default search action
Indrajit Ray
Person information
- affiliation: Colorado State University, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2022
- [b1]Carol S. Smidts, Indrajit Ray, Quanyan Zhu, Pavan Kumar Vaddi, Yunfei Zhao, Linan Huang, Xiaoxu Diao, Rakibul Talukdar, Michael C. Pietrykowski:
Cyber-Security Threats and Response Models in Nuclear Power Plants. Springer Briefs in Computer Science, Springer 2022, ISBN 978-3-031-12710-6, pp. 1-90
Journal Articles
- 2023
- [j41]Chirantan Ganguly, Indrajit Ray:
Simple Mediation in a Cheap-Talk Game. Games 14(3): 47 (2023) - [j40]Chirantan Ganguly, Indrajit Ray:
Information revelation and coordination using cheap talk in a game with two-sided private information. Int. J. Game Theory 52(4): 957-992 (2023) - 2021
- [j39]Bruhadeshwar Bezawada, Indrakshi Ray, Indrajit Ray:
Behavioral fingerprinting of Internet-of-Things devices. WIREs Data Mining Knowl. Discov. 11(1) (2021) - 2020
- [j38]Diptendu Mohan Kar, Indrajit Ray, Jenna Gallegos, Jean Peccoud, Indrakshi Ray:
Synthesizing DNA molecules with identity-based digital signatures to prevent malicious tampering and enabling source attribution. J. Comput. Secur. 28(4): 437-467 (2020) - [j37]Subhojeet Mukherjee, Jeffrey C. Van Etten, Namburi Rani Samyukta, Jacob Walker, Indrakshi Ray, Indrajit Ray:
TruckSTM: Runtime Realization of Operational State Transitions for Medium and Heavy Duty Vehicles. ACM Trans. Cyber Phys. Syst. 4(1): 4:1-4:25 (2020) - 2018
- [j36]Kirill Belyaev, Wuliang Sun, Indrakshi Ray, Indrajit Ray:
On the design and analysis of protocols for Personal Health Record storage on Personal Data Server devices. Future Gener. Comput. Syst. 80: 467-482 (2018) - [j35]Tarik Moataz, Indrajit Ray, Indrakshi Ray, Abdullatif Shikfa, Frédéric Cuppens, Nora Cuppens:
Substring search over encrypted data. J. Comput. Secur. 26(1): 1-30 (2018) - 2016
- [j34]Zinta S. Byrne, Kyla J. Dvorak, Janet M. Peters, Indrajit Ray, Adele E. Howe, Diana R. Sanchez:
From the user's perspective: Perceptions of risk relative to benefit associated with using the Internet. Comput. Hum. Behav. 59: 456-468 (2016) - [j33]Mikhail Strizhov, Zachary Osman, Indrajit Ray:
Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup. Future Internet 8(3): 28 (2016) - [j32]Awad A. Younis, Yashwant K. Malaiya, Indrajit Ray:
Assessing vulnerability exploitability risk using software properties. Softw. Qual. J. 24(1): 159-202 (2016) - [j31]Mikhail Strizhov, Indrajit Ray:
Secure Multi-keyword Similarity Search Over Encrypted Cloud Data Supporting Efficient Multi-user Setup. Trans. Data Priv. 9(2): 131-159 (2016) - 2014
- [j30]Hervé Moulin, Indrajit Ray, Sonali Sen Gupta:
Improving Nash by coarse correlation. J. Econ. Theory 150: 852-865 (2014) - 2013
- [j29]Indrajit Ray, Sonali Sen Gupta:
Coarse correlated equilibria in linear duopoly games. Int. J. Game Theory 42(2): 541-562 (2013) - [j28]Indrajit Ray, Kirill Belyaev, Mikhail Strizhov, Dieudonne Mulamba, Mariappan Rajaram:
Secure Logging as a Service - Delegating Log Management to the Cloud. IEEE Syst. J. 7(2): 323-334 (2013) - 2012
- [j27]Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
Utility driven optimization of real time data broadcast schedules. Appl. Soft Comput. 12(7): 1832-1846 (2012) - [j26]Rinku Dewri, Indrajit Ray, Nayot Poolsappasit, L. Darrell Whitley:
Optimal security hardening on attack tree models of networks: a cost-benefit analysis. Int. J. Inf. Sec. 11(3): 167-188 (2012) - [j25]Nayot Poolsappasit, Rinku Dewri, Indrajit Ray:
Dynamic Security Risk Management Using Bayesian Attack Graphs. IEEE Trans. Dependable Secur. Comput. 9(1): 61-74 (2012) - 2011
