Search the dblp DataBase
Roshan K. Thomas :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ravi S. Sandhu , Roshan K. Thomas , Sushil Jajodia Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases. [Citation Graph (1, 0)][DBLP ] DBSec, 1991, pp:297-314 [Conf ] Roshan K. Thomas , Ravi S. Sandhu A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases. [Citation Graph (1, 7)][DBLP ] IEEE Trans. Knowl. Data Eng., 1996, v:8, n:1, pp:16-31 [Journal ] Ravi S. Sandhu , Roshan K. Thomas Conceptual Foundations for a Model of Task-based Authorizations. [Citation Graph (0, 0)][DBLP ] CSFW, 1994, pp:66-79 [Conf ] Ravi S. Sandhu , Roshan K. Thomas , Sushil Jajodia A Secure Kernelized Architecture for Multiple Object-Oriented Databases. [Citation Graph (0, 0)][DBLP ] CSFW, 1991, pp:139-152 [Conf ] Catherine D. McCollum , Donald B. Faatz , William R. Herndon , E. John Sebes , Roshan K. Thomas Distributed Object Technologies, Databases and Security. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:17-31 [Conf ] Roshan K. Thomas , Elisa Bertino , Pierangela Samarati , Hans Hermann Brüggemann , Bret Hartman , Ravi S. Sandhu , T. C. Ting Panel Discussion: Role-Based Access Control and Next-Generation Security Models. [Citation Graph (0, 0)][DBLP ] DBSec, 1995, pp:289-298 [Conf ] Roshan K. Thomas , Ravi S. Sandhu Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects. [Citation Graph (0, 0)][DBLP ] DBSec, 1992, pp:15-34 [Conf ] Roshan K. Thomas , Ravi S. Sandhu Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Transactions in Multilevel databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:309-328 [Conf ] Roshan K. Thomas , Ravi S. Sandhu Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:166-181 [Conf ] Roshan Thomas , Brian Mark , Tommy Johnson , James Croall NetBouncer: Client-legitimacy-based High-performance DDoS Filtering. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:14-25 [Conf ] Roshan Thomas , Hong Zhu , Tim Huck , Tommy Johnson NetBouncer: Client-legitimacy-based High-performance DDoS Filtering. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:111- [Conf ] Roshan K. Thomas , Ravi S. Sandhu Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture. [Citation Graph (0, 0)][DBLP ] ESORICS, 1994, pp:403-428 [Conf ] Charikleia Zouridaki , Brian L. Mark , Kris Gaj , Roshan K. Thomas Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2004, pp:232-245 [Conf ] Roshan K. Thomas , Ravi S. Sandhu Concurrency, Synchronization, and Scheduling to Support High-Assurance Write-Up in Multilevel Object-Based Computing. [Citation Graph (0, 0)][DBLP ] Security for Object-Oriented Systems, 1993, pp:218-228 [Conf ] Roshan K. Thomas , Ravi S. Sandhu Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions. [Citation Graph (0, 0)][DBLP ] PerCom Workshops, 2004, pp:164-170 [Conf ] Roshan K. Thomas , Ravi S. Sandhu Towards a Multi-dimensional Characterization of Dissemination Control. [Citation Graph (0, 0)][DBLP ] POLICY, 2004, pp:197-200 [Conf ] Marek Hejmo , Brian L. Mark , Charikleia Zouridaki , Roshan K. Thomas A Denial-of-Service Resistant Quality-of-Service Signaling Protocol for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] QSHINE, 2005, pp:32- [Conf ] Roshan K. Thomas Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1997, pp:13-19 [Conf ] Roshan K. Thomas Role-based access control and distributed object-based enterprise computing. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf ] Eve Cohen , Roshan K. Thomas , William H. Winsborough , Deborah Shands Models for coalition-based access control (CBAC). [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:97-106 [Conf ] Christos K. Georgiadis , Ioannis Mavridis , George Pangalos , Roshan K. Thomas Flexible team-based access control using contexts. [Citation Graph (0, 0)][DBLP ] SACMAT, 2001, pp:21-27 [Conf ] Marek Hejmo , Brian L. Mark , Charikleia Zouridaki , Roshan K. Thomas Denial-of-service resistant quality-of-service signaling for mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] SASN, 2004, pp:23-28 [Conf ] Charikleia Zouridaki , Brian L. Mark , Marek Hejmo , Roshan K. Thomas Robust cooperative trust establishment for MANETs. [Citation Graph (0, 0)][DBLP ] SASN, 2006, pp:23-34 [Conf ] Charikleia Zouridaki , Brian L. Mark , Marek Hejmo , Roshan K. Thomas A quantitative trust establishment framework for reliable data packet delivery in MANETs. [Citation Graph (0, 0)][DBLP ] SASN, 2005, pp:1-10 [Conf ] Shi-Kuo Chang , Giuseppe Polese , Roshan K. Thomas , Souvik Das A Visual Language for Authorization Modeling. [Citation Graph (0, 0)][DBLP ] VL, 1997, pp:110-118 [Conf ] Charikleia Zouridaki , Marek Hejmo , Brian L. Mark , Roshan K. Thomas , Kris Gaj Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs. [Citation Graph (0, 0)][DBLP ] Wireless Information Systems, 2005, pp:61-70 [Conf ] Shi-Kuo Chang , Giuseppe Polese , Maurizio Cibelli , Roshan K. Thomas Visual Authorization Modeling in E-commerce Applications. [Citation Graph (0, 0)][DBLP ] IEEE MultiMedia, 2003, v:10, n:1, pp:44-54 [Journal ] Roshan K. Thomas , Ravi S. Sandhu A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1993, v:2, n:2-3, pp:231-275 [Journal ] Charikleia Zouridaki , Brian L. Mark , Marek Hejmo , Roshan K. Thomas Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2007, v:15, n:1, pp:3-38 [Journal ] Jelena Mirkovic , Alefiya Hussain , Brett Willson , Sonia Fahmy , Wei-Min Yao , Peter L. Reiher , Stephen Schwab , Roshan Thomas When is service really denied?: a user-centric dos metric. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 2007, pp:357-358 [Conf ] Measuring denial Of service. [Citation Graph (, )][DBLP ] Realizing the CDL Cross-Domain Language in the Ponder2 Policy Framework: Experiences and Research Directions. [Citation Graph (, )][DBLP ] Towards user-centric metrics for denial-of-service measurement. [Citation Graph (, )][DBLP ] Timing-based localization of in-band wormhole tunnels in MANETs. [Citation Graph (, )][DBLP ] Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). [Citation Graph (, )][DBLP ] E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks. [Citation Graph (, )][DBLP ] Search in 0.020secs, Finished in 0.023secs