


default search action
Indrakshi Ray
Person information
- affiliation: Colorado State University, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j59]Saneesh P. Francis
, Vysakh Kani Kolil
, Vipin Pavithran, Indrakshi Ray
, Krishnashree Achuthan
:
Exploring gender dynamics in cybersecurity education: A self-determination theory and social cognitive theory perspective. Comput. Secur. 144: 103968 (2024) - [j58]Yaser Baseri
, Abdelhakim Hafid, Mahdi Daghmehchi Firoozjaei
, Soumaya Cherkaoui
, Indrakshi Ray:
Statistical privacy protection for secure data access control in cloud. J. Inf. Secur. Appl. 84: 103823 (2024) - [c185]Matt Gorbett
, Hossein Shirazi
, Indrakshi Ray
:
Tiled Bit Networks: Sub-Bit Neural Network Compression Through Reuse of Learnable Binary Vectors. CIKM 2024: 674-684 - [c184]Mahmoud Abdelgawad, Indrakshi Ray:
Resiliency Analysis of Mission-Critical System of Systems Using Formal Methods. DBSec 2024: 153-170 - [c183]Hajar Homayouni, Hamed Aghayarzadeh, Indrakshi Ray, Hossein Shirazi:
Anomaly Detection and Interpretation from Tabular Data Using Transformer Architecture. ICDM (Workshops) 2024: 657-664 - [c182]Oluwatosin Falebita, Mahmoud Abdelgawad, Evan Anspach, Indrakshi Ray:
Securing Virtual Reality Apps Inter-process Communication. ICISS 2024: 63-84 - [c181]Asif Uz Zaman Asif, Meera Sridhar, Indrakshi Ray, Francisco R. Ortega:
Breaking the Virtual Barrier of Exploit Chain Attacks in XR Systems. ISMAR-Adjunct 2024: 32-34 - [c180]Matthew Sturgeon, Evan Anspach, Francisco R. Ortega, Indrakshi Ray, Mohammed Safayet Arefin
:
Impact of Relevant Augmented Reality Information on Human Performance. ISVC (2) 2024: 185-198 - [c179]Shwetha Gowdanakatte, Mahmoud Abdelgawad, Indrakshi Ray:
Assets Criticality Assessment of Industrial Control Systems: A Wind Farm Case Study. QRS 2024: 352-363 - [c178]Mahmoud Abdelgawad
, Indrakshi Ray
:
Methodology for Resiliency Analysis of Mission-critical Systems. SAC 2024: 1292-1300 - [c177]Shadaab Kawnain Bashir, Hossein Shirazi, Noushin Salek Faramarzi, Thomas Harris, Ashmita Shishodia, Hajar Homayouni, Indrakshi Ray:
Investigating Influential COVID-19 Perspectives: A Multifaceted Analysis of Twitter Discourse. SocialSec 2024: 3-22 - [c176]Shadaab Kawnain Bashir, Rakesh Podder, Sarath Sreedharan, Indrakshi Ray, Indrajit Ray:
Resiliency Graphs: Modelling the Interplay between Cyber Attacks and System Failures through AI Planning. TPS-ISA 2024: 292-302 - [c175]Saja Alqurashi, Indrakshi Ray, Mahmoud Abdelgawad, Hossein Shirazi:
SR2ACM: A Methodical Approach for Translating Natural Language Security Requirements to Access Control Model. TPS-ISA 2024: 303-312 - [i7]Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
Tiled Bit Networks: Sub-Bit Neural Network Compression Through Reuse of Learnable Binary Vectors. CoRR abs/2407.12075 (2024) - 2023
- [j57]Matt Gorbett, Caspian Siebert, Hossein Shirazi, Indrakshi Ray:
The intrinsic dimensionality of network datasets and its applications. J. Comput. Secur. 31(6): 679-704 (2023) - [j56]Chaoyuan Zuo
, Ritwik Banerjee
, Fateme Hashemi Chaleshtori
, Hossein Shirazi
, Indrakshi Ray
:
Seeing Should Probably Not Be Believing: The Role of Deceptive Support in COVID-19 Misinformation on Twitter. ACM J. Data Inf. Qual. 15(1): 9:1-9:26 (2023) - [j55]Hossein Shirazi
, Shashika Ranga Muramudalige
, Indrakshi Ray
, Anura P. Jayasumana
, Haonan Wang:
Adversarial Autoencoder Data Synthesis for Enhancing Machine Learning-Based Phishing Detection Algorithms. IEEE Trans. Serv. Comput. 16(4): 2411-2422 (2023) - [c174]Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
Cross-Silo Federated Learning Across Divergent Domains with Iterative Parameter Alignment. IEEE Big Data 2023: 5233-5242 - [c173]Eric Burton Samuel Martin
, Hossein Shirazi
, Indrakshi Ray
:
Poster: Towards a Dataset for the Discrimination between Warranted and Unwarranted Emails. CCS 2023: 3603-3605 - [c172]Faiza Tazi
, Suleiman Saka
, Griffin Opp
, Shradha Neupane
, Sanchari Das
, Lorenzo De Carli
, Indrakshi Ray
:
Accessibility Evaluation of IoT Android Mobile Companion Apps. CHI Extended Abstracts 2023: 19:1-19:7 - [c171]Maxwel Bar-on, Bruhadeshwar Bezawada, Indrakshi Ray, Indrajit Ray:
A Small World-Privacy Preserving IoT Device-Type Fingerprinting with Small Datasets. FPS (1) 2023: 104-122 - [c170]Matt Gorbett
, Hossein Shirazi
, Indrakshi Ray
:
Sparse Binary Transformers for Multivariate Time Series Modeling. KDD 2023: 544-556 - [c169]Mahmoud Abdelgawad
, Indrakshi Ray
, Saja Alqurashi
, Videep Venkatesha
, Hossein Shirazi
:
Synthesizing and Analyzing Attribute-Based Access Control Model Generated from Natural Language Policy Statements. SACMAT 2023: 91-98 - [c168]Indrajit Ray, Bhavani Thuraisingham, Jaideep Vaidya, Sharad Mehrotra
, Vijayalakshmi Atluri
, Indrakshi Ray, Murat Kantarcioglu
, Ramesh Raskar, Babak Salimi, Steve Simske
, Nalini Venkatasubramanian, Vivek K. Singh:
SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups. SACMAT 2023: 145-155 - [c167]Asif Uz Zaman Asif, Hossein Shirazi, Indrakshi Ray:
Machine Learning-Based Phishing Detection Using URL Features: A Comprehensive Review. SSS 2023: 481-497 - [c166]Mahmoud Abdelgawad, Indrakshi Ray, Tomas Vasquez:
Workflow Resilience for Mission Critical Systems. SSS 2023: 498-512 - [c165]Indrajit Ray, Sarath Sreedharan, Rakesh Podder
, Shadaab Kawnain Bashir
, Indrakshi Ray:
Explainable AI for Prioritizing and Deploying Defenses for Cyber-Physical System Resiliency. TPS-ISA 2023: 184-192 - [c164]Shwetha Gowdanakatte, Indrakshi Ray, Mahmoud Abdelgawad:
Model Based Risk Assessment and Risk Mitigation Framework for Cyber-Physical Systems. TPS-ISA 2023: 203-212 - [c163]Noushin Salek Faramarzi
, Fateme Hashemi Chaleshtori
, Hossein Shirazi
, Indrakshi Ray
, Ritwik Banerjee
:
Claim Extraction and Dynamic Stance Detection in COVID-19 Tweets. WWW (Companion Volume) 2023: 1059-1068 - [i6]Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
Sparse Binary Transformers for Multivariate Time Series Modeling. CoRR abs/2308.04637 (2023) - [i5]Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
Cross-Silo Federated Learning Across Divergent Domains with Iterative Parameter Alignment. CoRR abs/2311.04818 (2023) - 2022
- [j54]Hossein Shirazi, Katherine Haynes, Indrakshi Ray:
Towards Performance of NLP Transformers on URL-Based Phishing Detection for Mobile Devices. J. Ubiquitous Syst. Pervasive Networks 17(1): 35-42 (2022) - [j53]Shashika Ranga Muramudalige
, Benjamin W. K. Hung
, Anura P. Jayasumana
, Indrakshi Ray
, Jytte Klausen:
Enhancing Investigative Pattern Detection via Inexact Matching and Graph Databases. IEEE Trans. Serv. Comput. 15(5): 2780-2794 (2022) - [c162]Shwetha Gowdanakatte, Indrakshi Ray, Siv Hilde Houmb:
Attribute Based Access Control Model for Protecting Programmable Logic Controllers. SAT-CPS@CODASPY 2022: 47-56 - [c161]Hossein Shirazi, William Pickard
, Indrakshi Ray, Haonan Wang:
Towards Resiliency of Heavy Vehicles through Compromised Sensor Data Reconstruction. CODASPY 2022: 276-287 - [c160]Elisa Bertino, Ravi S. Sandhu, Bhavani Thuraisingham, Indrakshi Ray, Wenjia Li, Maanak Gupta, Sudip Mittal:
Security and Privacy for Emerging IoT and CPS Domains. CODASPY 2022: 336-337 - [c159]Gabriele Maurina, Hajar Homayouni, Sudipto Ghosh, Indrakshi Ray, Gerald P. Duggan:
A Methodology for Energy Usage Prediction in Long-Lasting Abnormal Events. CogMI 2022: 91-100 - [c158]Vinayak S. Prabhu, Mohit Singh, Indrajit Ray, Indrakshi Ray, Sudipto Ghosh:
Detecting Secure Memory Deallocation Violations with CBMC. CPSS@AsiaCCS 2022: 27-38 - [c157]Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
Local Intrinsic Dimensionality of IoT Networks for Unsupervised Intrusion Detection. DBSec 2022: 143-161 - [c156]Shradha Neupane, Faiza Tazi, Upakar Paudel, Freddy Veloz Baez, Merzia Adamjee, Lorenzo De Carli, Sanchari Das, Indrakshi Ray:
On the Data Privacy, Security, and Risk Postures of IoT Mobile Companion Apps. DBSec 2022: 162-182 - [c155]Fateme Hashemi Chaleshtori
, Indrakshi Ray
:
Automation of Vulnerability Information Extraction Using Transformer-Based Language Models. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 645-665 - [c154]Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
WiP: The Intrinsic Dimensionality of IoT Networks. SACMAT 2022: 245-250 - 2021
- [j52]Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray, Chuck Anderson:
Directed adversarial sampling attacks on phishing detection. J. Comput. Secur. 29(1): 1-23 (2021) - [j51]Hajar Homayouni, Indrakshi Ray, Sudipto Ghosh
, Shlok Gondalia, Michael G. Kahn:
Anomaly Detection in COVID-19 Time-Series Data. SN Comput. Sci. 2(4): 279 (2021) - [j50]Bruhadeshwar Bezawada, Indrakshi Ray, Indrajit Ray:
Behavioral fingerprinting of Internet-of-Things devices. WIREs Data Mining Knowl. Discov. 11(1) (2021) - [c153]Joaquin Cuomo, Hajar Homayouni, Indrakshi Ray, Sudipto Ghosh:
Detecting Temporal Dependencies in Data. BICOD 2021: 29-39 - [c152]Upakar Paudel, Andy Dolan, Suryadipta Majumdar, Indrakshi Ray:
Context-Aware IoT Device Functionality Extraction from Specifications for Ensuring Consumer Security. CNS 2021: 155-163 - [c151]Shalin Kumar Deval, Meenakshi Tripathi, Bruhadeshwar Bezawada, Indrakshi Ray:
"X-Phish: Days of Future Past"‡: Adaptive & Privacy Preserving Phishing Detection. CNS 2021: 227-235 - [c150]Ritwik Banerjee
, Indrakshi Ray:
Diagnosis, Prevention, and Cure for Misinformation. CogMI 2021: 156-162 - [c149]Kyle Haefner
, Indrakshi Ray
:
Trust and Verify: A Complexity-Based IoT Behavioral Enforcement Method. CSCML 2021: 432-450 - [c148]Lorenzo De Carli
, Indrakshi Ray, Erin Solovey
:
Vision: Stewardship of Smart Devices Security for the Aging Population. EuroUSEC 2021: 236-241 - [c147]Katherine Haynes, Hossein Shirazi, Indrakshi Ray:
Lightweight URL-based phishing detection using natural language processing transformers for mobile devices. FNC/MobiSPC 2021: 127-134 - [c146]Sina Mahdipour Saravani
, Indrajit Ray, Indrakshi Ray:
Automated Identification of Social Media Bots Using Deepfake Text Detection. ICISS 2021: 111-123 - [c145]Brandt Reutimann, Indrakshi Ray:
Simulating Measurement Attacks in a Scada System Testbed. Critical Infrastructure Protection 2021: 135-153 - [c144]Vishwajeet Bhosale, Lorenzo De Carli, Indrakshi Ray:
Detection of Anomalous User Activity for Home IoT Devices. IoTBDS 2021: 309-314 - [c143]Saja Alqurashi, Hossein Shirazi, Indrakshi Ray:
On the Performance of Isolation Forest and Multi Layer Perceptron for Anomaly Detection in Industrial Control Systems Networks. IOTSMS 2021: 1-6 - 2020
- [j49]Diptendu Mohan Kar, Indrajit Ray, Jenna Gallegos, Jean Peccoud, Indrakshi Ray:
Synthesizing DNA molecules with identity-based digital signatures to prevent malicious tampering and enabling source attribution. J. Comput. Secur. 28(4): 437-467 (2020) - [j48]Subhojeet Mukherjee, Jeffrey C. Van Etten, Namburi Rani Samyukta, Jacob Walker, Indrakshi Ray, Indrajit Ray:
TruckSTM: Runtime Realization of Operational State Transitions for Medium and Heavy Duty Vehicles. ACM Trans. Cyber Phys. Syst. 4(1): 4:1-4:25 (2020) - [c142]Hajar Homayouni, Sudipto Ghosh, Indrakshi Ray, Shlok Gondalia, Jerry Duggan, Michael G. Kahn:
An Autocorrelation-based LSTM-Autoencoder for Anomaly Detection on Time-Series Data. IEEE BigData 2020: 5068-5077 - [c141]Andy Dolan, Indrakshi Ray, Suryadipta Majumdar:
Proactively Extracting IoT Device Capabilities: An Application to Smart Homes. DBSec 2020: 42-63 - [c140]Hossein Shirazi, Landon Zweigle, Indrakshi Ray:
A Machine-learning based Unbiased Phishing Detection Approach. ICETE (2) 2020: 423-430 - [c139]Majdi Khalid
, Hamidreza Chitsaz, Indrakshi Ray:
Proximal Stochastic AUC Maximization. IJCNN 2020: 1-8 - [c138]Hossein Shirazi, Shashika Ranga Muramudalige, Indrakshi Ray, Anura P. Jayasumana:
Improved Phishing Detection Algorithms using Adversarial Autoencoder Synthesized Data. LCN 2020: 24-32 - [c137]Sowmya Ravidas, Indrakshi Ray, Nicola Zannone
:
Handling Incomplete Information in Policy Evaluation using Attribute Similarity. TPS-ISA 2020: 79-88 - [i4]Drew Johnston, Jarret Flack, Indrakshi Ray, Francisco R. Ortega:
Towards a Virtual Reality Home IoT Network Visualizer. CoRR abs/2001.06579 (2020)
2010 – 2019
- 2019
- [j47]Hajar Homayouni, Sudipto Ghosh, Indrakshi Ray:
Chapter Five - Data Warehouse Testing. Adv. Comput. 112: 223-273 (2019) - [c136]Hajar Homayouni, Sudipto Ghosh, Indrakshi Ray, Michael G. Kahn:
An Interactive Data Quality Test Approach for Constraint Discovery and Fault Detection. IEEE BigData 2019: 200-205 - [c135]Indrakshi Ray, Ramadan Abdunabi, Rejina Basnet:
Access Control for Internet of Things Applications. CPSS@AsiaCCS 2019: 35-36 - [c134]Hossein Shirazi
, Bruhadeshwar Bezawada
, Indrakshi Ray, Charles Anderson
:
Adversarial Sampling Attacks Against Phishing Detection. DBSec 2019: 83-101 - [c133]Hossein Shirazi
, Indrakshi Ray, Charles Anderson
:
Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles. FPS 2019: 39-55 - [c132]Shashika Ranga Muramudalige, Benjamin W. K. Hung, Anura P. Jayasumana, Indrakshi Ray:
Investigative Graph Search using Graph Databases. GC 2019: 60-67 - [c131]Hajar Homayouni, Sudipto Ghosh, Indrakshi Ray:
ADQuaTe: An Automated Data Quality Test Approach for Constraint Discovery and Fault Detection. IRI 2019: 61-68 - [c130]Kyle Haefner, Indrakshi Ray:
ComplexIoT: Behavior-Based Trust For IoT Networks. TPS-ISA 2019: 56-65 - 2018
- [j46]Kirill Belyaev, Wuliang Sun, Indrakshi Ray, Indrajit Ray:
On the design and analysis of protocols for Personal Health Record storage on Personal Data Server devices. Future Gener. Comput. Syst. 80: 467-482 (2018) - [j45]Kirill Belyaev, Indrakshi Ray:
Component-oriented access control - Application servers meet tuple spaces for the masses. Future Gener. Comput. Syst. 86: 726-739 (2018) - [j44]Hossein Shirazi, Kyle Haefner, Indrakshi Ray:
Improving Auto-Detection of Phishing Websites using Fresh-Phish Framework. Int. J. Multim. Data Eng. Manag. 9(1): 51-64 (2018) - [j43]Tarik Moataz, Indrajit Ray, Indrakshi Ray, Abdullatif Shikfa
, Frédéric Cuppens, Nora Cuppens:
Substring search over encrypted data. J. Comput. Secur. 26(1): 1-30 (2018) - [j42]Victor Bahl, Barbara Carminati, James Caverlee, Ing-Ray Chen, Wynne Hsu, Toru Ishida, Valérie Issarny, Surya Nepal, Indrakshi Ray, Kui Ren, Shamik Sural, Mei-Ling Shyu:
Editorial. IEEE Trans. Serv. Comput. 11(1): 1-4 (2018) - [c129]Kirill Belyaev, Indrakshi Ray:
Towards Service Orchestration in XML Filtering Overlays. ADBIS (Short Papers and Workshops) 2018: 12-19 - [c128]Bruhadeshwar Bezawada
, Indrakshi Ray:
Attribute-Based Encryption: Applications and Future Directions. From Database to Cyber Security 2018: 353-374 - [c127]Bruhadeshwar Bezawada
, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray:
Behavioral Fingerprinting of IoT Devices. ASHES@CCS 2018: 41-50 - [c126]Rejina Basnet, Subhojeet Mukherjee, Vignesh M. Pagadala, Indrakshi Ray:
An efficient implementation of next generation access control for the mobile health cloud. FMEC 2018: 131-138 - [c125]Vignesh M. Pagadala, Indrakshi Ray:
Achieving Mobile-Health Privacy Using Attribute-Based Access Control. FPS 2018: 301-316 - [c124]Hajar Homayouni, Sudipto Ghosh, Indrakshi Ray:
An Approach for Testing the Extract-Transform-Load Process in Data Warehouse Systems. IDEAS 2018: 236-245 - [c123]Majdi Khalid
, Indrakshi Ray, Hamidreza Chitsaz:
Scalable Nonlinear AUC Maximization Methods. ECML/PKDD (2) 2018: 292-307 - [c122]Ibrahim Lazrig, Toan C. Ong, Indrajit Ray, Indrakshi Ray, Xiaoqian Jiang, Jaideep Vaidya:
Privacy Preserving Probabilistic Record Linkage Without Trusted Third Party. PST 2018: 1-10 - [c121]Dieudonne Mulamba, Indrajit Ray, Indrakshi Ray:
On Sybil Classification in Online Social Networks Using Only Structural Features. PST 2018: 1-10 - [c120]Bruhadeshwar Bezawada
, Sandeep S. Kulkarni, Indrajit Ray, Indrakshi Ray, Rui Li:
Independent Key Distribution Protocols for Broadcast Authentication. SACMAT 2018: 27-38 - [c119]Hossein Shirazi
, Bruhadeshwar Bezawada
, Indrakshi Ray:
"Kn0w Thy Doma1n Name": Unbiased Phishing Detection Using Domain Name Based Features. SACMAT 2018: 69-75 - [e8]Pierangela Samarati, Indrajit Ray, Indrakshi Ray:
From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday. Lecture Notes in Computer Science 11170, Springer 2018, ISBN 978-3-030-04833-4 [contents] - [r2]Indrakshi Ray, Thilina Buddhika:
Secure Transaction Processing. Encyclopedia of Database Systems (2nd ed.) 2018 - [i3]Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray:
IoTSense: Behavioral Fingerprinting of IoT Devices. CoRR abs/1804.03852 (2018) - 2017
- [j41]Kirill Belyaev, Indrakshi Ray:
On the formalization, design, and implementation of component-oriented access control in lightweight virtualized server environments. Comput. Secur. 71: 15-35 (2017) - [c118]Diptendu Mohan Kar, Ibrahim Lazrig, Indrajit Ray, Indrakshi Ray:
POSTER: PriReMat: A Distributed Tool for Privacy Preserving Record Linking in Healthcare. CCS 2017: 2507-2509 - [c117]Subhojeet Mukherjee, Noah Cain, Jacob Walker, David White, Indrajit Ray, Indrakshi Ray:
POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles. CCS 2017: 2559-2561 - [c116]Subhojeet Mukherjee, Indrakshi Ray, Indrajit Ray, Hossein Shirazi
, Toan Ong, Michael G. Kahn:
Attribute Based Access Control for Healthcare Resources. ABAC@CODASPY 2017: 29-40 - [c115]Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray:
A Distributed Mechanism to Protect Against DDoS Attacks. DBSec 2017: 529-540 - [c114]Indrakshi Ray:
Keynote speech 2: Attribute-based access control status and directions. FMEC 2017: 2 - [c113]Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray, Bruhadeshwar Bezawada
:
History-Based Throttling of Distributed Denial-of-Service Attacks. ICETE (Selected Papers) 2017: 199-223 - [c112]Hossein Shirazi, Kyle Haefner, Indrakshi Ray:
Fresh-Phish: A Framework for Auto-Detection of Phishing Websites. IRI 2017: 137-143 - [c111]Subhojeet Mukherjee, Jacob Walker, Indrakshi Ray, Jeremy Daily:
A Precedence Graph-Based Approach to Detect Message Injection Attacks in J1939 Based Networks. PST 2017: 67-76 - [c110]Indrakshi Ray:
Keynote speech 2: Attribute-based access control status and directions. SDS 2017: 2 - [c109]Indrakshi Ray, Bithin Alangot, Shilpa Nair, Krishnashree Achuthan:
Using Attribute-Based Access Control for Remote Healthcare Monitoring. SDS 2017: 137-142 - [c108]Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray:
Using a History-based Profile to Detect and Respond to DDoS Attacks. SECRYPT 2017: 175-186 - [i2]Majdi Khalid, Indrakshi Ray, Hamidreza Chitsaz:
AUC Maximization with K-hyperplane. CoRR abs/1710.00760 (2017) - 2016
- [c107]Majdi Khalid
, Indrakshi Ray, Hamidreza Chitsaz:
Confidence-Weighted Bipartite Ranking. ADMA 2016: 35-49 - [c106]Indrakshi Ray, Toan C. Ong, Indrajit Ray, Michael G. Kahn:
Applying attribute based access control for privacy preserving health data disclosure. BHI 2016: 1-4 - [c105]Kirill Belyaev, Indrakshi Ray:
Component-Oriented Access Control for Deployment of Application Services in Containerized Environments. CANS 2016: 383-399 - [c104]Andy Chunliang Hsu, Indrakshi Ray:
Specification and Enforcement of Location-Aware Attribute-Based Access Control for Online Social Networks. ABAC@CODASPY 2016: 25-34 - [c103]Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray:
Compacted Bloom Filter. CIC 2016: 304-311 - [c102]Ibrahim Lazrig, Toan Ong, Indrajit Ray, Indrakshi Ray, Michael G. Kahn:
Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes. DBSec 2016: 61-76 - [c101]Victor R. Kebande
, Indrakshi Ray:
A Generic Digital Forensic Investigation Framework for Internet of Things (IoT). FiCloud 2016: 356-362 - [c100]Subhojeet Mukherjee, Hossein Shirazi
, Indrakshi Ray, Jeremy Daily, Rose F. Gamble:
Practical DoS Attacks on Embedded Networks in Commercial Vehicles. ICISS 2016: 23-42 - [c99]Kirill Belyaev, Indrakshi Ray:
Enhancing applications with filtering of XML message streams. IDEAS 2016: 322-327 - [c98]Dieudonne Mulamba, Indrajit Ray, Indrakshi Ray:
SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks. SEC 2016: 179-193 - [c97]Kirill Belyaev, Indrakshi Ray:
Towards Access Control for Isolated Applications. SECRYPT 2016: 171-182 - [e7]Guojun Wang, Indrakshi Ray, José M. Alcaraz Calero
, Sabu M. Thampi:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10066, 2016, ISBN 978-3-319-49147-9 [contents] - [e6]Guojun Wang, Indrakshi Ray, José M. Alcaraz Calero
, Sabu M. Thampi:
Security, Privacy and Anonymity in Computation, Communication and Storage - SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10067, 2016, ISBN 978-3-319-49144-8 [contents] - [i1]Majdi Khalid, Indrakshi Ray, Hamidreza Chitsaz:
Confidence-Weighted Bipartite Ranking. CoRR abs/1607.00847 (2016) - 2015
- [j40]Constance L. Heitmeyer
, Marc Pickett, Elizabeth I. Leonard, Myla M. Archer, Indrakshi Ray, David W. Aha
, J. Gregory Trafton:
Building high assurance human-centric decision systems. Autom. Softw. Eng. 22(2): 159-197 (2015) - [j39]Wuliang Sun, Benoît Combemale, Robert B. France, Arnaud Blouin
, Benoit Baudry, Indrakshi Ray:
Using Slicing to Improve the Performance of Model Invariant Checking. J. Object Technol. 14(4): 1:1-28 (2015) - [j38]Jinshu Su
, Xiaofeng Wang, Weisong Shi
, Indrakshi Ray:
Security, trust, and resilience of distributed networks and systems. Secur. Commun. Networks 8(10): 1829-1830 (2015) - [c96]Kirill Belyaev, Indrakshi Ray:
Towards Efficient Dissemination and Filtering of XML Data Streams. CIT/IUCC/DASC/PICom 2015: 1870-1877 - [c95]Phillipa Bennett, Indrakshi Ray, Robert B. France:
Analysis of a Relationship Based Access Control Model. C3S2E 2015: 1-8 - [c94]Ibrahim Lazrig, Tarik Moataz, Indrajit Ray, Indrakshi Ray, Toan Ong, Michael G. Kahn, Frédéric Cuppens, Nora Cuppens-Boulahia:
Privacy Preserving Record Matching Using Automated Semi-trusted Broker. DBSec 2015: 103-118 - [c93]Indrakshi Ray, Raman Adaikkalavan, Xing Xie, Rose F. Gamble:
Stream Processing with Secure Information Flow Constraints. DBSec 2015: 311-329 - [c92]Phillipa Bennett, Indrakshi Ray, Robert B. France:
Modeling of Online Social Network Policies Using an Attribute-Based Access Control Framework. ICISS 2015: 79-97 - [c91]Phillipa Bennett, Wuliang Sun, Ted D. Wade, Geri Georg, Indrakshi Ray, Michael G. Kahn:
Analyzing Regulatory Conformance in Medical Research Systems Using Multi-Paradigm Modeling. GEMOC+MPM@MoDELS 2015: 22-31 - 2014
- [j37]Ramadan Abdunabi, Wuliang Sun, Indrakshi Ray:
Enforcing spatio-temporal access control in mobile applications. Computing 96(4): 313-353 (2014) - [j36]Sarra M. Alqahtani
, Rose F. Gamble, Indrakshi Ray:
Enforcing the Chinese wall model for tenant conflict of interest in the service cloud. Int. J. Bus. Process. Integr. Manag. 7(2): 166-177 (2014) - [j35]Ping Yang, Xing Xie, Indrakshi Ray, Shiyong Lu:
Satisfiability Analysis of Workflows with Control-Flow Patterns and Authorization Constraints. IEEE Trans. Serv. Comput. 7(2): 237-251 (2014) - [c90]Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray:
Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds. DBSec 2014: 66-81 - [c89]Tarik Moataz, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray, Indrakshi Ray:
ELITE: zEro Links Identity managemenT systEm. DBSec 2014: 195-210 - [c88]Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray:
A Responsive Defense Mechanism Against DDoS Attacks. FPS 2014: 347-355 - [c87]Prabhakaran Murugesan, Indrakshi Ray:
Audit Log Management in MongoDB. SERVICES 2014: 53-57 - [c86]Curtis C. R. Busby Earle, Robert B. France, Indrakshi Ray:
Analysing Requirements to Detect Latent Security Vulnerabilities. SERE (Companion) 2014: 168-175 - 2013
- [j34]Ramadan Abdunabi, Mustafa Al-Lail, Indrakshi Ray, Robert B. France:
Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model. IEEE Syst. J. 7(3): 501-515 (2013) - [c85]Kirill Belyaev, Indrakshi Ray, Indrajit Ray, Gary Luckasen:
Personal health record storage on privacy preserving green clouds. CollaborateCom 2013: 448-457 - [c84]Indrajit Ray, Dieudonne Mulamba, Indrakshi Ray, Keesook J. Han:
A Model for Trust-Based Access Control and Delegation in Mobile Clouds. DBSec 2013: 242-257 - [c83]Xing Xie, Indrakshi Ray, Waruna Ranasinghe, Philips A. Gilbert, Pramod Shashidhara, Anoop Yadav:
Distributed Multilevel Secure Data Stream Processing. ICDCS Workshops 2013: 368-373 - [c82]Mustafa Al-Lail, Ramadan Abdunabi, Robert B. France, Indrakshi Ray:
Rigorous Analysis of Temporal Access Control Properties in Mobile Systems. ICECCS 2013: 246-251 - [c81]Wuliang Sun, Robert B. France, Indrakshi Ray:
Analyzing Behavioral Refactoring of Class Models. ME@MoDELS 2013: 70-79 - [c80]Mustafa Al-Lail, Ramadan Abdunabi, Robert B. France, Indrakshi Ray:
An Approach to Analyzing Temporal Properties in UML Class Models. MoDeVVa@MoDELS 2013: 77-86 - [c79]Wuliang Sun, Robert B. France, Indrakshi Ray:
Contract-Aware Slicing of UML Class Models. MoDELS 2013: 724-739 - [c78]Xing Xie, Indrakshi Ray, Raman Adaikkalavan, Rose F. Gamble:
Information flow control for stream processing in clouds. SACMAT 2013: 89-100 - [c77]Ramadan Abdunabi, Indrakshi Ray, Robert B. France:
Specification and analysis of access control policies for mobile applications. SACMAT 2013: 173-184 - [c76]Sarra M. Alqahtani
, Rose F. Gamble, Indrakshi Ray:
Auditing Requirements for Implementing the Chinese Wall Model in the Service Cloud. SERVICES 2013: 298-305 - [c75]Xing Xie, Indrakshi Ray, Raman Adaikkalavan:
On the Efficient Processing of Multilevel Secure Continuous Queries. SocialCom 2013: 417-422 - [e5]Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan:
Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings. Lecture Notes in Computer Science 8300, Springer 2013, ISBN 978-3-319-03583-3 [contents] - [e4]Aditya Bagchi, Indrakshi Ray:
Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings. Lecture Notes in Computer Science 8303, Springer 2013, ISBN 978-3-642-45203-1 [contents] - 2012
- [j33]Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
Utility driven optimization of real time data broadcast schedules. Appl. Soft Comput. 12(7): 1832-1846 (2012) - [j32]Raman Adaikkalavan, Xing Xie, Indrakshi Ray:
Multilevel secure data stream processing: Architecture and implementation. J. Comput. Secur. 20(5): 547-581 (2012) - [c74]Lijun Yu, Robert B. France, Indrakshi Ray, Wuliang Sun:
Systematic Scenario-Based Analysis of UML Design Class Models. ICECCS 2012: 86-95 - [c73]Indrakshi Ray, Sanjay Kumar Madria, Mark Linderman:
Query Plan Execution in a Heterogeneous Stream Management System for Situational Awareness. SRDS 2012: 424-429 - 2011
- [j31]Parvathi Chundi, Tai Xin, Indrakshi Ray:
When does a workflow complete? Comput. Stand. Interfaces 33(3): 292-300 (2011) - [j30]Manachai Toahchoodee, Indrakshi Ray:
On the formalization and analysis of a spatio-temporal role-based access control model. J. Comput. Secur. 19(3): 399-452 (2011) - [j29]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization. J. Comput. Secur. 19(5): 935-974 (2011) - [j28]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
k-Anonymization in the Presence of Publisher Preferences. IEEE Trans. Knowl. Data Eng. 23(11): 1678-1690 (2011) - [c72]Raman Adaikkalavan, Indrakshi Ray, Xing Xie:
Multilevel Secure Data Stream Processing. DBSec 2011: 122-137 - [c71]Wuliang Sun, Robert B. France, Indrakshi Ray:
Supporting Iterative Development of Robust Operation Contracts in UML Requirements Models. HASE 2011: 9-16 - [c70]Sean S. E. Thorpe, Indrakshi Ray, Indrajit Ray, Tyrone Grandison
, Abbie Barbir, Robert B. France:
Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment. ICDF2C 2011: 156-171 - [c69]Wuliang Sun, Robert B. France, Indrakshi Ray:
Rigorous Analysis of UML Access Control Policy Models. POLICY 2011: 9-16 - 2010
- [j27]Indrakshi Ray:
Using Graph Theory to Represent a Spatio-Temporal Role-Based Access Control Model. Int. J. Next Gener. Comput. 1(2) (2010) - [j26]Manachai Toahchoodee, Indrakshi Ray, Ross M. McConnell:
Using Graph Theory to Represent a Spatio-Temporal Role-Based Access Control Model. Int. J. Next Gener. Comput. 1(2) (2010) - [j25]Tristan Allard, Nicolas Anciaux, Luc Bouganim, Yanli Guo, Lionel Le Folgoc, Benjamin Nguyen
, Philippe Pucheral, Indrajit Ray, Indrakshi Ray, Shaoyi Yin:
Secure Personal Data Servers: a Vision Paper. Proc. VLDB Endow. 3(1): 25-35 (2010) - [j24]Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
Real time stochastic scheduling in broadcast systems with decentralized data storage. Real Time Syst. 45(3): 143-175 (2010) - [j23]Kyriakos Anastasakis, Behzad Bordbar, Geri Georg, Indrakshi Ray:
On challenges of model transformation from UML to Alloy. Softw. Syst. Model. 9(1): 69-86 (2010) - [j22]Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray, Sudip Chakraborty
:
Trust-Based Security Level Evaluation Using Bayesian Belief Networks. Trans. Comput. Sci. 10: 154-186 (2010) - [j21]Geri Georg, Kyriakos Anastasakis, Behzad Bordbar, Siv Hilde Houmb, Indrakshi Ray, Manachai Toahchoodee:
Verification and Trade-Off Analysis of Security Properties in UML System Models. IEEE Trans. Software Eng. 36(3): 338-356 (2010) - [c68]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
On the Identification of Property Based Generalizations in Microdata Anonymization. DBSec 2010: 81-96 - [c67]Siv Hilde Houmb, Sudip Chakraborty
, Indrakshi Ray, Indrajit Ray:
Using Trust-Based Information Aggregation for Predicting Security Level of Systems. DBSec 2010: 241-256 - [c66]Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services. Mobile Data Management 2010: 95-104 - [c65]Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS. SecureComm 2010: 71-88
2000 – 2009
- 2009
- [j20]Manachai Toahchoodee, Indrakshi Ray:
Using alloy to analyse a spatio-temporal access control model supporting delegation. IET Inf. Secur. 3(3): 75-113 (2009) - [j19]Geri Georg, Indrakshi Ray, Kyriakos Anastasakis, Behzad Bordbar, Manachai Toahchoodee, Siv Hilde Houmb:
An aspect-oriented methodology for designing secure applications. Inf. Softw. Technol. 51(5): 846-864 (2009) - [j18]Indrakshi Ray, Indrajit Ray, Sudip Chakraborty
:
An interoperable context sensitive model of trust. J. Intell. Inf. Syst. 32(1): 75-104 (2009) - [j17]Nayot Poolsappasit, Indrakshi Ray:
Towards Achieving Personalized Privacy for Location-Based Services. Trans. Data Priv. 2(1): 77-99 (2009) - [c64]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice. CIKM 2009: 1037-1046 - [c63]Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi Ray, Indrajit Ray:
A Trust-Based Access Control Model for Pervasive Computing Applications. DBSec 2009: 307-314 - [c62]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
On the comparison of microdata disclosure control algorithms. EDBT 2009: 240-251 - [c61]Rinku Dewri, L. Darrell Whitley, Indrajit Ray, Indrakshi Ray:
A multi-objective approach to data sharing with privacy constraints and preference based objectives. GECCO 2009: 1499-1506 - [c60]Lijun Yu, Robert B. France, Indrakshi Ray, Sudipto Ghosh:
A Rigorous Approach to Uncovering Security Policy Violations in UML Designs. ICECCS 2009: 126-135 - [c59]Manachai Toahchoodee, Xing Xie, Indrakshi Ray:
Towards Trustworthy Delegation in Role-Based Access Control Model. ISC 2009: 379-394 - [c58]Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anastasakis, Geri Georg, Behzad Bordbar:
Ensuring spatio-temporal access control for real-world applications. SACMAT 2009: 13-22 - [r1]Indrakshi Ray:
Secure Transaction Processing. Encyclopedia of Database Systems 2009: 2540-2546 - 2008
- [j16]Indrakshi Ray:
Editorial. ACM Trans. Inf. Syst. Secur. 11(1): 1:1 (2008) - [c57]Indrakshi Ray, Wei Huang:
Increasing Expressiveness of Composite Events Using Parameter Contexts. ADBIS 2008: 215-230 - [c56]Manachai Toahchoodee, Indrakshi Ray:
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model. DBSec 2008: 17-32 - [c55]Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
Optimizing on-demand data broadcast scheduling in pervasive environments. EDBT 2008: 559-569 - [c54]Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
Security Provisioning in Pervasive Environments Using Multi-objective Optimization. ESORICS 2008: 349-363 - [c53]Rinku Dewri, L. Darrell Whitley, Indrakshi Ray, Indrajit Ray:
Evolution strategy based optimization of on-demand dependent data broadcast scheduling. GECCO 2008: 1699-1700 - [c52]Nayot Poolsappasit, Indrakshi Ray:
Towards a scalable model for location privacy. SPRINGL 2008: 46-51 - [c51]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
On the Optimal Selection of k in the k-Anonymity Problem. ICDE 2008: 1364-1366 - [c50]Lijun Yu, Robert B. France, Indrakshi Ray:
Scenario-Based Static Analysis of UML Class Models. MoDELS 2008: 234-248 - [c49]Rinku Dewri, L. Darrell Whitley, Indrajit Ray, Indrakshi Ray:
Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy. PPSN 2008: 991-1000 - [c48]Indrakshi Ray, Manachai Toahchoodee:
A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications. TrustBus 2008: 48-58 - [e3]Indrakshi Ray, Ninghui Li:
13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings. ACM 2008, ISBN 978-1-60558-129-3 [contents] - 2007
- [j15]Eunjee Song
, Shuxin Yin, Indrakshi Ray:
Using UML to model relational database operations. Comput. Stand. Interfaces 29(3): 343-354 (2007) - [j14]Tai Xin, Indrakshi Ray:
A lattice-based approach for updating access control policies in real-time. Inf. Syst. 32(5): 755-772 (2007) - [c47]Indrakshi Ray, Manachai Toahchoodee:
A Spatio-temporal Role-Based Access Control Model. DBSec 2007: 211-226 - [c46]Jinyoo Kim, Yashwant K. Malaiya, Indrakshi Ray:
Vulnerability Discovery in Multi-Version Software Systems. HASE 2007: 141-148 - [c45]Lijun Yu, Robert B. France, Indrakshi Ray, Kevin Lano:
A light-weight static approach to analyzing UML behavioral properties. ICECCS 2007: 56-63 - [c44]Indrakshi Ray, C. J. Michael Geisterfer:
A method for early correspondence discovery using instance data. ICEIS (1) 2007: 258-263 - [c43]Kyriakos Anastasakis, Behzad Bordbar, Geri Georg, Indrakshi Ray:
UML2Alloy: A Challenging Model Transformation. MoDELS 2007: 436-450 - 2006
- [j13]Indrakshi Ray, Mahendra Kumar:
Towards a location-based mandatory access control model. Comput. Secur. 25(1): 36-44 (2006) - [j12]Indrakshi Ray, Tai Xin:
Analysis of dependencies in advanced transaction models. Distributed Parallel Databases 20(1): 5-27 (2006) - [j11]Anna Cinzia Squicciarini
, Elisa Bertino, Elena Ferrari
, Indrakshi Ray:
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach. IEEE Trans. Dependable Secur. Comput. 3(1): 13-30 (2006) - [c42]Shuxin Yin, Indrakshi Ray, Indrajit Ray:
A Trust Model for Pervasive Computing Environments. CollaborateCom 2006 - [c41]Geri Georg, Siv Hilde Houmb, Indrakshi Ray:
Aspect-Oriented Risk Driven Development of Secure Applications. DBSec 2006: 282-296 - [c40]Tai Xin, Indrakshi Ray, Parvathi Chundi, Sopak Chaichana:
On the Completion of Workflows. DEXA 2006: 582-591 - [c39]Monte Lunacek, L. Darrell Whitley, Indrakshi Ray:
A crossover operator for the k- anonymity problem. GECCO 2006: 1713-1720 - [c38]Anna Cinzia Squicciarini
, Abhilasha Bhargav-Spantzel, Elisa Bertino, Elena Ferrari
, Indrakshi Ray:
Trust Negotiations with Customizable Anonymity. IAT Workshops 2006: 69-72 - [c37]Indrakshi Ray, Mahendra Kumar, Lijun Yu:
LRBAC: A Location-Aware Role-Based Access Control Model. ICISS 2006: 147-161 - [c36]Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray:
Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation. iTrust 2006: 135-149 - [e2]David F. Ferraiolo, Indrakshi Ray:
11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings. ACM 2006, ISBN 1-59593-353-0 [contents] - 2005
- [j10]Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthi:
An anonymous and failure resilient fair-exchange e-commerce protocol. Decis. Support Syst. 39(3): 267-292 (2005) - [j9]Indrakshi Ray:
Applying Semantic Knowledge to Real-Time Update of Access Control Policies. IEEE Trans. Knowl. Data Eng. 17(6): 844-858 (2005) - [c35]Shuxin Yin, Indrakshi Ray:
Relational Database Operations Modeling with UML. AINA 2005: 927-932 - [c34]Tai Xin, Yajie Zhu, Indrakshi Ray:
Reliable Scheduling of Advanced Transactions. DBSec 2005: 124-138 - [c33]Yajie Zhu, Tai Xin, Indrakshi Ray:
Recovering from Malicious Attacks in Workflow Systems. DEXA 2005: 14-23 - [c32]Manachai Toahchoodee, Indrakshi Ray:
Validation of Policy Integration Using Alloy. ICDCIT 2005: 420-431 - [c31]Indrajit Ray, Sudip Chakraborty, Indrakshi Ray:
VTrust: A Trust Management System Based on a Vector Model of Trust. ICISS 2005: 91-105 - [c30]Indrakshi Ray, Wei Huang:
Event Detection in Multilevel Secure Active Databases. ICISS 2005: 177-190 - [c29]Tai Xin, Indrakshi Ray:
Detection for Conflicts of Dependencies in Advanced Transaction Models. IDEAS 2005: 17-26 - [c28]Indrakshi Ray, Elisa Bertino, Anna Cinzia Squicciarini
, Elena Ferrari
:
Anonymity Preserving Techniques in Trust Negotiations. Privacy Enhancing Technologies 2005: 93-109 - [c27]Eunjee Song
, Raghu Reddy
, Robert B. France, Indrakshi Ray, Geri Georg, Roger T. Alexander:
Verifiable composition of access control and application features. SACMAT 2005: 120-129 - [c26]Indrakshi Ray, Lijun Yu:
Short Paper: Towards a Location-Aware Role-Based Access Control Model. SecureComm 2005: 234-236 - 2004
- [j8]Indrakshi Ray:
Real-time update of access control policies. Data Knowl. Eng. 49(3): 287-309 (2004) - [j7]Robert B. France, Indrakshi Ray, Geri Georg, Sudipto Ghosh:
Aspect-oriented approach to early design modelling. IEE Proc. Softw. 151(4): 173-186 (2004) - [j6]Indrakshi Ray, Robert B. France, Na Li, Geri Georg:
An aspect-based approach to modeling access control concerns. Inf. Softw. Technol. 46(9): 575-587 (2004) - [j5]Vijayalakshmi Atluri
, Indrakshi Ray:
Editors' message for the special issue on security. Int. J. Digit. Libr. 4(3): 137-138 (2004) - [c25]Nitin Prabhu, Vijay Kumar, Indrakshi Ray, Gi-Chul Yang:
Concurrency Control in Mobile Database Systems. AINA (2) 2004: 83-86 - [c24]Indrakshi Ray, Ross M. McConnell, Monte Lunacek, Vijay Kumar:
Reducing Damage Assessment Latency in Survivable Databases. BNCOD 2004: 106-111 - [c23]Indrakshi Ray, Tai Xin:
Implementing Real-Time Update of Access Control Policies. DBSec 2004: 65-80 - [c22]Indrakshi Ray, Tai Xin, Yajie Zhu:
Ensuring Task Dependencies During Workflow Recovery. DEXA 2004: 24-33 - [c21]Dae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na Li:
Modeling Role-Based Access Control Using Parameterized UML Models. FASE 2004: 180-193 - [c20]Indrakshi Ray, Marianna Muller:
Using Schemas to Simplify Access Control for XML Documents. ICDCIT 2004: 363-368 - [c19]Nitin Prabhu, Vijay Kumar, Indrakshi Ray:
Periodic Scheduling in On-Demand Broadcast System. ISTA 2004: 107-121 - [c18]Indrakshi Ray, Na Li, Robert B. France, Dae-Kyoo Kim:
Using uml to visualize role-based access control constraints. SACMAT 2004: 115-124 - [e1]Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray:
Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA. IFIP 142, Kluwer/Springer 2004, ISBN 1-4020-8069-7 [contents] - 2003
- [c17]Indrakshi Ray:
Multilevel Secure Rules and Its Impact on the Design of Active Database Systems. BNCOD 2003: 226-244 - [c16]Indrakshi Ray, Tai Xin:
Concurrent and Real-Time Update of Access Control Policies. DEXA 2003: 330-339 - [c15]Indrakshi Ray, Na Li, Dae-Kyoo Kim, Robert B. France:
Using Parameterized UML to Specify and Compose Access Control Models. IICIS 2003: 49-65 - 2002
- [j4]Indrajit Ray, Indrakshi Ray:
Fair exchange in E-commerce. SIGecom Exch. 3(2): 9-17 (2002) - [c14]Indrajit Ray, Indrakshi Ray:
Anonymous and Secure Multicast Subscription. DBSec 2002: 313-327 - [c13]Geri Georg, Indrakshi Ray, Robert B. France:
Using Aspects to Design a Secure System. ICECCS 2002: 117- - [c12]Indrakshi Ray, Indrajit Ray:
Using Compatible Keys for Secure Multicasting in E-Commerce. IPDPS 2002 - [c11]Indrakshi Ray, Indrajit Ray, Natu Narasimhamurthi:
A cryptographic solution to implement access control in a hierarchy and more. SACMAT 2002: 65-73 - [c10]Geri Georg, Robert B. France, Indrakshi Ray:
Designing High Integrity Systems Using Aspects. IICIS 2002: 37-57 - 2001
- [c9]Indrakshi Ray, Indrajit Ray:
Detecting Termination of Active Database Rules Using Symbolic Model Checking. ADBIS 2001: 266-279 - [c8]Indrakshi Ray, Indrajit Ray:
An Anomymous Fair Exchange E-commerce Protocol. IPDPS 2001: 172 - [c7]Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthi:
An Anonymous Electronic Voting Protocol for Voting Over The Internet. WECWIS 2001: 188-191 - 2000
- [j3]Indrakshi Ray, Paul Ammann, Sushil Jajodia:
Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity. Inf. Sci. 129(1-4): 155-195 (2000) - [c6]Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthy:
A Fair-exchange E-commerce Protocol with Automated Dispute Resolution. DBSec 2000: 27-38 - [c5]Indrakshi Ray, Indrajit Ray:
An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution. EC-Web 2000: 84-93 - [c4]Indrakshi Ray, Indrajit Ray:
Failure Analysis of an E-Commerce Protocol Using Model Checking. WECWIS 2000: 176-183
1990 – 1999
- 1998
- [j2]Indrakshi Ray, Paul Ammann, Sushil Jajodia:
A Semantic-Based Transaction Processing Model for Multilevel Transactions. J. Comput. Secur. 6(3): 181-217 (1998) - 1997
- [j1]Paul Ammann, Sushil Jajodia, Indrakshi Ray:
Applying Formal Methods to Semantic-Based Decomposition of Transactions. ACM Trans. Database Syst. 22(2): 215-254 (1997) - [c3]Sushil Jajodia, Indrakshi Ray, Paul Ammann:
Implementing Semantic-Based Decomposition of Transactions. CAiSE 1997: 75-88 - [p1]Paul Ammann, Sushil Jajodia, Indrakshi Ray:
Semantic-Based Decomposition of Transactions. Advanced Transaction Models and Architectures 1997 - 1996
- [c2]Paul Ammann, Sushil Jajodia, Indrakshi Ray:
Ensuring Atomicity of Multilevel Transactions. S&P 1996: 74-84 - 1995
- [c1]Paul Ammann, Sushil Jajodia, Indrakshi Ray:
Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions. VLDB 1995: 218-227
Coauthor Index
aka: Bruhadeshwar Bezawada

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-08 21:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint