2010 | ||
---|---|---|
86 | Kyriakos Anastasakis, Behzad Bordbar, Geri Georg, Indrakshi Ray: On challenges of model transformation from UML to Alloy. Software and System Modeling 9(1): 69-86 (2010) | |
2009 | ||
85 | Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley: POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice. CIKM 2009: 1037-1046 | |
84 | Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi Ray, Indrajit Ray: A Trust-Based Access Control Model for Pervasive Computing Applications. DBSec 2009: 307-314 | |
83 | Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley: On the comparison of microdata disclosure control algorithms. EDBT 2009: 240-251 | |
82 | Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrakshi Ray: A multi-objective approach to data sharing with privacy constraints and preference based objectives. GECCO 2009: 1499-1506 | |
81 | Lijun Yu, Robert B. France, Indrakshi Ray, Sudipto Ghosh: A Rigorous Approach to Uncovering Security Policy Violations in UML Designs. ICECCS 2009: 126-135 | |
80 | Manachai Toahchoodee, Xing Xie, Indrakshi Ray: Towards Trustworthy Delegation in Role-Based Access Control Model. ISC 2009: 379-394 | |
79 | Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anastasakis, Geri Georg, Behzad Bordbar: Ensuring spatio-temporal access control for real-world applications. SACMAT 2009: 13-22 | |
78 | Indrakshi Ray: Secure Transaction Processing. Encyclopedia of Database Systems 2009: 2540-2546 | |
77 | Geri Georg, Indrakshi Ray, Kyriakos Anastasakis, Behzad Bordbar, Manachai Toahchoodee, Siv Hilde Houmb: An aspect-oriented methodology for designing secure applications. Information & Software Technology 51(5): 846-864 (2009) | |
76 | Indrakshi Ray, Indrajit Ray, Sudip Chakraborty: An interoperable context sensitive model of trust. J. Intell. Inf. Syst. 32(1): 75-104 (2009) | |
75 | Nayot Poolsappasit, Indrakshi Ray: Towards Achieving Personalized Privacy for Location-Based Services. Transactions on Data Privacy 2(1): 77-99 (2009) | |
2008 | ||
74 | Indrakshi Ray, Ninghui Li: SACMAT 2008, 13th ACM Symposium on Access Control Models and Technologies, Estes Park, CO, USA, June 11-13, 2008, Proceedings ACM 2008 | |
73 | Indrakshi Ray, Wei Huang: Increasing Expressiveness of Composite Events Using Parameter Contexts. ADBIS 2008: 215-230 | |
72 | Manachai Toahchoodee, Indrakshi Ray: On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model. DBSec 2008: 17-32 | |
71 | Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell Whitley: Optimizing on-demand data broadcast scheduling in pervasive environments. EDBT 2008: 559-569 | |
70 | Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell Whitley: Security Provisioning in Pervasive Environments Using Multi-objective Optimization. ESORICS 2008: 349-363 | |
69 | Rinku Dewri, Darrell Whitley, Indrakshi Ray, Indrajit Ray: Evolution strategy based optimization of on-demand dependent data broadcast scheduling. GECCO 2008: 1699-1700 | |
68 | Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley: On the Optimal Selection of k in the k-Anonymity Problem. ICDE 2008: 1364-1366 | |
67 | Lijun Yu, Robert B. France, Indrakshi Ray: Scenario-Based Static Analysis of UML Class Models. MoDELS 2008: 234-248 | |
66 | Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrakshi Ray: Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy. PPSN 2008: 991-1000 | |
65 | Nayot Poolsappasit, Indrakshi Ray: Towards a scalable model for location privacy. SPRINGL 2008: 46-51 | |
64 | Indrakshi Ray, Manachai Toahchoodee: A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications. TrustBus 2008: 48-58 | |
63 | Indrakshi Ray: Editorial. ACM Trans. Inf. Syst. Secur. 11(1): (2008) | |
2007 | ||
62 | Indrakshi Ray, Manachai Toahchoodee: A Spatio-temporal Role-Based Access Control Model. DBSec 2007: 211-226 | |
61 | Jinyoo Kim, Yashwant K. Malaiya, Indrakshi Ray: Vulnerability Discovery in Multi-Version Software Systems. HASE 2007: 141-148 | |
60 | Lijun Yu, Robert B. France, Indrakshi Ray, Kevin Lano: A light-weight static approach to analyzing UML behavioral properties. ICECCS 2007: 56-63 | |
59 | Indrakshi Ray, C. J. Michael Geisterfer: A method for early correspondence discovery using instance data. ICEIS (1) 2007: 258-263 | |
58 | Kyriakos Anastasakis, Behzad Bordbar, Geri Georg, Indrakshi Ray: UML2Alloy: A Challenging Model Transformation. MoDELS 2007: 436-450 | |
57 | Eunjee Song, Shuxin Yin, Indrakshi Ray: Using UML to model relational database operations. Computer Standards & Interfaces 29(3): 343-354 (2007) | |
56 | Tai Xin, Indrakshi Ray: A lattice-based approach for updating access control policies in real-time. Inf. Syst. 32(5): 755-772 (2007) | |
2006 | ||
55 | David F. Ferraiolo, Indrakshi Ray: SACMAT 2006,11th ACM Symposium on Access Control Models and Technologies, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings ACM 2006 | |
54 | Geri Georg, Siv Hilde Houmb, Indrakshi Ray: Aspect-Oriented Risk Driven Development of Secure Applications. DBSec 2006: 282-296 | |
53 | Tai Xin, Indrakshi Ray, Parvathi Chundi, Sopak Chaichana: On the Completion of Workflows. DEXA 2006: 582-591 | |
52 | Monte Lunacek, Darrell Whitley, Indrakshi Ray: A crossover operator for the k- anonymity problem. GECCO 2006: 1713-1720 | |
51 | Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Elena Ferrari, Indrakshi Ray: Trust Negotiations with Customizable Anonymity. IAT Workshops 2006: 69-72 | |
50 | Indrakshi Ray, Mahendra Kumar, Lijun Yu: LRBAC: A Location-Aware Role-Based Access Control Model. ICISS 2006: 147-161 | |
49 | Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray: Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation. iTrust 2006: 135-149 | |
48 | Indrakshi Ray, Mahendra Kumar: Towards a location-based mandatory access control model. Computers & Security 25(1): 36-44 (2006) | |
47 | Indrakshi Ray, Tai Xin: Analysis of dependencies in advanced transaction models. Distributed and Parallel Databases 20(1): 5-27 (2006) | |
46 | Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Indrakshi Ray: Achieving Privacy in Trust Negotiations with an Ontology-Based Approach. IEEE Trans. Dependable Sec. Comput. 3(1): 13-30 (2006) | |
2005 | ||
45 | Shuxin Yin, Indrakshi Ray: Relational Database Operations Modeling with UML. AINA 2005: 927-932 | |
44 | Tai Xin, Yajie Zhu, Indrakshi Ray: Reliable Scheduling of Advanced Transactions. DBSec 2005: 124-138 | |
43 | Yajie Zhu, Tai Xin, Indrakshi Ray: Recovering from Malicious Attacks in Workflow Systems. DEXA 2005: 14-23 | |
42 | Manachai Toahchoodee, Indrakshi Ray: Validation of Policy Integration Using Alloy. ICDCIT 2005: 420-431 | |
41 | Indrakshi Ray, Wei Huang: Event Detection in Multilevel Secure Active Databases. ICISS 2005: 177-190 | |
40 | Indrajit Ray, Sudip Chakraborty, Indrakshi Ray: VTrust: A Trust Management System Based on a Vector Model of Trust. ICISS 2005: 91-105 | |
39 | Tai Xin, Indrakshi Ray: Detection for Conflicts of Dependencies in Advanced Transaction Models. IDEAS 2005: 17-26 | |
38 | Indrakshi Ray, Elisa Bertino, Anna Cinzia Squicciarini, Elena Ferrari: Anonymity Preserving Techniques in Trust Negotiations. Privacy Enhancing Technologies 2005: 93-109 | |
37 | Eunjee Song, Raghu Reddy, Robert B. France, Indrakshi Ray, Geri Georg, Roger T. Alexander: Verifiable composition of access control and application features. SACMAT 2005: 120-129 | |
36 | Indrajit Ray, Indrakshi Ray, Narasimhamurthi Natarajan: An anonymous and failure resilient fair-exchange e-commerce protocol. Decision Support Systems 39(3): 267-292 (2005) | |
35 | Indrakshi Ray: Applying Semantic Knowledge to Real-Time Update of Access Control Policies - Appendices. IEEE Trans. Knowl. Data Eng. 17(6): (2005) | |
34 | Indrakshi Ray: Applying Semantic Knowledge to Real-Time Update of Access Control Policies. IEEE Trans. Knowl. Data Eng. 17(6): 844-858 (2005) | |
2004 | ||
33 | Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray: Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA Kluwer 2004 | |
32 | Nitin Prabhu, Vijay Kumar, Indrakshi Ray, Gi-Chul Yang: Concurrency Control in Mobile Database Systems. AINA (2) 2004: 83-86 | |
31 | Indrakshi Ray, Ross M. McConnell, Monte Lunacek, Vijay Kumar: Reducing Damage Assessment Latency in Survivable Databases. BNCOD 2004: 106-111 | |
30 | Indrakshi Ray, Tai Xin: Implementing Real-Time Update of Access Control Policies. DBSec 2004: 65-80 | |
29 | Indrakshi Ray, Tai Xin, Yajie Zhu: Ensuring Task Dependencies During Workflow Recovery. DEXA 2004: 24-33 | |
28 | Dae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na Li: Modeling Role-Based Access Control Using Parameterized UML Models. FASE 2004: 180-193 | |
27 | Indrakshi Ray, Marianna Muller: Using Schemas to Simplify Access Control for XML Documents. ICDCIT 2004: 363-368 | |
26 | Nitin Prabhu, Vijay Kumar, Indrakshi Ray: Periodic Scheduling in On-Demand Broadcast System. ISTA 2004: 107-121 | |
25 | Indrakshi Ray, Na Li, Robert B. France, Dae-Kyoo Kim: Using uml to visualize role-based access control constraints. SACMAT 2004: 115-124 | |
24 | Indrakshi Ray: Real-time update of access control policies. Data Knowl. Eng. 49(3): 287-309 (2004) | |
23 | Robert B. France, Indrakshi Ray, Geri Georg, Sudipto Ghosh: Aspect-oriented approach to early design modelling. IEE Proceedings - Software 151(4): 173-186 (2004) | |
22 | Indrakshi Ray, Robert B. France, Na Li, Geri Georg: An aspect-based approach to modeling access control concerns. Information & Software Technology 46(9): 575-587 (2004) | |
21 | Vijayalakshmi Atluri, Indrakshi Ray: Editors' message for the special issue on security. Int. J. on Digital Libraries 4(3): 137-138 (2004) | |
2003 | ||
20 | Indrakshi Ray: Multilevel Secure Rules and Its Impact on the Design of Active Database Systems. BNCOD 2003: 226-244 | |
19 | Indrakshi Ray, Tai Xin: Concurrent and Real-Time Update of Access Control Policies. DEXA 2003: 330-339 | |
2002 | ||
18 | Indrajit Ray, Indrakshi Ray: Anonymous and Secure Multicast Subscription. DBSec 2002: 313-327 | |
17 | Geri Georg, Indrakshi Ray, Robert B. France: Using Aspects to Design a Secure System. ICECCS 2002: 117- | |
16 | Geri Georg, Robert B. France, Indrakshi Ray: Designing High Integrity Systems Using Aspects. IICIS 2002: 37-57 | |
15 | Indrakshi Ray, Indrajit Ray: Using Compatible Keys for Secure Multicasting in E-Commerce. IPDPS 2002 | |
14 | Indrakshi Ray, Indrajit Ray, Natu Narasimhamurthi: A cryptographic solution to implement access control in a hierarchy and more. SACMAT 2002: 65-73 | |
13 | Indrajit Ray, Indrakshi Ray: Fair exchange in E-commerce. SIGecom Exchanges 3(2): 9-17 (2002) | |
2001 | ||
12 | Indrakshi Ray, Indrajit Ray: Detecting Termination of Active Database Rules Using Symbolic Model Checking. ADBIS 2001: 266-279 | |
11 | Indrakshi Ray, Indrajit Ray: An Anomymous Fair Exchange E-commerce Protocol. IPDPS 2001: 172 | |
2000 | ||
10 | Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthy: A Fair-exchange E-commerce Protocol with Automated Dispute Resolution. DBSec 2000: 27-38 | |
9 | Indrakshi Ray, Indrajit Ray: An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution. EC-Web 2000: 84-93 | |
8 | Indrakshi Ray, Indrajit Ray: Failure Analysis of an E-Commerce Protocol Using Model Checking. WECWIS 2000: 176-183 | |
7 | Indrakshi Ray, Paul Ammann, Sushil Jajodia: Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity. Inf. Sci. 129(1-4): 155-195 (2000) | |
1998 | ||
6 | Indrakshi Ray, Paul Ammann, Sushil Jajodia: A Semantic-Based Transaction Processing Model for Multilevel Transactions. Journal of Computer Security 6(3): 181-217 (1998) | |
1997 | ||
5 | Sushil Jajodia, Indrakshi Ray, Paul Ammann: Implementing Semantic-Based Decomposition of Transactions. CAiSE 1997: 75-88 | |
4 | Paul Ammann, Sushil Jajodia, Indrakshi Ray: Semantic-Based Decomposition of Transactions. Advanced Transaction Models and Architectures 1997: 0- | |
3 | Paul Ammann, Sushil Jajodia, Indrakshi Ray: Applying Formal Methods to Semantic-Based Decomposition of Transactions. ACM Trans. Database Syst. 22(2): 215-254 (1997) | |
1996 | ||
2 | Paul Ammann, Sushil Jajodia, Indrakshi Ray: Ensuring Atomicity of Multilevel Transactions. IEEE Symposium on Security and Privacy 1996: 74-84 | |
1995 | ||
1 | Paul Ammann, Sushil Jajodia, Indrakshi Ray: Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions. VLDB 1995: 218-227 |