- [j24]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization. J. Comput. Secur. 19(5): 935-974 (2011) - [j23]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
k-Anonymization in the Presence of Publisher Preferences. IEEE Trans. Knowl. Data Eng. 23(11): 1678-1690 (2011) - 2010
- [j22]Anirban Kar, Indrajit Ray, Roberto Serrano:
A difficulty in implementing correlated equilibrium distributions. Games Econ. Behav. 69(1): 189-193 (2010) - [j21]Tristan Allard, Nicolas Anciaux, Luc Bouganim, Yanli Guo, Lionel Le Folgoc, Benjamin Nguyen, Philippe Pucheral, Indrajit Ray, Indrakshi Ray, Shaoyi Yin:
Secure Personal Data Servers: a Vision Paper. Proc. VLDB Endow. 3(1): 25-35 (2010) - [j20]Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
Real time stochastic scheduling in broadcast systems with decentralized data storage. Real Time Syst. 45(3): 143-175 (2010) - [j19]Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray, Sudip Chakraborty:
Trust-Based Security Level Evaluation Using Bayesian Belief Networks. Trans. Comput. Sci. 10: 154-186 (2010) - 2009
- [j18]Silvia B. Uchoa, Indrajit Ray, Julio F. Davalos, Josealdo Tonholo:
Comparative studies of chloride permeability, conductivity and salt-ponding tests of concrete containing different admixtures. Int. J. Model. Identif. Control. 7(2): 160-170 (2009) - [j17]Indrakshi Ray, Indrajit Ray, Sudip Chakraborty:
An interoperable context sensitive model of trust. J. Intell. Inf. Syst. 32(1): 75-104 (2009) - 2008
- [j16]Indrajit Ray, Hongjun Zhang:
Experiences in developing a fair-exchange e-commerce protocol using common off-the-shelf components. Electron. Commer. Res. Appl. 7(2): 247-259 (2008) - [j15]Andrew Burt, Michael Darschewski, Indrajit Ray, Ramakrishna Thurimella, Hailin Wu:
Origins: an approach to trace fast spreading worms to their roots. Int. J. Secur. Networks 3(1): 36-46 (2008) - [j14]Indrajit Ray, Nayot Poolsappasit:
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents. Int. J. Secur. Networks 3(2): 80-94 (2008) - 2007
- [j13]Omar Hussain Alhazmi, Yashwant K. Malaiya, Indrajit Ray:
Measuring, analyzing and predicting security vulnerabilities in software systems. Comput. Secur. 26(3): 219-228 (2007) - [j12]Indrajit Ray, Junxing Zhang:
Towards a new standard for allowing concurrency and ensuring consistency in revision control systems. Comput. Stand. Interfaces 29(3): 355-364 (2007) - [j11]Junxing Zhang, Indrajit Ray:
Towards secure multi-sited transactional revision control systems. Comput. Stand. Interfaces 29(3): 365-375 (2007) - [j10]Sudip Chakraborty, Indrajit Ray:
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework. J. Comput. 2(2): 13-24 (2007) - 2006
- [j9]Herakles M. Polemarchakis, Indrajit Ray:
Sunspots, correlation and competition. Games Econ. Behav. 56(1): 174-184 (2006) - 2005
- [j8]Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthi:
An anonymous and failure resilient fair-exchange e-commerce protocol. Decis. Support Syst. 39(3): 267-292 (2005) - 2004
- [j7]Indrajit Ray, Sonja Tideman:
A Secure TCP Connection Migration Protocol to Enable the Survivability of Client-Server Applications under Malicious Attack. J. Netw. Syst. Manag. 12(3): 251-276 (2004) - 2002
- [j6]Indrajit Ray, Indrakshi Ray:
Fair exchange in E-commerce. SIGecom Exch. 3(2): 9-17 (2002) - 2001
- [j5]Indrajit Ray, Lin Zhou:
Game Theory via Revealed Preferences. Games Econ. Behav. 37(2): 415-424 (2001) - 2000
- [j4]Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino:
Flexible Transaction Dependencies in Database Systems. Distributed Parallel Databases 8(4): 399-446 (2000) - [j3]Indrajit Ray:
Consistency, dummy and independence of irrelevant strategies for strategic games. Soc. Choice Welf. 17(2): 217-222 (2000) - [j2]Indrajit Ray, Luigi V. Mancini, Sushil Jajodia, Elisa Bertino:
ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems. IEEE Trans. Knowl. Data Eng. 12(6): 880-899 (2000) - 1998
- [j1]Elisa Bertino, Sushil Jajodia, Luigi V. Mancini, Indrajit Ray:
Advanced Transaction Processing in Multilevel Secure File Stores. IEEE Trans. Knowl. Data Eng. 10(1): 120-135 (1998)
Conference and Workshop Papers
- 2024
- [c106]Rakesh Podder, Jack Sovereign, Indrajit Ray, Madhan B. Santharam, Stefano Righi:
The PIT-Cerberus Framework: Preventing Device Tampering During Transit. QRS 2024: 584-595 - [c105]Md. Al Amin, Hemanth Tummala, Rushabh Shah, Indrajit Ray:
Balancing Patient Privacy and Health Data Security: The Role of Compliance in Protected Health Information (PHI) Sharing. SECRYPT 2024: 211-223 - 2023
- [c104]Dimitrios Georgakopoulos, Mei-Ling Shyu, Indrajit Ray, Barbara Carminati:
Message from the General Chairs and PC Chairs CIC 2023. CIC 2023: viii-ix - [c103]Maxwel Bar-on, Bruhadeshwar Bezawada, Indrakshi Ray, Indrajit Ray:
A Small World-Privacy Preserving IoT Device-Type Fingerprinting with Small Datasets. FPS (1) 2023: 104-122 - [c102]Qian Qu, Ronghua Xu, Han Sun, Yu Chen, Sumantra Sarkar, Indrajit Ray:
A Digital Healthcare Service Architecture for Seniors Safety Monitoring in Metaverse. MetaCom 2023: 86-93 - [c101]Fathima James, Indrajit Ray, Deep Medhi:
Worst Attack Vulnerability and Fortification for IoT Security Management: An approach and An Illustration for Smart Home IoT. NOMS 2023: 1-6 - [c100]Indrajit Ray, Bhavani Thuraisingham, Jaideep Vaidya, Sharad Mehrotra, Vijayalakshmi Atluri, Indrakshi Ray, Murat Kantarcioglu, Ramesh Raskar, Babak Salimi, Steve Simske, Nalini Venkatasubramanian, Vivek K. Singh:
SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups. SACMAT 2023: 145-155 - [c99]Md. Al Amin, Amani Altarawneh, Indrajit Ray:
Informed Consent as Patient Driven Policy for Clinical Diagnosis and Treatment: A Smart Contract Based Approach. SECRYPT 2023: 159-170 - [c98]Indrajit Ray, Sarath Sreedharan, Rakesh Podder, Shadaab Kawnain Bashir, Indrakshi Ray:
Explainable AI for Prioritizing and Deploying Defenses for Cyber-Physical System Resiliency. TPS-ISA 2023: 184-192 - 2022
- [c97]Vinayak S. Prabhu, Mohit Singh, Indrajit Ray, Indrakshi Ray, Sudipto Ghosh:
Detecting Secure Memory Deallocation Violations with CBMC. CPSS@AsiaCCS 2022: 27-38 - [c96]Md. Rakibul Hasan Talukder, Md. Al Amin, Indrajit Ray:
Protecting Cyber-Physical System Testbeds from Red-Teaming/Blue-Teaming Experiments Gone Awry. ISPEC 2022: 140-157 - 2021
- [c95]Sina Mahdipour Saravani, Indrajit Ray, Indrakshi Ray:
Automated Identification of Social Media Bots Using Deepfake Text Detection. ICISS 2021: 111-123 - [c94]Fathima James, Indrajit Ray, Deep Medhi:
Situational Awareness for Smart Home IoT Security via Finite State Automata Based Attack Modeling. TPS-ISA 2021: 61-69 - 2019
- [c93]Indrajit Ray, Diptendu Mohan Kar, Jordan Peterson, Steve Goeringer:
Device Identity and Trust in IoT-sphere Forsaking Cryptography. CIC 2019: 204-213 - [c92]Bruhadeshwar Bezawada, Indrajit Ray, Kushagra Tiwary:
AGBuilder: An AI Tool for Automated Attack Graph Building, Analysis, and Refinement. DBSec 2019: 23-42 - [c91]Diptendu Mohan Kar, Indrajit Ray:
That's My DNA: Detecting Malicious Tampering of Synthesized DNA. DBSec 2019: 61-80 - [c90]Sachin Shetty, Indrajit Ray, Nurcin Celik, Michael Mesham, Nathaniel Bastian, Quanyan Zhu:
Simulation for Cyber Risk Management - Where are we, and Where do we Want to Go? WSC 2019: 726-737 - 2018
- [c89]Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray:
Behavioral Fingerprinting of IoT Devices. ASHES@CCS 2018: 41-50 - [c88]Dieudonne Mulamba, Athith Amarnath, Bruhadeshwar Bezawada, Indrajit Ray:
A Secure Hash Commitment Approach for Moving Target Defense of Security-critical Services. MTD@CCS 2018: 59-68 - [c87]Diptendu Mohan Kar, Indrajit Ray, Jenna Gallegos, Jean Peccoud:
Digital Signatures to Ensure the Authenticity and Integrity of Synthetic DNA Molecules. NSPW 2018: 110-122 - [c86]Ibrahim Lazrig, Toan C. Ong, Indrajit Ray, Indrakshi Ray, Xiaoqian Jiang, Jaideep Vaidya:
Privacy Preserving Probabilistic Record Linkage Without Trusted Third Party. PST 2018: 1-10 - [c85]Dieudonne Mulamba, Indrajit Ray, Indrakshi Ray:
On Sybil Classification in Online Social Networks Using Only Structural Features. PST 2018: 1-10 - [c84]Bruhadeshwar Bezawada, Sandeep S. Kulkarni, Indrajit Ray, Indrakshi Ray, Rui Li:
Independent Key Distribution Protocols for Broadcast Authentication. SACMAT 2018: 27-38 - 2017
- [c83]Diptendu Mohan Kar, Ibrahim Lazrig, Indrajit Ray, Indrakshi Ray:
POSTER: PriReMat: A Distributed Tool for Privacy Preserving Record Linking in Healthcare. CCS 2017: 2507-2509 - [c82]Subhojeet Mukherjee, Noah Cain, Jacob Walker, David White, Indrajit Ray, Indrakshi Ray:
POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles. CCS 2017: 2559-2561 - [c81]Subhojeet Mukherjee, Indrakshi Ray, Indrajit Ray, Hossein Shirazi, Toan Ong, Michael G. Kahn:
Attribute Based Access Control for Healthcare Resources. ABAC@CODASPY 2017: 29-40 - [c80]Dieudonne Mulamba, Indrajit Ray:
Resilient Reference Monitor for Distributed Access Control via Moving Target Defense. DBSec 2017: 20-40 - 2016
- [c79]Indrakshi Ray, Toan C. Ong, Indrajit Ray, Michael G. Kahn:
Applying attribute based access control for privacy preserving health data disclosure. BHI 2016: 1-4 - [c78]Awad A. Younis, Yashwant K. Malaiya, Charles Anderson, Indrajit Ray:
To Fear or Not to Fear That is the Question: Code Characteristics of a Vulnerable Functionwith an Existing Exploit. CODASPY 2016: 97-104 - [c77]Ibrahim Lazrig, Toan Ong, Indrajit Ray, Indrakshi Ray, Michael G. Kahn:
Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes. DBSec 2016: 61-76 - [c76]Awad A. Younis, Yashwant K. Malaiya, Indrajit Ray:
Evaluating CVSS Base Score Using Vulnerability Rewards Programs. SEC 2016: 62-75 - [c75]Dieudonne Mulamba, Indrajit Ray, Indrakshi Ray:
SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks. SEC 2016: 179-193 - 2015
- [c74]Luke Rodriguez, Darren S. Curtis, Sutanay Choudhury, Kiri Oler, Peter Nordquist, Pin-Yu Chen, Indrajit Ray:
DEMO: Action Recommendation for Cyber Resilience. CCS 2015: 1620-1622 - [c73]Subhojeet Mukherjee, Sachini S. Weerawardhana, Chancey Dunn, Indrajit Ray, Adele E. Howe:
POSTER: PsychoRithm: A Framework for Studying How Human Traits Affect User Response to Security Situations. CCS 2015: 1662-1664 - [c72]Florian Kerschbaum, Cristina Nita-Rotaru, Indrajit Ray:
CCSW 2015: The 7th ACM Cloud Computing Security Workshop. CCS 2015: 1703-1704 - [c71]Ibrahim Lazrig, Tarik Moataz, Indrajit Ray, Indrakshi Ray, Toan Ong, Michael G. Kahn, Frédéric Cuppens, Nora Cuppens-Boulahia:
Privacy Preserving Record Matching Using Automated Semi-trusted Broker. DBSec 2015: 103-118 - [c70]Mikhail Strizhov, Indrajit Ray:
Substring Position Search over Encrypted Cloud Data Using Tree-Based Index. IC2E 2015: 165-174 - [c69]Sutanay Choudhury, Luke Rodriguez, Darren S. Curtis, Kiri Oler, Peter Nordquist, Pin-Yu Chen, Indrajit Ray:
Action Recommendation for Cyber Resilience. SafeConfig@CCS 2015: 3-8 - 2014
- [c68]Mark Roberts, Adele E. Howe, Indrajit Ray:
Evaluating Diversity in Classical Planning. ICAPS 2014 - [c67]Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray:
Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds. DBSec 2014: 66-81 - [c66]Tarik Moataz, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray, Indrakshi Ray:
ELITE: zEro Links Identity managemenT systEm. DBSec 2014: 195-210 - [c65]Sachini S. Weerawardhana, Subhojeet Mukherjee, Indrajit Ray, Adele E. Howe:
Automated Extraction of Vulnerability Information for Home Computer Security. FPS 2014: 356-366 - [c64]Awad A. Younis, Yashwant K. Malaiya, Indrajit Ray:
Using Attack Surface Entry Points and Reachability Analysis to Assess the Risk of Software Vulnerability Exploitability. HASE 2014: 1-8 - [c63]Mikhail Strizhov, Indrajit Ray:
Multi-keyword Similarity Search over Encrypted Cloud Data. SEC 2014: 52-65 - 2013
- [c62]Malgorzata Urbanska, Mark Roberts, Indrajit Ray, Adele E. Howe, Zinta S. Byrne:
Accepting the inevitable: factoring the user into home computer security. CODASPY 2013: 325-332 - [c61]Kirill Belyaev, Indrakshi Ray, Indrajit Ray, Gary Luckasen:
Personal health record storage on privacy preserving green clouds. CollaborateCom 2013: 448-457 - [c60]Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert B. France:
Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations. DBSec 2013: 97-112 - [c59]Indrajit Ray, Dieudonne Mulamba, Indrakshi Ray, Keesook J. Han:
A Model for Trust-Based Access Control and Delegation in Mobile Clouds. DBSec 2013: 242-257 - [c58]Mahantesh Halappanavar, Sutanay Choudhury, Emilie Hogan, Peter Hui, John R. Johnson, Indrajit Ray, Lawrence B. Holder:
Towards a network-of-networks framework for cyber security. ISI 2013: 106-108 - [c57]Sean S. E. Thorpe, Tyrone Grandison, Arnett Campbell, Janet Williams, Khalilah Burrell, Indrajit Ray:
Towards a Forensic-Based Service Oriented Architecture Framework for Auditing of Cloud Logs. SERVICES 2013: 75-83 - 2012
- [c56]Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir:
Cloud Log Forensics Metadata Analysis. COMPSAC Workshops 2012: 194-199 - [c55]Sean S. E. Thorpe, Tyrone Grandison, Indrajit Ray, Abbie Barbir:
Towards Enabling Behavioral Trust among Participating Cloud Forensic Data Center Agencies. Secure Data Management 2012: 156-161 - [c54]Adele E. Howe, Indrajit Ray, Mark Roberts, Malgorzata Urbanska, Zinta S. Byrne:
The Psychology of Security for the Home Computer User. IEEE Symposium on Security and Privacy 2012: 209-223 - 2011
- [c53]Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison:
Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit Logs. CISIS 2011: 259-264 - [c52]Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison:
Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques. CISIS 2011: 265-271 - [c51]Sean S. E. Thorpe, Indrakshi Ray, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert B. France:
Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment. ICDF2C 2011: 156-171 - 2010
- [c50]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
On the Identification of Property Based Generalizations in Microdata Anonymization. DBSec 2010: 81-96 - [c49]Siv Hilde Houmb, Sudip Chakraborty, Indrakshi Ray, Indrajit Ray:
Using Trust-Based Information Aggregation for Predicting Security Level of Systems. DBSec 2010: 241-256 - [c48]Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services. Mobile Data Management 2010: 95-104 - [c47]Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS. SecureComm 2010: 71-88 - 2009
