Julien A. Thomas

Learn More
In this paper, we investigate the use of Aspect-Oriented Programming (AOP) [13] in the domain of Mobile Ad-hoc NETworks (MANETs). More precisely we study the availability issues in Proac-tive routing protocols. This paper classifies the different possible attacks and examines the countermeasures to ensure availability. Our approach is based on a(More)
—In existing systems, information are protected by security models that control the accesses to the information, depending on their security level. In such systems, allowing accesses that were previously denied by diminishing the security level of the information is called downgrading. Controlling this downgrade of sensitive information is an important(More)
Single crystals of Meta nitro aniline (mNA), an Organic nonlinear optical (NLO) material, were grown by slow solvent evaporation technique at room temperature. Acetone was used as solvent. The mNA crystals obtained by the above technique were subjected to different characterization analyses. The lattice dimensions were determined from the single crystal(More)
In the literature, reputation systems are used to evaluate other entities behavior and have many applications such as, for instance, the detection of malicious entities. The associated models are based on mathematic formulae, in order to formaly dene elements such as the reputation evaluation and evolution and the reputation propagation between peers.(More)
—Standard multilevel security (MLS) policies lack flexibility as data classification is considered static. Previous works have addressed this issue and defined declassification requirements, especially in programming languages using a language-based security approach. In this paper, we suggest a different approach. We show how to define and enforce(More)
Many research works focused on modeling relational database management systems (DBMS) that support multilevel security (MLS) policies. However, most of these previous proposals only consider static aspects of relational databases and do not address dynamicity provided by mechanisms like triggers. Since such mechanisms introduced specific security problems,(More)
An optimal strategy for cascading phased-array deflectors is presented that allows for high-resolution random-access beam steering with continuous scan-angle control but requires a minimum number of control lines. The system is analyzed theoretically by use of a Fourier optics approach and then verified experimentally. A pair of 32-channel optical phased(More)
In the modern world, the information that could benefit the individual / a group also can be used against such individual or group. Encryption is the technique of converting a plaintext (original data packet) into cipher text (encrypted message) which can be decoded back into the original message. There are several types of data encryptions schemes(More)
Many research work focused on modeling relational database management systems (DBMS) that support multilevel security (MLS) policies. One issue in this context is the inference problem which occurs when it is possible to derive higher classified data from lower classified ones. This corresponds to situations where data is inconsistently classified. Research(More)
  • J Thomas, Joseph Prakash, L Ruby Nirmala
  • 2010
Bisthiourea Zinc Acetate (BTZA) a semi organic material has been synthesized by slow evaporation method using water as a solvent. The solubility studies have been carried out in aqueous solution in the temperature range 25˚C – 45˚C. Crystals have been grown from low temperature solution method by slow evaporation of saturated aqueous solution at room(More)
  • 1