Publications

Patents

  • Auditable Multi-claim Security Token. U.S. Patent 9,038,155, May 19, 2015. Inventors: R. Gamble and R. Baird.

2011-Present

  • The Influence of Commenting Validity, Placement, and Style on Perceptions of Computer Code Trustworthiness: A Heuristic-Systematic Processing Approach, G.M. Alarcon, R.F. Gamble, C. Walter, S.A. Jessup, and T.J. Ryan, Applied Ergonomics, vol. 70, pp. 182-193, 2018, https://doi.org/10.1016/j.apergo.2018.02.027.
  • MTL Robustness for Path Planning with A*, S. Alqahtani, I. Riley, S. Taylor, R. Gamble, and R. Mailler, to appear in the Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS), July 2018.
  • Toward Evaluating the Impact of Self-adaptation on Security Control Certification, A. Marshall, S. Jahan, and R. Gamble, to appear in the Proceedings of the 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), May 2018.
  • Task allocation in Imperfect, Adversarial Environments using a QuadTree and Flow network, S. Alqahtani, I. Riley, S. Taylor, R. Gamble, and R. Mailler, to appear in the Proceedings of the International Conference on Unmanned Aircraft Systems, June 2018.
  • Employing the SI Network Model to Evaluate Network Propagation in Bluetooth MANETs, I. Riley and R. Gamble, to appear in the Proceedings of the IEEE International Congress on Internet of Things, July 2018.
  • Augmentation of Services with Semantic Meta-information in the Physical Web, A. Marshall, X. He, and R. Gamble, to appear in the Proceedings of the IEEE ICC 2018 Workshop – 3rd workshop on Convergent Internet of Things (C-IoT), May 2018.
  • Assessing the Risk of an Adaptation using Prior Compliance Verification,” A. Marshall, S. Jahan, and R. Gamble, in the Proceedings of the 51st Hawaii International Conference on System Sciences, Jan. 3-6, 2018.
  • Securing Wearables through the Creation of a Personal Fog, C. Walter, I. Riley, and R. Gamble, in the Proceedings of the 51st Hawaii International Conference on System Sciences, nominated for Best Paper Award (top 10%), Jan. 2018.
  • Semantic Hierarchies for Extracting, Modeling, and Connecting Compliance Requirements in Information Security Control Standards, M. Hale and R. Gamble, Requirements Engineering, pp. 1-38, Dec. 2017, https://doi.org/10.1007/s00766-017-0287-5.
  • Verifying the Detection Results of Impersonation Attacks in Service Clouds, S. Alqahtani and R.F. Gamble, Advances in Science, Technology, and Engineering Systems, 2(3): 449-459, 2017, DOI: 10.25046/aj020358.
  • Application of the Heuristic-Systematic Model to Computer Code Trustworthiness: The Influence of Reputation and Transparency, G.M. Alarcon, R. Gamble, S.A. Jessup, C. Walter, T.J. Ryan, D.W. Wood, and C.S. Calhoun, Cogent Psychology, 2017, https://doi.org/10.1080/23311908.2017.1389640/
  • Embedding Verification Concerns in Self-Adaptive System Code, S. Jahan, A. Marshall, and R. Gamble, in the Proceedings of the 11th IEEE International Conference on Self-Adaptive and Self-Organizing Systems, Tucson, AZ, Sept. 2017.
  • Visualizing Self-Adaptive Plan Simulations given Embedded Verification Concerns, S. Jahan, A. Marshall, and R. Gamble, in the Proceedings of the11th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (Demo Track), Tucson, AZ, Sept. 2017.
  • Adapting Compliance of Security Requirements in Multi-Tenant Applications, S. Alqahtani, X. He, and R. Gamble, in the Proceedings of the 4th International Workshop on Self-Improving System Integration, Tucson, AZ, Sept. 2017.
