Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mathews Thomas is active.

Publication


Featured researches published by Mathews Thomas.


congress on evolutionary computation | 2003

Modeling of Web services flow

Johnson P. Thomas; Mathews Thomas; George Ghinea

Services such as automatic purchasing, automatic updating of prices, or getting latest information etc, can be provided on the Internet using Web services technology. A client can access these services using the Internet. Web services infrastructure includes some standards, such as simple object access protocol (SOAP), Web services description language (WSDL) and universal description, discovery and integration (UDDI). In this paper we represent distributed Web services by modeling the flow of messages and methods in a Web service transaction. Such a model assists the Web services designer to ensure the correctness of Web flows in terms of deadlock and correct termination of the Web services transaction. WSDL and methods are modeled using Petri Nets. A software tool is implemented for extracting the model from the WSDL description of the Web services flow.


international conference on e-business engineering | 2005

Enhancing Web services availability

Subil M. Abraham; Mathews Thomas; Johnson P. Thomas

Little work has been reported on highly available Web services which are essential for mission critical applications. In this paper we propose architecture for highly available Web services for mission critical applications. The central idea is the enhancement of Web services by the introduction of a central hub to increase the availability of Web services


trust security and privacy in computing and communications | 2012

Secure Sector Based Bi-path Clustering and Routing Protocol for WSNs

Yihong Zang; Johnson P. Thomas; Gheorghita Ghinea; Mathews Thomas; Salaheddin Darwish

Security and efficient routing are two important parameters in sensor networks. In this paper we propose SSBCR (Secured Sector Based Bi-path Clustering and Routing) protocol that takes both these two issues into consideration. It uses a bi-path routing algorithm to decrease the computational overhead as well as energy dissipation in the nodes. A key pre-distribution scheme is proposed such that nodes in the route share keys while those that are not in the route do not share keys with nodes that are in the route. Simulations have been done for both small and large areas, low and high density, on-route and non-route connectivity scenarios. Simulation results show that the proposed protocol not only provides security but also maximizes sensor network lifetime and achieves a high probability of connectivity, particularly when the network is large.


social computing behavioral modeling and prediction | 2010

Manipulation as a security mechanism in sensor networks

Ruiyi Zhang; Johnson P. Thomas; Qiurui Zhu; Mathews Thomas

Manipulation is used as a behavior mechanism to achieve a certain goal. In this paper we propose a framework for manipulation in sensor networks where an attacker is manipulated with a long term objective in view. In particular an approach for selecting manipulation nodes is presented. Results show that the proposed scheme improves the security of the network by allowing more of the network to operate normally even when under attack. A manipulation scheme for a Denial of Service attack is proposed. A prediction based scheme is used to drive the manipulation.


information assurance and security | 2010

Secure protocol for ad hoc transportation system

Johnson P. Thomas; Vinay Abburi; Mathews Thomas; Ajith Abraham

We define an ad hoc transportation system as one that has no infrastructure such as roads (and lanes), traffic lights etc. We assume that in such a system the vehicle are autonomic and can guide and direct themselves without a human driver. In this paper we investigate how a safe distance can be maintained between vehicles. A vehicle which has been compromised by an adversary can cause serious chaos and accidents in such a network (a denial of service type of attack). A simple key management scheme is then introduced to ensure secure communications between the components of the system.


ieee international conference on services computing | 2007

Information Discovery across Organizational Boundaries through Local Caching

Anuradha Gasikanti; Johnson P. Thomas; Mathews Thomas

There is a need for the creation of virtual organizations where services offered by one organization should become accessible to other organizations. The proposed model virtual service-oriented architecture, makes the information discovery process across organizations more flexible and efficient by introducing a cache registry. A Web services architecture is realized using the Websphere message broker and WAS servers. The proposed approach is compared with extended services oriented architecture. Results show that caching significantly improves the response time.


international conference on enterprise information systems | 2004

A Model-Driven Approach for Item Synchronization and Uccnet Integration in Large E-Commerce Enterprise Systems

Simon Cheng; Mathews Thomas; Santhosh Kumaran; Amaresh Rajasekharan; Frederick Y. Wu; Yiming Ye; Ying Huang

The pervasive connectivity of the Internet and the powerful architecture of the WWW are changing many market conventions and creating a tremendous opportunity for conducting business on the Internet. Digital marketplace business models and the advancement of Web related standards are tearing down walls within and between different business artifacts and entities at all granularities and at all levels, from devices, operating systems and middleware to directory, data, information, application, and finally the business processes. As a matter of fact, business process integration (BPI), which entails the integration of all the facets of business artifacts and entities, is emerging as a key IT challenge. In this paper, we describe our effort in exploring a new approach to address the complexities of BPI. More specifically, we study how to use a solution template based approach for BPI and explore the validity of this approach with a frequently encountered integration problem, the item synchronization problem for large enterprises. The proposed approach can greatly reduce the complexities of the business integration task and reduce the time and amount of effort of the system integrators. Different customers are deploying the described Item Synchronization system.


Archive | 2010

Dynamically optimized distributed cloud computing-based business process management (BPM) system

Joshua L. Purcell; Tassanee K. Supakkul; Mathews Thomas; Julio Wong


Archive | 2005

Method and system for enhancing user security and session persistence

Subil M. Abraham; Tam M. Cao; Jason A. Gonzalez; Adam A. Nemati; Mathews Thomas


Archive | 2004

Method and system to enhance web-based shopping collaborations

Subil M. Abraham; James P. Appleyard; Jason A. Gonzalez; Mathews Thomas

Researchain Logo
Decentralizing Knowledge