Publications

2006-Present

  • CyberPhishing: A Game-based Platform Phishing Awareness Testing, M. Hale, R. Gamble, and P. Gamble, 48th Annual Hawaii International Conference on System Sciences, January 2015.
  • DDoS Attacks in Service Clouds, S. Alqahtani and R. Gamble, 48th Annual Hawaii International Conference on System Sciences, January 2015.
  • Toward Increasing Awareness of Suspicious Content through Game Play, M. Hale and R. Gamble, IEEE World Congress on Services, pp. 113-120, 2014.
  • Embedding a Distributed Auditing Mechanism in the Service Cloud, S. Alqahtani and R. Gamble, IEEE World Congress on Services, pp. 69-76, 2014.
  • Enforcing the Chinese Wall Model for Tenant Conflict of Interest in the Service Cloud, S. Alqahtani, R. Gamble, and I. Ray, International Journal of Business Process Integration, Vol. 7, No. 2, pp. 166-177, 2014.
  • A Security Meta-Language for SOAP Messaging, R. Baird and R. Gamble, International Journal of Next-Generation Computing, vol. 5, no. 3, pp. 249-273, 2014.
  • R. Xie, R. Gamble, and N. Ahmed, Diagnosing Vulnerability Patterns in Cloud Audit Logs, in High Performance Cloud Auditing and Applications, K. Han, B.-Y. Choi and S. Song, Eds., Springer: New York, 2014, ISBN: 1461432952.
  • Introducing Replaceability into Web Service Composition, H. Al-Helal and R. Gamble, IEEE Transactions on Services Computing, Vol. 7, No. 2, pp. 198-209, 2014.
  • Auditing Requirements for Implementing the Chinese Wall Model in the Service Cloud, S. Alqahtani, R. Gamble, and I. Ray, Proceedings of the IEEE 9th World Congress on Services, pp. 298-305.
  • Analysis of End-to-End SOA Security Protocols with Mobile Devices, N. Ahmed, R. Gamble, M. Linderman, and B. Bhargava, International Workshop on Mobile Cloud Computing : Data, Management & Security, 2013.
  • An Architecture for Cross-Cloud Auditing of Service Cloud, R. Xie and R. Gamble, 8th Annual Cyber Security and Information Intelligence Research Workshop, 2013.
  • Assessing Individual Performance in Agile Teams, R. Gamble and M. Hale, 43rd Annual Frontiers in Education Conference, pp. 1678-1684, 2013.
  • Information Flow Control for Stream Processing in Clouds, X. Xie, I. Ray, R. Adaikkalavan, and R. Gamble, Symposium on Access Control Models and Technologies, 2013.
  • M. Hale, M.T. Gamble, and R. Gamble, A Design and Verification Framework for Service Composition in the Cloud, Proceedings of the IEEE Third International Workshop on Security and Privacy Engineering, 2013.
  • M. Hale and R. Gamble, Building a Compliance Vocabulary to Embed Security Controls in Cloud SLAs, Proceeding of the IEEE Third International Workshop on Formal Methods in Services and Cloud Computing, 2013.
  • M. Hale and R. Gamble, Risk Propagation of Security SLAs in the Cloud, Proceeding of the workshop on Management and Security technologies for Cloud Computing 2012, IEEE GLOBECOM, 2012.
  • R. Xie and R. Gamble, A Tiered Strategy for Auditing in the Cloud, 5th IEEE International Conference on Cloud Computing, 2012.
  • A. Andrekanic and R. Gamble, Architecting Web Service Attack Detection Handlers, 19th IEEE International Conference on Web Services, 2012.
  • M. Hale and R. Gamble, SecAgreement: Advancing Security Risk Calculations in Cloud Services, 8th IEEE World Congress on Services, 2012.
  • N. Jorgenson and R. Gamble, Client-Side Rendering of Collaborative Idea Networks, International Conference on Collaboration Technologies and Systems, 2012.
  • Self-Adapting Workflow Reconfiguration, R. Baird, N. Jorgenson, and R. Gamble, Journal of Systems and Software, v. 84, pp. 510-524, 2011.
  • M. Hale, R. F. Gamble, K. S. Wilson, & A. Narayan, Collaborative Learning in Software Engineering Teams, in 17th Americas Conference on Information Systems, 2011.
  • F. Grove, N. Jorgenson, S. Sen, B. Brummel, and R. Gamble, Adapting Rewards to Encourage Creativity, in  Multi-Agent Systems for Education and Interactive Entertainment: Design, Use and Experience, M. Beer, M. Fasli, and D. Richards, eds., IGI Global, 2011.
  • N. Jorgenson, and R. Gamble,Self-Adapting Workflow Reconfiguration, R. Baird, Journal of Systems and Software, v. 84, pp. 510-524, 2011.
  • N. Jorgenson, M. Hale, and R. Gamble, SEREBRO: Facilitating Student Project Team Collaboration, 33rd International Conference on Software Engineering, 2011.
  • M. Hale, N. Jorgenson, and R. Gamble, Predicting Individual Performance in Student Project Teams, in Proceedings of the 24th Conference on Software Engineering Education and Training, 2011.
  • M.T. Gamble, R. Gamble, and M. Hale, Security Policy Foundations in Context UNITY, in Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011.
  • M. Young, B. Nienhaus, and R. Gamble, Abstraction, Uniformity, and Comparison of Security Management Policies, in Proceedings of the 2011 Security Conference, 2011.
  • M. Hale, N. Jorgenson, and R. Gamble, Analyzing the Role of Tags as Lightweight Traceability Links, in Proceedings for the 6th International Workshop on Traceability in Emerging Forms of Software Engineering, 2011.
  • R. Baird, R. Gamble, Developing a Security Meta-Language Framework, 44th Hawaii International Conference on System Sciences, 2011.