- [c46]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice. CIKM 2009: 1037-1046 - [c45]Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi Ray, Indrajit Ray:
A Trust-Based Access Control Model for Pervasive Computing Applications. DBSec 2009: 307-314 - [c44]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
On the comparison of microdata disclosure control algorithms. EDBT 2009: 240-251 - [c43]Rinku Dewri, L. Darrell Whitley, Indrajit Ray, Indrakshi Ray:
A multi-objective approach to data sharing with privacy constraints and preference based objectives. GECCO 2009: 1499-1506 - 2008
- [c42]Indrajit Ray, Nayot Poolsappasit, Rinku Dewri:
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems. DBSec 2008: 297-312 - [c41]Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
Optimizing on-demand data broadcast scheduling in pervasive environments. EDBT 2008: 559-569 - [c40]Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
Security Provisioning in Pervasive Environments Using Multi-objective Optimization. ESORICS 2008: 349-363 - [c39]Rinku Dewri, L. Darrell Whitley, Indrakshi Ray, Indrajit Ray:
Evolution strategy based optimization of on-demand dependent data broadcast scheduling. GECCO 2008: 1699-1700 - [c38]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
On the Optimal Selection of k in the k-Anonymity Problem. ICDE 2008: 1364-1366 - [c37]H. M. N. Dilum Bandara, Anura P. Jayasumana, Indrajit Ray:
Key pre-distribution based secure backbone formation in wireless sensor networks. LCN 2008: 786-793 - [c36]Rinku Dewri, L. Darrell Whitley, Indrajit Ray, Indrakshi Ray:
Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy. PPSN 2008: 991-1000 - [c35]Indrajit Ray, Sudip Chakraborty:
Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data. SEC 2008: 605-620 - 2007
- [c34]Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, L. Darrell Whitley:
Optimal security hardening using multi-objective optimization on attack tree models of networks. CCS 2007: 204-213 - [c33]Sudip Chakraborty, Nayot Poolsappasit, Indrajit Ray:
Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments. DBSec 2007: 77-92 - [c32]Nayot Poolsapassit, Indrajit Ray:
Investigating Computer Attacks Using Attack Trees. IFIP Int. Conf. Digital Forensics 2007: 331-343 - 2006
- [c31]Shuxin Yin, Indrakshi Ray, Indrajit Ray:
A Trust Model for Pervasive Computing Environments. CollaborateCom 2006 - [c30]Indrajit Ray, Sudip Chakraborty:
A Framework for Flexible Access Control in Digital Library Systems. DBSec 2006: 252-266 - [c29]Indrajit Ray:
Remote Upload of Evidence over Mobile Ad Hoc Networks. IFIP Int. Conf. Digital Forensics 2006: 41-54 - [c28]Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray:
Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation. iTrust 2006: 135-149 - [c27]Sudip Chakraborty, Indrajit Ray:
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems. SACMAT 2006: 49-58 - 2005
- [c26]Omar Hussain Alhazmi, Yashwant K. Malaiya, Indrajit Ray:
Security Vulnerabilities in Software Systems: A Quantitative Perspective. DBSec 2005: 281-294 - [c25]Indrajit Ray, Eunjong Kim, Ross M. McConnell, Daniel Massey:
Reliably, Securely and Efficiently Distributing Electronic Content Using Multicasting. EC-Web 2005: 327-336 - [c24]Indrajit Ray, Nayot Poolsapassit:
Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. ESORICS 2005: 231-246 - [c23]Indrajit Ray:
System Security Track Chair's Message. ICDCIT 2005: 333 - [c22]Indrajit Ray, Sudip Chakraborty, Indrakshi Ray:
VTrust: A Trust Management System Based on a Vector Model of Trust. ICISS 2005: 91-105 - [c21]Eunjong Kim, Daniel Massey, Indrajit Ray:
Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback. IFIP Int. Conf. Digital Forensics 2005: 165-176 - 2004
- [c20]Indrajit Ray, Tomas Hajek:
Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation. DBSec 2004: 295-309 - [c19]Indrajit Ray, Mike Geisterfer:
Towards a Privacy Preserving e-Commerce Protocol. EC-Web 2004: 154-163 - [c18]Indrajit Ray, Sudip Chakraborty:
A Vector Model of Trust for Developing Trustworthy Systems. ESORICS 2004: 260-275 - [c17]Vamsi Kambhampati, Indrajit Ray, Eunjong Kim:
A Secure Checkpointing Protocol for Survivable Server Design. ICDCIT 2004: 430-440 - [c16]Indrajit Ray, Eunjong Kim:
Collective Signature for Efficient Authentication of XML Documents. SEC 2004: 411-424 - 2003
- [c15]Jung-Min Park, Indrajit Ray, Edwin K. P. Chong, Howard Jay Siegel:
A certified e-mail protocol suitable for mobile environments. GLOBECOM 2003: 1394-1398 - [c14]Indrajit Ray, Junxing Zhang:
A Secure Multi-Sited Version Control System. IICIS 2003: 125-141 - 2002
- [c13]Indrajit Ray, Indrakshi Ray:
Anonymous and Secure Multicast Subscription. DBSec 2002: 313-327 - [c12]Indrakshi Ray, Indrajit Ray:
Using Compatible Keys for Secure Multicasting in E-Commerce. IPDPS 2002 - [c11]Indrakshi Ray, Indrajit Ray, Natu Narasimhamurthi:
A cryptographic solution to implement access control in a hierarchy and more. SACMAT 2002: 65-73 - 2001
- [c10]Indrakshi Ray, Indrajit Ray:
Detecting Termination of Active Database Rules Using Symbolic Model Checking. ADBIS 2001: 266-279 - [c9]Indrakshi Ray, Indrajit Ray:
An Anomymous Fair Exchange E-commerce Protocol. IPDPS 2001: 172 - [c8]Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthi:
An Anonymous Electronic Voting Protocol for Voting Over The Internet. WECWIS 2001: 188-191 - 2000
- [c7]Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthy:
A Fair-exchange E-commerce Protocol with Automated Dispute Resolution. DBSec 2000: 27-38 - [c6]Indrakshi Ray, Indrajit Ray:
An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution. EC-Web 2000: 84-93 - [c5]Indrakshi Ray, Indrajit Ray:
Failure Analysis of an E-Commerce Protocol Using Model Checking. WECWIS 2000: 176-183 - 1997
- [c4]Sushil Jajodia, Ravi Mukkamala, Indrajit Ray:
A Two-tier Coarse Indexing Scheme for MLS Database Systems. DBSec 1997: 199-218 - 1996
- [c3]Indrajit Ray, Elisa Bertino, Sushil Jajodia, Luigi V. Mancini:
An Advanced Commit Protocol for MLS Distributed Database Systems. CCS 1996: 119-128 - [c2]Sushil Jajodia, Luigi V. Mancini, Indrajit Ray:
Secure Locking Protocols for Multilevel Database Management Systems. DBSec 1996: 177-194 - [c1]Luigi V. Mancini, Indrajit Ray:
Secure Concurrency Control in MLS Databases with Two Versions of Data. ESORICS 1996: 304-323
Parts in Books or Collections
- 1997
- [p1]Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino:
Flexible Commit Protocols for Advanced Transaction Processing. Advanced Transaction Models and Architectures 1997
Editorship
- 2018
- [e13]Pierangela Samarati, Indrajit Ray, Indrakshi Ray:
From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday. Lecture Notes in Computer Science 11170, Springer 2018, ISBN 978-3-030-04833-4 [contents] - 2016
- [e12]Javier García Blas, Jesús Carretero, Indrajit Ray, Qun Jin, Nektarios Georgalas:
15th International Conference on Ubiquitous Computing and 8th Communications and International Symposium on Cyberspace Safety and Security, IUCC-CSS 2016, Granada, Spain, December 14-16, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-5566-1 [contents] - [e11]Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti:
Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings. Lecture Notes in Computer Science 10063, Springer 2016, ISBN 978-3-319-49805-8 [contents] - 2015
- [e10]Indrajit Ray, Ninghui Li, Christopher Kruegel:
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015. ACM 2015, ISBN 978-1-4503-3832-5 [contents] - [e9]Indrajit Ray, Xiaofeng Wang, Kui Ren, Christos Dimitrakakis, Aikaterini Mitrokotsa, Arunesh Sinha:
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, AISec 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN 978-1-4503-3826-4 [contents] - [e8]Indrajit Ray, Xiaofeng Wang, Kui Ren, Florian Kerschbaum, Cristina Nita-Rotaru:
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, CCSW 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN 978-1-4503-3825-7 [contents] - [e7]Indrajit Ray, Roshan K. Thomas, Alvaro A. Cárdenas:
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, CPS-SPC 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN 978-1-4503-3827-1 [contents] - [e6]Indrajit Ray, Xiaofeng Wang, Kui Ren:
Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN 978-1-4503-3828-8 [contents] - [e5]Indrajit Ray, Tomas Sander, Moti Yung:
Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, WISCS 2015, Denver, Colorado, USA, October 12, 2015. ACM 2015, ISBN 978-1-4503-3822-6 [contents] - [e4]Javier López, Indrajit Ray, Bruno Crispo:
Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8924, Springer 2015, ISBN 978-3-319-17126-5 [contents] - [e3]Indrajit Ray, Nicholas Hopper, Rob Jansen:
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, WPES 2015, Denver, Colorado, USA, October 12, 2015. ACM 2015, ISBN 978-1-4503-3820-2 [contents] - 2008
- [e2]Indrajit Ray, Sujeet Shenoi:
Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008. IFIP 285, Springer 2008, ISBN 978-0-387-84926-3 [contents] - 2004
- [e1]Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray:
Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA. IFIP 142, Kluwer/Springer 2004, ISBN 1-4020-8069-7 [contents]
Informal and Other Publications
- 2024
- [i8]Md. Al Amin, Hemanth Tummala, Rushabh Shah, Indrajit Ray:
Balancing Patient Privacy and Health Data Security: The Role of Compliance in Protected Health Information (PHI) Sharing. CoRR abs/2407.02766 (2024) - [i7]Md. Al Amin, Rushabh Shah, Hemanth Tummala, Indrajit Ray:
Utilizing Blockchain and Smart Contracts for Enhanced Fraud Prevention and Minimization in Health Insurance through Multi-Signature Claim Processing. CoRR abs/2407.17765 (2024) - 2023
- [i6]Md. Al Amin, Hemanth Tummala, Seshamalini Mohan, Indrajit Ray:
Healthcare Policy Compliance: A Blockchain Smart Contract-Based Approach. CoRR abs/2312.10214 (2023) - 2019
- [i5]Pin-Yu Chen, Sutanay Choudhury, Luke Rodriguez, Alfred O. Hero III, Indrajit Ray:
Enterprise Cyber Resiliency Against Lateral Movement: A Graph Theoretic Approach. CoRR abs/1905.01002 (2019) - [i4]Diptendu Mohan Kar, Indrajit Ray:
Systematization of Knowledge and Implementation: Short Identity-Based Signatures. CoRR abs/1908.05366 (2019) - 2018
- [i3]Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray:
IoTSense: Behavioral Fingerprinting of IoT Devices. CoRR abs/1804.03852 (2018) - 2015
- [i2]Mikhail Strizhov, Indrajit Ray:
Multi-keyword Similarity Search Over Encrypted Cloud Data. IACR Cryptol. ePrint Arch. 2015: 137 (2015) - 2013
- [i1]Mahantesh Halappanavar, Sutanay Choudhury, Emilie Hogan, Peter Hui, John R. Johnson, Indrajit Ray, Lawrence B. Holder:
Towards a Networks-of-Networks Framework for Cyber Security. CoRR abs/1304.6761 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint