Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Roshan K. Thomas
@book{DBLP:series/ais/HeckmanSTST15, author = {Kristin E. Heckman and Frank J. Stech and Roshan K. Thomas and Ben S. Schmoker and Alexander W. Tsow}, title = {Cyber Denial, Deception and Counter Deception - {A} Framework for Supporting Active Cyber Defense}, series = {Advances in Information Security}, volume = {64}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25133-2}, doi = {10.1007/978-3-319-25133-2}, isbn = {978-3-319-25131-8}, timestamp = {Wed, 29 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/HeckmanSTST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HeckmanSST15, author = {Kristin E. Heckman and Frank J. Stech and Ben S. Schmoker and Roshan K. Thomas}, title = {Denial and Deception in Cyber Defense}, journal = {Computer}, volume = {48}, number = {4}, pages = {36--44}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.104}, doi = {10.1109/MC.2015.104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HeckmanSST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HahnTLC15, author = {Adam Hahn and Roshan K. Thomas and Ivan Lozano and Alvaro A. C{\'{a}}rdenas}, title = {A multi-layered and kill-chain based security analysis framework for cyber-physical systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {11}, pages = {39--50}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2015.08.003}, doi = {10.1016/J.IJCIP.2015.08.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/HahnTLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ThomasCB15, author = {Roshan K. Thomas and Alvaro A. C{\'{a}}rdenas and Rakesh B. Bobba}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {First Workshop on Cyber-Physical Systems Security and PrivaCy {(CPS-SPC):} Challenges and Research Directions}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1705--1706}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2812621}, doi = {10.1145/2810103.2812621}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ThomasCB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2015cpsspc, editor = {Indrajit Ray and Roshan K. Thomas and Alvaro A. C{\'{a}}rdenas}, title = {Proceedings of the First {ACM} Workshop on Cyber-Physical Systems-Security and/or PrivaCy, {CPS-SPC} 2015, Denver, Colorado, USA, October 16, 2015}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808705}, doi = {10.1145/2808705}, isbn = {978-1-4503-3827-1}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2015cpsspc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KimSHTT10, author = {Jinsub Kim and Dan Sterne and Rommie L. Hardy and Roshan K. Thomas and Lang Tong}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {Timing-based localization of in-band wormhole tunnels in MANETs}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {1--12}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741869}, doi = {10.1145/1741866.1741869}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/KimSHTT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ZouridakiMHT09, author = {Charikleia Zouridaki and Brian L. Mark and Marek Hejmo and Roshan K. Thomas}, title = {E-Hermes: {A} robust cooperative trust establishment scheme for mobile ad hoc networks}, journal = {Ad Hoc Networks}, volume = {7}, number = {6}, pages = {1156--1168}, year = {2009}, url = {https://doi.org/10.1016/j.adhoc.2008.10.003}, doi = {10.1016/J.ADHOC.2008.10.003}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/ZouridakiMHT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MirkovicHFRT09, author = {Jelena Mirkovic and Alefiya Hussain and Sonia Fahmy and Peter L. Reiher and Roshan K. Thomas}, title = {Accurately Measuring Denial of Service in Simulation and Testbed Experiments}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {2}, pages = {81--95}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2008.73}, doi = {10.1109/TDSC.2008.73}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MirkovicHFRT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/ThomasRT09, author = {Roshan K. Thomas and Giovanni Russello and Simon Tsang}, title = {Realizing the {CDL} Cross-Domain Language in the Ponder2 Policy Framework: Experiences and Research Directions}, booktitle = {{POLICY} 2009, {IEEE} International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009}, pages = {76--83}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/POLICY.2009.38}, doi = {10.1109/POLICY.2009.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/ThomasRT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isips/ThomasSBAX08, author = {Roshan K. Thomas and Ravi S. Sandhu and Elisa Bertino and Ismailcem Budak Arpinar and Shouhuai Xu}, editor = {Cecilia S. Gal and Paul B. Kantor and Michael E. Lesk}, title = {Privacy-Preserving Accountable Accuracy Management Systems {(PAAMS)}}, booktitle = {Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, {ISIPS} 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5661}, pages = {115--121}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-10233-2\_11}, doi = {10.1007/978-3-642-10233-2\_11}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/isips/ThomasSBAX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ZouridakiMHT07, author = {Charikleia Zouridaki and Brian L. Mark and Marek Hejmo and Roshan K. Thomas}, title = {Hermes: {A} quantitative trust establishment framework for reliable data packet delivery in MANETs}, journal = {J. Comput. Secur.}, volume = {15}, number = {1}, pages = {3--38}, year = {2007}, url = {https://doi.org/10.3233/jcs-2007-15102}, doi = {10.3233/JCS-2007-15102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ZouridakiMHT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/expcs/MirkovicHWFRTYS07, author = {Jelena Mirkovic and Alefiya Hussain and Brett Wilson and Sonia Fahmy and Peter L. Reiher and Roshan K. Thomas and Wei{-}Min Yao and Stephen Schwab}, title = {Towards user-centric metrics for denial-of-service measurement}, booktitle = {Proceedings of the Workshop on Experimental Computer Science, Part of {ACM} FCRC, San Diego, CA, USA, 13-14 June 2007}, pages = {8}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1281700.1281708}, doi = {10.1145/1281700.1281708}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/expcs/MirkovicHWFRTYS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/MirkovicHWFYRST07, author = {Jelena Mirkovic and Alefiya Hussain and Brett Wilson and Sonia Fahmy and Wei{-}Min Yao and Peter L. Reiher and Stephen Schwab and Roshan K. Thomas}, editor = {Leana Golubchik and Mostafa H. Ammar and Mor Harchol{-}Balter}, title = {When is service really denied?: a user-centric dos metric}, booktitle = {Proceedings of the 2007 {ACM} {SIGMETRICS} International Conference on Measurement and Modeling of Computer Systems, {SIGMETRICS} 2007, San Diego, California, USA, June 12-16, 2007}, pages = {357--358}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1254882.1254928}, doi = {10.1145/1254882.1254928}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/MirkovicHWFYRST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tridentcom/MirkovicWHWTSFC07, author = {Jelena Mirkovic and Songjie Wei and Alefiya Hussain and Brett Wilson and Roshan K. Thomas and Stephen Schwab and Sonia Fahmy and Roman Chertov and Peter L. Reiher}, editor = {Csaba Attila Szab{\'{o}} and Tricha Anjali}, title = {DDoS Benchmarks and Experimenter's Workbench for the {DETER} Testbed}, booktitle = {3rd International {ICST} Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, TridentCom 2007, Orlando, Florida, USA, May 21-23 2007}, pages = {1--7}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/TRIDENTCOM.2007.4444680}, doi = {10.1109/TRIDENTCOM.2007.4444680}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tridentcom/MirkovicWHWTSFC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MirkovicFRT07, author = {Jelena Mirkovic and Sonia Fahmy and Peter L. Reiher and Roshan K. Thomas}, editor = {Terry V. Benzel and George Kesidis}, title = {Automating DDoS Experimentation}, booktitle = {{DETER} Community Workshop on Cyber Security Experimentation and Test 2007, Boston, Ma, USA, August 6-7, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/deter-2007/automating-ddos-experimentation}, timestamp = {Mon, 01 Feb 2021 08:43:10 +0100}, biburl = {https://dblp.org/rec/conf/uss/MirkovicFRT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/HejmoMZT06, author = {Marek Hejmo and Brian L. Mark and Charikleia Zouridaki and Roshan K. Thomas}, title = {Design and analysis of a denial-of-service-resistant quality-of-service signaling protocol for MANETs}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {55}, number = {3}, pages = {743--751}, year = {2006}, url = {https://doi.org/10.1109/TVT.2006.873834}, doi = {10.1109/TVT.2006.873834}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/HejmoMZT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MirkovicRFTHSK06, author = {Jelena Mirkovic and Peter L. Reiher and Sonia Fahmy and Roshan K. Thomas and Alefiya Hussain and Stephen Schwab and Calvin Ko}, editor = {G{\"{u}}nter Karjoth and Fabio Massacci}, title = {Measuring denial Of service}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006}, pages = {53--58}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179494.1179506}, doi = {10.1145/1179494.1179506}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MirkovicRFTHSK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qshine/HejmoMZT06, author = {Marek Hejmo and Brian L. Mark and Charikleia Zouridaki and Roshan K. Thomas}, editor = {Jon W. Mark}, title = {On the fairness of flow aggregation for denial-of-service resistant QoS in MANETs}, booktitle = {3rd International {ICST} Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, {QSHINE} 2006, Waterloo, Canada, August 7-9, 2006}, pages = {54}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1185373.1185443}, doi = {10.1145/1185373.1185443}, timestamp = {Tue, 06 Nov 2018 16:59:08 +0100}, biburl = {https://dblp.org/rec/conf/qshine/HejmoMZT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sasn/ZouridakiMHT06, author = {Charikleia Zouridaki and Brian L. Mark and Marek Hejmo and Roshan K. Thomas}, editor = {Sencun Zhu and Donggang Liu}, title = {Robust cooperative trust establishment for MANETs}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security of ad hoc and Sensor Networks, {SASN} 2006, Alexandria, VA, USA, October 30, 2006}, pages = {23--34}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180345.1180349}, doi = {10.1145/1180345.1180349}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sasn/ZouridakiMHT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qshine/HejmoMZT05, author = {Marek Hejmo and Brian L. Mark and Charikleia Zouridaki and Roshan K. Thomas}, title = {A Denial-of-Service Resistant Quality-of-Service Signaling Protocol for Mobile Ad Hoc Networks}, booktitle = {Second International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks {(QSHINE} 2005), 22-24 August 2005, Lake Buena Vista, FL, {USA}}, pages = {32}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/QSHINE.2005.1}, doi = {10.1109/QSHINE.2005.1}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qshine/HejmoMZT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sasn/ZouridakiMHT05, author = {Charikleia Zouridaki and Brian L. Mark and Marek Hejmo and Roshan K. Thomas}, editor = {Vijay Atluri and Peng Ning and Wenliang Du}, title = {A quantitative trust establishment framework for reliable data packet delivery in MANETs}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Security of ad hoc and Sensor Networks, {SASN} 2005, Alexandria, VA, USA, November 7, 2005}, pages = {1--10}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102219.1102222}, doi = {10.1145/1102219.1102222}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sasn/ZouridakiMHT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wis/ZouridakiHMTG05, author = {Charikleia Zouridaki and Marek Hejmo and Brian L. Mark and Roshan K. Thomas and Kris Gaj}, editor = {Hans Weghorn and Qusay H. Mahmoud}, title = {Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs}, booktitle = {Wireless Information Systems, Proceedings of the 4th International Workshop on Wireless Information Systems, {WIS} 2005, In conjunction with {ICEIS} 2005, Miami, USA, May 2005}, pages = {61--70}, publisher = {{INSTICC} Press}, year = {2005}, timestamp = {Mon, 15 Jun 2015 19:00:08 +0200}, biburl = {https://dblp.org/rec/conf/wis/ZouridakiHMTG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/ZouridakiMGT04, author = {Charikleia Zouridaki and Brian L. Mark and Kris Gaj and Roshan K. Thomas}, editor = {Sokratis K. Katsikas and Stefanos Gritzalis and Javier L{\'{o}}pez}, title = {Distributed CA-based {PKI} for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography}, booktitle = {Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3093}, pages = {232--245}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25980-0\_19}, doi = {10.1007/978-3-540-25980-0\_19}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/europki/ZouridakiMGT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/ThomasS04, author = {Roshan K. Thomas and Ravi S. Sandhu}, title = {Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions}, booktitle = {2nd {IEEE} Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 14-17 March 2004, Orlando, FL, {USA}}, pages = {164--170}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/PERCOMW.2004.1276925}, doi = {10.1109/PERCOMW.2004.1276925}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/ThomasS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/ThomasS04, author = {Roshan K. Thomas and Ravi S. Sandhu}, title = {Towards a Multi-dimensional Characterization of Dissemination Control}, booktitle = {5th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2004), 7-9 June 2004, Yorktown Heights, NY, {USA}}, pages = {197--200}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/POLICY.2004.1309168}, doi = {10.1109/POLICY.2004.1309168}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/ThomasS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sasn/HejmoMZT04, author = {Marek Hejmo and Brian L. Mark and Charikleia Zouridaki and Roshan K. Thomas}, editor = {Sanjeev Setia and Vipin Swarup}, title = {Denial-of-service resistant quality-of-service signaling for mobile ad hoc networks}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Security of ad hoc and Sensor Networks, {SASN} 2004, Washington, DC, USA, October 25, 2004}, pages = {23--28}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029102.1029108}, doi = {10.1145/1029102.1029108}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sasn/HejmoMZT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/ZaidiMT04, author = {Zainab R. Zaidi and Brian L. Mark and Roshan K. Thomas}, title = {A two-tier representation of node mobility in ad hoc networks}, booktitle = {Proceedings of the First Annual {IEEE} Communications Society Conference on Sensor and Ad Hoc Communications and Networks, {SECON} 2004, October 4-7, 2004, Santa Clara, CA, {USA}}, pages = {153--161}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/SAHCN.2004.1381913}, doi = {10.1109/SAHCN.2004.1381913}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/secon/ZaidiMT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeemm/ChangPCT03, author = {Shi{-}Kuo Chang and Giuseppe Polese and Maurizio Cibelli and Roshan K. Thomas}, title = {Visual Authorization Modeling in E-commerce Applications}, journal = {{IEEE} Multim.}, volume = {10}, number = {1}, pages = {44--54}, year = {2003}, url = {https://doi.org/10.1109/MMUL.2003.1167921}, doi = {10.1109/MMUL.2003.1167921}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeemm/ChangPCT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/discex/ThomasMJC03, author = {Roshan K. Thomas and Brian L. Mark and Tommy Johnson and James Croall}, title = {NetBouncer: Client-legitimacy-based High-performance DDoS Filtering}, booktitle = {3rd {DARPA} Information Survivability Conference and Exposition {(DISCEX-III} 2003), 22-24 April 2003, Washington, DC, {USA}}, pages = {14--25}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/DISCEX.2003.1194869}, doi = {10.1109/DISCEX.2003.1194869}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/discex/ThomasMJC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/discex/ThomasZHJ03, author = {Roshan K. Thomas and Hong Zhu and Tim Huck and Tommy Johnson}, title = {NetBouncer: Client-legitimacy-based High-performance DDoS Filtering}, booktitle = {3rd {DARPA} Information Survivability Conference and Exposition {(DISCEX-III} 2003), 22-24 April 2003, Washington, DC, {USA}}, pages = {111}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/DISCEX.2003.1194939}, doi = {10.1109/DISCEX.2003.1194939}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/discex/ThomasZHJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/CohenTWS02, author = {Eve Cohen and Roshan K. Thomas and William H. Winsborough and Deborah Shands}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Models for coalition-based access control {(CBAC)}}, booktitle = {7th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002}, pages = {97--106}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/507711.507727}, doi = {10.1145/507711.507727}, timestamp = {Tue, 09 Feb 2021 08:50:30 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/CohenTWS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/GeorgiadisMPT01, author = {Christos K. Georgiadis and Ioannis Mavridis and George Pangalos and Roshan K. Thomas}, editor = {Ravi S. Sandhu and Trent Jaeger}, title = {Flexible team-based access control using contexts}, booktitle = {6th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001}, pages = {21--27}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/373256.373259}, doi = {10.1145/373256.373259}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/GeorgiadisMPT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/McCollumFHST97, author = {Catherine D. McCollum and Donald B. Faatz and William R. Herndon and E. John Sebes and Roshan K. Thomas}, editor = {Tsau Young Lin and Shelly Qian}, title = {Distributed Object Technologies, Databases and Security}, booktitle = {Database Securty {XI:} Status and Prospects, {IFIP} {TC11} {WG11.3} Eleventh International Conference on Database Security, 10-13 August 1997, Lake Tahoe, California, {USA}}, series = {{IFIP} Conference Proceedings}, volume = {113}, pages = {17--31}, publisher = {Chapman {\&} Hall}, year = {1997}, timestamp = {Wed, 24 Sep 2003 08:16:49 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/McCollumFHST97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ThomasS97, author = {Roshan K. Thomas and Ravi S. Sandhu}, editor = {Tsau Young Lin and Shelly Qian}, title = {Task-Based Authorization Controls {(TBAC):} {A} Family of Models for Active and Enterprise-Oriented Autorization Management}, booktitle = {Database Securty {XI:} Status and Prospects, {IFIP} {TC11} {WG11.3} Eleventh International Conference on Database Security, 10-13 August 1997, Lake Tahoe, California, {USA}}, series = {{IFIP} Conference Proceedings}, volume = {113}, pages = {166--181}, publisher = {Chapman {\&} Hall}, year = {1997}, timestamp = {Thu, 24 Oct 2002 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ThomasS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rbac/Thomas97, author = {Roshan K. Thomas}, editor = {Charles E. Youman and Edward J. Coyne and Trent Jaeger}, title = {Team-based access control {(TMAC):} a primitive for applying role-based access controls in collaborative environments}, booktitle = {Proceedings of the Second Workshop on Role-Based Access Control, {RBAC} 1997, Fairfax, VA, USA, November 6-7, 1997}, pages = {13--19}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/266741.266748}, doi = {10.1145/266741.266748}, timestamp = {Tue, 06 Nov 2018 16:59:23 +0100}, biburl = {https://dblp.org/rec/conf/rbac/Thomas97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vl/ChangPTD97, author = {Shi{-}Kuo Chang and Giuseppe Polese and Roshan K. Thomas and Souvik Das}, title = {A Visual Language for Authorization Modeling}, booktitle = {Proceedings 1997 {IEEE} Symposium on Visual Languages, Isle of Capri, Italy, September 23-26, 1997}, pages = {110--118}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/VL.1997.626565}, doi = {10.1109/VL.1997.626565}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vl/ChangPTD97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/ThomasS96, author = {Roshan K. Thomas and Ravi S. Sandhu}, title = {A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {8}, number = {1}, pages = {16--31}, year = {1996}, url = {https://doi.org/10.1109/69.485626}, doi = {10.1109/69.485626}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/ThomasS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ThomasBSBHST95, author = {Roshan K. Thomas and Elisa Bertino and Pierangela Samarati and Hans Hermann Br{\"{u}}ggemann and Bret Hartman and Ravi S. Sandhu and T. C. Ting}, editor = {David L. Spooner and Steven A. Demurjian and John E. Dobson}, title = {Panel Discussion: Role-Based Access Control and Next-Generation Security Models}, booktitle = {Database Security {IX:} Status and Prospects, Proceedings of the Ninth Annual {IFIP} {WG11} Working Conference on Database Security, Rensselaerville, New York, USA, 13-16 August 1995}, series = {{IFIP} Conference Proceedings}, volume = {51}, pages = {289--298}, publisher = {Chapman {\&} Hall}, year = {1995}, timestamp = {Thu, 24 Oct 2002 16:18:58 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ThomasBSBHST95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rbac/Thomas95, author = {Roshan K. Thomas}, editor = {Charles E. Youman and Ravi S. Sandhu and Edward J. Coyne}, title = {Role-based access control and distributed object-based enterprise computing}, booktitle = {Proceedings of the First {ACM} Workshop on Role-Based Access Control, {RBAC} 1995, Gaithersburg, MD, USA, November 30 - December 2, 1995}, publisher = {{ACM}}, year = {1995}, url = {https://doi.org/10.1145/270152.270194}, doi = {10.1145/270152.270194}, timestamp = {Tue, 06 Nov 2018 16:59:23 +0100}, biburl = {https://dblp.org/rec/conf/rbac/Thomas95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/SandhuT94, author = {Ravi S. Sandhu and Roshan K. Thomas}, title = {Conceptual Foundations for a Model of Task-based Authorizations}, booktitle = {Seventh {IEEE} Computer Security Foundations Workshop - CSFW'94, Franconia, New Hampshire, USA, June 14-16, 1994, Proceedings}, pages = {66--79}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/CSFW.1994.315946}, doi = {10.1109/CSFW.1994.315946}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/csfw/SandhuT94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ThomasS94, author = {Roshan K. Thomas and Ravi S. Sandhu}, editor = {Dieter Gollmann}, title = {Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {875}, pages = {403--428}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58618-0\_76}, doi = {10.1007/3-540-58618-0\_76}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ThomasS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ThomasS93, author = {Roshan K. Thomas and Ravi S. Sandhu}, title = {A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up}, journal = {J. Comput. Secur.}, volume = {2}, number = {2-3}, pages = {231--275}, year = {1993}, url = {https://doi.org/10.3233/JCS-1993-22-309}, doi = {10.3233/JCS-1993-22-309}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ThomasS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ThomasS93, author = {Roshan K. Thomas and Ravi S. Sandhu}, editor = {Thomas F. Keefe and Carl E. Landwehr}, title = {Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Transactions in Multilevel databases}, booktitle = {Database Security, {VII:} Status and Prospects, Proceedings of the {IFIP} {WG11.3} Working Conference on Database Security, Lake Guntersville, Alabama, USA, 12-15 September, 1993}, series = {{IFIP} Transactions}, volume = {{A-47}}, pages = {309--328}, publisher = {North-Holland}, year = {1993}, timestamp = {Thu, 03 Jan 2002 11:56:17 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/ThomasS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ThomasS93, author = {Roshan K. Thomas and Ravi S. Sandhu}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {Towards a task-based paradigm for flexible and adaptable access control in distributed applications}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {138--142}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283810}, doi = {10.1145/283751.283810}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/nspw/ThomasS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/oopsla/ThomasS93, author = {Roshan K. Thomas and Ravi S. Sandhu}, editor = {Bhavani Thuraisingham and Ravi S. Sandhu and T. C. Ting}, title = {Concurrency, Synchronization, and Scheduling to Support High-Assurance Write-Up in Multilevel Object-Based Computing}, booktitle = {Security for Object-Oriented Systems, Proceedings of the {OOPSLA-93} Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993}, series = {Workshops in Computing}, pages = {218--228}, publisher = {Springer}, year = {1993}, timestamp = {Wed, 29 Jun 2022 15:37:45 +0200}, biburl = {https://dblp.org/rec/conf/oopsla/ThomasS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ThomasS92, author = {Roshan K. Thomas and Ravi S. Sandhu}, editor = {Bhavani Thuraisingham and Carl E. Landwehr}, title = {Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects}, booktitle = {Database Security, {VI:} Status and Prospects. Results of the {IFIP} {WG} 11.3 Workshop on Database Security, Vancouver, Canada, 19-21 August 1992}, series = {{IFIP} Transactions}, volume = {{A-21}}, pages = {15--34}, publisher = {North-Holland}, year = {1992}, timestamp = {Wed, 29 Jun 2022 15:37:44 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ThomasS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/SandhuTJ91, author = {Ravi S. Sandhu and Roshan K. Thomas and Sushil Jajodia}, title = {A Secure Kernelized Architecture for Multiple Object-Oriented Databases}, booktitle = {4th {IEEE} Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings}, pages = {139--152}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/CSFW.1991.151580}, doi = {10.1109/CSFW.1991.151580}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/csfw/SandhuTJ91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/SanhuTJ91, author = {Ravi S. Sandhu and Roshan K. Thomas and Sushil Jajodia}, editor = {Carl E. Landwehr and Sushil Jajodia}, title = {Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases}, booktitle = {Database Security, {V:} Status and Prospects, Results of the {IFIP} {WG} 11.3 Workshop on Database Security, Shepherdstown, West Virginia, USA, 4-7 November, 1991}, series = {{IFIP} Transactions}, volume = {{A-6}}, pages = {297--314}, publisher = {North-Holland}, year = {1991}, timestamp = {Fri, 15 Feb 2002 12:14:34 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/SanhuTJ91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.