dblp.uni-trier.dewww.uni-trier.de

Indrakshi Ray

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
75EERinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley: On the comparison of microdata disclosure control algorithms. EDBT 2009: 240-251
74EENayot Poolsappasit, Indrakshi Ray: Towards Achieving Personalized Privacy for Location-Based Services. Transactions on Data Privacy 2(1): 77-99 (2009)
2008
73 Indrakshi Ray, Ninghui Li: SACMAT 2008, 13th ACM Symposium on Access Control Models and Technologies, Estes Park, CO, USA, June 11-13, 2008, Proceedings ACM 2008
72EEIndrakshi Ray, Wei Huang: Increasing Expressiveness of Composite Events Using Parameter Contexts. ADBIS 2008: 215-230
71EEManachai Toahchoodee, Indrakshi Ray: On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model. DBSec 2008: 17-32
70EERinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell Whitley: Optimizing on-demand data broadcast scheduling in pervasive environments. EDBT 2008: 559-569
69EERinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell Whitley: Security Provisioning in Pervasive Environments Using Multi-objective Optimization. ESORICS 2008: 349-363
68EERinku Dewri, Darrell Whitley, Indrakshi Ray, Indrajit Ray: Evolution strategy based optimization of on-demand dependent data broadcast scheduling. GECCO 2008: 1699-1700
67EERinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley: On the Optimal Selection of k in the k-Anonymity Problem. ICDE 2008: 1364-1366
66EELijun Yu, Robert B. France, Indrakshi Ray: Scenario-Based Static Analysis of UML Class Models. MoDELS 2008: 234-248
65EERinku Dewri, Darrell Whitley, Indrajit Ray, Indrakshi Ray: Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy. PPSN 2008: 991-1000
64EENayot Poolsappasit, Indrakshi Ray: Towards a scalable model for location privacy. SPRINGL 2008: 46-51
63EEIndrakshi Ray, Manachai Toahchoodee: A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications. TrustBus 2008: 48-58
62EEIndrakshi Ray: Editorial. ACM Trans. Inf. Syst. Secur. 11(1): (2008)
2007
61EEIndrakshi Ray, Manachai Toahchoodee: A Spatio-temporal Role-Based Access Control Model. DBSec 2007: 211-226
60EEJinyoo Kim, Yashwant K. Malaiya, Indrakshi Ray: Vulnerability Discovery in Multi-Version Software Systems. HASE 2007: 141-148
59EELijun Yu, Robert B. France, Indrakshi Ray, Kevin Lano: A light-weight static approach to analyzing UML behavioral properties. ICECCS 2007: 56-63
58 Indrakshi Ray, C. J. Michael Geisterfer: A method for early correspondence discovery using instance data. ICEIS (1) 2007: 258-263
57EEKyriakos Anastasakis, Behzad Bordbar, Geri Georg, Indrakshi Ray: UML2Alloy: A Challenging Model Transformation. MoDELS 2007: 436-450
56EETai Xin, Indrakshi Ray: A lattice-based approach for updating access control policies in real-time. Inf. Syst. 32(5): 755-772 (2007)
2006
55 David F. Ferraiolo, Indrakshi Ray: SACMAT 2006,11th ACM Symposium on Access Control Models and Technologies, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings ACM 2006
54EEGeri Georg, Siv Hilde Houmb, Indrakshi Ray: Aspect-Oriented Risk Driven Development of Secure Applications. DBSec 2006: 282-296
53EETai Xin, Indrakshi Ray, Parvathi Chundi, Sopak Chaichana: On the Completion of Workflows. DEXA 2006: 582-591
52EEMonte Lunacek, Darrell Whitley, Indrakshi Ray: A crossover operator for the k- anonymity problem. GECCO 2006: 1713-1720
51EEAnna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Elena Ferrari, Indrakshi Ray: Trust Negotiations with Customizable Anonymity. IAT Workshops 2006: 69-72
50EEIndrakshi Ray, Mahendra Kumar, Lijun Yu: LRBAC: A Location-Aware Role-Based Access Control Model. ICISS 2006: 147-161
49EESiv Hilde Houmb, Indrakshi Ray, Indrajit Ray: Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation. iTrust 2006: 135-149
48EEIndrakshi Ray, Mahendra Kumar: Towards a location-based mandatory access control model. Computers & Security 25(1): 36-44 (2006)
47EEIndrakshi Ray, Tai Xin: Analysis of dependencies in advanced transaction models. Distributed and Parallel Databases 20(1): 5-27 (2006)
46EEAnna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Indrakshi Ray: Achieving Privacy in Trust Negotiations with an Ontology-Based Approach. IEEE Trans. Dependable Sec. Comput. 3(1): 13-30 (2006)
2005
45EEShuxin Yin, Indrakshi Ray: Relational Database Operations Modeling with UML. AINA 2005: 927-932
44EETai Xin, Yajie Zhu, Indrakshi Ray: Reliable Scheduling of Advanced Transactions. DBSec 2005: 124-138
43EEYajie Zhu, Tai Xin, Indrakshi Ray: Recovering from Malicious Attacks in Workflow Systems. DEXA 2005: 14-23
42EEManachai Toahchoodee, Indrakshi Ray: Validation of Policy Integration Using Alloy. ICDCIT 2005: 420-431
41EEIndrakshi Ray, Wei Huang: Event Detection in Multilevel Secure Active Databases. ICISS 2005: 177-190
40EEIndrajit Ray, Sudip Chakraborty, Indrakshi Ray: VTrust: A Trust Management System Based on a Vector Model of Trust. ICISS 2005: 91-105
39EETai Xin, Indrakshi Ray: Detection for Conflicts of Dependencies in Advanced Transaction Models. IDEAS 2005: 17-26
38EEIndrakshi Ray, Elisa Bertino, Anna Cinzia Squicciarini, Elena Ferrari: Anonymity Preserving Techniques in Trust Negotiations. Privacy Enhancing Technologies 2005: 93-109
37EEEunjee Song, Raghu Reddy, Robert B. France, Indrakshi Ray, Geri Georg, Roger T. Alexander: Verifiable composition of access control and application features. SACMAT 2005: 120-129
36EEIndrajit Ray, Indrakshi Ray, Narasimhamurthi Natarajan: An anonymous and failure resilient fair-exchange e-commerce protocol. Decision Support Systems 39(3): 267-292 (2005)
35EEIndrakshi Ray: Applying Semantic Knowledge to Real-Time Update of Access Control Policies - Appendices. IEEE Trans. Knowl. Data Eng. 17(6): (2005)
34EEIndrakshi Ray: Applying Semantic Knowledge to Real-Time Update of Access Control Policies. IEEE Trans. Knowl. Data Eng. 17(6): 844-858 (2005)
2004
33 Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray: Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA Kluwer 2004
32EENitin Prabhu, Vijay Kumar, Indrakshi Ray, Gi-Chul Yang: Concurrency Control in Mobile Database Systems. AINA (2) 2004: 83-86
31EEIndrakshi Ray, Ross M. McConnell, Monte Lunacek, Vijay Kumar: Reducing Damage Assessment Latency in Survivable Databases. BNCOD 2004: 106-111
30 Indrakshi Ray, Tai Xin: Implementing Real-Time Update of Access Control Policies. DBSec 2004: 65-80
29EEIndrakshi Ray, Tai Xin, Yajie Zhu: Ensuring Task Dependencies During Workflow Recovery. DEXA 2004: 24-33
28EEDae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na Li: Modeling Role-Based Access Control Using Parameterized UML Models. FASE 2004: 180-193
27EEIndrakshi Ray, Marianna Muller: Using Schemas to Simplify Access Control for XML Documents. ICDCIT 2004: 363-368
26 Nitin Prabhu, Vijay Kumar, Indrakshi Ray: Periodic Scheduling in On-Demand Broadcast System. ISTA 2004: 107-121
25EEIndrakshi Ray, Na Li, Robert B. France, Dae-Kyoo Kim: Using uml to visualize role-based access control constraints. SACMAT 2004: 115-124
24EEIndrakshi Ray: Real-time update of access control policies. Data Knowl. Eng. 49(3): 287-309 (2004)
23EERobert B. France, Indrakshi Ray, Geri Georg, Sudipto Ghosh: Aspect-oriented approach to early design modelling. IEE Proceedings - Software 151(4): 173-186 (2004)
22EEIndrakshi Ray, Robert B. France, Na Li, Geri Georg: An aspect-based approach to modeling access control concerns. Information & Software Technology 46(9): 575-587 (2004)
21EEVijayalakshmi Atluri, Indrakshi Ray: Editors' message for the special issue on security. Int. J. on Digital Libraries 4(3): 137-138 (2004)
2003
20EEIndrakshi Ray: Multilevel Secure Rules and Its Impact on the Design of Active Database Systems. BNCOD 2003: 226-244
19EEIndrakshi Ray, Tai Xin: Concurrent and Real-Time Update of Access Control Policies. DEXA 2003: 330-339
2002
18 Indrajit Ray, Indrakshi Ray: Anonymous and Secure Multicast Subscription. DBSec 2002: 313-327
17EEGeri Georg, Indrakshi Ray, Robert B. France: Using Aspects to Design a Secure System. ICECCS 2002: 117-
16 Geri Georg, Robert B. France, Indrakshi Ray: Designing High Integrity Systems Using Aspects. IICIS 2002: 37-57
15EEIndrakshi Ray, Indrajit Ray: Using Compatible Keys for Secure Multicasting in E-Commerce. IPDPS 2002
14EEIndrakshi Ray, Indrajit Ray, Natu Narasimhamurthi: A cryptographic solution to implement access control in a hierarchy and more. SACMAT 2002: 65-73
13EEIndrajit Ray, Indrakshi Ray: Fair exchange in E-commerce. SIGecom Exchanges 3(2): 9-17 (2002)
2001
12EEIndrakshi Ray, Indrajit Ray: Detecting Termination of Active Database Rules Using Symbolic Model Checking. ADBIS 2001: 266-279
11 Indrakshi Ray, Indrajit Ray: An Anomymous Fair Exchange E-commerce Protocol. IPDPS 2001: 172
2000
10 Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthy: A Fair-exchange E-commerce Protocol with Automated Dispute Resolution. DBSec 2000: 27-38
9EEIndrakshi Ray, Indrajit Ray: An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution. EC-Web 2000: 84-93
8EEIndrakshi Ray, Indrajit Ray: Failure Analysis of an E-Commerce Protocol Using Model Checking. WECWIS 2000: 176-183
7 Indrakshi Ray, Paul Ammann, Sushil Jajodia: Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity. Inf. Sci. 129(1-4): 155-195 (2000)
1998
6 Indrakshi Ray, Paul Ammann, Sushil Jajodia: A Semantic-Based Transaction Processing Model for Multilevel Transactions. Journal of Computer Security 6(3): 181-217 (1998)
1997
5 Sushil Jajodia, Indrakshi Ray, Paul Ammann: Implementing Semantic-Based Decomposition of Transactions. CAiSE 1997: 75-88
4 Paul Ammann, Sushil Jajodia, Indrakshi Ray: Semantic-Based Decomposition of Transactions. Advanced Transaction Models and Architectures 1997: 0-
3EEPaul Ammann, Sushil Jajodia, Indrakshi Ray: Applying Formal Methods to Semantic-Based Decomposition of Transactions. ACM Trans. Database Syst. 22(2): 215-254 (1997)
1996
2EEPaul Ammann, Sushil Jajodia, Indrakshi Ray: Ensuring Atomicity of Multilevel Transactions. IEEE Symposium on Security and Privacy 1996: 74-84
1995
1EEPaul Ammann, Sushil Jajodia, Indrakshi Ray: Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions. VLDB 1995: 218-227

Coauthor Index

1Roger T. Alexander [37]
2Paul Ammann [1] [2] [3] [4] [5] [6] [7]
3Kyriakos Anastasakis [57]
4Vijayalakshmi Atluri (Vijay Atluri) [21]
5Elisa Bertino [38] [46] [51]
6Abhilasha Bhargav-Spantzel [51]
7Behzad Bordbar [57]
8Sopak Chaichana [53]
9Sudip Chakraborty [40]
10Parvathi Chundi [53]
11Rinku Dewri [65] [67] [68] [69] [70] [75]
12David F. Ferraiolo [55]
13Elena Ferrari [38] [46] [51]
14Robert B. France [16] [17] [22] [23] [25] [28] [37] [59] [66]
15C. J. Michael Geisterfer [58]
16Geri Georg [16] [17] [22] [23] [37] [54] [57]
17Sudipto Ghosh [23]
18Siv Hilde Houmb [49] [54]
19Wei Huang [41] [72]
20Sushil Jajodia [1] [2] [3] [4] [5] [6] [7]
21Dae-Kyoo Kim [25] [28]
22Jinyoo Kim [60]
23Mahendra Kumar [48] [50]
24Vijay Kumar [26] [31] [32]
25Kevin Lano [59]
26Na Li [22] [25] [28]
27Ninghui Li [73]
28Monte Lunacek [31] [52]
29Yashwant K. Malaiya [60]
30Ross M. McConnell [31]
31Marianna Muller [27]
32Natu Narasimhamurthi [14]
33Natarajan Narasimhamurthy [10]
34Narasimhamurthi Natarajan [36]
35Nayot Poolsappasit [64] [74]
36Nitin Prabhu [26] [32]
37Indrajit Ray [8] [9] [10] [11] [12] [13] [14] [15] [18] [33] [36] [40] [49] [65] [67] [68] [69] [70] [75]
38Raghu Reddy (Raghu Y. Reddy) [37]
39Eunjee Song [37]
40Anna Cinzia Squicciarini [38] [46] [51]
41Manachai Toahchoodee [42] [61] [63] [71]
42Sabrina De Capitani di Vimercati [33]
43L. Darrell Whitley (Darrell Whitley) [52] [65] [67] [68] [69] [70] [75]
44Tai Xin [19] [29] [30] [39] [43] [44] [47] [53] [56]
45Gi-Chul Yang [32]
46Shuxin Yin [45]
47Lijun Yu [50] [59] [66]
48Yajie Zhu [29] [43] [44]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)