  • H. Al-Helal and R. Gamble, Web Service Composition with Dominance-based Filtering and Partial Unfolded Loops, in Proceedings of the International Conference on Genetic and Evolutionary Methods, 2010.
  • R. Baird and R. Gamble, Security Controls Applied to Web Service Architectures, International Conference on Software Engineering and Data Engineering (SEDE), 2010.
  • R. Baird and R. Gamble, Using Δ-Federations for On-Demand Crisis Situation Response, International Conference on Software Engineering and Data
    Engineering
    (SEDE), 2010.
  • J. Hosey and R. Gamble, Extracting Security Control Requirements, Cyber Security and Information Intelligence Research Workshop (CSIIRW), 2010.
  • R. Baird and R. Gamble, Reasoning about Policy Noncompliance, Cyber Security and Information Intelligence Research Workshop (CSIIRW), 2010.
  • C. Nelson, B. Brummel, D.F. Grove, N. Jorgenson, R. Gamble, and S. Sen, Measuring Creativity in Software Design, in the International Conference on Computational Creativity, 2010
  • M. Hepner, R. Baird, R. Gamble, Dynamically Changing Workflows of Web Services, 3rd International Workshop on Web Service Composition and Adaptation, July 2009.
  • R. Gamble, S. Sen, B. Brummel, F. Grove, N. Jorgenson, D. Guernsey, D. Hampton, D. Baker, and J. Hughes, The SEREBRO Project: Fostering Creativity through Collaboration and Rewards, Presented at EDUMas Workshop, part of 8th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009.
  • M.T. Gamble, R. Gamble, Monoliths to Mashups: Increasing Opportunistic Assets, IEEE Software, vol. 25, no. 6, pp. 71-79, Nov./Dec. 2008
  • R. Gamble, M. Smith, Moving toward “reality” in team selection for software engineering, Frontiers in Education, Oct. 2008.
  • R. Gamble, R. Baird, L. Flagg, and M. McClure, FACT: A Fusion Architecture with Contract Templates for Semantic and Syntactic Integration, IEEE International Conference on Information Reuse and Integration (IRI2008), 2008.
  • R. Baird, M. Hepner, N. Jorgenson, R. Gamble, Automating Preference and Change in Workflows, IEEE International Conference on Composition Based Software Systems, 2008 (ICCBSS’08).
  • M.T. Gamble, R. Gamble, Reasoning about Hybrid System of Systems Designs, IEEE International Conference on Composition Based Software Systems, 2008 (ICCBSS’08).
  • M.T. Gamble, R. Gamble, Isolation in Design Reuse, Journal of Software Process Improvement and Practice, Volume 13, Issue 2, Pages 145-156, Feb 2008.
  • M.T. Gamble, Reasoning about Isolation in Distribute System Design, Ph.D. Dissertation, Department of Computer Science, University of Tulsa, 2007.
  • R. Baird, Next Generation Workflow Toolkit (NeWT), M.S. Thesis, Department of Computer Science, University of Tulsa, 2007.
  • M. Hepner, Dynamic Changes To Workflow Instances of Web Services, Ph.D. Dissertation, Department of Mathematical and Computer Sciences, University of Tulsa, 2007.
  • M. Kelkar, Modeling Software Component Security Policies, Ph.D. Dissertation, Department of Mathematical and Computer Sciences, University of Tulsa, 2007.
  • M. Kelkar, R. Perry, R. Gamble, A. Walvekar, The Impact of Certification Criteria on Integrated COTS-Based Systems, IEEE International Conference on COTS-Based Software Systems, 2007 (ICCBSS’07).
  • M.T. Gamble, R.F. Gamble, Isolating Mechanisms in COTS-Based Systems, IEEE International Conference on COTS-Based Software Systems, 2007 (ICCBSS’07).
  • R. Baird, M. Hepner, R. Gamble and M. T. Gamble, Reconfiguring Workflows of Web Services, IEEE International Conference on COTS-Based Software Systems, 2007 (ICCBSS’07).
  • Melanie Smith, Toward Policy Based Logic For Secure Component Interaction, Masters Thesis, University of Tulsa, Oklahoma, 2006.
  • Amit Walvekar, ConPN: Detecting Conflicts in Interdomain Mappings, Masters Thesis, University of Tulsa, Oklahoma, 2006.
  • M. Hepner, M. T. Gamble, and R. Gamble, Forming a Security Certification Enclave for Service-Oriented Architectures, Modeling, Design, and Analysis for Service-oriented Architecture Workshop, 2006 (MDA4SOA’06).
  • M. Smith, M. Kelkar, R. Gamble, Examining Security Certification and Access Control Conflicts Using Deontic Logic, 1st International Workshop on Software Certification, 2006 (CERTSOFT’06).
  • A. Walvekar, M. Kelkar, M. Smith, R. Gamble, Determining Conflicts in Interdomain Mappings for Access Control, Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA’06), Seattle, August 15 – 16, 2006.
  • M. Hepner, M.T. Gamble, R. Gamble, Elevating Interaction Requirements for Web Service Integration, 1st International Workshop on Evaluation and Evolution of Component Composition, 2006 (EECC 2006).
  • M. Kelkar, M. Smith, R. Gamble, Interaction Partnering Criteria for COTS Components, 18th International Conference on Software Engineering and Knowledge Engineering, 2006 (SEKE 2006).
  • M. Hepner, R. Gamble, M. Kelkar, L. Davis, D. Flagg, Patterns of Conflict Among Software Components, Journal of Systems and Software, Volume 79, Issue 4, pp. 537-551, 2006.

1992-2005

© SEAT 2012 Software Engineering Architecture Team Suffusion theme by Sayontan Sinha