2009 | ||
---|---|---|
59 | Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley: POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice. CIKM 2009: 1037-1046 | |
58 | Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi Ray, Indrajit Ray: A Trust-Based Access Control Model for Pervasive Computing Applications. DBSec 2009: 307-314 | |
57 | Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley: On the comparison of microdata disclosure control algorithms. EDBT 2009: 240-251 | |
56 | Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrakshi Ray: A multi-objective approach to data sharing with privacy constraints and preference based objectives. GECCO 2009: 1499-1506 | |
55 | Indrakshi Ray, Indrajit Ray, Sudip Chakraborty: An interoperable context sensitive model of trust. J. Intell. Inf. Syst. 32(1): 75-104 (2009) | |
2008 | ||
54 | Indrajit Ray, Sujeet Shenoi: Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008 Springer 2008 | |
53 | Indrajit Ray, Nayot Poolsappasit, Rinku Dewri: An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems. DBSec 2008: 297-312 | |
52 | Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell Whitley: Optimizing on-demand data broadcast scheduling in pervasive environments. EDBT 2008: 559-569 | |
51 | Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell Whitley: Security Provisioning in Pervasive Environments Using Multi-objective Optimization. ESORICS 2008: 349-363 | |
50 | Rinku Dewri, Darrell Whitley, Indrakshi Ray, Indrajit Ray: Evolution strategy based optimization of on-demand dependent data broadcast scheduling. GECCO 2008: 1699-1700 | |
49 | Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley: On the Optimal Selection of k in the k-Anonymity Problem. ICDE 2008: 1364-1366 | |
48 | H. M. N. Dilum Bandara, Anura P. Jayasumana, Indrajit Ray: Key pre-distribution based secure backbone formation in wireless sensor networks. LCN 2008: 786-793 | |
47 | Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrakshi Ray: Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy. PPSN 2008: 991-1000 | |
46 | Indrajit Ray, Sudip Chakraborty: Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data. SEC 2008: 605-620 | |
45 | Indrajit Ray, Hongjun Zhang: Experiences in developing a fair-exchange e-commerce protocol using common off-the-shelf components. Electronic Commerce Research and Applications 7(2): 247-259 (2008) | |
44 | Andrew Burt, Michael Darschewski, Indrajit Ray, Ramakrishna Thurimella, Hailin Wu: Origins: an approach to trace fast spreading worms to their roots. IJSN 3(1): 36-46 (2008) | |
43 | Indrajit Ray, Nayot Poolsappasit: Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents. IJSN 3(2): 80-94 (2008) | |
2007 | ||
42 | Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, Darrell Whitley: Optimal security hardening using multi-objective optimization on attack tree models of networks. ACM Conference on Computer and Communications Security 2007: 204-213 | |
41 | Sudip Chakraborty, Nayot Poolsappasit, Indrajit Ray: Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments. DBSec 2007: 77-92 | |
40 | Nayot Poolsapassit, Indrajit Ray: Investigating Computer Attacks Using Attack Trees. IFIP Int. Conf. Digital Forensics 2007: 331-343 | |
39 | Indrajit Ray, Junxing Zhang: Towards a new standard for allowing concurrency and ensuring consistency in revision control systems. Computer Standards & Interfaces 29(3): 355-364 (2007) | |
38 | Junxing Zhang, Indrajit Ray: Towards secure multi-sited transactional revision control systems. Computer Standards & Interfaces 29(3): 365-375 (2007) | |
37 | Omar H. Alhazmi, Yashwant K. Malaiya, Indrajit Ray: Measuring, analyzing and predicting security vulnerabilities in software systems. Computers & Security 26(3): 219-228 (2007) | |
36 | Sudip Chakraborty, Indrajit Ray: p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework. JCP 2(2): 13-24 (2007) | |
2006 | ||
35 | Indrajit Ray, Sudip Chakraborty: A Framework for Flexible Access Control in Digital Library Systems. DBSec 2006: 252-266 | |
34 | Indrajit Ray: Remote Upload of Evidence over Mobile Ad Hoc Networks. IFIP Int. Conf. Digital Forensics 2006: 41-54 | |
33 | Sudip Chakraborty, Indrajit Ray: TrustBAC: integrating trust relationships into the RBAC model for access control in open systems. SACMAT 2006: 49-58 | |
32 | Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray: Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation. iTrust 2006: 135-149 | |
2005 | ||
31 | Omar H. Alhazmi, Yashwant K. Malaiya, Indrajit Ray: Security Vulnerabilities in Software Systems: A Quantitative Perspective. DBSec 2005: 281-294 | |
30 | Indrajit Ray, Eunjong Kim, Ross M. McConnell, Daniel Massey: Reliably, Securely and Efficiently Distributing Electronic Content Using Multicasting. EC-Web 2005: 327-336 | |
29 | Indrajit Ray, Nayot Poolsapassit: Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. ESORICS 2005: 231-246 | |
28 | Indrajit Ray: System Security Track Chair's Message. ICDCIT 2005: 333 | |
27 | Indrajit Ray, Sudip Chakraborty, Indrakshi Ray: VTrust: A Trust Management System Based on a Vector Model of Trust. ICISS 2005: 91-105 | |
26 | Eunjong Kim, Daniel Massey, Indrajit Ray: Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback. IFIP Int. Conf. Digital Forensics 2005: 165-176 | |
25 | Indrajit Ray, Indrakshi Ray, Narasimhamurthi Natarajan: An anonymous and failure resilient fair-exchange e-commerce protocol. Decision Support Systems 39(3): 267-292 (2005) | |
2004 | ||
24 | Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray: Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA Kluwer 2004 | |
23 | Indrajit Ray, Tomas Hajek: Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation. DBSec 2004: 295-309 | |
22 | Indrajit Ray, Mike Geisterfer: Towards a Privacy Preserving e-Commerce Protocol. EC-Web 2004: 154-163 | |
21 | Indrajit Ray, Sudip Chakraborty: A Vector Model of Trust for Developing Trustworthy Systems. ESORICS 2004: 260-275 | |
20 | Vamsi Kambhampati, Indrajit Ray, Eunjong Kim: A Secure Checkpointing Protocol for Survivable Server Design. ICDCIT 2004: 430-440 | |
19 | Indrajit Ray, Eunjong Kim: Collective Signature for Efficient Authentication of XML Documents. SEC 2004: 411-424 | |
18 | Indrajit Ray, Sonja Tideman: A Secure TCP Connection Migration Protocol to Enable the Survivability of Client-Server Applications under Malicious Attack. J. Network Syst. Manage. 12(3): (2004) | |
2002 | ||
17 | Indrajit Ray, Indrakshi Ray: Anonymous and Secure Multicast Subscription. DBSec 2002: 313-327 | |
16 | Indrakshi Ray, Indrajit Ray: Using Compatible Keys for Secure Multicasting in E-Commerce. IPDPS 2002 | |
15 | Indrakshi Ray, Indrajit Ray, Natu Narasimhamurthi: A cryptographic solution to implement access control in a hierarchy and more. SACMAT 2002: 65-73 | |
14 | Indrajit Ray, Indrakshi Ray: Fair exchange in E-commerce. SIGecom Exchanges 3(2): 9-17 (2002) | |
2001 | ||
13 | Indrakshi Ray, Indrajit Ray: Detecting Termination of Active Database Rules Using Symbolic Model Checking. ADBIS 2001: 266-279 | |
12 | Indrakshi Ray, Indrajit Ray: An Anomymous Fair Exchange E-commerce Protocol. IPDPS 2001: 172 | |
2000 | ||
11 | Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthy: A Fair-exchange E-commerce Protocol with Automated Dispute Resolution. DBSec 2000: 27-38 | |
10 | Indrakshi Ray, Indrajit Ray: An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution. EC-Web 2000: 84-93 | |
9 | Indrakshi Ray, Indrajit Ray: Failure Analysis of an E-Commerce Protocol Using Model Checking. WECWIS 2000: 176-183 | |
8 | Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino: Flexible Transaction Dependencies in Database Systems. Distributed and Parallel Databases 8(4): 399-446 (2000) | |
7 | Indrajit Ray, Luigi V. Mancini, Sushil Jajodia, Elisa Bertino: ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems. IEEE Trans. Knowl. Data Eng. 12(6): 880-899 (2000) | |
1998 | ||
6 | Elisa Bertino, Sushil Jajodia, Luigi V. Mancini, Indrajit Ray: Advanced Transaction Processing in Multilevel Secure File Stores. IEEE Trans. Knowl. Data Eng. 10(1): 120-135 (1998) | |
1997 | ||
5 | Sushil Jajodia, Ravi Mukkamala, Indrajit Ray: A Two-tier Coarse Indexing Scheme for MLS Database Systems. DBSec 1997: 199-218 | |
4 | Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino: Flexible Commit Protocols for Advanced Transaction Processing. Advanced Transaction Models and Architectures 1997: 0- | |
1996 | ||
3 | Indrajit Ray, Elisa Bertino, Sushil Jajodia, Luigi V. Mancini: An Advanced Commit Protocol for MLS Distributed Database Systems. ACM Conference on Computer and Communications Security 1996: 119-128 | |
2 | Sushil Jajodia, Luigi V. Mancini, Indrajit Ray: Secure Locking Protocols for Multilevel Database Management Systems. DBSec 1996: 177-194 | |
1 | Luigi V. Mancini, Indrajit Ray: Secure Concurrency Control in MLS Databases with Two Versions of Data. ESORICS 1996: 304-323 |