2009 | ||
---|---|---|
75 | EE | Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley: On the comparison of microdata disclosure control algorithms. EDBT 2009: 240-251 |
74 | EE | Nayot Poolsappasit, Indrakshi Ray: Towards Achieving Personalized Privacy for Location-Based Services. Transactions on Data Privacy 2(1): 77-99 (2009) |
2008 | ||
73 | Indrakshi Ray, Ninghui Li: SACMAT 2008, 13th ACM Symposium on Access Control Models and Technologies, Estes Park, CO, USA, June 11-13, 2008, Proceedings ACM 2008 | |
72 | EE | Indrakshi Ray, Wei Huang: Increasing Expressiveness of Composite Events Using Parameter Contexts. ADBIS 2008: 215-230 |
71 | EE | Manachai Toahchoodee, Indrakshi Ray: On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model. DBSec 2008: 17-32 |
70 | EE | Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell Whitley: Optimizing on-demand data broadcast scheduling in pervasive environments. EDBT 2008: 559-569 |
69 | EE | Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell Whitley: Security Provisioning in Pervasive Environments Using Multi-objective Optimization. ESORICS 2008: 349-363 |
68 | EE | Rinku Dewri, Darrell Whitley, Indrakshi Ray, Indrajit Ray: Evolution strategy based optimization of on-demand dependent data broadcast scheduling. GECCO 2008: 1699-1700 |
67 | EE | Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley: On the Optimal Selection of k in the k-Anonymity Problem. ICDE 2008: 1364-1366 |
66 | EE | Lijun Yu, Robert B. France, Indrakshi Ray: Scenario-Based Static Analysis of UML Class Models. MoDELS 2008: 234-248 |
65 | EE | Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrakshi Ray: Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy. PPSN 2008: 991-1000 |
64 | EE | Nayot Poolsappasit, Indrakshi Ray: Towards a scalable model for location privacy. SPRINGL 2008: 46-51 |
63 | EE | Indrakshi Ray, Manachai Toahchoodee: A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications. TrustBus 2008: 48-58 |
62 | EE | Indrakshi Ray: Editorial. ACM Trans. Inf. Syst. Secur. 11(1): (2008) |
2007 | ||
61 | EE | Indrakshi Ray, Manachai Toahchoodee: A Spatio-temporal Role-Based Access Control Model. DBSec 2007: 211-226 |
60 | EE | Jinyoo Kim, Yashwant K. Malaiya, Indrakshi Ray: Vulnerability Discovery in Multi-Version Software Systems. HASE 2007: 141-148 |
59 | EE | Lijun Yu, Robert B. France, Indrakshi Ray, Kevin Lano: A light-weight static approach to analyzing UML behavioral properties. ICECCS 2007: 56-63 |
58 | Indrakshi Ray, C. J. Michael Geisterfer: A method for early correspondence discovery using instance data. ICEIS (1) 2007: 258-263 | |
57 | EE | Kyriakos Anastasakis, Behzad Bordbar, Geri Georg, Indrakshi Ray: UML2Alloy: A Challenging Model Transformation. MoDELS 2007: 436-450 |
56 | EE | Tai Xin, Indrakshi Ray: A lattice-based approach for updating access control policies in real-time. Inf. Syst. 32(5): 755-772 (2007) |
2006 | ||
55 | David F. Ferraiolo, Indrakshi Ray: SACMAT 2006,11th ACM Symposium on Access Control Models and Technologies, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings ACM 2006 | |
54 | EE | Geri Georg, Siv Hilde Houmb, Indrakshi Ray: Aspect-Oriented Risk Driven Development of Secure Applications. DBSec 2006: 282-296 |
53 | EE | Tai Xin, Indrakshi Ray, Parvathi Chundi, Sopak Chaichana: On the Completion of Workflows. DEXA 2006: 582-591 |
52 | EE | Monte Lunacek, Darrell Whitley, Indrakshi Ray: A crossover operator for the k- anonymity problem. GECCO 2006: 1713-1720 |
51 | EE | Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Elena Ferrari, Indrakshi Ray: Trust Negotiations with Customizable Anonymity. IAT Workshops 2006: 69-72 |
50 | EE | Indrakshi Ray, Mahendra Kumar, Lijun Yu: LRBAC: A Location-Aware Role-Based Access Control Model. ICISS 2006: 147-161 |
49 | EE | Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray: Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation. iTrust 2006: 135-149 |
48 | EE | Indrakshi Ray, Mahendra Kumar: Towards a location-based mandatory access control model. Computers & Security 25(1): 36-44 (2006) |
47 | EE | Indrakshi Ray, Tai Xin: Analysis of dependencies in advanced transaction models. Distributed and Parallel Databases 20(1): 5-27 (2006) |
46 | EE | Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Indrakshi Ray: Achieving Privacy in Trust Negotiations with an Ontology-Based Approach. IEEE Trans. Dependable Sec. Comput. 3(1): 13-30 (2006) |
2005 | ||
45 | EE | Shuxin Yin, Indrakshi Ray: Relational Database Operations Modeling with UML. AINA 2005: 927-932 |
44 | EE | Tai Xin, Yajie Zhu, Indrakshi Ray: Reliable Scheduling of Advanced Transactions. DBSec 2005: 124-138 |
43 | EE | Yajie Zhu, Tai Xin, Indrakshi Ray: Recovering from Malicious Attacks in Workflow Systems. DEXA 2005: 14-23 |
42 | EE | Manachai Toahchoodee, Indrakshi Ray: Validation of Policy Integration Using Alloy. ICDCIT 2005: 420-431 |
41 | EE | Indrakshi Ray, Wei Huang: Event Detection in Multilevel Secure Active Databases. ICISS 2005: 177-190 |
40 | EE | Indrajit Ray, Sudip Chakraborty, Indrakshi Ray: VTrust: A Trust Management System Based on a Vector Model of Trust. ICISS 2005: 91-105 |
39 | EE | Tai Xin, Indrakshi Ray: Detection for Conflicts of Dependencies in Advanced Transaction Models. IDEAS 2005: 17-26 |
38 | EE | Indrakshi Ray, Elisa Bertino, Anna Cinzia Squicciarini, Elena Ferrari: Anonymity Preserving Techniques in Trust Negotiations. Privacy Enhancing Technologies 2005: 93-109 |
37 | EE | Eunjee Song, Raghu Reddy, Robert B. France, Indrakshi Ray, Geri Georg, Roger T. Alexander: Verifiable composition of access control and application features. SACMAT 2005: 120-129 |
36 | EE | Indrajit Ray, Indrakshi Ray, Narasimhamurthi Natarajan: An anonymous and failure resilient fair-exchange e-commerce protocol. Decision Support Systems 39(3): 267-292 (2005) |
35 | EE | Indrakshi Ray: Applying Semantic Knowledge to Real-Time Update of Access Control Policies - Appendices. IEEE Trans. Knowl. Data Eng. 17(6): (2005) |
34 | EE | Indrakshi Ray: Applying Semantic Knowledge to Real-Time Update of Access Control Policies. IEEE Trans. Knowl. Data Eng. 17(6): 844-858 (2005) |
2004 | ||
33 | Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray: Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA Kluwer 2004 | |
32 | EE | Nitin Prabhu, Vijay Kumar, Indrakshi Ray, Gi-Chul Yang: Concurrency Control in Mobile Database Systems. AINA (2) 2004: 83-86 |
31 | EE | Indrakshi Ray, Ross M. McConnell, Monte Lunacek, Vijay Kumar: Reducing Damage Assessment Latency in Survivable Databases. BNCOD 2004: 106-111 |
30 | Indrakshi Ray, Tai Xin: Implementing Real-Time Update of Access Control Policies. DBSec 2004: 65-80 | |
29 | EE | Indrakshi Ray, Tai Xin, Yajie Zhu: Ensuring Task Dependencies During Workflow Recovery. DEXA 2004: 24-33 |
28 | EE | Dae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na Li: Modeling Role-Based Access Control Using Parameterized UML Models. FASE 2004: 180-193 |
27 | EE | Indrakshi Ray, Marianna Muller: Using Schemas to Simplify Access Control for XML Documents. ICDCIT 2004: 363-368 |
26 | Nitin Prabhu, Vijay Kumar, Indrakshi Ray: Periodic Scheduling in On-Demand Broadcast System. ISTA 2004: 107-121 | |
25 | EE | Indrakshi Ray, Na Li, Robert B. France, Dae-Kyoo Kim: Using uml to visualize role-based access control constraints. SACMAT 2004: 115-124 |
24 | EE | Indrakshi Ray: Real-time update of access control policies. Data Knowl. Eng. 49(3): 287-309 (2004) |
23 | EE | Robert B. France, Indrakshi Ray, Geri Georg, Sudipto Ghosh: Aspect-oriented approach to early design modelling. IEE Proceedings - Software 151(4): 173-186 (2004) |
22 | EE | Indrakshi Ray, Robert B. France, Na Li, Geri Georg: An aspect-based approach to modeling access control concerns. Information & Software Technology 46(9): 575-587 (2004) |
21 | EE | Vijayalakshmi Atluri, Indrakshi Ray: Editors' message for the special issue on security. Int. J. on Digital Libraries 4(3): 137-138 (2004) |
2003 | ||
20 | EE | Indrakshi Ray: Multilevel Secure Rules and Its Impact on the Design of Active Database Systems. BNCOD 2003: 226-244 |
19 | EE | Indrakshi Ray, Tai Xin: Concurrent and Real-Time Update of Access Control Policies. DEXA 2003: 330-339 |
2002 | ||
18 | Indrajit Ray, Indrakshi Ray: Anonymous and Secure Multicast Subscription. DBSec 2002: 313-327 | |
17 | EE | Geri Georg, Indrakshi Ray, Robert B. France: Using Aspects to Design a Secure System. ICECCS 2002: 117- |
16 | Geri Georg, Robert B. France, Indrakshi Ray: Designing High Integrity Systems Using Aspects. IICIS 2002: 37-57 | |
15 | EE | Indrakshi Ray, Indrajit Ray: Using Compatible Keys for Secure Multicasting in E-Commerce. IPDPS 2002 |
14 | EE | Indrakshi Ray, Indrajit Ray, Natu Narasimhamurthi: A cryptographic solution to implement access control in a hierarchy and more. SACMAT 2002: 65-73 |
13 | EE | Indrajit Ray, Indrakshi Ray: Fair exchange in E-commerce. SIGecom Exchanges 3(2): 9-17 (2002) |
2001 | ||
12 | EE | Indrakshi Ray, Indrajit Ray: Detecting Termination of Active Database Rules Using Symbolic Model Checking. ADBIS 2001: 266-279 |
11 | Indrakshi Ray, Indrajit Ray: An Anomymous Fair Exchange E-commerce Protocol. IPDPS 2001: 172 | |
2000 | ||
10 | Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthy: A Fair-exchange E-commerce Protocol with Automated Dispute Resolution. DBSec 2000: 27-38 | |
9 | EE | Indrakshi Ray, Indrajit Ray: An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution. EC-Web 2000: 84-93 |
8 | EE | Indrakshi Ray, Indrajit Ray: Failure Analysis of an E-Commerce Protocol Using Model Checking. WECWIS 2000: 176-183 |
7 | Indrakshi Ray, Paul Ammann, Sushil Jajodia: Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity. Inf. Sci. 129(1-4): 155-195 (2000) | |
1998 | ||
6 | Indrakshi Ray, Paul Ammann, Sushil Jajodia: A Semantic-Based Transaction Processing Model for Multilevel Transactions. Journal of Computer Security 6(3): 181-217 (1998) | |
1997 | ||
5 | Sushil Jajodia, Indrakshi Ray, Paul Ammann: Implementing Semantic-Based Decomposition of Transactions. CAiSE 1997: 75-88 | |
4 | Paul Ammann, Sushil Jajodia, Indrakshi Ray: Semantic-Based Decomposition of Transactions. Advanced Transaction Models and Architectures 1997: 0- | |
3 | EE | Paul Ammann, Sushil Jajodia, Indrakshi Ray: Applying Formal Methods to Semantic-Based Decomposition of Transactions. ACM Trans. Database Syst. 22(2): 215-254 (1997) |
1996 | ||
2 | EE | Paul Ammann, Sushil Jajodia, Indrakshi Ray: Ensuring Atomicity of Multilevel Transactions. IEEE Symposium on Security and Privacy 1996: 74-84 |
1995 | ||
1 | EE | Paul Ammann, Sushil Jajodia, Indrakshi Ray: Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions. VLDB 1995: 218-227 |