINE 2005: 32 | |
26 | Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas: A quantitative trust establishment framework for reliable data packet delivery in MANETs. SASN 2005: 1-10 | |
25 | Charikleia Zouridaki, Marek Hejmo, Brian L. Mark, Roshan K. Thomas, Kris Gaj: Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs. Wireless Information Systems 2005: 61-70 | |
2004 | ||
24 | Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Roshan K. Thomas: Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography. EuroPKI 2004: 232-245 | |
23 | Roshan K. Thomas, Ravi S. Sandhu: Towards a Multi-dimensional Characterization of Dissemination Control. POLICY 2004: 197-200 | |
22 | Roshan K. Thomas, Ravi S. Sandhu: Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions. PerCom Workshops 2004: 164-170 | |
21 | Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas: Denial-of-service resistant quality-of-service signaling for mobile ad hoc networks. SASN 2004: 23-28 | |
2003 | ||
20 | Roshan K. Thomas, Brian L. Mark, Tommy Johnson, James Croall: NetBouncer: Client-legitimacy-based High-performance DDoS Filtering. DISCEX (1) 2003: 14-25 | |
19 | Roshan K. Thomas, Hong Zhu, Tim Huck, Tommy Johnson: NetBouncer: Client-legitimacy-based High-performance DDoS Filtering. DISCEX (2) 2003: 111 | |
18 | Shi-Kuo Chang, Giuseppe Polese, Maurizio Cibelli, Roshan K. Thomas: Visual Authorization Modeling in E-commerce Applications. IEEE MultiMedia 10(1): 44-54 (2003) | |
2002 | ||
17 | Eve Cohen, Roshan K. Thomas, William H. Winsborough, Deborah Shands: Models for coalition-based access control (CBAC). SACMAT 2002: 97-106 | |
2001 | ||
16 | Christos K. Georgiadis, Ioannis Mavridis, George Pangalos, Roshan K. Thomas: Flexible team-based access control using contexts. SACMAT 2001: 21-27 | |
1997 | ||
15 | Roshan K. Thomas: Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. ACM Workshop on Role-Based Access Control 1997: 13-19 | |
14 | Roshan K. Thomas, Ravi S. Sandhu: Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. DBSec 1997: 166-181 | |
13 | Catherine D. McCollum, Donald B. Faatz, William R. Herndon, E. John Sebes, Roshan K. Thomas: Distributed Object Technologies, Databases and Security. DBSec 1997: 17-31 | |
12 | Shi-Kuo Chang, Giuseppe Polese, Roshan K. Thomas, Souvik Das: A Visual Language for Authorization Modeling. VL 1997: 110-118 | |
1996 | ||
11 | Roshan K. Thomas, Ravi S. Sandhu: A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases. IEEE Trans. Knowl. Data Eng. 8(1): 16-31 (1996) | |
1995 | ||
10 | Roshan K. Thomas: Role-based access control and distributed object-based enterprise computing. ACM Workshop on Role-Based Access Control 1995 | |
9 | Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting: Panel Discussion: Role-Based Access Control and Next-Generation Security Models. DBSec 1995: 289-298 | |
1994 | ||
8 | Ravi S. Sandhu, Roshan K. Thomas: Conceptual Foundations for a Model of Task-based Authorizations. CSFW 1994: 66-79 | |
7 | Roshan K. Thomas, Ravi S. Sandhu: Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture. ESORICS 1994: 403-428 | |
1993 | ||
6 | Roshan K. Thomas, Ravi S. Sandhu: Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Transactions in Multilevel databases. DBSec 1993: 309-328 | |
5 | Roshan K. Thomas, Ravi S. Sandhu: Concurrency, Synchronization, and Scheduling to Support High-Assurance Write-Up in Multilevel Object-Based Computing. Security for Object-Oriented Systems 1993: 218-228 | |
4 | Roshan K. Thomas, Ravi S. Sandhu: A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up. Journal of Computer Security 2(2-3): 231-275 (1993) | |
1992 | ||
3 | Roshan K. Thomas, Ravi S. Sandhu: Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects. DBSec 1992: 15-34 | |
1991 | ||
2 | Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia: A Secure Kernelized Architecture for Multiple Object-Oriented Databases. CSFW 1991: 139-152 | |
1 | Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia: Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases. DBSec 1991: 297-314 |