default search action
Roshan K. Thomas
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [b1]Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben S. Schmoker, Alexander W. Tsow:
Cyber Denial, Deception and Counter Deception - A Framework for Supporting Active Cyber Defense. Advances in Information Security 64, Springer 2015, ISBN 978-3-319-25131-8, pp. 1-174 - [j9]Kristin E. Heckman, Frank J. Stech, Ben S. Schmoker, Roshan K. Thomas:
Denial and Deception in Cyber Defense. Computer 48(4): 36-44 (2015) - [j8]Adam Hahn, Roshan K. Thomas, Ivan Lozano, Alvaro A. Cárdenas:
A multi-layered and kill-chain based security analysis framework for cyber-physical systems. Int. J. Crit. Infrastructure Prot. 11: 39-50 (2015) - [c37]Roshan K. Thomas, Alvaro A. Cárdenas, Rakesh B. Bobba:
First Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC): Challenges and Research Directions. CCS 2015: 1705-1706 - [e1]Indrajit Ray, Roshan K. Thomas, Alvaro A. Cárdenas:
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, CPS-SPC 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN 978-1-4503-3827-1 [contents] - 2010
- [c36]Jinsub Kim, Dan Sterne, Rommie L. Hardy, Roshan K. Thomas, Lang Tong:
Timing-based localization of in-band wormhole tunnels in MANETs. WISEC 2010: 1-12
2000 – 2009
- 2009
- [j7]Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas:
E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks. Ad Hoc Networks 7(6): 1156-1168 (2009) - [j6]Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas:
Accurately Measuring Denial of Service in Simulation and Testbed Experiments. IEEE Trans. Dependable Secur. Comput. 6(2): 81-95 (2009) - [c35]Roshan K. Thomas, Giovanni Russello, Simon Tsang:
Realizing the CDL Cross-Domain Language in the Ponder2 Policy Framework: Experiences and Research Directions. POLICY 2009: 76-83 - 2008
- [c34]Roshan K. Thomas, Ravi S. Sandhu, Elisa Bertino, Ismailcem Budak Arpinar, Shouhuai Xu:
Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). ISIPS 2008: 115-121 - 2007
- [j5]Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas:
Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs. J. Comput. Secur. 15(1): 3-38 (2007) - [c33]Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas, Wei-Min Yao, Stephen Schwab:
Towards user-centric metrics for denial-of-service measurement. Experimental Computer Science 2007: 8 - [c32]Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Wei-Min Yao, Peter L. Reiher, Stephen Schwab, Roshan K. Thomas:
When is service really denied?: a user-centric dos metric. SIGMETRICS 2007: 357-358 - [c31]Jelena Mirkovic, Songjie Wei, Alefiya Hussain, Brett Wilson, Roshan K. Thomas, Stephen Schwab, Sonia Fahmy, Roman Chertov, Peter L. Reiher:
DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed. TRIDENTCOM 2007: 1-7 - [c30]Jelena Mirkovic, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas:
Automating DDoS Experimentation. DETER 2007 - 2006
- [j4]Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas:
Design and analysis of a denial-of-service-resistant quality-of-service signaling protocol for MANETs. IEEE Trans. Veh. Technol. 55(3): 743-751 (2006) - [c29]Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko:
Measuring denial Of service. QoP 2006: 53-58 - [c28]Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas:
On the fairness of flow aggregation for denial-of-service resistant QoS in MANETs. QSHINE 2006: 54 - [c27]Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas:
Robust cooperative trust establishment for MANETs. SASN 2006: 23-34 - 2005
- [c26]Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas:
A Denial-of-Service Resistant Quality-of-Service Signaling Protocol for Mobile Ad Hoc Networks. QSHINE 2005: 32 - [c25]Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas:
A quantitative trust establishment framework for reliable data packet delivery in MANETs. SASN 2005: 1-10 - [c24]Charikleia Zouridaki, Marek Hejmo, Brian L. Mark, Roshan K. Thomas, Kris Gaj:
Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs. Wireless Information Systems 2005: 61-70 - 2004
- [c23]Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Roshan K. Thomas:
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography. EuroPKI 2004: 232-245 - [c22]Roshan K. Thomas, Ravi S. Sandhu:
Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions. PerCom Workshops 2004: 164-170 - [c21]Roshan K. Thomas, Ravi S. Sandhu:
Towards a Multi-dimensional Characterization of Dissemination Control. POLICY 2004: 197-200 - [c20]Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas:
Denial-of-service resistant quality-of-service signaling for mobile ad hoc networks. SASN 2004: 23-28 - [c19]Zainab R. Zaidi, Brian L. Mark, Roshan K. Thomas:
A two-tier representation of node mobility in ad hoc networks. SECON 2004: 153-161 - 2003
- [j3]Shi-Kuo Chang, Giuseppe Polese, Maurizio Cibelli, Roshan K. Thomas:
Visual Authorization Modeling in E-commerce Applications. IEEE Multim. 10(1): 44-54 (2003) - [c18]Roshan K. Thomas, Brian L. Mark, Tommy Johnson, James Croall:
NetBouncer: Client-legitimacy-based High-performance DDoS Filtering. DISCEX (1) 2003: 14-25 - [c17]Roshan K. Thomas, Hong Zhu, Tim Huck, Tommy Johnson:
NetBouncer: Client-legitimacy-based High-performance DDoS Filtering. DISCEX (2) 2003: 111 - 2002
- [c16]Eve Cohen, Roshan K. Thomas, William H. Winsborough, Deborah Shands:
Models for coalition-based access control (CBAC). SACMAT 2002: 97-106 - 2001
- [c15]Christos K. Georgiadis, Ioannis Mavridis, George Pangalos, Roshan K. Thomas:
Flexible team-based access control using contexts. SACMAT 2001: 21-27
1990 – 1999
- 1997
- [c14]Catherine D. McCollum, Donald B. Faatz, William R. Herndon, E. John Sebes, Roshan K. Thomas:
Distributed Object Technologies, Databases and Security. DBSec 1997: 17-31 - [c13]Roshan K. Thomas, Ravi S. Sandhu:
Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. DBSec 1997: 166-181 - [c12]Roshan K. Thomas:
Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. ACM Workshop on Role-Based Access Control 1997: 13-19 - [c11]Shi-Kuo Chang, Giuseppe Polese, Roshan K. Thomas, Souvik Das:
A Visual Language for Authorization Modeling. VL 1997: 110-118 - 1996
- [j2]Roshan K. Thomas, Ravi S. Sandhu:
A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases. IEEE Trans. Knowl. Data Eng. 8(1): 16-31 (1996) - 1995
- [c10]Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting:
Panel Discussion: Role-Based Access Control and Next-Generation Security Models. DBSec 1995: 289-298 - [c9]Roshan K. Thomas:
Role-based access control and distributed object-based enterprise computing. ACM Workshop on Role-Based Access Control 1995 - 1994
- [c8]Ravi S. Sandhu, Roshan K. Thomas:
Conceptual Foundations for a Model of Task-based Authorizations. CSFW 1994: 66-79 - [c7]Roshan K. Thomas, Ravi S. Sandhu:
Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture. ESORICS 1994: 403-428 - 1993
- [j1]Roshan K. Thomas, Ravi S. Sandhu:
A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up. J. Comput. Secur. 2(2-3): 231-275 (1993) - [c6]Roshan K. Thomas, Ravi S. Sandhu:
Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Transactions in Multilevel databases. DBSec 1993: 309-328 - [c5]Roshan K. Thomas, Ravi S. Sandhu:
Towards a task-based paradigm for flexible and adaptable access control in distributed applications. NSPW 1993: 138-142 - [c4]Roshan K. Thomas, Ravi S. Sandhu:
Concurrency, Synchronization, and Scheduling to Support High-Assurance Write-Up in Multilevel Object-Based Computing. Security for Object-Oriented Systems 1993: 218-228 - 1992
- [c3]Roshan K. Thomas, Ravi S. Sandhu:
Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects. DBSec 1992: 15-34 - 1991
- [c2]Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia:
A Secure Kernelized Architecture for Multiple Object-Oriented Databases. CSFW 1991: 139-152 - [c1]Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia:
Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases. DBSec 1991: 297-314
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint