Roshan K. Thomas

According to our database1, Roshan K. Thomas authored at least 47 papers between 1991 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Cyber Denial, Deception and Counter Deception - A Framework for Supporting Active Cyber Defense
Advances in Information Security 64, Springer, ISBN: 978-3-319-25133-2, 2015

A multi-layered and kill-chain based security analysis framework for cyber-physical systems.
Int. J. Crit. Infrastructure Prot., 2015

Denial and Deception in Cyber Defense.
Computer, 2015

First Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC): Challenges and Research Directions.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2010
Timing-based localization of in-band wormhole tunnels in MANETs.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

2009
Accurately Measuring Denial of Service in Simulation and Testbed Experiments.
IEEE Trans. Dependable Secur. Comput., 2009

E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks.
Ad Hoc Networks, 2009

Realizing the CDL Cross-Domain Language in the Ponder2 Policy Framework: Experiences and Research Directions.
Proceedings of the POLICY 2009, 2009

2008
Privacy-Preserving Accountable Accuracy Management Systems (PAAMS).
Proceedings of the Protecting Persons While Protecting the People, 2008

2007
Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs.
J. Comput. Secur., 2007

Automating DDoS Experimentation.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007

DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed.
Proceedings of the 3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2007

When is service really denied?: a user-centric dos metric.
Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2007

Towards user-centric metrics for denial-of-service measurement.
Proceedings of the Workshop on Experimental Computer Science, 2007

2006
Design and analysis of a denial-of-service-resistant quality-of-service signaling protocol for MANETs.
IEEE Trans. Veh. Technol., 2006

Robust cooperative trust establishment for MANETs.
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006

On the fairness of flow aggregation for denial-of-service resistant QoS in MANETs.
Proceedings of the 3rd International ICST Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, 2006

Measuring denial Of service.
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006

2005
Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs.
Proceedings of the Wireless Information Systems, 2005

A quantitative trust establishment framework for reliable data packet delivery in MANETs.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005

A Denial-of-Service Resistant Quality-of-Service Signaling Protocol for Mobile Ad Hoc Networks.
Proceedings of the Second International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2005), 2005

2004
A two-tier representation of node mobility in ad hoc networks.
Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004

Denial-of-service resistant quality-of-service signaling for mobile ad hoc networks.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004

Towards a Multi-dimensional Characterization of Dissemination Control.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography.
Proceedings of the Public Key Infrastructure, 2004

2003
Visual Authorization Modeling in E-commerce Applications.
IEEE Multim., 2003

NetBouncer: Client-legitimacy-based High-performance DDoS Filtering.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

NetBouncer: Client-legitimacy-based High-performance DDoS Filtering.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
Models for coalition-based access control (CBAC).
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

2001
Flexible team-based access control using contexts.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

1997
A Visual Language for Authorization Modeling.
Proceedings of the Proceedings 1997 IEEE Symposium on Visual Languages, 1997

Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments.
Proceedings of the Second Workshop on Role-Based Access Control, 1997

Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management.
Proceedings of the Database Securty XI: Status and Prospects, 1997

Distributed Object Technologies, Databases and Security.
Proceedings of the Database Securty XI: Status and Prospects, 1997

1996
A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases.
IEEE Trans. Knowl. Data Eng., 1996

1995
Role-based access control and distributed object-based enterprise computing.
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995

Panel Discussion: Role-Based Access Control and Next-Generation Security Models.
Proceedings of the Database Security IX: Status and Prospects, 1995

1994
Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture.
Proceedings of the Computer Security, 1994

Conceptual Foundations for a Model of Task-based Authorizations.
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994

1993
A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up.
J. Comput. Secur., 1993

Concurrency, Synchronization, and Scheduling to Support High-Assurance Write-Up in Multilevel Object-Based Computing.
Proceedings of the Security for Object-Oriented Systems, 1993

Towards a task-based paradigm for flexible and adaptable access control in distributed applications.
Proceedings of the Proceedings on the 1992-1993 Workshop on New Security Paradigms, 1993

Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Transactions in Multilevel databases.
Proceedings of the Database Security, 1993

1992
Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects.
Proceedings of the Database Security, 1992

1991
Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases.
Proceedings of the Database Security, 1991

A Secure Kernelized Architecture for Multiple Object-Oriented Databases.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991


  Loading...