<?xml version="1.0"?>
<dblpperson name="Roshan K. Thomas" pid="09/613" n="48">
<person key="homepages/09/613" mdate="2009-06-09">
<author pid="09/613">Roshan K. Thomas</author>
</person>
<r><book key="series/ais/HeckmanSTST15" mdate="2018-08-29">
<author pid="23/10596">Kristin E. Heckman</author>
<author pid="04/10598">Frank J. Stech</author>
<author pid="09/613">Roshan K. Thomas</author>
<author pid="161/7854">Ben S. Schmoker</author>
<author pid="179/0204">Alexander W. Tsow</author>
<title>Cyber Denial, Deception and Counter Deception - A Framework for Supporting Active Cyber Defense</title>
<publisher>Springer</publisher>
<year>2015</year>
<pages>1-174</pages>
<volume>64</volume>
<series href="db/series/ais/index.html">Advances in Information Security</series>
<isbn>978-3-319-25131-8</isbn>
<isbn>978-3-319-25133-2</isbn>
<ee>https://doi.org/10.1007/978-3-319-25133-2</ee>
</book>
</r>
<r><article key="journals/computer/HeckmanSST15" mdate="2020-08-12">
<author pid="23/10596">Kristin E. Heckman</author>
<author pid="04/10598">Frank J. Stech</author>
<author pid="161/7854">Ben S. Schmoker</author>
<author pid="09/613">Roshan K. Thomas</author>
<title>Denial and Deception in Cyber Defense.</title>
<pages>36-44</pages>
<year>2015</year>
<volume>48</volume>
<journal>Computer</journal>
<number>4</number>
<ee>https://doi.org/10.1109/MC.2015.104</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MC.2015.104</ee>
<url>db/journals/computer/computer48.html#HeckmanSST15</url>
</article>
</r>
<r><article key="journals/ijcip/HahnTLC15" mdate="2020-02-21">
<author pid="44/10653">Adam Hahn</author>
<author pid="09/613">Roshan K. Thomas</author>
<author pid="124/0345">Ivan Lozano</author>
<author pid="48/6119">Alvaro A. C&#225;rdenas</author>
<title>A multi-layered and kill-chain based security analysis framework for cyber-physical systems.</title>
<pages>39-50</pages>
<year>2015</year>
<volume>11</volume>
<journal>Int. J. Crit. Infrastructure Prot.</journal>
<ee>https://doi.org/10.1016/j.ijcip.2015.08.003</ee>
<url>db/journals/ijcip/ijcip11.html#HahnTLC15</url>
</article>
</r>
<r><inproceedings key="conf/ccs/ThomasCB15" mdate="2022-04-09">
<author pid="09/613">Roshan K. Thomas</author>
<author pid="48/6119">Alvaro A. C&#225;rdenas</author>
<author orcid="0000-0002-5440-0785" pid="115/7959">Rakesh B. Bobba</author>
<title>First Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC): Challenges and Research Directions.</title>
<pages>1705-1706</pages>
<year>2015</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/2810103.2812621</ee>
<crossref>conf/ccs/2015</crossref>
<url>db/conf/ccs/ccs2015.html#ThomasCB15</url>
</inproceedings>
</r>
<r><proceedings key="conf/ccs/2015cpsspc" mdate="2020-11-10">
<editor pid="r/IndrajitRay">Indrajit Ray</editor>
<editor pid="09/613">Roshan K. Thomas</editor>
<editor pid="48/6119">Alvaro A. C&#225;rdenas</editor>
<title>Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, CPS-SPC 2015, Denver, Colorado, USA, October 16, 2015</title>
<booktitle>CPS-SPC@CCS</booktitle>
<publisher>ACM</publisher>
<year>2015</year>
<isbn>978-1-4503-3827-1</isbn>
<ee>https://doi.org/10.1145/2808705</ee>
<url>db/conf/ccs/cpsspc2015.html</url>
</proceedings>
</r>
<r><inproceedings key="conf/wisec/KimSHTT10" mdate="2024-07-09">
<author pid="57/7954">Jinsub Kim</author>
<author pid="39/7957">Dan Sterne</author>
<author pid="12/1379">Rommie L. Hardy</author>
<author pid="09/613">Roshan K. Thomas</author>
<author pid="92/1653-1">Lang Tong 0001</author>
<title>Timing-based localization of in-band wormhole tunnels in MANETs.</title>
<pages>1-12</pages>
<year>2010</year>
<booktitle>WISEC</booktitle>
<ee>https://doi.org/10.1145/1741866.1741869</ee>
<crossref>conf/wisec/2010</crossref>
<url>db/conf/wisec/wisec2010.html#KimSHTT10</url>
</inproceedings>
</r>
<r><article key="journals/adhoc/ZouridakiMHT09" mdate="2024-10-06">
<author pid="68/945">Charikleia Zouridaki</author>
<author orcid="0000-0002-4030-5592" pid="60/2817">Brian L. Mark</author>
<author pid="78/5490">Marek Hejmo</author>
<author pid="09/613">Roshan K. Thomas</author>
<title>E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks.</title>
<pages>1156-1168</pages>
<year>2009</year>
<volume>7</volume>
<journal>Ad Hoc Networks</journal>
<number>6</number>
<ee>https://doi.org/10.1016/j.adhoc.2008.10.003</ee>
<url>db/journals/adhoc/adhoc7.html#ZouridakiMHT09</url>
</article>
</r>
<r><article key="journals/tdsc/MirkovicHFRT09" mdate="2025-01-19">
<author pid="89/6100">Jelena Mirkovic</author>
<author orcid="0000-0002-4944-8338" pid="13/2327">Alefiya Hussain</author>
<author orcid="0000-0003-2870-7166" pid="f/SoniaFahmy">Sonia Fahmy</author>
<author pid="r/PLReiher">Peter L. Reiher</author>
<author pid="09/613">Roshan K. Thomas</author>
<title>Accurately Measuring Denial of Service in Simulation and Testbed Experiments.</title>
<pages>81-95</pages>
<year>2009</year>
<volume>6</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TDSC.2008.73</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TDSC.2008.73</ee>
<ee>https://www.wikidata.org/entity/Q125798466</ee>
<url>db/journals/tdsc/tdsc6.html#MirkovicHFRT09</url>
</article>
</r>
<r><inproceedings key="conf/policy/ThomasRT09" mdate="2023-03-23">
<author pid="09/613">Roshan K. Thomas</author>
<author pid="43/4123">Giovanni Russello</author>
<author pid="43/977">Simon Tsang</author>
<title>Realizing the CDL Cross-Domain Language in the Ponder2 Policy Framework: Experiences and Research Directions.</title>
<pages>76-83</pages>
<year>2009</year>
<booktitle>POLICY</booktitle>
<ee>https://doi.org/10.1109/POLICY.2009.38</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/POLICY.2009.38</ee>
<crossref>conf/policy/2009</crossref>
<url>db/conf/policy/policy2009.html#ThomasRT09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isips/ThomasSBAX08" mdate="2017-05-24">
<author pid="09/613">Roshan K. Thomas</author>
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<author pid="b/ElisaBertino">Elisa Bertino</author>
<author pid="b/IBudakArpinar">Ismailcem Budak Arpinar</author>
<author pid="78/2715">Shouhuai Xu</author>
<title>Privacy-Preserving Accountable Accuracy Management Systems (PAAMS).</title>
<pages>115-121</pages>
<year>2008</year>
<booktitle>ISIPS</booktitle>
<ee>https://doi.org/10.1007/978-3-642-10233-2_11</ee>
<crossref>conf/isips/2008</crossref>
<url>db/conf/isips/isips2008.html#ThomasSBAX08</url>
</inproceedings>
</r>
<r><article key="journals/jcs/ZouridakiMHT07" mdate="2023-08-28">
<author pid="68/945">Charikleia Zouridaki</author>
<author pid="60/2817">Brian L. Mark</author>
<author pid="78/5490">Marek Hejmo</author>
<author pid="09/613">Roshan K. Thomas</author>
<title>Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs.</title>
<pages>3-38</pages>
<year>2007</year>
<volume>15</volume>
<journal>J. Comput. Secur.</journal>
<number>1</number>
<ee>https://doi.org/10.3233/jcs-2007-15102</ee>
<ee>https://www.wikidata.org/entity/Q114943976</ee>
<url>db/journals/jcs/jcs15.html#ZouridakiMHT07</url>
</article>
</r>
<r><inproceedings key="conf/expcs/MirkovicHWFRTYS07" mdate="2022-10-02">
<author pid="89/6100">Jelena Mirkovic</author>
<author pid="13/2327">Alefiya Hussain</author>
<author pid="54/2345">Brett Wilson</author>
<author orcid="0000-0003-2870-7166" pid="f/SoniaFahmy">Sonia Fahmy</author>
<author pid="r/PLReiher">Peter L. Reiher</author>
<author pid="09/613">Roshan K. Thomas</author>
<author pid="49/4881">Wei-Min Yao</author>
<author orcid="0000-0002-4305-9454" pid="83/3126">Stephen Schwab</author>
<title>Towards user-centric metrics for denial-of-service measurement.</title>
<pages>8</pages>
<year>2007</year>
<booktitle>Experimental Computer Science</booktitle>
<ee>https://doi.org/10.1145/1281700.1281708</ee>
<crossref>conf/expcs/2007</crossref>
<url>db/conf/expcs/expcs2007.html#MirkovicHWFRTYS07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sigmetrics/MirkovicHWFYRST07" mdate="2022-10-02">
<author pid="89/6100">Jelena Mirkovic</author>
<author orcid="0000-0002-4944-8338" pid="13/2327">Alefiya Hussain</author>
<author pid="54/2345">Brett Wilson</author>
<author orcid="0000-0003-2870-7166" pid="f/SoniaFahmy">Sonia Fahmy</author>
<author pid="49/4881">Wei-Min Yao</author>
<author pid="r/PLReiher">Peter L. Reiher</author>
<author orcid="0000-0002-4305-9454" pid="83/3126">Stephen Schwab</author>
<author pid="09/613">Roshan K. Thomas</author>
<title>When is service really denied?: a user-centric dos metric.</title>
<pages>357-358</pages>
<year>2007</year>
<crossref>conf/sigmetrics/2007</crossref>
<booktitle>SIGMETRICS</booktitle>
<ee>https://doi.org/10.1145/1254882.1254928</ee>
<ee>https://doi.org/10.1145/1269899.1254928</ee>
<url>db/conf/sigmetrics/sigmetrics2007.html#MirkovicHWFYRST07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tridentcom/MirkovicWHWTSFC07" mdate="2021-05-19">
<author pid="89/6100">Jelena Mirkovic</author>
<author pid="09/2496">Songjie Wei</author>
<author pid="13/2327">Alefiya Hussain</author>
<author pid="54/2345">Brett Wilson</author>
<author pid="09/613">Roshan K. Thomas</author>
<author pid="83/3126">Stephen Schwab</author>
<author orcid="0000-0003-2870-7166" pid="f/SoniaFahmy">Sonia Fahmy</author>
<author pid="06/815">Roman Chertov</author>
<author pid="r/PLReiher">Peter L. Reiher</author>
<title>DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed.</title>
<pages>1-7</pages>
<year>2007</year>
<booktitle>TRIDENTCOM</booktitle>
<ee>https://doi.org/10.1109/TRIDENTCOM.2007.4444680</ee>
<ee>http://eudl.eu/doi/10.1109/TRIDENTCOM.2007.4444680</ee>
<crossref>conf/tridentcom/2007</crossref>
<url>db/conf/tridentcom/tridentcom2007.html#MirkovicWHWTSFC07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/MirkovicFRT07" mdate="2021-02-01">
<author pid="89/6100">Jelena Mirkovic</author>
<author pid="f/SoniaFahmy">Sonia Fahmy</author>
<author pid="r/PLReiher">Peter L. Reiher</author>
<author pid="09/613">Roshan K. Thomas</author>
<title>Automating DDoS Experimentation.</title>
<year>2007</year>
<booktitle>DETER</booktitle>
<ee type="oa">https://www.usenix.org/conference/deter-2007/automating-ddos-experimentation</ee>
<crossref>conf/uss/2007deter</crossref>
<url>db/conf/uss/deter2007.html#MirkovicFRT07</url>
</inproceedings>
</r>
<r><article key="journals/tvt/HejmoMZT06" mdate="2024-10-06">
<author pid="78/5490">Marek Hejmo</author>
<author orcid="0000-0002-4030-5592" pid="60/2817">Brian L. Mark</author>
<author pid="68/945">Charikleia Zouridaki</author>
<author pid="09/613">Roshan K. Thomas</author>
<title>Design and analysis of a denial-of-service-resistant quality-of-service signaling protocol for MANETs.</title>
<pages>743-751</pages>
<year>2006</year>
<volume>55</volume>
<journal>IEEE Trans. Veh. Technol.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/TVT.2006.873834</ee>
<url>db/journals/tvt/tvt55.html#HejmoMZT06</url>
</article>
</r>
<r><inproceedings key="conf/ccs/MirkovicRFTHSK06" mdate="2022-10-02">
<author pid="89/6100">Jelena Mirkovic</author>
<author pid="r/PLReiher">Peter L. Reiher</author>
<author orcid="0000-0003-2870-7166" pid="f/SoniaFahmy">Sonia Fahmy</author>
<author pid="09/613">Roshan K. Thomas</author>
<author pid="13/2327">Alefiya Hussain</author>
<author orcid="0000-0002-4305-9454" pid="83/3126">Stephen Schwab</author>
<author pid="54/1747">Calvin Ko</author>
<title>Measuring denial Of service.</title>
<pages>53-58</pages>
<year>2006</year>
<booktitle>QoP</booktitle>
<ee>https://doi.org/10.1145/1179494.1179506</ee>
<crossref>conf/ccs/2006qop</crossref>
<url>db/conf/ccs/qop2006.html#MirkovicRFTHSK06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/qshine/HejmoMZT06" mdate="2024-10-06">
<author pid="78/5490">Marek Hejmo</author>
<author orcid="0000-0002-4030-5592" pid="60/2817">Brian L. Mark</author>
<author pid="68/945">Charikleia Zouridaki</author>
<author pid="09/613">Roshan K. Thomas</author>
<title>On the fairness of flow aggregation for denial-of-service resistant QoS in MANETs.</title>
<pages>54</pages>
<year>2006</year>
<booktitle>QSHINE</booktitle>
<ee>https://doi.org/10.1145/1185373.1185443</ee>
<ee>http://eudl.eu/doi/10.1145/1185373.1185443</ee>
<crossref>conf/qshine/2006</crossref>
<url>db/conf/qshine/qshine2006.html#HejmoMZT06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sasn/ZouridakiMHT06" mdate="2024-10-06">
<author pid="68/945">Charikleia Zouridaki</author>
<author orcid="0000-0002-4030-5592" pid="60/2817">Brian L. Mark</author>
<author pid="78/5490">Marek Hejmo</author>
<author pid="09/613">Roshan K. Thomas</author>
<title>Robust cooperative trust establishment for MANETs.</title>
<pages>23-34</pages>
<year>2006</year>
<crossref>conf/sasn/2006</crossref>
<booktitle>SASN</booktitle>
<ee>https://doi.org/10.1145/1180345.1180349</ee>
<url>db/conf/sasn/sasn2006.html#ZouridakiMHT06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/qshine/HejmoMZT05" mdate="2024-10-06">
<author pid="78/5490">Marek Hejmo</author>
<author orcid="0000-0002-4030-5592" pid="60/2817">Brian L. Mark</author>
<author pid="68/945">Charikleia Zouridaki</author>
<author pid="09/613">Roshan K. Thomas</author>
<title>A Denial-of-Service Resistant Quality-of-Service Signaling Protocol for Mobile Ad Hoc Networks.</title>
<pages>32</pages>
<year>2005</year>
<crossref>conf/qshine/2005</crossref>
<booktitle>QSHINE</booktitle>
<ee>https://doi.org/10.1109/QSHINE.2005.1</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/QSHINE.2005.1</ee>
<ee>http://eudl.eu/doi/10.1109/QSHINE.2005.1</ee>
<url>db/conf/qshine/qshine2005.html#HejmoMZT05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sasn/ZouridakiMHT05" mdate="2024-10-06">
<author pid="68/945">Charikleia Zouridaki</author>
<author orcid="0000-0002-4030-5592" pid="60/2817">Brian L. Mark</author>
<author pid="78/5490">Marek Hejmo</author>
<author pid="09/613">Roshan K. Thomas</author>
<title>A quantitative trust establishment framework for reliable data packet delivery in MANETs.</title>
<pages>1-10</pages>
<year>2005</year>
<crossref>conf/sasn/2005</crossref>
<booktitle>SASN</booktitle>
<ee>https://doi.org/10.1145/1102219.1102222</ee>
<url>db/conf/sasn/sasn2005.html#ZouridakiMHT05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wis/ZouridakiHMTG05" mdate="2005-07-26">
<author pid="68/945">Charikleia Zouridaki</author>
<author pid="78/5490">Marek Hejmo</author>
<author pid="60/2817">Brian L. Mark</author>
<author pid="09/613">Roshan K. Thomas</author>
<author pid="02/1286">Kris Gaj</author>
<title>Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs.</title>
<pages>61-70</pages>
<year>2005</year>
<crossref>conf/wis/2005</crossref>
<booktitle>Wireless Information Systems</booktitle>
<url>db/conf/wis/wis2005.html#ZouridakiHMTG05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/europki/ZouridakiMGT04" mdate="2017-05-19">
<author pid="68/945">Charikleia Zouridaki</author>
<author pid="60/2817">Brian L. Mark</author>
<author pid="02/1286">Kris Gaj</author>
<author pid="09/613">Roshan K. Thomas</author>
<title>Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography.</title>
<pages>232-245</pages>
<ee>https://doi.org/10.1007/978-3-540-25980-0_19</ee>
<year>2004</year>
<crossref>conf/europki/2004</crossref>
<booktitle>EuroPKI</booktitle>
<url>db/conf/europki/europki2004.html#ZouridakiMGT04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/percom/ThomasS04" mdate="2023-03-24">
<author pid="09/613">Roshan K. Thomas</author>
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<title>Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions.</title>
<pages>164-170</pages>
<year>2004</year>
<crossref>conf/percom/2004w</crossref>
<booktitle>PerCom Workshops</booktitle>
<ee>https://doi.org/10.1109/PERCOMW.2004.1276925</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/PERCOMW.2004.1276925</ee>
<url>db/conf/percom/percomw2004.html#ThomasS04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/policy/ThomasS04" mdate="2023-03-23">
<author pid="09/613">Roshan K. Thomas</author>
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<title>Towards a Multi-dimensional Characterization of Dissemination Control.</title>
<pages>197-200</pages>
<year>2004</year>
<crossref>conf/policy/2004</crossref>
<booktitle>POLICY</booktitle>
<ee>https://doi.org/10.1109/POLICY.2004.1309168</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/POLICY.2004.1309168</ee>
<url>db/conf/policy/policy2004.html#ThomasS04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sasn/HejmoMZT04" mdate="2018-11-06">
<author pid="78/5490">Marek Hejmo</author>
<author pid="60/2817">Brian L. Mark</author>
<author pid="68/945">Charikleia Zouridaki</author>
<author pid="09/613">Roshan K. Thomas</author>
<title>Denial-of-service resistant quality-of-service signaling for mobile ad hoc networks.</title>
<pages>23-28</pages>
<year>2004</year>
<crossref>conf/sasn/2004</crossref>
<booktitle>SASN</booktitle>
<ee>https://doi.org/10.1145/1029102.1029108</ee>
<url>db/conf/sasn/sasn2004.html#HejmoMZT04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/secon/ZaidiMT04" mdate="2017-05-24">
<author pid="22/50">Zainab R. Zaidi</author>
<author pid="60/2817">Brian L. Mark</author>
<author pid="09/613">Roshan K. Thomas</author>
<title>A two-tier representation of node mobility in ad hoc networks.</title>
<pages>153-161</pages>
<year>2004</year>
<booktitle>SECON</booktitle>
<ee>https://doi.org/10.1109/SAHCN.2004.1381913</ee>
<crossref>conf/secon/2004</crossref>
<url>db/conf/secon/secon2004.html#ZaidiMT04</url>
</inproceedings>
</r>
<r><article key="journals/ieeemm/ChangPCT03" mdate="2020-03-13">
<author pid="c/ShiKuoChang">Shi-Kuo Chang</author>
<author orcid="0000-0002-8496-2658" pid="97/3702">Giuseppe Polese</author>
<author pid="84/2670">Maurizio Cibelli</author>
<author pid="09/613">Roshan K. Thomas</author>
<title>Visual Authorization Modeling in E-commerce Applications.</title>
<pages>44-54</pages>
<year>2003</year>
<volume>10</volume>
<journal>IEEE Multim.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/MMUL.2003.1167921</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MMUL.2003.1167921</ee>
<url>db/journals/ieeemm/ieeemm10.html#ChangPCT03</url>
</article>
</r>
<r><inproceedings key="conf/discex/ThomasMJC03" mdate="2023-03-23">
<author pid="09/613">Roshan K. Thomas</author>
<author pid="60/2817">Brian L. Mark</author>
<author pid="11/5035">Tommy Johnson</author>
<author pid="14/1758">James Croall</author>
<title>NetBouncer: Client-legitimacy-based High-performance DDoS Filtering.</title>
<pages>14-25</pages>
<year>2003</year>
<crossref>conf/discex/2003</crossref>
<booktitle>DISCEX (1)</booktitle>
<ee>https://doi.org/10.1109/DISCEX.2003.1194869</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/DISCEX.2003.1194869</ee>
<url>db/conf/discex/discex2003.html#ThomasMJC03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/discex/ThomasZHJ03" mdate="2023-03-23">
<author pid="09/613">Roshan K. Thomas</author>
<author pid="55/521">Hong Zhu</author>
<author pid="89/5832">Tim Huck</author>
<author pid="11/5035">Tommy Johnson</author>
<title>NetBouncer: Client-legitimacy-based High-performance DDoS Filtering.</title>
<pages>111</pages>
<year>2003</year>
<crossref>conf/discex/2003</crossref>
<booktitle>DISCEX (2)</booktitle>
<ee>https://doi.org/10.1109/DISCEX.2003.1194939</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/DISCEX.2003.1194939</ee>
<url>db/conf/discex/discex2003.html#ThomasZHJ03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/CohenTWS02" mdate="2018-11-06">
<author pid="89/3234">Eve Cohen</author>
<author pid="09/613">Roshan K. Thomas</author>
<author pid="45/6818">William H. Winsborough</author>
<author pid="37/3851">Deborah Shands</author>
<title>Models for coalition-based access control (CBAC).</title>
<pages>97-106</pages>
<year>2002</year>
<crossref>conf/sacmat/2002</crossref>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/507711.507727</ee>
<url>db/conf/sacmat/sacmat2002.html#CohenTWS02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/GeorgiadisMPT01" mdate="2021-10-14">
<author orcid="0000-0003-0897-9009" pid="43/5243">Christos K. Georgiadis</author>
<author pid="33/6741">Ioannis Mavridis</author>
<author pid="81/1168">George Pangalos</author>
<author pid="09/613">Roshan K. Thomas</author>
<title>Flexible team-based access control using contexts.</title>
<pages>21-27</pages>
<year>2001</year>
<crossref>conf/sacmat/2001</crossref>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/373256.373259</ee>
<url>db/conf/sacmat/sacmat2001.html#GeorgiadisMPT01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/McCollumFHST97" mdate="2002-10-24">
<author pid="76/2160">Catherine D. McCollum</author>
<author pid="46/4674">Donald B. Faatz</author>
<author pid="48/5773">William R. Herndon</author>
<author pid="47/4853">E. John Sebes</author>
<author pid="09/613">Roshan K. Thomas</author>
<title>Distributed Object Technologies, Databases and Security.</title>
<pages>17-31</pages>
<year>1997</year>
<crossref>conf/dbsec/1997</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec97.html#McCollumFHST97</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/ThomasS97" mdate="2002-10-24">
<author pid="09/613">Roshan K. Thomas</author>
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<title>Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management.</title>
<pages>166-181</pages>
<year>1997</year>
<crossref>conf/dbsec/1997</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec97.html#ThomasS97</url>
</inproceedings>
</r>
<r><inproceedings key="conf/rbac/Thomas97" mdate="2018-11-06">
<author pid="09/613">Roshan K. Thomas</author>
<title>Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments.</title>
<pages>13-19</pages>
<year>1997</year>
<crossref>conf/rbac/1997</crossref>
<booktitle>ACM Workshop on Role-Based Access Control</booktitle>
<ee>https://doi.org/10.1145/266741.266748</ee>
<url>db/conf/rbac/rbac1997.html#Thomas97</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vl/ChangPTD97" mdate="2023-03-23">
<author pid="c/ShiKuoChang">Shi-Kuo Chang</author>
<author pid="97/3702">Giuseppe Polese</author>
<author pid="09/613">Roshan K. Thomas</author>
<author pid="19/2460">Souvik Das</author>
<title>A Visual Language for Authorization Modeling.</title>
<pages>110-118</pages>
<year>1997</year>
<crossref>conf/vl/1997</crossref>
<booktitle>VL</booktitle>
<url>db/conf/vl/vl97.html#ChangPTD97</url>
<ee>https://doi.org/10.1109/VL.1997.626565</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/VL.1997.626565</ee>
</inproceedings>
</r>
<r><article key="journals/tkde/ThomasS96" mdate="2017-05-20">
<author pid="09/613">Roshan K. Thomas</author>
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<title>A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases.</title>
<pages>16-31</pages>
<year>1996</year>
<volume>8</volume>
<journal>IEEE Trans. Knowl. Data Eng.</journal>
<number>1</number>
<url>db/journals/tkde/tkde8.html#ThomasS96</url>
<ee>https://doi.org/10.1109/69.485626</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/69.485626</ee>
<cdrom>TKDE8/k0016.pdf</cdrom>
<cite>...</cite>
<cite>...</cite>
<cite>...</cite>
<cite>journals/cacm/Denning76</cite>
<cite>journals/tois/FishmanBCCCDDHKLMNRS87</cite>
<cite>...</cite>
<cite>...</cite>
<cite>...</cite>
<cite>...</cite>
<cite>...</cite>
<cite>...</cite>
<cite>...</cite>
<cite>...</cite>
<cite>conf/oopsla/KimBCGWB88</cite>
<cite>conf/dbsec/Lunt89</cite>
<cite>conf/oopsla/MaierSOP86</cite>
<cite>books/mit/shriverW87/MaierS87</cite>
<cite>...</cite>
<cite>journals/tse/McCullough90</cite>
<cite>...</cite>
<cite>...</cite>
<cite>...</cite>
<cite>journals/computer/Sandhu93</cite>
<cite>...</cite>
<cite>...</cite>
<cite>...</cite>
<cite>...</cite>
<cite>...</cite>
</article>
</r>
<r><inproceedings key="conf/dbsec/ThomasBSBHST95" mdate="2002-10-24">
<author pid="09/613">Roshan K. Thomas</author>
<author pid="b/ElisaBertino">Elisa Bertino</author>
<author pid="s/PSamarati">Pierangela Samarati</author>
<author pid="b/HHBruggemann">Hans Hermann Br&#252;ggemann</author>
<author pid="50/3231">Bret Hartman</author>
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<author pid="68/3337">T. C. Ting</author>
<title>Panel Discussion: Role-Based Access Control and Next-Generation Security Models.</title>
<pages>289-298</pages>
<year>1995</year>
<crossref>conf/dbsec/1995</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec95.html#ThomasBSBHST95</url>
</inproceedings>
</r>
<r><inproceedings key="conf/rbac/Thomas95" mdate="2018-11-06">
<author pid="09/613">Roshan K. Thomas</author>
<title>Role-based access control and distributed object-based enterprise computing.</title>
<year>1995</year>
<crossref>conf/rbac/1995</crossref>
<booktitle>ACM Workshop on Role-Based Access Control</booktitle>
<ee>https://doi.org/10.1145/270152.270194</ee>
<url>db/conf/rbac/rbac1995.html#Thomas95</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csfw/SandhuT94" mdate="2017-05-25">
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<author pid="09/613">Roshan K. Thomas</author>
<title>Conceptual Foundations for a Model of Task-based Authorizations.</title>
<year>1994</year>
<crossref>conf/csfw/1994</crossref>
<booktitle>CSFW</booktitle>
<url>db/conf/csfw/csfw1994.html#SandhuT94</url>
<pages>66-79</pages>
<ee>https://doi.org/10.1109/CSFW.1994.315946</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/ThomasS94" mdate="2017-05-20">
<author pid="09/613">Roshan K. Thomas</author>
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<title>Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture.</title>
<pages>403-428</pages>
<year>1994</year>
<crossref>conf/esorics/1994</crossref>
<booktitle>ESORICS</booktitle>
<ee>https://doi.org/10.1007/3-540-58618-0_76</ee>
<url>db/conf/esorics/esorics1994.html#ThomasS94</url>
</inproceedings>
</r>
<r><article key="journals/jcs/ThomasS93" mdate="2023-08-28">
<author pid="09/613">Roshan K. Thomas</author>
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<title>A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up.</title>
<pages>231-275</pages>
<year>1993</year>
<volume>2</volume>
<journal>J. Comput. Secur.</journal>
<number>2-3</number>
<url>db/journals/jcs/jcs2.html#ThomasS93</url>
<ee>https://doi.org/10.3233/JCS-1993-22-309</ee>
<ee>https://www.wikidata.org/entity/Q114944578</ee>
</article>
</r>
<r><inproceedings key="conf/dbsec/ThomasS93" mdate="2002-01-03">
<author pid="09/613">Roshan K. Thomas</author>
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<title>Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Transactions in Multilevel databases.</title>
<pages>309-328</pages>
<year>1993</year>
<crossref>conf/dbsec/1993</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec93.html#ThomasS93</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nspw/ThomasS93" mdate="2018-11-06">
<author pid="09/613">Roshan K. Thomas</author>
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<title>Towards a task-based paradigm for flexible and adaptable access control in distributed applications.</title>
<pages>138-142</pages>
<year>1993</year>
<booktitle>NSPW</booktitle>
<ee>https://doi.org/10.1145/283751.283810</ee>
<crossref>conf/nspw/1993</crossref>
<url>db/conf/nspw/nspw1993.html#ThomasS93</url>
</inproceedings>
</r>
<r><inproceedings key="conf/oopsla/ThomasS93" mdate="2003-03-07">
<author pid="09/613">Roshan K. Thomas</author>
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<title>Concurrency, Synchronization, and Scheduling to Support High-Assurance Write-Up in Multilevel Object-Based Computing.</title>
<pages>218-228</pages>
<year>1993</year>
<crossref>conf/oopsla/1993w</crossref>
<booktitle>Security for Object-Oriented Systems</booktitle>
<url>db/conf/oopsla/oopsla1993w.html#ThomasS93</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/ThomasS92" mdate="2002-02-18">
<author pid="09/613">Roshan K. Thomas</author>
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<title>Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects.</title>
<pages>15-34</pages>
<year>1992</year>
<crossref>conf/dbsec/1992</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec92.html#ThomasS92</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csfw/SandhuTJ91" mdate="2017-05-25">
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<author pid="09/613">Roshan K. Thomas</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>A Secure Kernelized Architecture for Multiple Object-Oriented Databases.</title>
<pages>139-152</pages>
<year>1991</year>
<crossref>conf/csfw/1991</crossref>
<booktitle>CSFW</booktitle>
<url>db/conf/csfw/csfw1991.html#SandhuTJ91</url>
<ee>https://doi.org/10.1109/CSFW.1991.151580</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/SanhuTJ91" mdate="2002-02-15">
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<author pid="09/613">Roshan K. Thomas</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases.</title>
<pages>297-314</pages>
<year>1991</year>
<crossref>conf/dbsec/1991</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec91.html#SanhuTJ91</url>
</inproceedings>
</r>
<coauthors n="57" nc="7">
<co c="0"><na f="a/Arpinar:Ismailcem_Budak" pid="b/IBudakArpinar">Ismailcem Budak Arpinar</na></co>
<co c="0"><na f="b/Bertino:Elisa" pid="b/ElisaBertino">Elisa Bertino</na></co>
<co c="0" n="2"><na f="b/Bobba:Rakesh" pid="115/7959">Rakesh Bobba</na><na>Rakesh B. Bobba</na></co>
<co c="0"><na f="b/Br=uuml=ggemann:Hans_Hermann" pid="b/HHBruggemann">Hans Hermann Br&#252;ggemann</na></co>
<co c="0"><na f="c/C=aacute=rdenas:Alvaro_A=" pid="48/6119">Alvaro A. C&#225;rdenas</na></co>
<co c="2"><na f="c/Chang:Shi=Kuo" pid="c/ShiKuoChang">Shi-Kuo Chang</na></co>
<co c="1"><na f="c/Chertov:Roman" pid="06/815">Roman Chertov</na></co>
<co c="2"><na f="c/Cibelli:Maurizio" pid="84/2670">Maurizio Cibelli</na></co>
<co c="0"><na f="c/Cohen:Eve" pid="89/3234">Eve Cohen</na></co>
<co c="1"><na f="c/Croall:James" pid="14/1758">James Croall</na></co>
<co c="2"><na f="d/Das:Souvik" pid="19/2460">Souvik Das</na></co>
<co c="0"><na f="f/Faatz:Donald_B=" pid="46/4674">Donald B. Faatz</na></co>
<co c="1"><na f="f/Fahmy:Sonia" pid="f/SoniaFahmy">Sonia Fahmy</na></co>
<co c="1"><na f="g/Gaj:Kris" pid="02/1286">Kris Gaj</na></co>
<co c="5"><na f="g/Georgiadis:Christos_K=" pid="43/5243">Christos K. Georgiadis</na></co>
<co c="0"><na f="h/Hahn:Adam" pid="44/10653">Adam Hahn</na></co>
<co c="4"><na f="h/Hardy:Rommie_L=" pid="12/1379">Rommie L. Hardy</na></co>
<co c="0"><na f="h/Hartman:Bret" pid="50/3231">Bret Hartman</na></co>
<co c="3"><na f="h/Heckman:Kristin_E=" pid="23/10596">Kristin E. Heckman</na></co>
<co c="1"><na f="h/Hejmo:Marek" pid="78/5490">Marek Hejmo</na></co>
<co c="0"><na f="h/Herndon:William_R=" pid="48/5773">William R. Herndon</na></co>
<co c="1"><na f="h/Huck:Tim" pid="89/5832">Tim Huck</na></co>
<co c="1"><na f="h/Hussain:Alefiya" pid="13/2327">Alefiya Hussain</na></co>
<co c="0"><na f="j/Jajodia:Sushil" pid="j/SushilJajodia">Sushil Jajodia</na></co>
<co c="1"><na f="j/Johnson:Tommy" pid="11/5035">Tommy Johnson</na></co>
<co c="4"><na f="k/Kim:Jinsub" pid="57/7954">Jinsub Kim</na></co>
<co c="1"><na f="k/Ko:Calvin" pid="54/1747">Calvin Ko</na></co>
<co c="0"><na f="l/Lozano:Ivan" pid="124/0345">Ivan Lozano</na></co>
<co c="1"><na f="m/Mark:Brian_L=" pid="60/2817">Brian L. Mark</na></co>
<co c="5"><na f="m/Mavridis:Ioannis" pid="33/6741">Ioannis Mavridis</na></co>
<co c="0"><na f="m/McCollum:Catherine_D=" pid="76/2160">Catherine D. McCollum</na></co>
<co c="1"><na f="m/Mirkovic:Jelena" pid="89/6100">Jelena Mirkovic</na></co>
<co c="5"><na f="p/Pangalos:George" pid="81/1168">George Pangalos</na></co>
<co c="2"><na f="p/Polese:Giuseppe" pid="97/3702">Giuseppe Polese</na></co>
<co c="0"><na f="r/Ray:Indrajit" pid="r/IndrajitRay">Indrajit Ray</na></co>
<co c="1"><na f="r/Reiher:Peter_L=" pid="r/PLReiher">Peter L. Reiher</na></co>
<co c="6"><na f="r/Russello:Giovanni" pid="43/4123">Giovanni Russello</na></co>
<co c="0"><na f="s/Samarati:Pierangela" pid="s/PSamarati">Pierangela Samarati</na></co>
<co c="0"><na f="s/Sandhu:Ravi_S=" pid="s/RaviSSandhu">Ravi S. Sandhu</na></co>
<co c="3"><na f="s/Schmoker:Ben_S=" pid="161/7854">Ben S. Schmoker</na></co>
<co c="1"><na f="s/Schwab:Stephen" pid="83/3126">Stephen Schwab</na></co>
<co c="0"><na f="s/Sebes:E=_John" pid="47/4853">E. John Sebes</na></co>
<co c="0"><na f="s/Shands:Deborah" pid="37/3851">Deborah Shands</na></co>
<co c="3"><na f="s/Stech:Frank_J=" pid="04/10598">Frank J. Stech</na></co>
<co c="4"><na f="s/Sterne:Dan" pid="39/7957">Dan Sterne</na></co>
<co c="0"><na f="t/Ting:T=_C=" pid="68/3337">T. C. Ting</na></co>
<co c="4"><na f="t/Tong_0001:Lang" pid="92/1653-1">Lang Tong 0001</na></co>
<co c="6"><na f="t/Tsang:Simon" pid="43/977">Simon Tsang</na></co>
<co c="3"><na f="t/Tsow:Alexander_W=" pid="179/0204">Alexander W. Tsow</na></co>
<co c="1"><na f="w/Wei:Songjie" pid="09/2496">Songjie Wei</na></co>
<co c="1"><na f="w/Wilson:Brett" pid="54/2345">Brett Wilson</na></co>
<co c="0"><na f="w/Winsborough:William_H=" pid="45/6818">William H. Winsborough</na></co>
<co c="0"><na f="x/Xu:Shouhuai" pid="78/2715">Shouhuai Xu</na></co>
<co c="1"><na f="y/Yao:Wei=Min" pid="49/4881">Wei-Min Yao</na></co>
<co c="1"><na f="z/Zaidi:Zainab_R=" pid="22/50">Zainab R. Zaidi</na></co>
<co c="1"><na f="z/Zhu:Hong" pid="55/521">Hong Zhu</na></co>
<co c="1"><na f="z/Zouridaki:Charikleia" pid="68/945">Charikleia Zouridaki</na></co>
</coauthors>
</dblpperson>

