Roshan K. Thomas
According to our database1,
Roshan K. Thomas
authored at least 47 papers
between 1991 and 2015.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2015
Cyber Denial, Deception and Counter Deception - A Framework for Supporting Active Cyber Defense
Advances in Information Security 64, Springer, ISBN: 978-3-319-25133-2, 2015
A multi-layered and kill-chain based security analysis framework for cyber-physical systems.
Int. J. Crit. Infrastructure Prot., 2015
First Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC): Challenges and Research Directions.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2010
Proceedings of the Third ACM Conference on Wireless Network Security, 2010
2009
IEEE Trans. Dependable Secur. Comput., 2009
E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks.
Ad Hoc Networks, 2009
Realizing the CDL Cross-Domain Language in the Ponder2 Policy Framework: Experiences and Research Directions.
Proceedings of the POLICY 2009, 2009
2008
Proceedings of the Protecting Persons While Protecting the People, 2008
2007
Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs.
J. Comput. Secur., 2007
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007
Proceedings of the 3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2007
Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2007
Proceedings of the Workshop on Experimental Computer Science, 2007
2006
Design and analysis of a denial-of-service-resistant quality-of-service signaling protocol for MANETs.
IEEE Trans. Veh. Technol., 2006
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006
Proceedings of the 3rd International ICST Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, 2006
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006
2005
Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs.
Proceedings of the Wireless Information Systems, 2005
A quantitative trust establishment framework for reliable data packet delivery in MANETs.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005
A Denial-of-Service Resistant Quality-of-Service Signaling Protocol for Mobile Ad Hoc Networks.
Proceedings of the Second International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2005), 2005
2004
Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004
Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography.
Proceedings of the Public Key Infrastructure, 2004
2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
2002
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002
2001
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001
1997
Proceedings of the Proceedings 1997 IEEE Symposium on Visual Languages, 1997
Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments.
Proceedings of the Second Workshop on Role-Based Access Control, 1997
Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management.
Proceedings of the Database Securty XI: Status and Prospects, 1997
Distributed Object Technologies, Databases and Security.
Proceedings of the Database Securty XI: Status and Prospects, 1997
1996
IEEE Trans. Knowl. Data Eng., 1996
1995
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995
Panel Discussion: Role-Based Access Control and Next-Generation Security Models.
Proceedings of the Database Security IX: Status and Prospects, 1995
1994
Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture.
Proceedings of the Computer Security, 1994
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994
1993
A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up.
J. Comput. Secur., 1993
Concurrency, Synchronization, and Scheduling to Support High-Assurance Write-Up in Multilevel Object-Based Computing.
Proceedings of the Security for Object-Oriented Systems, 1993
Towards a task-based paradigm for flexible and adaptable access control in distributed applications.
Proceedings of the Proceedings on the 1992-1993 Workshop on New Security Paradigms, 1993
Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Transactions in Multilevel databases.
Proceedings of the Database Security, 1993
1992
Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects.
Proceedings of the Database Security, 1992
1991
Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases.
Proceedings of the Database Security, 1991
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991