Indrajit Ray Home Page Coauthor index DBLP Vis pubzone.org

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

DBLP keys2009
59Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley: POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice. CIKM 2009: 1037-1046
58Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLManachai Toahchoodee, Ramadan Abdunabi, Indrakshi Ray, Indrajit Ray: A Trust-Based Access Control Model for Pervasive Computing Applications. DBSec 2009: 307-314
57Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley: On the comparison of microdata disclosure control algorithms. EDBT 2009: 240-251
56Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRinku Dewri, Darrell Whitley, Indrajit Ray, Indrakshi Ray: A multi-objective approach to data sharing with privacy constraints and preference based objectives. GECCO 2009: 1499-1506
55Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrakshi Ray, Indrajit Ray, Sudip Chakraborty: An interoperable context sensitive model of trust. J. Intell. Inf. Syst. 32(1): 75-104 (2009)
2008
54no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray, Sujeet Shenoi: Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008 Springer 2008
53Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray, Nayot Poolsappasit, Rinku Dewri: An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems. DBSec 2008: 297-312
52Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell Whitley: Optimizing on-demand data broadcast scheduling in pervasive environments. EDBT 2008: 559-569
51Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell Whitley: Security Provisioning in Pervasive Environments Using Multi-objective Optimization. ESORICS 2008: 349-363
50Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRinku Dewri, Darrell Whitley, Indrakshi Ray, Indrajit Ray: Evolution strategy based optimization of on-demand dependent data broadcast scheduling. GECCO 2008: 1699-1700
49Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley: On the Optimal Selection of k in the k-Anonymity Problem. ICDE 2008: 1364-1366
48Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLH. M. N. Dilum Bandara, Anura P. Jayasumana, Indrajit Ray: Key pre-distribution based secure backbone formation in wireless sensor networks. LCN 2008: 786-793
47Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRinku Dewri, Darrell Whitley, Indrajit Ray, Indrakshi Ray: Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy. PPSN 2008: 991-1000
46Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray, Sudip Chakraborty: Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data. SEC 2008: 605-620
45Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray, Hongjun Zhang: Experiences in developing a fair-exchange e-commerce protocol using common off-the-shelf components. Electronic Commerce Research and Applications 7(2): 247-259 (2008)
44Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAndrew Burt, Michael Darschewski, Indrajit Ray, Ramakrishna Thurimella, Hailin Wu: Origins: an approach to trace fast spreading worms to their roots. IJSN 3(1): 36-46 (2008)
43Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray, Nayot Poolsappasit: Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents. IJSN 3(2): 80-94 (2008)
2007
42Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRinku Dewri, Nayot Poolsappasit, Indrajit Ray, Darrell Whitley: Optimal security hardening using multi-objective optimization on attack tree models of networks. ACM Conference on Computer and Communications Security 2007: 204-213
41Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSudip Chakraborty, Nayot Poolsappasit, Indrajit Ray: Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments. DBSec 2007: 77-92
40Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNayot Poolsapassit, Indrajit Ray: Investigating Computer Attacks Using Attack Trees. IFIP Int. Conf. Digital Forensics 2007: 331-343
39Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray, Junxing Zhang: Towards a new standard for allowing concurrency and ensuring consistency in revision control systems. Computer Standards & Interfaces 29(3): 355-364 (2007)
38Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJunxing Zhang, Indrajit Ray: Towards secure multi-sited transactional revision control systems. Computer Standards & Interfaces 29(3): 365-375 (2007)
37Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLOmar H. Alhazmi, Yashwant K. Malaiya, Indrajit Ray: Measuring, analyzing and predicting security vulnerabilities in software systems. Computers & Security 26(3): 219-228 (2007)
36Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSudip Chakraborty, Indrajit Ray: p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework. JCP 2(2): 13-24 (2007)
2006
35Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray, Sudip Chakraborty: A Framework for Flexible Access Control in Digital Library Systems. DBSec 2006: 252-266
34no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray: Remote Upload of Evidence over Mobile Ad Hoc Networks. IFIP Int. Conf. Digital Forensics 2006: 41-54
33Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSudip Chakraborty, Indrajit Ray: TrustBAC: integrating trust relationships into the RBAC model for access control in open systems. SACMAT 2006: 49-58
32Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSiv Hilde Houmb, Indrakshi Ray, Indrajit Ray: Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation. iTrust 2006: 135-149
2005
31Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLOmar H. Alhazmi, Yashwant K. Malaiya, Indrajit Ray: Security Vulnerabilities in Software Systems: A Quantitative Perspective. DBSec 2005: 281-294
30Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray, Eunjong Kim, Ross M. McConnell, Daniel Massey: Reliably, Securely and Efficiently Distributing Electronic Content Using Multicasting. EC-Web 2005: 327-336
29Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray, Nayot Poolsapassit: Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. ESORICS 2005: 231-246
28Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray: System Security Track Chair's Message. ICDCIT 2005: 333
27Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray, Sudip Chakraborty, Indrakshi Ray: VTrust: A Trust Management System Based on a Vector Model of Trust. ICISS 2005: 91-105
26no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLEunjong Kim, Daniel Massey, Indrajit Ray: Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback. IFIP Int. Conf. Digital Forensics 2005: 165-176
25Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray, Indrakshi Ray, Narasimhamurthi Natarajan: An anonymous and failure resilient fair-exchange e-commerce protocol. Decision Support Systems 39(3): 267-292 (2005)
2004
24no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray: Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA Kluwer 2004
23no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray, Tomas Hajek: Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation. DBSec 2004: 295-309
22Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray, Mike Geisterfer: Towards a Privacy Preserving e-Commerce Protocol. EC-Web 2004: 154-163
21Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray, Sudip Chakraborty: A Vector Model of Trust for Developing Trustworthy Systems. ESORICS 2004: 260-275
20Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLVamsi Kambhampati, Indrajit Ray, Eunjong Kim: A Secure Checkpointing Protocol for Survivable Server Design. ICDCIT 2004: 430-440
19no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray, Eunjong Kim: Collective Signature for Efficient Authentication of XML Documents. SEC 2004: 411-424
18no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray, Sonja Tideman: A Secure TCP Connection Migration Protocol to Enable the Survivability of Client-Server Applications under Malicious Attack. J. Network Syst. Manage. 12(3): (2004)
2002
17no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray, Indrakshi Ray: Anonymous and Secure Multicast Subscription. DBSec 2002: 313-327
16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrakshi Ray, Indrajit Ray: Using Compatible Keys for Secure Multicasting in E-Commerce. IPDPS 2002
15Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrakshi Ray, Indrajit Ray, Natu Narasimhamurthi: A cryptographic solution to implement access control in a hierarchy and more. SACMAT 2002: 65-73
14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray, Indrakshi Ray: Fair exchange in E-commerce. SIGecom Exchanges 3(2): 9-17 (2002)
2001
13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrakshi Ray, Indrajit Ray: Detecting Termination of Active Database Rules Using Symbolic Model Checking. ADBIS 2001: 266-279
12no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrakshi Ray, Indrajit Ray: An Anomymous Fair Exchange E-commerce Protocol. IPDPS 2001: 172
2000
11no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthy: A Fair-exchange E-commerce Protocol with Automated Dispute Resolution. DBSec 2000: 27-38
10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrakshi Ray, Indrajit Ray: An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution. EC-Web 2000: 84-93
9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrakshi Ray, Indrajit Ray: Failure Analysis of an E-Commerce Protocol Using Model Checking. WECWIS 2000: 176-183
8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLuigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino: Flexible Transaction Dependencies in Database Systems. Distributed and Parallel Databases 8(4): 399-446 (2000)
7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray, Luigi V. Mancini, Sushil Jajodia, Elisa Bertino: ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems. IEEE Trans. Knowl. Data Eng. 12(6): 880-899 (2000)
1998
6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLElisa Bertino, Sushil Jajodia, Luigi V. Mancini, Indrajit Ray: Advanced Transaction Processing in Multilevel Secure File Stores. IEEE Trans. Knowl. Data Eng. 10(1): 120-135 (1998)
1997
5no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSushil Jajodia, Ravi Mukkamala, Indrajit Ray: A Two-tier Coarse Indexing Scheme for MLS Database Systems. DBSec 1997: 199-218
4no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLuigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino: Flexible Commit Protocols for Advanced Transaction Processing. Advanced Transaction Models and Architectures 1997: 0-
1996
3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrajit Ray, Elisa Bertino, Sushil Jajodia, Luigi V. Mancini: An Advanced Commit Protocol for MLS Distributed Database Systems. ACM Conference on Computer and Communications Security 1996: 119-128
2no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSushil Jajodia, Luigi V. Mancini, Indrajit Ray: Secure Locking Protocols for Multilevel Database Management Systems. DBSec 1996: 177-194
1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLuigi V. Mancini, Indrajit Ray: Secure Concurrency Control in MLS Databases with Two Versions of Data. ESORICS 1996: 304-323

Coauthor Index

1Ramadan Abdunabi [58]
2Omar H. Alhazmi [31] [37]
3H. M. N. Dilum Bandara [48]
4Elisa Bertino [3] [4] [6] [7] [8]
5Andrew Burt [44]
6Sudip Chakraborty [21] [27] [33] [35] [36] [41] [46] [55]
7Michael Darschewski [44]
8Rinku Dewri [42] [47] [49] [50] [51] [52] [53] [56] [57] [59]
9Mike Geisterfer [22]
10Tomas Hajek [23]
11Siv Hilde Houmb [32]
12Sushil Jajodia [2] [3] [4] [5] [6] [7] [8]
13Anura P. Jayasumana [48]
14Vamsi Kambhampati [20]
15Eunjong Kim [19] [20] [26] [30]
16Yashwant K. Malaiya [31] [37]
17Luigi V. Mancini [1] [2] [3] [4] [6] [7] [8]
18Daniel Massey [26] [30]
19Ross M. McConnell [30]
20Ravi Mukkamala [5]
21Natu Narasimhamurthi [15]
22Natarajan Narasimhamurthy [11]
23Narasimhamurthi Natarajan [25]
24Nayot Poolsapassit [29] [40]
25Nayot Poolsappasit [41] [42] [43] [53]
26Indrakshi Ray [9] [10] [11] [12] [13] [14] [15] [16] [17] [24] [25] [27] [32] [47] [49] [50] [51] [52] [55] [56] [57] [58] [59]
27Sujeet Shenoi [54]
28Ramakrishna Thurimella (Ramki Thurimella) [44]
29Sonja Tideman [18]
30Manachai Toahchoodee [58]
31Sabrina De Capitani di Vimercati [24]
32L. Darrell Whitley (Darrell Whitley) [42] [47] [49] [50] [51] [52] [56] [57] [59]
33Hailin Wu [44]
34Hongjun Zhang [45]
35Junxing Zhang [38] [39]

Colors in the list of coauthors

Copyright © Sun Mar 14 22:39:24 2010 by Michael Ley (ley@uni-trier.de)