2009 |
75 | EE | Rinku Dewri,
Indrajit Ray,
Indrakshi Ray,
Darrell Whitley:
On the comparison of microdata disclosure control algorithms.
EDBT 2009: 240-251 |
74 | EE | Nayot Poolsappasit,
Indrakshi Ray:
Towards Achieving Personalized Privacy for Location-Based Services.
Transactions on Data Privacy 2(1): 77-99 (2009) |
2008 |
73 | | Indrakshi Ray,
Ninghui Li:
SACMAT 2008, 13th ACM Symposium on Access Control Models and Technologies, Estes Park, CO, USA, June 11-13, 2008, Proceedings
ACM 2008 |
72 | EE | Indrakshi Ray,
Wei Huang:
Increasing Expressiveness of Composite Events Using Parameter Contexts.
ADBIS 2008: 215-230 |
71 | EE | Manachai Toahchoodee,
Indrakshi Ray:
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model.
DBSec 2008: 17-32 |
70 | EE | Rinku Dewri,
Indrakshi Ray,
Indrajit Ray,
Darrell Whitley:
Optimizing on-demand data broadcast scheduling in pervasive environments.
EDBT 2008: 559-569 |
69 | EE | Rinku Dewri,
Indrakshi Ray,
Indrajit Ray,
Darrell Whitley:
Security Provisioning in Pervasive Environments Using Multi-objective Optimization.
ESORICS 2008: 349-363 |
68 | EE | Rinku Dewri,
Darrell Whitley,
Indrakshi Ray,
Indrajit Ray:
Evolution strategy based optimization of on-demand dependent data broadcast scheduling.
GECCO 2008: 1699-1700 |
67 | EE | Rinku Dewri,
Indrajit Ray,
Indrakshi Ray,
Darrell Whitley:
On the Optimal Selection of k in the k-Anonymity Problem.
ICDE 2008: 1364-1366 |
66 | EE | Lijun Yu,
Robert B. France,
Indrakshi Ray:
Scenario-Based Static Analysis of UML Class Models.
MoDELS 2008: 234-248 |
65 | EE | Rinku Dewri,
Darrell Whitley,
Indrajit Ray,
Indrakshi Ray:
Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy.
PPSN 2008: 991-1000 |
64 | EE | Nayot Poolsappasit,
Indrakshi Ray:
Towards a scalable model for location privacy.
SPRINGL 2008: 46-51 |
63 | EE | Indrakshi Ray,
Manachai Toahchoodee:
A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications.
TrustBus 2008: 48-58 |
62 | EE | Indrakshi Ray:
Editorial.
ACM Trans. Inf. Syst. Secur. 11(1): (2008) |
2007 |
61 | EE | Indrakshi Ray,
Manachai Toahchoodee:
A Spatio-temporal Role-Based Access Control Model.
DBSec 2007: 211-226 |
60 | EE | Jinyoo Kim,
Yashwant K. Malaiya,
Indrakshi Ray:
Vulnerability Discovery in Multi-Version Software Systems.
HASE 2007: 141-148 |
59 | EE | Lijun Yu,
Robert B. France,
Indrakshi Ray,
Kevin Lano:
A light-weight static approach to analyzing UML behavioral properties.
ICECCS 2007: 56-63 |
58 | | Indrakshi Ray,
C. J. Michael Geisterfer:
A method for early correspondence discovery using instance data.
ICEIS (1) 2007: 258-263 |
57 | EE | Kyriakos Anastasakis,
Behzad Bordbar,
Geri Georg,
Indrakshi Ray:
UML2Alloy: A Challenging Model Transformation.
MoDELS 2007: 436-450 |
56 | EE | Tai Xin,
Indrakshi Ray:
A lattice-based approach for updating access control policies in real-time.
Inf. Syst. 32(5): 755-772 (2007) |
2006 |
55 | | David F. Ferraiolo,
Indrakshi Ray:
SACMAT 2006,11th ACM Symposium on Access Control Models and Technologies, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings
ACM 2006 |
54 | EE | Geri Georg,
Siv Hilde Houmb,
Indrakshi Ray:
Aspect-Oriented Risk Driven Development of Secure Applications.
DBSec 2006: 282-296 |
53 | EE | Tai Xin,
Indrakshi Ray,
Parvathi Chundi,
Sopak Chaichana:
On the Completion of Workflows.
DEXA 2006: 582-591 |
52 | EE | Monte Lunacek,
Darrell Whitley,
Indrakshi Ray:
A crossover operator for the k- anonymity problem.
GECCO 2006: 1713-1720 |
51 | EE | Anna Cinzia Squicciarini,
Abhilasha Bhargav-Spantzel,
Elisa Bertino,
Elena Ferrari,
Indrakshi Ray:
Trust Negotiations with Customizable Anonymity.
IAT Workshops 2006: 69-72 |
50 | EE | Indrakshi Ray,
Mahendra Kumar,
Lijun Yu:
LRBAC: A Location-Aware Role-Based Access Control Model.
ICISS 2006: 147-161 |
49 | EE | Siv Hilde Houmb,
Indrakshi Ray,
Indrajit Ray:
Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation.
iTrust 2006: 135-149 |
48 | EE | Indrakshi Ray,
Mahendra Kumar:
Towards a location-based mandatory access control model.
Computers & Security 25(1): 36-44 (2006) |
47 | EE | Indrakshi Ray,
Tai Xin:
Analysis of dependencies in advanced transaction models.
Distributed and Parallel Databases 20(1): 5-27 (2006) |
46 | EE | Anna Cinzia Squicciarini,
Elisa Bertino,
Elena Ferrari,
Indrakshi Ray:
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach.
IEEE Trans. Dependable Sec. Comput. 3(1): 13-30 (2006) |
2005 |
45 | EE | Shuxin Yin,
Indrakshi Ray:
Relational Database Operations Modeling with UML.
AINA 2005: 927-932 |
44 | EE | Tai Xin,
Yajie Zhu,
Indrakshi Ray:
Reliable Scheduling of Advanced Transactions.
DBSec 2005: 124-138 |
43 | EE | Yajie Zhu,
Tai Xin,
Indrakshi Ray:
Recovering from Malicious Attacks in Workflow Systems.
DEXA 2005: 14-23 |
42 | EE | Manachai Toahchoodee,
Indrakshi Ray:
Validation of Policy Integration Using Alloy.
ICDCIT 2005: 420-431 |
41 | EE | Indrakshi Ray,
Wei Huang:
Event Detection in Multilevel Secure Active Databases.
ICISS 2005: 177-190 |
40 | EE | Indrajit Ray,
Sudip Chakraborty,
Indrakshi Ray:
VTrust: A Trust Management System Based on a Vector Model of Trust.
ICISS 2005: 91-105 |
39 | EE | Tai Xin,
Indrakshi Ray:
Detection for Conflicts of Dependencies in Advanced Transaction Models.
IDEAS 2005: 17-26 |
38 | EE | Indrakshi Ray,
Elisa Bertino,
Anna Cinzia Squicciarini,
Elena Ferrari:
Anonymity Preserving Techniques in Trust Negotiations.
Privacy Enhancing Technologies 2005: 93-109 |
37 | EE | Eunjee Song,
Raghu Reddy,
Robert B. France,
Indrakshi Ray,
Geri Georg,
Roger T. Alexander:
Verifiable composition of access control and application features.
SACMAT 2005: 120-129 |
36 | EE | Indrajit Ray,
Indrakshi Ray,
Narasimhamurthi Natarajan:
An anonymous and failure resilient fair-exchange e-commerce protocol.
Decision Support Systems 39(3): 267-292 (2005) |
35 | EE | Indrakshi Ray:
Applying Semantic Knowledge to Real-Time Update of Access Control Policies - Appendices.
IEEE Trans. Knowl. Data Eng. 17(6): (2005) |
34 | EE | Indrakshi Ray:
Applying Semantic Knowledge to Real-Time Update of Access Control Policies.
IEEE Trans. Knowl. Data Eng. 17(6): 844-858 (2005) |
2004 |
33 | | Sabrina De Capitani di Vimercati,
Indrakshi Ray,
Indrajit Ray:
Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA
Kluwer 2004 |
32 | EE | Nitin Prabhu,
Vijay Kumar,
Indrakshi Ray,
Gi-Chul Yang:
Concurrency Control in Mobile Database Systems.
AINA (2) 2004: 83-86 |
31 | EE | Indrakshi Ray,
Ross M. McConnell,
Monte Lunacek,
Vijay Kumar:
Reducing Damage Assessment Latency in Survivable Databases.
BNCOD 2004: 106-111 |
30 | | Indrakshi Ray,
Tai Xin:
Implementing Real-Time Update of Access Control Policies.
DBSec 2004: 65-80 |
29 | EE | Indrakshi Ray,
Tai Xin,
Yajie Zhu:
Ensuring Task Dependencies During Workflow Recovery.
DEXA 2004: 24-33 |
28 | EE | Dae-Kyoo Kim,
Indrakshi Ray,
Robert B. France,
Na Li:
Modeling Role-Based Access Control Using Parameterized UML Models.
FASE 2004: 180-193 |
27 | EE | Indrakshi Ray,
Marianna Muller:
Using Schemas to Simplify Access Control for XML Documents.
ICDCIT 2004: 363-368 |
26 | | Nitin Prabhu,
Vijay Kumar,
Indrakshi Ray:
Periodic Scheduling in On-Demand Broadcast System.
ISTA 2004: 107-121 |
25 | EE | Indrakshi Ray,
Na Li,
Robert B. France,
Dae-Kyoo Kim:
Using uml to visualize role-based access control constraints.
SACMAT 2004: 115-124 |
24 | EE | Indrakshi Ray:
Real-time update of access control policies.
Data Knowl. Eng. 49(3): 287-309 (2004) |
23 | EE | Robert B. France,
Indrakshi Ray,
Geri Georg,
Sudipto Ghosh:
Aspect-oriented approach to early design modelling.
IEE Proceedings - Software 151(4): 173-186 (2004) |
22 | EE | Indrakshi Ray,
Robert B. France,
Na Li,
Geri Georg:
An aspect-based approach to modeling access control concerns.
Information & Software Technology 46(9): 575-587 (2004) |
21 | EE | Vijayalakshmi Atluri,
Indrakshi Ray:
Editors' message for the special issue on security.
Int. J. on Digital Libraries 4(3): 137-138 (2004) |
2003 |
20 | EE | Indrakshi Ray:
Multilevel Secure Rules and Its Impact on the Design of Active Database Systems.
BNCOD 2003: 226-244 |
19 | EE | Indrakshi Ray,
Tai Xin:
Concurrent and Real-Time Update of Access Control Policies.
DEXA 2003: 330-339 |
2002 |
18 | | Indrajit Ray,
Indrakshi Ray:
Anonymous and Secure Multicast Subscription.
DBSec 2002: 313-327 |
17 | EE | Geri Georg,
Indrakshi Ray,
Robert B. France:
Using Aspects to Design a Secure System.
ICECCS 2002: 117- |
16 | | Geri Georg,
Robert B. France,
Indrakshi Ray:
Designing High Integrity Systems Using Aspects.
IICIS 2002: 37-57 |
15 | EE | Indrakshi Ray,
Indrajit Ray:
Using Compatible Keys for Secure Multicasting in E-Commerce.
IPDPS 2002 |
14 | EE | Indrakshi Ray,
Indrajit Ray,
Natu Narasimhamurthi:
A cryptographic solution to implement access control in a hierarchy and more.
SACMAT 2002: 65-73 |
13 | EE | Indrajit Ray,
Indrakshi Ray:
Fair exchange in E-commerce.
SIGecom Exchanges 3(2): 9-17 (2002) |
2001 |
12 | EE | Indrakshi Ray,
Indrajit Ray:
Detecting Termination of Active Database Rules Using Symbolic Model Checking.
ADBIS 2001: 266-279 |
11 | | Indrakshi Ray,
Indrajit Ray:
An Anomymous Fair Exchange E-commerce Protocol.
IPDPS 2001: 172 |
2000 |
10 | | Indrajit Ray,
Indrakshi Ray,
Natarajan Narasimhamurthy:
A Fair-exchange E-commerce Protocol with Automated Dispute Resolution.
DBSec 2000: 27-38 |
9 | EE | Indrakshi Ray,
Indrajit Ray:
An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution.
EC-Web 2000: 84-93 |
8 | EE | Indrakshi Ray,
Indrajit Ray:
Failure Analysis of an E-Commerce Protocol Using Model Checking.
WECWIS 2000: 176-183 |
7 | | Indrakshi Ray,
Paul Ammann,
Sushil Jajodia:
Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity.
Inf. Sci. 129(1-4): 155-195 (2000) |
1998 |
6 | | Indrakshi Ray,
Paul Ammann,
Sushil Jajodia:
A Semantic-Based Transaction Processing Model for Multilevel Transactions.
Journal of Computer Security 6(3): 181-217 (1998) |
1997 |
5 | | Sushil Jajodia,
Indrakshi Ray,
Paul Ammann:
Implementing Semantic-Based Decomposition of Transactions.
CAiSE 1997: 75-88 |
4 | | Paul Ammann,
Sushil Jajodia,
Indrakshi Ray:
Semantic-Based Decomposition of Transactions.
Advanced Transaction Models and Architectures 1997: 0- |
3 | EE | Paul Ammann,
Sushil Jajodia,
Indrakshi Ray:
Applying Formal Methods to Semantic-Based Decomposition of Transactions.
ACM Trans. Database Syst. 22(2): 215-254 (1997) |
1996 |
2 | EE | Paul Ammann,
Sushil Jajodia,
Indrakshi Ray:
Ensuring Atomicity of Multilevel Transactions.
IEEE Symposium on Security and Privacy 1996: 74-84 |
1995 |
1 | EE | Paul Ammann,
Sushil Jajodia,
Indrakshi Ray:
Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions.
VLDB 1995: 218-227 |