The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Roshan K. Thomas: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia
    Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases. [Citation Graph (1, 0)][DBLP]
    DBSec, 1991, pp:297-314 [Conf]
  2. Roshan K. Thomas, Ravi S. Sandhu
    A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases. [Citation Graph (1, 7)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1996, v:8, n:1, pp:16-31 [Journal]
  3. Ravi S. Sandhu, Roshan K. Thomas
    Conceptual Foundations for a Model of Task-based Authorizations. [Citation Graph (0, 0)][DBLP]
    CSFW, 1994, pp:66-79 [Conf]
  4. Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia
    A Secure Kernelized Architecture for Multiple Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:139-152 [Conf]
  5. Catherine D. McCollum, Donald B. Faatz, William R. Herndon, E. John Sebes, Roshan K. Thomas
    Distributed Object Technologies, Databases and Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:17-31 [Conf]
  6. Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting
    Panel Discussion: Role-Based Access Control and Next-Generation Security Models. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:289-298 [Conf]
  7. Roshan K. Thomas, Ravi S. Sandhu
    Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects. [Citation Graph (0, 0)][DBLP]
    DBSec, 1992, pp:15-34 [Conf]
  8. Roshan K. Thomas, Ravi S. Sandhu
    Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Transactions in Multilevel databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:309-328 [Conf]
  9. Roshan K. Thomas, Ravi S. Sandhu
    Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:166-181 [Conf]
  10. Roshan Thomas, Brian Mark, Tommy Johnson, James Croall
    NetBouncer: Client-legitimacy-based High-performance DDoS Filtering. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:14-25 [Conf]
  11. Roshan Thomas, Hong Zhu, Tim Huck, Tommy Johnson
    NetBouncer: Client-legitimacy-based High-performance DDoS Filtering. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:111- [Conf]
  12. Roshan K. Thomas, Ravi S. Sandhu
    Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:403-428 [Conf]
  13. Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Roshan K. Thomas
    Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:232-245 [Conf]
  14. Roshan K. Thomas, Ravi S. Sandhu
    Concurrency, Synchronization, and Scheduling to Support High-Assurance Write-Up in Multilevel Object-Based Computing. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:218-228 [Conf]
  15. Roshan K. Thomas, Ravi S. Sandhu
    Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2004, pp:164-170 [Conf]
  16. Roshan K. Thomas, Ravi S. Sandhu
    Towards a Multi-dimensional Characterization of Dissemination Control. [Citation Graph (0, 0)][DBLP]
    POLICY, 2004, pp:197-200 [Conf]
  17. Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas
    A Denial-of-Service Resistant Quality-of-Service Signaling Protocol for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    QSHINE, 2005, pp:32- [Conf]
  18. Roshan K. Thomas
    Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:13-19 [Conf]
  19. Roshan K. Thomas
    Role-based access control and distributed object-based enterprise computing. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  20. Eve Cohen, Roshan K. Thomas, William H. Winsborough, Deborah Shands
    Models for coalition-based access control (CBAC). [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:97-106 [Conf]
  21. Christos K. Georgiadis, Ioannis Mavridis, George Pangalos, Roshan K. Thomas
    Flexible team-based access control using contexts. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:21-27 [Conf]
  22. Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas
    Denial-of-service resistant quality-of-service signaling for mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:23-28 [Conf]
  23. Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas
    Robust cooperative trust establishment for MANETs. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:23-34 [Conf]
  24. Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas
    A quantitative trust establishment framework for reliable data packet delivery in MANETs. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:1-10 [Conf]
  25. Shi-Kuo Chang, Giuseppe Polese, Roshan K. Thomas, Souvik Das
    A Visual Language for Authorization Modeling. [Citation Graph (0, 0)][DBLP]
    VL, 1997, pp:110-118 [Conf]
  26. Charikleia Zouridaki, Marek Hejmo, Brian L. Mark, Roshan K. Thomas, Kris Gaj
    Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs. [Citation Graph (0, 0)][DBLP]
    Wireless Information Systems, 2005, pp:61-70 [Conf]
  27. Shi-Kuo Chang, Giuseppe Polese, Maurizio Cibelli, Roshan K. Thomas
    Visual Authorization Modeling in E-commerce Applications. [Citation Graph (0, 0)][DBLP]
    IEEE MultiMedia, 2003, v:10, n:1, pp:44-54 [Journal]
  28. Roshan K. Thomas, Ravi S. Sandhu
    A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1993, v:2, n:2-3, pp:231-275 [Journal]
  29. Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas
    Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2007, v:15, n:1, pp:3-38 [Journal]
  30. Jelena Mirkovic, Alefiya Hussain, Brett Willson, Sonia Fahmy, Wei-Min Yao, Peter L. Reiher, Stephen Schwab, Roshan Thomas
    When is service really denied?: a user-centric dos metric. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2007, pp:357-358 [Conf]

  31. Measuring denial Of service. [Citation Graph (, )][DBLP]


  32. Realizing the CDL Cross-Domain Language in the Ponder2 Policy Framework: Experiences and Research Directions. [Citation Graph (, )][DBLP]


  33. Towards user-centric metrics for denial-of-service measurement. [Citation Graph (, )][DBLP]


  34. Timing-based localization of in-band wormhole tunnels in MANETs. [Citation Graph (, )][DBLP]


  35. Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). [Citation Graph (, )][DBLP]


  36. E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002