2009 | ||
---|---|---|
53 | EE | Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley: On the comparison of microdata disclosure control algorithms. EDBT 2009: 240-251 |
2008 | ||
52 | Indrajit Ray, Sujeet Shenoi: Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008 Springer 2008 | |
51 | EE | Indrajit Ray, Nayot Poolsappasit, Rinku Dewri: An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems. DBSec 2008: 297-312 |
50 | EE | Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell Whitley: Optimizing on-demand data broadcast scheduling in pervasive environments. EDBT 2008: 559-569 |
49 | EE | Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell Whitley: Security Provisioning in Pervasive Environments Using Multi-objective Optimization. ESORICS 2008: 349-363 |
48 | EE | Rinku Dewri, Darrell Whitley, Indrakshi Ray, Indrajit Ray: Evolution strategy based optimization of on-demand dependent data broadcast scheduling. GECCO 2008: 1699-1700 |
47 | EE | Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley: On the Optimal Selection of k in the k-Anonymity Problem. ICDE 2008: 1364-1366 |
46 | EE | H. M. N. Dilum Bandara, Anura P. Jayasumana, Indrajit Ray: Key pre-distribution based secure backbone formation in wireless sensor networks. LCN 2008: 786-793 |
45 | EE | Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrakshi Ray: Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy. PPSN 2008: 991-1000 |
44 | EE | Indrajit Ray, Sudip Chakraborty: Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data. SEC 2008: 605-620 |
43 | EE | Indrajit Ray, Hongjun Zhang: Experiences in developing a fair-exchange e-commerce protocol using common off-the-shelf components. Electronic Commerce Research and Applications 7(2): 247-259 (2008) |
42 | EE | Andrew Burt, Michael Darschewski, Indrajit Ray, Ramakrishna Thurimella, Hailin Wu: Origins: an approach to trace fast spreading worms to their roots. IJSN 3(1): 36-46 (2008) |
41 | EE | Indrajit Ray, Nayot Poolsappasit: Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents. IJSN 3(2): 80-94 (2008) |
2007 | ||
40 | EE | Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, Darrell Whitley: Optimal security hardening using multi-objective optimization on attack tree models of networks. ACM Conference on Computer and Communications Security 2007: 204-213 |
39 | EE | Sudip Chakraborty, Nayot Poolsappasit, Indrajit Ray: Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments. DBSec 2007: 77-92 |
38 | EE | Nayot Poolsapassit, Indrajit Ray: Investigating Computer Attacks Using Attack Trees. IFIP Int. Conf. Digital Forensics 2007: 331-343 |
37 | EE | Omar H. Alhazmi, Yashwant K. Malaiya, Indrajit Ray: Measuring, analyzing and predicting security vulnerabilities in software systems. Computers & Security 26(3): 219-228 (2007) |
36 | EE | Sudip Chakraborty, Indrajit Ray: p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework. JCP 2(2): 13-24 (2007) |
2006 | ||
35 | EE | Indrajit Ray, Sudip Chakraborty: A Framework for Flexible Access Control in Digital Library Systems. DBSec 2006: 252-266 |
34 | Indrajit Ray: Remote Upload of Evidence over Mobile Ad Hoc Networks. IFIP Int. Conf. Digital Forensics 2006: 41-54 | |
33 | EE | Sudip Chakraborty, Indrajit Ray: TrustBAC: integrating trust relationships into the RBAC model for access control in open systems. SACMAT 2006: 49-58 |
32 | EE | Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray: Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation. iTrust 2006: 135-149 |
2005 | ||
31 | EE | Omar H. Alhazmi, Yashwant K. Malaiya, Indrajit Ray: Security Vulnerabilities in Software Systems: A Quantitative Perspective. DBSec 2005: 281-294 |
30 | EE | Indrajit Ray, Eunjong Kim, Ross M. McConnell, Daniel Massey: Reliably, Securely and Efficiently Distributing Electronic Content Using Multicasting. EC-Web 2005: 327-336 |
29 | EE | Indrajit Ray, Nayot Poolsapassit: Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. ESORICS 2005: 231-246 |
28 | EE | Indrajit Ray: System Security Track Chair's Message. ICDCIT 2005: 333 |
27 | EE | Indrajit Ray, Sudip Chakraborty, Indrakshi Ray: VTrust: A Trust Management System Based on a Vector Model of Trust. ICISS 2005: 91-105 |
26 | Eunjong Kim, Daniel Massey, Indrajit Ray: Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback. IFIP Int. Conf. Digital Forensics 2005: 165-176 | |
25 | EE | Indrajit Ray, Indrakshi Ray, Narasimhamurthi Natarajan: An anonymous and failure resilient fair-exchange e-commerce protocol. Decision Support Systems 39(3): 267-292 (2005) |
2004 | ||
24 | Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray: Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA Kluwer 2004 | |
23 | Indrajit Ray, Tomas Hajek: Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation. DBSec 2004: 295-309 | |
22 | EE | Indrajit Ray, Mike Geisterfer: Towards a Privacy Preserving e-Commerce Protocol. EC-Web 2004: 154-163 |
21 | EE | Indrajit Ray, Sudip Chakraborty: A Vector Model of Trust for Developing Trustworthy Systems. ESORICS 2004: 260-275 |
20 | EE | Vamsi Kambhampati, Indrajit Ray, Eunjong Kim: A Secure Checkpointing Protocol for Survivable Server Design. ICDCIT 2004: 430-440 |
19 | Indrajit Ray, Eunjong Kim: Collective Signature for Efficient Authentication of XML Documents. SEC 2004: 411-424 | |
18 | Indrajit Ray, Sonja Tideman: A Secure TCP Connection Migration Protocol to Enable the Survivability of Client-Server Applications under Malicious Attack. J. Network Syst. Manage. 12(3): (2004) | |
2002 | ||
17 | Indrajit Ray, Indrakshi Ray: Anonymous and Secure Multicast Subscription. DBSec 2002: 313-327 | |
16 | EE | Indrakshi Ray, Indrajit Ray: Using Compatible Keys for Secure Multicasting in E-Commerce. IPDPS 2002 |
15 | EE | Indrakshi Ray, Indrajit Ray, Natu Narasimhamurthi: A cryptographic solution to implement access control in a hierarchy and more. SACMAT 2002: 65-73 |
14 | EE | Indrajit Ray, Indrakshi Ray: Fair exchange in E-commerce. SIGecom Exchanges 3(2): 9-17 (2002) |
2001 | ||
13 | EE | Indrakshi Ray, Indrajit Ray: Detecting Termination of Active Database Rules Using Symbolic Model Checking. ADBIS 2001: 266-279 |
12 | Indrakshi Ray, Indrajit Ray: An Anomymous Fair Exchange E-commerce Protocol. IPDPS 2001: 172 | |
2000 | ||
11 | Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthy: A Fair-exchange E-commerce Protocol with Automated Dispute Resolution. DBSec 2000: 27-38 | |
10 | EE | Indrakshi Ray, Indrajit Ray: An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution. EC-Web 2000: 84-93 |
9 | EE | Indrakshi Ray, Indrajit Ray: Failure Analysis of an E-Commerce Protocol Using Model Checking. WECWIS 2000: 176-183 |
8 | EE | Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino: Flexible Transaction Dependencies in Database Systems. Distributed and Parallel Databases 8(4): 399-446 (2000) |
7 | EE | Indrajit Ray, Luigi V. Mancini, Sushil Jajodia, Elisa Bertino: ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems. IEEE Trans. Knowl. Data Eng. 12(6): 880-899 (2000) |
1998 | ||
6 | EE | Elisa Bertino, Sushil Jajodia, Luigi V. Mancini, Indrajit Ray: Advanced Transaction Processing in Multilevel Secure File Stores. IEEE Trans. Knowl. Data Eng. 10(1): 120-135 (1998) |
1997 | ||
5 | Sushil Jajodia, Ravi Mukkamala, Indrajit Ray: A Two-tier Coarse Indexing Scheme for MLS Database Systems. DBSec 1997: 199-218 | |
4 | Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino: Flexible Commit Protocols for Advanced Transaction Processing. Advanced Transaction Models and Architectures 1997: 0- | |
1996 | ||
3 | EE | Indrajit Ray, Elisa Bertino, Sushil Jajodia, Luigi V. Mancini: An Advanced Commit Protocol for MLS Distributed Database Systems. ACM Conference on Computer and Communications Security 1996: 119-128 |
2 | Sushil Jajodia, Luigi V. Mancini, Indrajit Ray: Secure Locking Protocols for Multilevel Database Management Systems. DBSec 1996: 177-194 | |
1 | EE | Luigi V. Mancini, Indrajit Ray: Secure Concurrency Control in MLS Databases with Two Versions of Data. ESORICS 1996: 304-323 |