  • Talent Generation for Vehicle Cyber Security, J. Daily, U. Jonson, and R. Gamble, n the Proceedings of the5th Embedded Security in Cars Conference, June 2017.
  • Toward Predicting Secure Environments for Wearable Devices, C. Walter, I. Riley, X. He, E. Robards, E., and R.F. Gamble, in the Proceedings of the 50th Hawaii International Conference on System Sciences, nominated for Best Paper Award (top 10%), Jan. 2017.
  • Developing a Mechanism to Study Code Trustworthiness, C. Walter, R.F. Gamble, G.M. Alarcon, S.A. Jessup, and C. Calhoun, in the Proceedings of the 50th Hawaii International Conference on System Sciences, nominated for Best Paper Award (top 10%), Jan. 2017.
  • Practical DoS Attacks on Embedded Networks in Commercial Vehicles, S. Mukherjee, H. Shirazi, I. Ray, J. Daily, and R. Gamble, Lecture Notes in Computer Science, I. Ray, et al., eds., Vol. 10062, pp. 23-43, DOI: 10.1007/978-3-319-49806-5 2, Dec. 2016.
  • Towards a Cyber Assurance Testbed for Heavy Vehicle Electronic Controls, J. Daily, R. Gamble, S. Moffitt, C. Raines, J. Miran, I. Ray, S. Mukherjee, H. Shirazi, SAE Int. J. Commer. Veh., 9(2):339-349, 2016, doi:10.4271/2016-01-8142. Also appears in The Best of COMVEC 2016: Select technical papers from the SAE Commercial Vehicle Engineering Congress, pp. 69-80, Published by SAE International with a Product Code of PT-180, ISBN of 978-0-7680-8389-7 in a softbound binding, 9-24-2016.
  • Examining Collaboration among Student Teams relying on Web Applications to Coordinate Software Development, Brian Boyd, Ayden Townsley, Charles Walter, Callen Johnson, Rose Gamble, in the Proceedings of the 50th Hawaii International Conference on Systems Sciences, Jan. 2017.Mitigating Service Impersonation Attacks in Clouds, S. Alqahtani and R.F. Gamble, in the Proceedings of the Future Technologies Conference, Dec. 2016.
  • Configuring an Appropriate Team Environment to Satisfy Relevant Criteria, C. Walter, I. Riley, in the Proceedings of the 46th Frontiers in Education, Oct. 2016.
  • Imposing Security Awareness on Wearables, C. Walter, M.L. Hale, and R.F. Gamble, 2nd International Workshop on Software Engineering for Smart Cyber Physical Systems, May 2016.
  • Outcomes of Emotional Content from Agile Team Forum Posts, A. Marshall and R.F. Gamble, 1st International Workshop on Emotional Awareness in Software Engineering, May 2016.
  • Understanding how Member Influence Affects an Agile Software Development Team, A. Marshall and R. Gamble, 21st Frontiers in Education Conference, Oct. 2015.
  • Combining Coordination with Usage Policies to Improve Mission Scheduling Resilience, A. Marshall, S. Alqahtani, A. Ridgway, C. Walter, R. Gamble, and R. Mailler, 3rd International Symposium on Resilient Cyber Systems, Aug. 2015.
  • Stream Processing with Secure Information Flow Constraints, I. Ray, R. Adaikkalavan, X. Xie, and R.F. Gamble, Lecture Notes in Computer Science, P. Samarati, ed., vol. 9149, pp. 311-329, Springer International Publishing, June 2015.
  • Measuring the Potential for Victimization in Malicious Content, M. Hale, R. Gamble, J. Hale, M. Haney, J. Lin, and C. Walter, 22nd IEEE International Conference on Web Services, June 2015.
  • SecuWear: An Open Source, Multi-component Hardware/Software Platform for Exploring Wearable Security, M. Hale, D. Ellis, R. Gamble, C. Walter, J. Lin, 4th IEEE International Conference on Mobile Systems, June 2015.
  • CyberPhishing: A Game-based Platform Phishing Awareness Testing, M. Hale, R. Gamble, and P. Gamble, 48th Annual Hawaii International Conference on System Sciences, January 2015.
  • DDoS Attacks in Service Clouds, S. Alqahtani and R. Gamble, 48th Annual Hawaii International Conference on System Sciences, January 2015.
  • Toward Increasing Awareness of Suspicious Content through Game Play, M. Hale and R. Gamble, IEEE World Congress on Services, pp. 113-120, 2014.
  • Embedding a Distributed Auditing Mechanism in the Service Cloud, S. Alqahtani and R. Gamble, IEEE World Congress on Services, pp. 69-76, 2014.
  • Enforcing the Chinese Wall Model for Tenant Conflict of Interest in the Service Cloud, S. Alqahtani, R. Gamble, and I. Ray, International Journal of Business Process Integration, Vol. 7, No. 2, pp. 166-177, 2014.
  • A Security Meta-Language for SOAP Messaging, R. Baird and R. Gamble, International Journal of Next-Generation Computing, vol. 5, no. 3, pp. 249-273, 2014.
  • R. Xie, R. Gamble, and N. Ahmed, Diagnosing Vulnerability Patterns in Cloud Audit Logs, in High Performance Cloud Auditing and Applications, K. Han, B.-Y. Choi and S. Song, Eds., Springer: New York, 2014, ISBN: 1461432952.
  • Introducing Replaceability into Web Service Composition, H. Al-Helal and R. Gamble, IEEE Transactions on Services Computing, Vol. 7, No. 2, pp. 198-209, 2014.
  • Auditing Requirements for Implementing the Chinese Wall Model in the Service Cloud, S. Alqahtani, R. Gamble, and I. Ray, Proceedings of the IEEE 9th World Congress on Services, pp. 298-305.
  • Analysis of End-to-End SOA Security Protocols with Mobile Devices, N. Ahmed, R. Gamble, M. Linderman, and B. Bhargava, International Workshop on Mobile Cloud Computing : Data, Management & Security, 2013.
  • An Architecture for Cross-Cloud Auditing of Service Cloud, R. Xie and R. Gamble, 8th Annual Cyber Security and Information Intelligence Research Workshop, 2013.
  • Assessing Individual Performance in Agile Teams, R. Gamble and M. Hale, 43rd Annual Frontiers in Education Conference, pp. 1678-1684, 2013.
  • Information Flow Control for Stream Processing in Clouds, X. Xie, I. Ray, R. Adaikkalavan, and R. Gamble, Symposium on Access Control Models and Technologies, 2013.
  • M. Hale, M.T. Gamble, and R. Gamble, A Design and Verification Framework for Service Composition in the Cloud, Proceedings of the IEEE Third International Workshop on Security and Privacy Engineering, 2013.
  • M. Hale and R. Gamble, Building a Compliance Vocabulary to Embed Security Controls in Cloud SLAs, Proceeding of the IEEE Third International Workshop on Formal Methods in Services and Cloud Computing, 2013.
  • M. Hale and R. Gamble, Risk Propagation of Security SLAs in the Cloud, Proceeding of the workshop on Management and Security technologies for Cloud Computing 2012, IEEE GLOBECOM, 2012.
  • R. Xie and R. Gamble, A Tiered Strategy for Auditing in the Cloud, 5th IEEE International Conference on Cloud Computing, 2012.
  • A. Andrekanic and R. Gamble, Architecting Web Service Attack Detection Handlers, 19th IEEE International Conference on Web Services, 2012.
  • M. Hale and R. Gamble, SecAgreement: Advancing Security Risk Calculations in Cloud Services, 8th IEEE World Congress on Services, 2012.
  • N. Jorgenson and R. Gamble, Client-Side Rendering of Collaborative Idea Networks, International Conference on Collaboration Technologies and Systems, 2012.

2006-2011

1992-2005

© SEAT 2015 Software Engineering Architecture Team Suffusion theme by Sayontan Sinha