| 2009 |
| 31 | EE | Jelena Mirkovic,
Alefiya Hussain,
Sonia Fahmy,
Peter L. Reiher,
Roshan K. Thomas:
Accurately Measuring Denial of Service in Simulation and Testbed Experiments.
IEEE Trans. Dependable Sec. Comput. 6(2): 81-95 (2009) |
| 2007 |
| 30 | EE | Jelena Mirkovic,
Alefiya Hussain,
Brett Wilson,
Sonia Fahmy,
Peter L. Reiher,
Roshan K. Thomas,
Wei-Min Yao,
Stephen Schwab:
Towards user-centric metrics for denial-of-service measurement.
Experimental Computer Science 2007: 8 |
| 29 | EE | Jelena Mirkovic,
Alefiya Hussain,
Brett Wilson,
Sonia Fahmy,
Wei-Min Yao,
Peter L. Reiher,
Stephen Schwab,
Roshan K. Thomas:
When is service really denied?: a user-centric dos metric.
SIGMETRICS 2007: 357-358 |
| 28 | EE | Charikleia Zouridaki,
Brian L. Mark,
Marek Hejmo,
Roshan K. Thomas:
Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs.
Journal of Computer Security 15(1): 3-38 (2007) |
| 2006 |
| 27 | EE | Jelena Mirkovic,
Peter L. Reiher,
Sonia Fahmy,
Roshan K. Thomas,
Alefiya Hussain,
Stephen Schwab,
Calvin Ko:
Measuring denial Of service.
QoP 2006: 53-58 |
| 26 | EE | Charikleia Zouridaki,
Brian L. Mark,
Marek Hejmo,
Roshan K. Thomas:
Robust cooperative trust establishment for MANETs.
SASN 2006: 23-34 |
| 2005 |
| 25 | EE | Marek Hejmo,
Brian L. Mark,
Charikleia Zouridaki,
Roshan K. Thomas:
A Denial-of-Service Resistant Quality-of-Service Signaling Protocol for Mobile Ad Hoc Networks.
QSHINE 2005: 32 |
| 24 | EE | Charikleia Zouridaki,
Brian L. Mark,
Marek Hejmo,
Roshan K. Thomas:
A quantitative trust establishment framework for reliable data packet delivery in MANETs.
SASN 2005: 1-10 |
| 23 | | Charikleia Zouridaki,
Marek Hejmo,
Brian L. Mark,
Roshan K. Thomas,
Kris Gaj:
Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs.
Wireless Information Systems 2005: 61-70 |
| 2004 |
| 22 | EE | Charikleia Zouridaki,
Brian L. Mark,
Kris Gaj,
Roshan K. Thomas:
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography.
EuroPKI 2004: 232-245 |
| 21 | EE | Roshan K. Thomas,
Ravi S. Sandhu:
Towards a Multi-dimensional Characterization of Dissemination Control.
POLICY 2004: 197-200 |
| 20 | EE | Roshan K. Thomas,
Ravi S. Sandhu:
Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions.
PerCom Workshops 2004: 164-170 |
| 19 | EE | Marek Hejmo,
Brian L. Mark,
Charikleia Zouridaki,
Roshan K. Thomas:
Denial-of-service resistant quality-of-service signaling for mobile ad hoc networks.
SASN 2004: 23-28 |
| 2003 |
| 18 | EE | Shi-Kuo Chang,
Giuseppe Polese,
Maurizio Cibelli,
Roshan K. Thomas:
Visual Authorization Modeling in E-commerce Applications.
IEEE MultiMedia 10(1): 44-54 (2003) |
| 2002 |
| 17 | EE | Eve Cohen,
Roshan K. Thomas,
William H. Winsborough,
Deborah Shands:
Models for coalition-based access control (CBAC).
SACMAT 2002: 97-106 |
| 2001 |
| 16 | EE | Christos K. Georgiadis,
Ioannis Mavridis,
George Pangalos,
Roshan K. Thomas:
Flexible team-based access control using contexts.
SACMAT 2001: 21-27 |
| 1997 |
| 15 | EE | Roshan K. Thomas:
Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments.
ACM Workshop on Role-Based Access Control 1997: 13-19 |
| 14 | | Roshan K. Thomas,
Ravi S. Sandhu:
Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management.
DBSec 1997: 166-181 |
| 13 | | Catherine D. McCollum,
Donald B. Faatz,
William R. Herndon,
E. John Sebes,
Roshan K. Thomas:
Distributed Object Technologies, Databases and Security.
DBSec 1997: 17-31 |
| 12 | | Shi-Kuo Chang,
Giuseppe Polese,
Roshan K. Thomas,
Souvik Das:
A Visual Language for Authorization Modeling.
VL 1997: 110-118 |
| 1996 |
| 11 | EE | Roshan K. Thomas,
Ravi S. Sandhu:
A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases.
IEEE Trans. Knowl. Data Eng. 8(1): 16-31 (1996) |
| 1995 |
| 10 | EE | Roshan K. Thomas:
Role-based access control and distributed object-based enterprise computing.
ACM Workshop on Role-Based Access Control 1995 |
| 9 | | Roshan K. Thomas,
Elisa Bertino,
Pierangela Samarati,
Hans Hermann Brüggemann,
Bret Hartman,
Ravi S. Sandhu,
T. C. Ting:
Panel Discussion: Role-Based Access Control and Next-Generation Security Models.
DBSec 1995: 289-298 |
| 1994 |
| 8 | | Ravi S. Sandhu,
Roshan K. Thomas:
Conceptual Foundations for a Model of Task-based Authorizations.
CSFW 1994: 66-79 |
| 7 | EE | Roshan K. Thomas,
Ravi S. Sandhu:
Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture.
ESORICS 1994: 403-428 |
| 1993 |
| 6 | | Roshan K. Thomas,
Ravi S. Sandhu:
Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Transactions in Multilevel databases.
DBSec 1993: 309-328 |
| 5 | | Roshan K. Thomas,
Ravi S. Sandhu:
Concurrency, Synchronization, and Scheduling to Support High-Assurance Write-Up in Multilevel Object-Based Computing.
Security for Object-Oriented Systems 1993: 218-228 |
| 4 | | Roshan K. Thomas,
Ravi S. Sandhu:
A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up.
Journal of Computer Security 2(2-3): 231-275 (1993) |
| 1992 |
| 3 | | Roshan K. Thomas,
Ravi S. Sandhu:
Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects.
DBSec 1992: 15-34 |
| 1991 |
| 2 | | Ravi S. Sandhu,
Roshan K. Thomas,
Sushil Jajodia:
A Secure Kernelized Architecture for Multiple Object-Oriented Databases.
CSFW 1991: 139-152 |
| 1 | | Ravi S. Sandhu,
Roshan K. Thomas,
Sushil Jajodia:
Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases.
DBSec 1991: 297-314 |