dblp.uni-trier.dewww.uni-trier.de

Roshan K. Thomas

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
31EEJelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas: Accurately Measuring Denial of Service in Simulation and Testbed Experiments. IEEE Trans. Dependable Sec. Comput. 6(2): 81-95 (2009)
2007
30EEJelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas, Wei-Min Yao, Stephen Schwab: Towards user-centric metrics for denial-of-service measurement. Experimental Computer Science 2007: 8
29EEJelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Wei-Min Yao, Peter L. Reiher, Stephen Schwab, Roshan K. Thomas: When is service really denied?: a user-centric dos metric. SIGMETRICS 2007: 357-358
28EECharikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas: Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs. Journal of Computer Security 15(1): 3-38 (2007)
2006
27EEJelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko: Measuring denial Of service. QoP 2006: 53-58
26EECharikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas: Robust cooperative trust establishment for MANETs. SASN 2006: 23-34
2005
25EEMarek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas: A Denial-of-Service Resistant Quality-of-Service Signaling Protocol for Mobile Ad Hoc Networks. QSHINE 2005: 32
24EECharikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas: A quantitative trust establishment framework for reliable data packet delivery in MANETs. SASN 2005: 1-10
23 Charikleia Zouridaki, Marek Hejmo, Brian L. Mark, Roshan K. Thomas, Kris Gaj: Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs. Wireless Information Systems 2005: 61-70
2004
22EECharikleia Zouridaki, Brian L. Mark, Kris Gaj, Roshan K. Thomas: Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography. EuroPKI 2004: 232-245
21EERoshan K. Thomas, Ravi S. Sandhu: Towards a Multi-dimensional Characterization of Dissemination Control. POLICY 2004: 197-200
20EERoshan K. Thomas, Ravi S. Sandhu: Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions. PerCom Workshops 2004: 164-170
19EEMarek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas: Denial-of-service resistant quality-of-service signaling for mobile ad hoc networks. SASN 2004: 23-28
2003
18EEShi-Kuo Chang, Giuseppe Polese, Maurizio Cibelli, Roshan K. Thomas: Visual Authorization Modeling in E-commerce Applications. IEEE MultiMedia 10(1): 44-54 (2003)
2002
17EEEve Cohen, Roshan K. Thomas, William H. Winsborough, Deborah Shands: Models for coalition-based access control (CBAC). SACMAT 2002: 97-106
2001
16EEChristos K. Georgiadis, Ioannis Mavridis, George Pangalos, Roshan K. Thomas: Flexible team-based access control using contexts. SACMAT 2001: 21-27
1997
15EERoshan K. Thomas: Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. ACM Workshop on Role-Based Access Control 1997: 13-19
14 Roshan K. Thomas, Ravi S. Sandhu: Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. DBSec 1997: 166-181
13 Catherine D. McCollum, Donald B. Faatz, William R. Herndon, E. John Sebes, Roshan K. Thomas: Distributed Object Technologies, Databases and Security. DBSec 1997: 17-31
12 Shi-Kuo Chang, Giuseppe Polese, Roshan K. Thomas, Souvik Das: A Visual Language for Authorization Modeling. VL 1997: 110-118
1996
11EERoshan K. Thomas, Ravi S. Sandhu: A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases. IEEE Trans. Knowl. Data Eng. 8(1): 16-31 (1996)
1995
10EERoshan K. Thomas: Role-based access control and distributed object-based enterprise computing. ACM Workshop on Role-Based Access Control 1995
9 Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting: Panel Discussion: Role-Based Access Control and Next-Generation Security Models. DBSec 1995: 289-298
1994
8 Ravi S. Sandhu, Roshan K. Thomas: Conceptual Foundations for a Model of Task-based Authorizations. CSFW 1994: 66-79
7EERoshan K. Thomas, Ravi S. Sandhu: Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture. ESORICS 1994: 403-428
1993
6 Roshan K. Thomas, Ravi S. Sandhu: Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Transactions in Multilevel databases. DBSec 1993: 309-328
5 Roshan K. Thomas, Ravi S. Sandhu: Concurrency, Synchronization, and Scheduling to Support High-Assurance Write-Up in Multilevel Object-Based Computing. Security for Object-Oriented Systems 1993: 218-228
4 Roshan K. Thomas, Ravi S. Sandhu: A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up. Journal of Computer Security 2(2-3): 231-275 (1993)
1992
3 Roshan K. Thomas, Ravi S. Sandhu: Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects. DBSec 1992: 15-34
1991
2 Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia: A Secure Kernelized Architecture for Multiple Object-Oriented Databases. CSFW 1991: 139-152
1 Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia: Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases. DBSec 1991: 297-314

Coauthor Index

1Elisa Bertino [9]
2Hans Hermann Brüggemann [9]
3Shi-Kuo Chang [12] [18]
4Maurizio Cibelli [18]
5Eve Cohen [17]
6Souvik Das [12]
7Donald B. Faatz [13]
8Sonia Fahmy [27] [29] [30] [31]
9Kris Gaj [22] [23]
10Christos K. Georgiadis [16]
11Bret Hartman [9]
12Marek Hejmo [19] [23] [24] [25] [26] [28]
13William R. Herndon [13]
14Alefiya Hussain [27] [29] [30] [31]
15Sushil Jajodia [1] [2]
16Calvin Ko [27]
17Brian L. Mark [19] [22] [23] [24] [25] [26] [28]
18Ioannis Mavridis [16]
19Catherine D. McCollum [13]
20Jelena Mirkovic [27] [29] [30] [31]
21George Pangalos [16]
22Giuseppe Polese [12] [18]
23Peter L. Reiher [27] [29] [30] [31]
24Pierangela Samarati [9]
25Ravi S. Sandhu [1] [2] [3] [4] [5] [6] [7] [8] [9] [11] [14] [20] [21]
26Stephen Schwab [27] [29] [30]
27E. John Sebes [13]
28Deborah Shands [17]
29T. C. Ting [9]
30Brett Wilson [29] [30]
31William H. Winsborough [17]
32Wei-Min Yao [29] [30]
33Charikleia Zouridaki [19] [22] [23] [24] [25] [26] [28]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)