BibTeX records: Roshan K. Thomas

download as .bib file

@book{DBLP:series/ais/HeckmanSTST15,
  author       = {Kristin E. Heckman and
                  Frank J. Stech and
                  Roshan K. Thomas and
                  Ben S. Schmoker and
                  Alexander W. Tsow},
  title        = {Cyber Denial, Deception and Counter Deception - {A} Framework for
                  Supporting Active Cyber Defense},
  series       = {Advances in Information Security},
  volume       = {64},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25133-2},
  doi          = {10.1007/978-3-319-25133-2},
  isbn         = {978-3-319-25131-8},
  timestamp    = {Wed, 29 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/HeckmanSTST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HeckmanSST15,
  author       = {Kristin E. Heckman and
                  Frank J. Stech and
                  Ben S. Schmoker and
                  Roshan K. Thomas},
  title        = {Denial and Deception in Cyber Defense},
  journal      = {Computer},
  volume       = {48},
  number       = {4},
  pages        = {36--44},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.104},
  doi          = {10.1109/MC.2015.104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HeckmanSST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HahnTLC15,
  author       = {Adam Hahn and
                  Roshan K. Thomas and
                  Ivan Lozano and
                  Alvaro A. C{\'{a}}rdenas},
  title        = {A multi-layered and kill-chain based security analysis framework for
                  cyber-physical systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {11},
  pages        = {39--50},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2015.08.003},
  doi          = {10.1016/J.IJCIP.2015.08.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/HahnTLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ThomasCB15,
  author       = {Roshan K. Thomas and
                  Alvaro A. C{\'{a}}rdenas and
                  Rakesh B. Bobba},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {First Workshop on Cyber-Physical Systems Security and PrivaCy {(CPS-SPC):}
                  Challenges and Research Directions},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1705--1706},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2812621},
  doi          = {10.1145/2810103.2812621},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ThomasCB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015cpsspc,
  editor       = {Indrajit Ray and
                  Roshan K. Thomas and
                  Alvaro A. C{\'{a}}rdenas},
  title        = {Proceedings of the First {ACM} Workshop on Cyber-Physical Systems-Security
                  and/or PrivaCy, {CPS-SPC} 2015, Denver, Colorado, USA, October 16,
                  2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808705},
  doi          = {10.1145/2808705},
  isbn         = {978-1-4503-3827-1},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2015cpsspc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KimSHTT10,
  author       = {Jinsub Kim and
                  Dan Sterne and
                  Rommie L. Hardy and
                  Roshan K. Thomas and
                  Lang Tong},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {Timing-based localization of in-band wormhole tunnels in MANETs},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741869},
  doi          = {10.1145/1741866.1741869},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/KimSHTT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ZouridakiMHT09,
  author       = {Charikleia Zouridaki and
                  Brian L. Mark and
                  Marek Hejmo and
                  Roshan K. Thomas},
  title        = {E-Hermes: {A} robust cooperative trust establishment scheme for mobile
                  ad hoc networks},
  journal      = {Ad Hoc Networks},
  volume       = {7},
  number       = {6},
  pages        = {1156--1168},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.adhoc.2008.10.003},
  doi          = {10.1016/J.ADHOC.2008.10.003},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/ZouridakiMHT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MirkovicHFRT09,
  author       = {Jelena Mirkovic and
                  Alefiya Hussain and
                  Sonia Fahmy and
                  Peter L. Reiher and
                  Roshan K. Thomas},
  title        = {Accurately Measuring Denial of Service in Simulation and Testbed Experiments},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {6},
  number       = {2},
  pages        = {81--95},
  year         = {2009},
  url          = {https://doi.org/10.1109/TDSC.2008.73},
  doi          = {10.1109/TDSC.2008.73},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MirkovicHFRT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/ThomasRT09,
  author       = {Roshan K. Thomas and
                  Giovanni Russello and
                  Simon Tsang},
  title        = {Realizing the {CDL} Cross-Domain Language in the Ponder2 Policy Framework:
                  Experiences and Research Directions},
  booktitle    = {{POLICY} 2009, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, London, UK, 20-22 July 2009},
  pages        = {76--83},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/POLICY.2009.38},
  doi          = {10.1109/POLICY.2009.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/ThomasRT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isips/ThomasSBAX08,
  author       = {Roshan K. Thomas and
                  Ravi S. Sandhu and
                  Elisa Bertino and
                  Ismailcem Budak Arpinar and
                  Shouhuai Xu},
  editor       = {Cecilia S. Gal and
                  Paul B. Kantor and
                  Michael E. Lesk},
  title        = {Privacy-Preserving Accountable Accuracy Management Systems {(PAAMS)}},
  booktitle    = {Protecting Persons While Protecting the People, Second Annual Workshop
                  on Information Privacy and National Security, {ISIPS} 2008, New Brunswick,
                  NJ, USA, May 12, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5661},
  pages        = {115--121},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-10233-2\_11},
  doi          = {10.1007/978-3-642-10233-2\_11},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/isips/ThomasSBAX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ZouridakiMHT07,
  author       = {Charikleia Zouridaki and
                  Brian L. Mark and
                  Marek Hejmo and
                  Roshan K. Thomas},
  title        = {Hermes: {A} quantitative trust establishment framework for reliable
                  data packet delivery in MANETs},
  journal      = {J. Comput. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {3--38},
  year         = {2007},
  url          = {https://doi.org/10.3233/jcs-2007-15102},
  doi          = {10.3233/JCS-2007-15102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ZouridakiMHT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/expcs/MirkovicHWFRTYS07,
  author       = {Jelena Mirkovic and
                  Alefiya Hussain and
                  Brett Wilson and
                  Sonia Fahmy and
                  Peter L. Reiher and
                  Roshan K. Thomas and
                  Wei{-}Min Yao and
                  Stephen Schwab},
  title        = {Towards user-centric metrics for denial-of-service measurement},
  booktitle    = {Proceedings of the Workshop on Experimental Computer Science, Part
                  of {ACM} FCRC, San Diego, CA, USA, 13-14 June 2007},
  pages        = {8},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1281700.1281708},
  doi          = {10.1145/1281700.1281708},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/expcs/MirkovicHWFRTYS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/MirkovicHWFYRST07,
  author       = {Jelena Mirkovic and
                  Alefiya Hussain and
                  Brett Wilson and
                  Sonia Fahmy and
                  Wei{-}Min Yao and
                  Peter L. Reiher and
                  Stephen Schwab and
                  Roshan K. Thomas},
  editor       = {Leana Golubchik and
                  Mostafa H. Ammar and
                  Mor Harchol{-}Balter},
  title        = {When is service really denied?: a user-centric dos metric},
  booktitle    = {Proceedings of the 2007 {ACM} {SIGMETRICS} International Conference
                  on Measurement and Modeling of Computer Systems, {SIGMETRICS} 2007,
                  San Diego, California, USA, June 12-16, 2007},
  pages        = {357--358},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1254882.1254928},
  doi          = {10.1145/1254882.1254928},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/MirkovicHWFYRST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tridentcom/MirkovicWHWTSFC07,
  author       = {Jelena Mirkovic and
                  Songjie Wei and
                  Alefiya Hussain and
                  Brett Wilson and
                  Roshan K. Thomas and
                  Stephen Schwab and
                  Sonia Fahmy and
                  Roman Chertov and
                  Peter L. Reiher},
  editor       = {Csaba Attila Szab{\'{o}} and
                  Tricha Anjali},
  title        = {DDoS Benchmarks and Experimenter's Workbench for the {DETER} Testbed},
  booktitle    = {3rd International {ICST} Conference on Testbeds and Research Infrastructures
                  for the Development of Networks and Communities, TridentCom 2007,
                  Orlando, Florida, USA, May 21-23 2007},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/TRIDENTCOM.2007.4444680},
  doi          = {10.1109/TRIDENTCOM.2007.4444680},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tridentcom/MirkovicWHWTSFC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MirkovicFRT07,
  author       = {Jelena Mirkovic and
                  Sonia Fahmy and
                  Peter L. Reiher and
                  Roshan K. Thomas},
  editor       = {Terry V. Benzel and
                  George Kesidis},
  title        = {Automating DDoS Experimentation},
  booktitle    = {{DETER} Community Workshop on Cyber Security Experimentation and Test
                  2007, Boston, Ma, USA, August 6-7, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/deter-2007/automating-ddos-experimentation},
  timestamp    = {Mon, 01 Feb 2021 08:43:10 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MirkovicFRT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/HejmoMZT06,
  author       = {Marek Hejmo and
                  Brian L. Mark and
                  Charikleia Zouridaki and
                  Roshan K. Thomas},
  title        = {Design and analysis of a denial-of-service-resistant quality-of-service
                  signaling protocol for MANETs},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {55},
  number       = {3},
  pages        = {743--751},
  year         = {2006},
  url          = {https://doi.org/10.1109/TVT.2006.873834},
  doi          = {10.1109/TVT.2006.873834},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/HejmoMZT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MirkovicRFTHSK06,
  author       = {Jelena Mirkovic and
                  Peter L. Reiher and
                  Sonia Fahmy and
                  Roshan K. Thomas and
                  Alefiya Hussain and
                  Stephen Schwab and
                  Calvin Ko},
  editor       = {G{\"{u}}nter Karjoth and
                  Fabio Massacci},
  title        = {Measuring denial Of service},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Quality of Protection, QoP
                  2006, Alexandria, VA, USA, October 30, 2006},
  pages        = {53--58},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179494.1179506},
  doi          = {10.1145/1179494.1179506},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MirkovicRFTHSK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qshine/HejmoMZT06,
  author       = {Marek Hejmo and
                  Brian L. Mark and
                  Charikleia Zouridaki and
                  Roshan K. Thomas},
  editor       = {Jon W. Mark},
  title        = {On the fairness of flow aggregation for denial-of-service resistant
                  QoS in MANETs},
  booktitle    = {3rd International {ICST} Conference on Quality of Service in Heterogeneous
                  Wired/Wireless Networks, {QSHINE} 2006, Waterloo, Canada, August 7-9,
                  2006},
  pages        = {54},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1185373.1185443},
  doi          = {10.1145/1185373.1185443},
  timestamp    = {Tue, 06 Nov 2018 16:59:08 +0100},
  biburl       = {https://dblp.org/rec/conf/qshine/HejmoMZT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sasn/ZouridakiMHT06,
  author       = {Charikleia Zouridaki and
                  Brian L. Mark and
                  Marek Hejmo and
                  Roshan K. Thomas},
  editor       = {Sencun Zhu and
                  Donggang Liu},
  title        = {Robust cooperative trust establishment for MANETs},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Security of ad hoc and Sensor
                  Networks, {SASN} 2006, Alexandria, VA, USA, October 30, 2006},
  pages        = {23--34},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180345.1180349},
  doi          = {10.1145/1180345.1180349},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sasn/ZouridakiMHT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qshine/HejmoMZT05,
  author       = {Marek Hejmo and
                  Brian L. Mark and
                  Charikleia Zouridaki and
                  Roshan K. Thomas},
  title        = {A Denial-of-Service Resistant Quality-of-Service Signaling Protocol
                  for Mobile Ad Hoc Networks},
  booktitle    = {Second International Conference on Quality of Service in Heterogeneous
                  Wired/Wireless Networks {(QSHINE} 2005), 22-24 August 2005, Lake Buena
                  Vista, FL, {USA}},
  pages        = {32},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/QSHINE.2005.1},
  doi          = {10.1109/QSHINE.2005.1},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qshine/HejmoMZT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sasn/ZouridakiMHT05,
  author       = {Charikleia Zouridaki and
                  Brian L. Mark and
                  Marek Hejmo and
                  Roshan K. Thomas},
  editor       = {Vijay Atluri and
                  Peng Ning and
                  Wenliang Du},
  title        = {A quantitative trust establishment framework for reliable data packet
                  delivery in MANETs},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Security of ad hoc and Sensor
                  Networks, {SASN} 2005, Alexandria, VA, USA, November 7, 2005},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102219.1102222},
  doi          = {10.1145/1102219.1102222},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sasn/ZouridakiMHT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wis/ZouridakiHMTG05,
  author       = {Charikleia Zouridaki and
                  Marek Hejmo and
                  Brian L. Mark and
                  Roshan K. Thomas and
                  Kris Gaj},
  editor       = {Hans Weghorn and
                  Qusay H. Mahmoud},
  title        = {Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols
                  in MANETs},
  booktitle    = {Wireless Information Systems, Proceedings of the 4th International
                  Workshop on Wireless Information Systems, {WIS} 2005, In conjunction
                  with {ICEIS} 2005, Miami, USA, May 2005},
  pages        = {61--70},
  publisher    = {{INSTICC} Press},
  year         = {2005},
  timestamp    = {Mon, 15 Jun 2015 19:00:08 +0200},
  biburl       = {https://dblp.org/rec/conf/wis/ZouridakiHMTG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/ZouridakiMGT04,
  author       = {Charikleia Zouridaki and
                  Brian L. Mark and
                  Kris Gaj and
                  Roshan K. Thomas},
  editor       = {Sokratis K. Katsikas and
                  Stefanos Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {Distributed CA-based {PKI} for Mobile Ad Hoc Networks Using Elliptic
                  Curve Cryptography},
  booktitle    = {Public Key Infrastructure, First European PKIWorkshop: Research and
                  Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3093},
  pages        = {232--245},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25980-0\_19},
  doi          = {10.1007/978-3-540-25980-0\_19},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/ZouridakiMGT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/ThomasS04,
  author       = {Roshan K. Thomas and
                  Ravi S. Sandhu},
  title        = {Models, Protocols, and Architectures for Secure Pervasive Computing:
                  Challenges and Research Directions},
  booktitle    = {2nd {IEEE} Conference on Pervasive Computing and Communications Workshops
                  (PerCom 2004 Workshops), 14-17 March 2004, Orlando, FL, {USA}},
  pages        = {164--170},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/PERCOMW.2004.1276925},
  doi          = {10.1109/PERCOMW.2004.1276925},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/ThomasS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/ThomasS04,
  author       = {Roshan K. Thomas and
                  Ravi S. Sandhu},
  title        = {Towards a Multi-dimensional Characterization of Dissemination Control},
  booktitle    = {5th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2004), 7-9 June 2004, Yorktown Heights, NY,
                  {USA}},
  pages        = {197--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/POLICY.2004.1309168},
  doi          = {10.1109/POLICY.2004.1309168},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/ThomasS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sasn/HejmoMZT04,
  author       = {Marek Hejmo and
                  Brian L. Mark and
                  Charikleia Zouridaki and
                  Roshan K. Thomas},
  editor       = {Sanjeev Setia and
                  Vipin Swarup},
  title        = {Denial-of-service resistant quality-of-service signaling for mobile
                  ad hoc networks},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Security of ad hoc and Sensor
                  Networks, {SASN} 2004, Washington, DC, USA, October 25, 2004},
  pages        = {23--28},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029102.1029108},
  doi          = {10.1145/1029102.1029108},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sasn/HejmoMZT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/ZaidiMT04,
  author       = {Zainab R. Zaidi and
                  Brian L. Mark and
                  Roshan K. Thomas},
  title        = {A two-tier representation of node mobility in ad hoc networks},
  booktitle    = {Proceedings of the First Annual {IEEE} Communications Society Conference
                  on Sensor and Ad Hoc Communications and Networks, {SECON} 2004, October
                  4-7, 2004, Santa Clara, CA, {USA}},
  pages        = {153--161},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/SAHCN.2004.1381913},
  doi          = {10.1109/SAHCN.2004.1381913},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/secon/ZaidiMT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeemm/ChangPCT03,
  author       = {Shi{-}Kuo Chang and
                  Giuseppe Polese and
                  Maurizio Cibelli and
                  Roshan K. Thomas},
  title        = {Visual Authorization Modeling in E-commerce Applications},
  journal      = {{IEEE} Multim.},
  volume       = {10},
  number       = {1},
  pages        = {44--54},
  year         = {2003},
  url          = {https://doi.org/10.1109/MMUL.2003.1167921},
  doi          = {10.1109/MMUL.2003.1167921},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeemm/ChangPCT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/discex/ThomasMJC03,
  author       = {Roshan K. Thomas and
                  Brian L. Mark and
                  Tommy Johnson and
                  James Croall},
  title        = {NetBouncer: Client-legitimacy-based High-performance DDoS Filtering},
  booktitle    = {3rd {DARPA} Information Survivability Conference and Exposition {(DISCEX-III}
                  2003), 22-24 April 2003, Washington, DC, {USA}},
  pages        = {14--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/DISCEX.2003.1194869},
  doi          = {10.1109/DISCEX.2003.1194869},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/discex/ThomasMJC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/discex/ThomasZHJ03,
  author       = {Roshan K. Thomas and
                  Hong Zhu and
                  Tim Huck and
                  Tommy Johnson},
  title        = {NetBouncer: Client-legitimacy-based High-performance DDoS Filtering},
  booktitle    = {3rd {DARPA} Information Survivability Conference and Exposition {(DISCEX-III}
                  2003), 22-24 April 2003, Washington, DC, {USA}},
  pages        = {111},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/DISCEX.2003.1194939},
  doi          = {10.1109/DISCEX.2003.1194939},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/discex/ThomasZHJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/CohenTWS02,
  author       = {Eve Cohen and
                  Roshan K. Thomas and
                  William H. Winsborough and
                  Deborah Shands},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Models for coalition-based access control {(CBAC)}},
  booktitle    = {7th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2002, Naval Postgraduate School, Monterey, California, USA, June 3-4,
                  2002},
  pages        = {97--106},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/507711.507727},
  doi          = {10.1145/507711.507727},
  timestamp    = {Tue, 09 Feb 2021 08:50:30 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/CohenTWS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/GeorgiadisMPT01,
  author       = {Christos K. Georgiadis and
                  Ioannis Mavridis and
                  George Pangalos and
                  Roshan K. Thomas},
  editor       = {Ravi S. Sandhu and
                  Trent Jaeger},
  title        = {Flexible team-based access control using contexts},
  booktitle    = {6th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001},
  pages        = {21--27},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/373256.373259},
  doi          = {10.1145/373256.373259},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/GeorgiadisMPT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/McCollumFHST97,
  author       = {Catherine D. McCollum and
                  Donald B. Faatz and
                  William R. Herndon and
                  E. John Sebes and
                  Roshan K. Thomas},
  editor       = {Tsau Young Lin and
                  Shelly Qian},
  title        = {Distributed Object Technologies, Databases and Security},
  booktitle    = {Database Securty {XI:} Status and Prospects, {IFIP} {TC11} {WG11.3}
                  Eleventh International Conference on Database Security, 10-13 August
                  1997, Lake Tahoe, California, {USA}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {113},
  pages        = {17--31},
  publisher    = {Chapman {\&} Hall},
  year         = {1997},
  timestamp    = {Wed, 24 Sep 2003 08:16:49 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/McCollumFHST97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ThomasS97,
  author       = {Roshan K. Thomas and
                  Ravi S. Sandhu},
  editor       = {Tsau Young Lin and
                  Shelly Qian},
  title        = {Task-Based Authorization Controls {(TBAC):} {A} Family of Models for
                  Active and Enterprise-Oriented Autorization Management},
  booktitle    = {Database Securty {XI:} Status and Prospects, {IFIP} {TC11} {WG11.3}
                  Eleventh International Conference on Database Security, 10-13 August
                  1997, Lake Tahoe, California, {USA}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {113},
  pages        = {166--181},
  publisher    = {Chapman {\&} Hall},
  year         = {1997},
  timestamp    = {Thu, 24 Oct 2002 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ThomasS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rbac/Thomas97,
  author       = {Roshan K. Thomas},
  editor       = {Charles E. Youman and
                  Edward J. Coyne and
                  Trent Jaeger},
  title        = {Team-based access control {(TMAC):} a primitive for applying role-based
                  access controls in collaborative environments},
  booktitle    = {Proceedings of the Second Workshop on Role-Based Access Control, {RBAC}
                  1997, Fairfax, VA, USA, November 6-7, 1997},
  pages        = {13--19},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/266741.266748},
  doi          = {10.1145/266741.266748},
  timestamp    = {Tue, 06 Nov 2018 16:59:23 +0100},
  biburl       = {https://dblp.org/rec/conf/rbac/Thomas97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vl/ChangPTD97,
  author       = {Shi{-}Kuo Chang and
                  Giuseppe Polese and
                  Roshan K. Thomas and
                  Souvik Das},
  title        = {A Visual Language for Authorization Modeling},
  booktitle    = {Proceedings 1997 {IEEE} Symposium on Visual Languages, Isle of Capri,
                  Italy, September 23-26, 1997},
  pages        = {110--118},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/VL.1997.626565},
  doi          = {10.1109/VL.1997.626565},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vl/ChangPTD97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/ThomasS96,
  author       = {Roshan K. Thomas and
                  Ravi S. Sandhu},
  title        = {A Trusted Subject Architecture for Multilevel Secure Object-Oriented
                  Databases},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {8},
  number       = {1},
  pages        = {16--31},
  year         = {1996},
  url          = {https://doi.org/10.1109/69.485626},
  doi          = {10.1109/69.485626},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/ThomasS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ThomasBSBHST95,
  author       = {Roshan K. Thomas and
                  Elisa Bertino and
                  Pierangela Samarati and
                  Hans Hermann Br{\"{u}}ggemann and
                  Bret Hartman and
                  Ravi S. Sandhu and
                  T. C. Ting},
  editor       = {David L. Spooner and
                  Steven A. Demurjian and
                  John E. Dobson},
  title        = {Panel Discussion: Role-Based Access Control and Next-Generation Security
                  Models},
  booktitle    = {Database Security {IX:} Status and Prospects, Proceedings of the Ninth
                  Annual {IFIP} {WG11} Working Conference on Database Security, Rensselaerville,
                  New York, USA, 13-16 August 1995},
  series       = {{IFIP} Conference Proceedings},
  volume       = {51},
  pages        = {289--298},
  publisher    = {Chapman {\&} Hall},
  year         = {1995},
  timestamp    = {Thu, 24 Oct 2002 16:18:58 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ThomasBSBHST95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rbac/Thomas95,
  author       = {Roshan K. Thomas},
  editor       = {Charles E. Youman and
                  Ravi S. Sandhu and
                  Edward J. Coyne},
  title        = {Role-based access control and distributed object-based enterprise
                  computing},
  booktitle    = {Proceedings of the First {ACM} Workshop on Role-Based Access Control,
                  {RBAC} 1995, Gaithersburg, MD, USA, November 30 - December 2, 1995},
  publisher    = {{ACM}},
  year         = {1995},
  url          = {https://doi.org/10.1145/270152.270194},
  doi          = {10.1145/270152.270194},
  timestamp    = {Tue, 06 Nov 2018 16:59:23 +0100},
  biburl       = {https://dblp.org/rec/conf/rbac/Thomas95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/SandhuT94,
  author       = {Ravi S. Sandhu and
                  Roshan K. Thomas},
  title        = {Conceptual Foundations for a Model of Task-based Authorizations},
  booktitle    = {Seventh {IEEE} Computer Security Foundations Workshop - CSFW'94, Franconia,
                  New Hampshire, USA, June 14-16, 1994, Proceedings},
  pages        = {66--79},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/CSFW.1994.315946},
  doi          = {10.1109/CSFW.1994.315946},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/SandhuT94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ThomasS94,
  author       = {Roshan K. Thomas and
                  Ravi S. Sandhu},
  editor       = {Dieter Gollmann},
  title        = {Supporting Object-Based High-Assurance Write-up in Multilevel Databases
                  for the Replicated Architecture},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {875},
  pages        = {403--428},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_76},
  doi          = {10.1007/3-540-58618-0\_76},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ThomasS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ThomasS93,
  author       = {Roshan K. Thomas and
                  Ravi S. Sandhu},
  title        = {A Kernelized Architecture for Multilevel Secure Object-Oriented Databases
                  Supporting Write-Up},
  journal      = {J. Comput. Secur.},
  volume       = {2},
  number       = {2-3},
  pages        = {231--275},
  year         = {1993},
  url          = {https://doi.org/10.3233/JCS-1993-22-309},
  doi          = {10.3233/JCS-1993-22-309},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ThomasS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ThomasS93,
  author       = {Roshan K. Thomas and
                  Ravi S. Sandhu},
  editor       = {Thomas F. Keefe and
                  Carl E. Landwehr},
  title        = {Towards a Unified Framework and Theory for Reasoning about Security
                  and Correctness of Transactions in Multilevel databases},
  booktitle    = {Database Security, {VII:} Status and Prospects, Proceedings of the
                  {IFIP} {WG11.3} Working Conference on Database Security, Lake Guntersville,
                  Alabama, USA, 12-15 September, 1993},
  series       = {{IFIP} Transactions},
  volume       = {{A-47}},
  pages        = {309--328},
  publisher    = {North-Holland},
  year         = {1993},
  timestamp    = {Thu, 03 Jan 2002 11:56:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ThomasS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ThomasS93,
  author       = {Roshan K. Thomas and
                  Ravi S. Sandhu},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {Towards a task-based paradigm for flexible and adaptable access control
                  in distributed applications},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {138--142},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283810},
  doi          = {10.1145/283751.283810},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/ThomasS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/oopsla/ThomasS93,
  author       = {Roshan K. Thomas and
                  Ravi S. Sandhu},
  editor       = {Bhavani Thuraisingham and
                  Ravi S. Sandhu and
                  T. C. Ting},
  title        = {Concurrency, Synchronization, and Scheduling to Support High-Assurance
                  Write-Up in Multilevel Object-Based Computing},
  booktitle    = {Security for Object-Oriented Systems, Proceedings of the {OOPSLA-93}
                  Conference Workshop on Security for Object-Oriented Systems, Washington,
                  DC, USA, 26 September 1993},
  series       = {Workshops in Computing},
  pages        = {218--228},
  publisher    = {Springer},
  year         = {1993},
  timestamp    = {Wed, 29 Jun 2022 15:37:45 +0200},
  biburl       = {https://dblp.org/rec/conf/oopsla/ThomasS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ThomasS92,
  author       = {Roshan K. Thomas and
                  Ravi S. Sandhu},
  editor       = {Bhavani Thuraisingham and
                  Carl E. Landwehr},
  title        = {Implementing the Message Filter Object-Oriented Security Model without
                  Trusted Subjects},
  booktitle    = {Database Security, {VI:} Status and Prospects. Results of the {IFIP}
                  {WG} 11.3 Workshop on Database Security, Vancouver, Canada, 19-21
                  August 1992},
  series       = {{IFIP} Transactions},
  volume       = {{A-21}},
  pages        = {15--34},
  publisher    = {North-Holland},
  year         = {1992},
  timestamp    = {Wed, 29 Jun 2022 15:37:44 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ThomasS92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/SandhuTJ91,
  author       = {Ravi S. Sandhu and
                  Roshan K. Thomas and
                  Sushil Jajodia},
  title        = {A Secure Kernelized Architecture for Multiple Object-Oriented Databases},
  booktitle    = {4th {IEEE} Computer Security Foundations Workshop - CSFW'91, Franconia,
                  New Hampshire, USA, June 18-20, 1991, Proceedings},
  pages        = {139--152},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/CSFW.1991.151580},
  doi          = {10.1109/CSFW.1991.151580},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/SandhuTJ91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/SanhuTJ91,
  author       = {Ravi S. Sandhu and
                  Roshan K. Thomas and
                  Sushil Jajodia},
  editor       = {Carl E. Landwehr and
                  Sushil Jajodia},
  title        = {Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented
                  Databases},
  booktitle    = {Database Security, {V:} Status and Prospects, Results of the {IFIP}
                  {WG} 11.3 Workshop on Database Security, Shepherdstown, West Virginia,
                  USA, 4-7 November, 1991},
  series       = {{IFIP} Transactions},
  volume       = {{A-6}},
  pages        = {297--314},
  publisher    = {North-Holland},
  year         = {1991},
  timestamp    = {Fri, 15 Feb 2002 12:14:34 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/SanhuTJ91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics