Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Indrakshi Ray
@article{DBLP:journals/jcs/GorbettSSR23, author = {Matt Gorbett and Caspian Siebert and Hossein Shirazi and Indrakshi Ray}, title = {The intrinsic dimensionality of network datasets and its applications}, journal = {J. Comput. Secur.}, volume = {31}, number = {6}, pages = {679--704}, year = {2023}, url = {https://doi.org/10.3233/JCS-220131}, doi = {10.3233/JCS-220131}, timestamp = {Thu, 21 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/GorbettSSR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdiq/ZuoBCSR23, author = {Chaoyuan Zuo and Ritwik Banerjee and Fateme Hashemi Chaleshtori and Hossein Shirazi and Indrakshi Ray}, title = {Seeing Should Probably Not Be Believing: The Role of Deceptive Support in {COVID-19} Misinformation on Twitter}, journal = {{ACM} J. Data Inf. Qual.}, volume = {15}, number = {1}, pages = {9:1--9:26}, year = {2023}, url = {https://doi.org/10.1145/3546914}, doi = {10.1145/3546914}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdiq/ZuoBCSR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/ShiraziMRJW23, author = {Hossein Shirazi and Shashika Ranga Muramudalige and Indrakshi Ray and Anura P. Jayasumana and Haonan Wang}, title = {Adversarial Autoencoder Data Synthesis for Enhancing Machine Learning-Based Phishing Detection Algorithms}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {4}, pages = {2411--2422}, year = {2023}, url = {https://doi.org/10.1109/TSC.2023.3234806}, doi = {10.1109/TSC.2023.3234806}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/ShiraziMRJW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/GorbettSR23, author = {Matt Gorbett and Hossein Shirazi and Indrakshi Ray}, editor = {Jingrui He and Themis Palpanas and Xiaohua Hu and Alfredo Cuzzocrea and Dejing Dou and Dominik Slezak and Wei Wang and Aleksandra Gruca and Jerry Chun{-}Wei Lin and Rakesh Agrawal}, title = {Cross-Silo Federated Learning Across Divergent Domains with Iterative Parameter Alignment}, booktitle = {{IEEE} International Conference on Big Data, BigData 2023, Sorrento, Italy, December 15-18, 2023}, pages = {5233--5242}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BigData59044.2023.10386280}, doi = {10.1109/BIGDATA59044.2023.10386280}, timestamp = {Fri, 02 Feb 2024 12:00:39 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/GorbettSR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MartinSR23, author = {Eric Burton Samuel Martin and Hossein Shirazi and Indrakshi Ray}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Poster: Towards a Dataset for the Discrimination between Warranted and Unwarranted Emails}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {3603--3605}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3624397}, doi = {10.1145/3576915.3624397}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MartinSR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/TaziSONDCR23, author = {Faiza Tazi and Suleiman Saka and Griffin Opp and Shradha Neupane and Sanchari Das and Lorenzo De Carli and Indrakshi Ray}, editor = {Albrecht Schmidt and Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and Tesh Goyal and Per Ola Kristensson and Anicia Peters}, title = {Accessibility Evaluation of IoT Android Mobile Companion Apps}, booktitle = {Extended Abstracts of the 2023 {CHI} Conference on Human Factors in Computing Systems, {CHI} {EA} 2023, Hamburg, Germany, April 23-28, 2023}, pages = {19:1--19:7}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3544549.3585652}, doi = {10.1145/3544549.3585652}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/TaziSONDCR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/GorbettSR23, author = {Matt Gorbett and Hossein Shirazi and Indrakshi Ray}, editor = {Ambuj K. Singh and Yizhou Sun and Leman Akoglu and Dimitrios Gunopulos and Xifeng Yan and Ravi Kumar and Fatma Ozcan and Jieping Ye}, title = {Sparse Binary Transformers for Multivariate Time Series Modeling}, booktitle = {Proceedings of the 29th {ACM} {SIGKDD} Conference on Knowledge Discovery and Data Mining, {KDD} 2023, Long Beach, CA, USA, August 6-10, 2023}, pages = {544--556}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3580305.3599508}, doi = {10.1145/3580305.3599508}, timestamp = {Mon, 25 Sep 2023 08:29:22 +0200}, biburl = {https://dblp.org/rec/conf/kdd/GorbettSR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/AbdelgawadRAVS23, author = {Mahmoud Abdelgawad and Indrakshi Ray and Saja Alqurashi and Videep Venkatesha and Hossein Shirazi}, editor = {Silvio Ranise and Roberto Carbone and Daniel Takabi}, title = {Synthesizing and Analyzing Attribute-Based Access Control Model Generated from Natural Language Policy Statements}, booktitle = {Proceedings of the 28th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2023, Trento, Italy, June 7-9, 2023}, pages = {91--98}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3589608.3593844}, doi = {10.1145/3589608.3593844}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/AbdelgawadRAVS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/RayTVMARKRSSV023, author = {Indrajit Ray and Bhavani Thuraisingham and Jaideep Vaidya and Sharad Mehrotra and Vijayalakshmi Atluri and Indrakshi Ray and Murat Kantarcioglu and Ramesh Raskar and Babak Salimi and Steve Simske and Nalini Venkatasubramanian and Vivek K. Singh}, editor = {Silvio Ranise and Roberto Carbone and Daniel Takabi}, title = {{SAFE-PASS:} Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups}, booktitle = {Proceedings of the 28th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2023, Trento, Italy, June 7-9, 2023}, pages = {145--155}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3589608.3593830}, doi = {10.1145/3589608.3593830}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/RayTVMARKRSSV023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/AsifSR23, author = {Asif Uz Zaman Asif and Hossein Shirazi and Indrakshi Ray}, editor = {Shlomi Dolev and Baruch Schieber}, title = {Machine Learning-Based Phishing Detection Using {URL} Features: {A} Comprehensive Review}, booktitle = {Stabilization, Safety, and Security of Distributed Systems - 25th International Symposium, {SSS} 2023, Jersey City, NJ, USA, October 2-4, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14310}, pages = {481--497}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-44274-2\_36}, doi = {10.1007/978-3-031-44274-2\_36}, timestamp = {Sun, 08 Oct 2023 13:20:04 +0200}, biburl = {https://dblp.org/rec/conf/sss/AsifSR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/AbdelgawadRV23, author = {Mahmoud Abdelgawad and Indrakshi Ray and Tomas Vasquez}, editor = {Shlomi Dolev and Baruch Schieber}, title = {Workflow Resilience for Mission Critical Systems}, booktitle = {Stabilization, Safety, and Security of Distributed Systems - 25th International Symposium, {SSS} 2023, Jersey City, NJ, USA, October 2-4, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14310}, pages = {498--512}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-44274-2\_37}, doi = {10.1007/978-3-031-44274-2\_37}, timestamp = {Sun, 08 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sss/AbdelgawadRV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/RaySPBR23, author = {Indrajit Ray and Sarath Sreedharan and Rakesh Podder and Shadaab Kawnain Bashir and Indrakshi Ray}, title = {Explainable {AI} for Prioritizing and Deploying Defenses for Cyber-Physical System Resiliency}, booktitle = {5th {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2023, Atlanta, GA, USA, November 1-4, 2023}, pages = {184--192}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/TPS-ISA58951.2023.00032}, doi = {10.1109/TPS-ISA58951.2023.00032}, timestamp = {Tue, 05 Mar 2024 12:00:59 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/RaySPBR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/GowdanakatteRA23, author = {Shwetha Gowdanakatte and Indrakshi Ray and Mahmoud Abdelgawad}, title = {Model Based Risk Assessment and Risk Mitigation Framework for Cyber-Physical Systems}, booktitle = {5th {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2023, Atlanta, GA, USA, November 1-4, 2023}, pages = {203--212}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/TPS-ISA58951.2023.00034}, doi = {10.1109/TPS-ISA58951.2023.00034}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/GowdanakatteRA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/FaramarziCSRB23, author = {Noushin Salek Faramarzi and Fateme Hashemi Chaleshtori and Hossein Shirazi and Indrakshi Ray and Ritwik Banerjee}, editor = {Ying Ding and Jie Tang and Juan F. Sequeda and Lora Aroyo and Carlos Castillo and Geert{-}Jan Houben}, title = {Claim Extraction and Dynamic Stance Detection in {COVID-19} Tweets}, booktitle = {Companion Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023}, pages = {1059--1068}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3543873.3587643}, doi = {10.1145/3543873.3587643}, timestamp = {Mon, 28 Aug 2023 21:17:11 +0200}, biburl = {https://dblp.org/rec/conf/www/FaramarziCSRB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-04637, author = {Matt Gorbett and Hossein Shirazi and Indrakshi Ray}, title = {Sparse Binary Transformers for Multivariate Time Series Modeling}, journal = {CoRR}, volume = {abs/2308.04637}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.04637}, doi = {10.48550/ARXIV.2308.04637}, eprinttype = {arXiv}, eprint = {2308.04637}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-04637.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-04818, author = {Matt Gorbett and Hossein Shirazi and Indrakshi Ray}, title = {Cross-Silo Federated Learning Across Divergent Domains with Iterative Parameter Alignment}, journal = {CoRR}, volume = {abs/2311.04818}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.04818}, doi = {10.48550/ARXIV.2311.04818}, eprinttype = {arXiv}, eprint = {2311.04818}, timestamp = {Tue, 14 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-04818.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/juspn/ShiraziHR22, author = {Hossein Shirazi and Katherine Haynes and Indrakshi Ray}, title = {Towards Performance of {NLP} Transformers on URL-Based Phishing Detection for Mobile Devices}, journal = {J. Ubiquitous Syst. Pervasive Networks}, volume = {17}, number = {1}, pages = {35--42}, year = {2022}, url = {https://doi.org/10.5383/juspn.17.01.005}, doi = {10.5383/JUSPN.17.01.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/juspn/ShiraziHR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/MuramudaligeHJR22, author = {Shashika Ranga Muramudalige and Benjamin W. K. Hung and Anura P. Jayasumana and Indrakshi Ray and Jytte Klausen}, title = {Enhancing Investigative Pattern Detection via Inexact Matching and Graph Databases}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {5}, pages = {2780--2794}, year = {2022}, url = {https://doi.org/10.1109/TSC.2021.3073145}, doi = {10.1109/TSC.2021.3073145}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/MuramudaligeHJR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/GowdanakatteRH22, author = {Shwetha Gowdanakatte and Indrakshi Ray and Siv Hilde Houmb}, editor = {Maanak Gupta and Sajad Khorsandroo and Mahmoud Abdelsalam}, title = {Attribute Based Access Control Model for Protecting Programmable Logic Controllers}, booktitle = {Sat-CPS@CODASPY 2022: Proceedings of the 2022 {ACM} Workshop on Secure and Trustworthy Cyber-Physical Systems, Baltimore, MD, USA, 27 April 2022}, pages = {47--56}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510547.3517926}, doi = {10.1145/3510547.3517926}, timestamp = {Fri, 01 Jul 2022 13:06:12 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/GowdanakatteRH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ShiraziPRW22, author = {Hossein Shirazi and William Pickard and Indrakshi Ray and Haonan Wang}, editor = {Anupam Joshi and Maribel Fern{\'{a}}ndez and Rakesh M. Verma}, title = {Towards Resiliency of Heavy Vehicles through Compromised Sensor Data Reconstruction}, booktitle = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022}, pages = {276--287}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3508398.3511523}, doi = {10.1145/3508398.3511523}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ShiraziPRW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/BertinoSTRLGM22, author = {Elisa Bertino and Ravi S. Sandhu and Bhavani Thuraisingham and Indrakshi Ray and Wenjia Li and Maanak Gupta and Sudip Mittal}, editor = {Anupam Joshi and Maribel Fern{\'{a}}ndez and Rakesh M. Verma}, title = {Security and Privacy for Emerging IoT and {CPS} Domains}, booktitle = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022}, pages = {336--337}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3508398.3519314}, doi = {10.1145/3508398.3519314}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/BertinoSTRLGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cogmi/MaurinaHGRD22, author = {Gabriele Maurina and Hajar Homayouni and Sudipto Ghosh and Indrakshi Ray and Gerald P. Duggan}, title = {A Methodology for Energy Usage Prediction in Long-Lasting Abnormal Events}, booktitle = {4th {IEEE} International Conference on Cognitive Machine Intelligence, CogMI 2022, Atlanta, GA, USA, December 14-17, 2022}, pages = {91--100}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CogMI56440.2022.00023}, doi = {10.1109/COGMI56440.2022.00023}, timestamp = {Wed, 29 Mar 2023 11:07:46 +0200}, biburl = {https://dblp.org/rec/conf/cogmi/MaurinaHGRD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpss/PrabhuSRRG22, author = {Vinayak S. Prabhu and Mohit Singh and Indrajit Ray and Indrakshi Ray and Sudipto Ghosh}, editor = {Alvaro A. C{\'{a}}rdenas and Daisuke Mashima and Ertem Esiner}, title = {Detecting Secure Memory Deallocation Violations with {CBMC}}, booktitle = {Proceedings of the 8th {ACM} on Cyber-Physical System Security Workshop, CPSS@AsiaCCS 2022, Nagasaki, Japan, 30 May 2022}, pages = {27--38}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3494107.3522779}, doi = {10.1145/3494107.3522779}, timestamp = {Mon, 04 Jul 2022 17:06:15 +0200}, biburl = {https://dblp.org/rec/conf/cpss/PrabhuSRRG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/GorbettSR22, author = {Matt Gorbett and Hossein Shirazi and Indrakshi Ray}, editor = {Shamik Sural and Haibing Lu}, title = {Local Intrinsic Dimensionality of IoT Networks for Unsupervised Intrusion Detection}, booktitle = {Data and Applications Security and Privacy {XXXVI} - 36th Annual {IFIP} {WG} 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13383}, pages = {143--161}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-10684-2\_9}, doi = {10.1007/978-3-031-10684-2\_9}, timestamp = {Thu, 14 Jul 2022 17:34:57 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/GorbettSR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/NeupaneTPBACDR22, author = {Shradha Neupane and Faiza Tazi and Upakar Paudel and Freddy Veloz Baez and Merzia Adamjee and Lorenzo De Carli and Sanchari Das and Indrakshi Ray}, editor = {Shamik Sural and Haibing Lu}, title = {On the Data Privacy, Security, and Risk Postures of IoT Mobile Companion Apps}, booktitle = {Data and Applications Security and Privacy {XXXVI} - 36th Annual {IFIP} {WG} 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13383}, pages = {162--182}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-10684-2\_10}, doi = {10.1007/978-3-031-10684-2\_10}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/NeupaneTPBACDR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChaleshtoriR22, author = {Fateme Hashemi Chaleshtori and Indrakshi Ray}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Christos Kalloniatis and John Mylopoulos and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Jorge Maestre Vidal and Marco Antonio Sotelo Monge and Massimiliano Albanese and Basel Katt and Sandeep Pirbhulal and Ankur Shukla}, title = {Automation of Vulnerability Information Extraction Using Transformer-Based Language Models}, booktitle = {Computer Security. {ESORICS} 2022 International Workshops - CyberICPS 2022, {SECPRE} 2022, {SPOSE} 2022, {CPS4CIP} 2022, CDT{\&}SECOMANE 2022, {EIS} 2022, and SecAssure 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13785}, pages = {645--665}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25460-4\_37}, doi = {10.1007/978-3-031-25460-4\_37}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ChaleshtoriR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/GorbettSR22, author = {Matt Gorbett and Hossein Shirazi and Indrakshi Ray}, editor = {Sven Dietrich and Omar Chowdhury and Daniel Takabi}, title = {WiP: The Intrinsic Dimensionality of IoT Networks}, booktitle = {{SACMAT} '22: The 27th {ACM} Symposium on Access Control Models and Technologies, New York, NY, USA, June 8 - 10, 2022}, pages = {245--250}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3532105.3535038}, doi = {10.1145/3532105.3535038}, timestamp = {Mon, 13 Jun 2022 16:29:51 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/GorbettSR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ShiraziBRA21, author = {Hossein Shirazi and Bruhadeshwar Bezawada and Indrakshi Ray and Chuck Anderson}, title = {Directed adversarial sampling attacks on phishing detection}, journal = {J. Comput. Secur.}, volume = {29}, number = {1}, pages = {1--23}, year = {2021}, url = {https://doi.org/10.3233/JCS-191411}, doi = {10.3233/JCS-191411}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ShiraziBRA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/HomayouniRGGK21, author = {Hajar Homayouni and Indrakshi Ray and Sudipto Ghosh and Shlok Gondalia and Michael G. Kahn}, title = {Anomaly Detection in {COVID-19} Time-Series Data}, journal = {{SN} Comput. Sci.}, volume = {2}, number = {4}, pages = {279}, year = {2021}, url = {https://doi.org/10.1007/s42979-021-00658-w}, doi = {10.1007/S42979-021-00658-W}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/HomayouniRGGK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/widm/BezawadaRR21, author = {Bruhadeshwar Bezawada and Indrakshi Ray and Indrajit Ray}, title = {Behavioral fingerprinting of Internet-of-Things devices}, journal = {WIREs Data Mining Knowl. Discov.}, volume = {11}, number = {1}, year = {2021}, url = {https://doi.org/10.1002/widm.1337}, doi = {10.1002/WIDM.1337}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/widm/BezawadaRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bncod/CuomoHRG21, author = {Joaquin Cuomo and Hajar Homayouni and Indrakshi Ray and Sudipto Ghosh}, editor = {Holger Pirk and Thomas Heinis}, title = {Detecting Temporal Dependencies in Data}, booktitle = {Proceedings of the The British International Conference on Databases 2021, London, United Kingdom, March 28, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3163}, pages = {29--39}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3163/BICOD21\_paper\_5.pdf}, timestamp = {Wed, 07 Feb 2024 16:02:39 +0100}, biburl = {https://dblp.org/rec/conf/bncod/CuomoHRG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PaudelDMR21, author = {Upakar Paudel and Andy Dolan and Suryadipta Majumdar and Indrakshi Ray}, title = {Context-Aware IoT Device Functionality Extraction from Specifications for Ensuring Consumer Security}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {155--163}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705050}, doi = {10.1109/CNS53000.2021.9705050}, timestamp = {Fri, 18 Feb 2022 10:36:40 +0100}, biburl = {https://dblp.org/rec/conf/cns/PaudelDMR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DevalTBR21, author = {Shalin Kumar Deval and Meenakshi Tripathi and Bruhadeshwar Bezawada and Indrakshi Ray}, title = {"X-Phish: Days of Future Past"{\textdaggerdbl}: Adaptive {\&} Privacy Preserving Phishing Detection}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {227--235}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705052}, doi = {10.1109/CNS53000.2021.9705052}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/DevalTBR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cogmi/BanerjeeR21, author = {Ritwik Banerjee and Indrakshi Ray}, title = {Diagnosis, Prevention, and Cure for Misinformation}, booktitle = {Third {IEEE} International Conference on Cognitive Machine Intelligence, CogMI 2021, Atlanta, GA, USA, December 13-15, 2021}, pages = {156--162}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CogMI52975.2021.00028}, doi = {10.1109/COGMI52975.2021.00028}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cogmi/BanerjeeR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/HaefnerR21, author = {Kyle Haefner and Indrakshi Ray}, editor = {Shlomi Dolev and Oded Margalit and Benny Pinkas and Alexander A. Schwarzmann}, title = {Trust and Verify: {A} Complexity-Based IoT Behavioral Enforcement Method}, booktitle = {Cyber Security Cryptography and Machine Learning - 5th International Symposium, {CSCML} 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12716}, pages = {432--450}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78086-9\_32}, doi = {10.1007/978-3-030-78086-9\_32}, timestamp = {Mon, 03 Jan 2022 22:32:47 +0100}, biburl = {https://dblp.org/rec/conf/cscml/HaefnerR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurousec/CarliRS21, author = {Lorenzo De Carli and Indrakshi Ray and Erin Solovey}, title = {Vision: Stewardship of Smart Devices Security for the Aging Population}, booktitle = {EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11 - 12, 2021}, pages = {236--241}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3481357.3481523}, doi = {10.1145/3481357.3481523}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurousec/CarliRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fnc/HaynesSR21, author = {Katherine Haynes and Hossein Shirazi and Indrakshi Ray}, editor = {Elhadi M. Shakshuki and Ansar{-}Ul{-}Haque Yasar}, title = {Lightweight URL-based phishing detection using natural language processing transformers for mobile devices}, booktitle = {The 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2021) / The 16th International Conference on Future Networks and Communications {(FNC-2021)} / The 11th International Conference on Sustainable Energy Information Technology, Leuven, Belgium, August 9-12, 2021}, series = {Procedia Computer Science}, volume = {191}, pages = {127--134}, publisher = {Elsevier}, year = {2021}, url = {https://doi.org/10.1016/j.procs.2021.07.040}, doi = {10.1016/J.PROCS.2021.07.040}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fnc/HaynesSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/SaravaniRR21, author = {Sina Mahdipour Saravani and Indrajit Ray and Indrakshi Ray}, editor = {Somanath Tripathy and Rudrapatna K. Shyamasundar and Rajiv Ranjan}, title = {Automated Identification of Social Media Bots Using Deepfake Text Detection}, booktitle = {Information Systems Security - 17th International Conference, {ICISS} 2021, Patna, India, December 16-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13146}, pages = {111--123}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92571-0\_7}, doi = {10.1007/978-3-030-92571-0\_7}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/SaravaniRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/ReutimannR21, author = {Brandt Reutimann and Indrakshi Ray}, editor = {Jason Staggs and Sujeet Shenoi}, title = {Simulating Measurement Attacks in a Scada System Testbed}, booktitle = {Critical Infrastructure Protection {XV} - 15th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2021, Virtual Event, March 15-16, 2021, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {636}, pages = {135--153}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93511-5\_7}, doi = {10.1007/978-3-030-93511-5\_7}, timestamp = {Wed, 09 Mar 2022 16:41:36 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/ReutimannR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotbd/BhosaleCR21, author = {Vishwajeet Bhosale and Lorenzo De Carli and Indrakshi Ray}, editor = {Gary B. Wills and P{\'{e}}ter Kacsuk and Victor Chang}, title = {Detection of Anomalous User Activity for Home IoT Devices}, booktitle = {Proceedings of the 6th International Conference on Internet of Things, Big Data and Security, IoTBDS 2021, Online Streaming, April 23-25, 2021}, pages = {309--314}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010476503090314}, doi = {10.5220/0010476503090314}, timestamp = {Mon, 31 May 2021 12:07:54 +0200}, biburl = {https://dblp.org/rec/conf/iotbd/BhosaleCR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotsms/AlqurashiSR21, author = {Saja Alqurashi and Hossein Shirazi and Indrakshi Ray}, editor = {Jaime Mauri Lauret and Mohamed Abdel{-}Maguid and Yaser Jararweh and Elhadj Benkhelifa}, title = {On the Performance of Isolation Forest and Multi Layer Perceptron for Anomaly Detection in Industrial Control Systems Networks}, booktitle = {8th International Conference on Internet of Things: Systems, Management and Security, {IOTSMS} 2021, Gandia, Spain, December 6-9, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IOTSMS53705.2021.9704986}, doi = {10.1109/IOTSMS53705.2021.9704986}, timestamp = {Fri, 18 Feb 2022 10:36:42 +0100}, biburl = {https://dblp.org/rec/conf/iotsms/AlqurashiSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KarRGPR20, author = {Diptendu Mohan Kar and Indrajit Ray and Jenna Gallegos and Jean Peccoud and Indrakshi Ray}, title = {Synthesizing {DNA} molecules with identity-based digital signatures to prevent malicious tampering and enabling source attribution}, journal = {J. Comput. Secur.}, volume = {28}, number = {4}, pages = {437--467}, year = {2020}, url = {https://doi.org/10.3233/JCS-191383}, doi = {10.3233/JCS-191383}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KarRGPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcps/MukherjeeESWRR20, author = {Subhojeet Mukherjee and Jeffrey C. Van Etten and Namburi Rani Samyukta and Jacob Walker and Indrakshi Ray and Indrajit Ray}, title = {TruckSTM: Runtime Realization of Operational State Transitions for Medium and Heavy Duty Vehicles}, journal = {{ACM} Trans. Cyber Phys. Syst.}, volume = {4}, number = {1}, pages = {4:1--4:25}, year = {2020}, url = {https://doi.org/10.1145/3300183}, doi = {10.1145/3300183}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcps/MukherjeeESWRR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/HomayouniGRGDK20, author = {Hajar Homayouni and Sudipto Ghosh and Indrakshi Ray and Shlok Gondalia and Jerry Duggan and Michael G. Kahn}, editor = {Xintao Wu and Chris Jermaine and Li Xiong and Xiaohua Hu and Olivera Kotevska and Siyuan Lu and Weija Xu and Srinivas Aluru and Chengxiang Zhai and Eyhab Al{-}Masri and Zhiyuan Chen and Jeff Saltz}, title = {An Autocorrelation-based LSTM-Autoencoder for Anomaly Detection on Time-Series Data}, booktitle = {2020 {IEEE} International Conference on Big Data {(IEEE} BigData 2020), Atlanta, GA, USA, December 10-13, 2020}, pages = {5068--5077}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigData50022.2020.9378192}, doi = {10.1109/BIGDATA50022.2020.9378192}, timestamp = {Fri, 19 Nov 2021 16:08:20 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/HomayouniGRGDK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/DolanRM20, author = {Andy Dolan and Indrakshi Ray and Suryadipta Majumdar}, editor = {Anoop Singhal and Jaideep Vaidya}, title = {Proactively Extracting IoT Device Capabilities: An Application to Smart Homes}, booktitle = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP} {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12122}, pages = {42--63}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-49669-2\_3}, doi = {10.1007/978-3-030-49669-2\_3}, timestamp = {Thu, 18 Jun 2020 13:44:27 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/DolanRM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/ShiraziZR20, author = {Hossein Shirazi and Landon Zweigle and Indrakshi Ray}, editor = {Pierangela Samarati and Sabrina De Capitani di Vimercati and Mohammad S. Obaidat and Jalel Ben{-}Othman}, title = {A Machine-learning based Unbiased Phishing Detection Approach}, booktitle = {Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020}, pages = {423--430}, publisher = {ScitePress}, year = {2020}, url = {https://doi.org/10.5220/0009834204230430}, doi = {10.5220/0009834204230430}, timestamp = {Wed, 29 Jul 2020 16:57:35 +0200}, biburl = {https://dblp.org/rec/conf/icete/ShiraziZR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/KhalidCR20, author = {Majdi Khalid and Hamidreza Chitsaz and Indrakshi Ray}, title = {Proximal Stochastic {AUC} Maximization}, booktitle = {2020 International Joint Conference on Neural Networks, {IJCNN} 2020, Glasgow, United Kingdom, July 19-24, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IJCNN48605.2020.9206926}, doi = {10.1109/IJCNN48605.2020.9206926}, timestamp = {Tue, 06 Oct 2020 15:44:04 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/KhalidCR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/ShiraziMRJ20, author = {Hossein Shirazi and Shashika Ranga Muramudalige and Indrakshi Ray and Anura P. Jayasumana}, editor = {Hwee{-}Pink Tan and Lyes Khoukhi and Sharief Oteafy}, title = {Improved Phishing Detection Algorithms using Adversarial Autoencoder Synthesized Data}, booktitle = {45th {IEEE} Conference on Local Computer Networks, {LCN} 2020, Sydney, Australia, November 16-19, 2020}, pages = {24--32}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/LCN48667.2020.9314775}, doi = {10.1109/LCN48667.2020.9314775}, timestamp = {Fri, 25 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/ShiraziMRJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/RavidasRZ20, author = {Sowmya Ravidas and Indrakshi Ray and Nicola Zannone}, title = {Handling Incomplete Information in Policy Evaluation using Attribute Similarity}, booktitle = {Second {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta, GA, USA, October 28-31, 2020}, pages = {79--88}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TPS-ISA50397.2020.00021}, doi = {10.1109/TPS-ISA50397.2020.00021}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/RavidasRZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-06579, author = {Drew Johnston and Jarret Flack and Indrakshi Ray and Francisco R. Ortega}, title = {Towards a Virtual Reality Home IoT Network Visualizer}, journal = {CoRR}, volume = {abs/2001.06579}, year = {2020}, url = {https://arxiv.org/abs/2001.06579}, eprinttype = {arXiv}, eprint = {2001.06579}, timestamp = {Fri, 04 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-06579.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HomayouniGR19, author = {Hajar Homayouni and Sudipto Ghosh and Indrakshi Ray}, title = {Chapter Five - Data Warehouse Testing}, journal = {Adv. Comput.}, volume = {112}, pages = {223--273}, year = {2019}, url = {https://doi.org/10.1016/bs.adcom.2017.12.005}, doi = {10.1016/BS.ADCOM.2017.12.005}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HomayouniGR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/HomayouniGRK19, author = {Hajar Homayouni and Sudipto Ghosh and Indrakshi Ray and Michael G. Kahn}, editor = {Chaitanya K. Baru and Jun Huan and Latifur Khan and Xiaohua Hu and Ronay Ak and Yuanyuan Tian and Roger S. Barga and Carlo Zaniolo and Kisung Lee and Yanfang (Fanny) Ye}, title = {An Interactive Data Quality Test Approach for Constraint Discovery and Fault Detection}, booktitle = {2019 {IEEE} International Conference on Big Data {(IEEE} BigData), Los Angeles, CA, USA, December 9-12, 2019}, pages = {200--205}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/BigData47090.2019.9006446}, doi = {10.1109/BIGDATA47090.2019.9006446}, timestamp = {Tue, 18 Oct 2022 14:44:48 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/HomayouniGRK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpss/RayAB19, author = {Indrakshi Ray and Ramadan Abdunabi and Rejina Basnet}, title = {Access Control for Internet of Things Applications}, booktitle = {Proceedings of the 5th {ACM} on Cyber-Physical System Security Workshop, CPSS@AsiaCCS 2019, Auckland, New Zealand, 8 July 2019}, pages = {35--36}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3327961.3329533}, doi = {10.1145/3327961.3329533}, timestamp = {Mon, 23 May 2022 17:59:02 +0200}, biburl = {https://dblp.org/rec/conf/cpss/RayAB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ShiraziBRA19, author = {Hossein Shirazi and Bruhadeshwar Bezawada and Indrakshi Ray and Charles Anderson}, editor = {Simon N. Foley}, title = {Adversarial Sampling Attacks Against Phishing Detection}, booktitle = {Data and Applications Security and Privacy {XXXIII} - 33rd Annual {IFIP} {WG} 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15-17, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11559}, pages = {83--101}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22479-0\_5}, doi = {10.1007/978-3-030-22479-0\_5}, timestamp = {Wed, 20 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/ShiraziBRA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/ShiraziRA19, author = {Hossein Shirazi and Indrakshi Ray and Charles Anderson}, editor = {Abdelmalek Benzekri and Michel Barbeau and Guang Gong and Romain Laborde and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles}, booktitle = {Foundations and Practice of Security - 12th International Symposium, {FPS} 2019, Toulouse, France, November 5-7, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12056}, pages = {39--55}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-45371-8\_3}, doi = {10.1007/978-3-030-45371-8\_3}, timestamp = {Wed, 07 Dec 2022 23:10:28 +0100}, biburl = {https://dblp.org/rec/conf/fps/ShiraziRA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gc/MuramudaligeHJR19, author = {Shashika Ranga Muramudalige and Benjamin W. K. Hung and Anura P. Jayasumana and Indrakshi Ray}, title = {Investigative Graph Search using Graph Databases}, booktitle = {First International Conference on Graph Computing, {GC} 2019, Laguna Hills, CA, USA, September 25-27, 2019}, pages = {60--67}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/GC46384.2019.00017}, doi = {10.1109/GC46384.2019.00017}, timestamp = {Fri, 25 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gc/MuramudaligeHJR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/HomayouniGR19, author = {Hajar Homayouni and Sudipto Ghosh and Indrakshi Ray}, title = {ADQuaTe: An Automated Data Quality Test Approach for Constraint Discovery and Fault Detection}, booktitle = {20th {IEEE} International Conference on Information Reuse and Integration for Data Science, {IRI} 2019, Los Angeles, CA, USA, July 30 - August 1, 2019}, pages = {61--68}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IRI.2019.00023}, doi = {10.1109/IRI.2019.00023}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/iri/HomayouniGR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/HaefnerR19, author = {Kyle Haefner and Indrakshi Ray}, title = {ComplexIoT: Behavior-Based Trust For IoT Networks}, booktitle = {First {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2019, Los Angeles, CA, USA, December 12-14, 2019}, pages = {56--65}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TPS-ISA48467.2019.00016}, doi = {10.1109/TPS-ISA48467.2019.00016}, timestamp = {Tue, 26 Jan 2021 14:05:24 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/HaefnerR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/BelyaevSRR18, author = {Kirill Belyaev and Wuliang Sun and Indrakshi Ray and Indrajit Ray}, title = {On the design and analysis of protocols for Personal Health Record storage on Personal Data Server devices}, journal = {Future Gener. Comput. Syst.}, volume = {80}, pages = {467--482}, year = {2018}, url = {https://doi.org/10.1016/j.future.2016.05.027}, doi = {10.1016/J.FUTURE.2016.05.027}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/BelyaevSRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/BelyaevR18, author = {Kirill Belyaev and Indrakshi Ray}, title = {Component-oriented access control - Application servers meet tuple spaces for the masses}, journal = {Future Gener. Comput. Syst.}, volume = {86}, pages = {726--739}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.05.003}, doi = {10.1016/J.FUTURE.2017.05.003}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/BelyaevR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmdem/ShiraziHR18, author = {Hossein Shirazi and Kyle Haefner and Indrakshi Ray}, title = {Improving Auto-Detection of Phishing Websites using Fresh-Phish Framework}, journal = {Int. J. Multim. Data Eng. Manag.}, volume = {9}, number = {1}, pages = {51--64}, year = {2018}, url = {https://doi.org/10.4018/IJMDEM.2018010104}, doi = {10.4018/IJMDEM.2018010104}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmdem/ShiraziHR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MoatazRRSCC18, author = {Tarik Moataz and Indrajit Ray and Indrakshi Ray and Abdullatif Shikfa and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens}, title = {Substring search over encrypted data}, journal = {J. Comput. Secur.}, volume = {26}, number = {1}, pages = {1--30}, year = {2018}, url = {https://doi.org/10.3233/JCS-14652}, doi = {10.3233/JCS-14652}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MoatazRRSCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/BahlCCCHIINRRSS18, author = {Victor Bahl and Barbara Carminati and James Caverlee and Ing{-}Ray Chen and Wynne Hsu and Toru Ishida and Val{\'{e}}rie Issarny and Surya Nepal and Indrakshi Ray and Kui Ren and Shamik Sural and Mei{-}Ling Shyu}, title = {Editorial}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {11}, number = {1}, pages = {1--4}, year = {2018}, url = {https://doi.org/10.1109/TSC.2018.2793681}, doi = {10.1109/TSC.2018.2793681}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/BahlCCCHIINRRSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adbis/BelyaevR18, author = {Kirill Belyaev and Indrakshi Ray}, editor = {Andr{\'{a}}s Bencz{\'{u}}r and Bernhard Thalheim and Tom{\'{a}}s Horv{\'{a}}th and Silvia Chiusano and Tania Cerquitelli and Csaba Istv{\'{a}}n Sidl{\'{o}} and Peter Z. Revesz}, title = {Towards Service Orchestration in {XML} Filtering Overlays}, booktitle = {New Trends in Databases and Information Systems - {ADBIS} 2018 Short Papers and Workshops, AI*QA, BIGPMED, CSACDB, M2U, BigDataMAPS, ISTREND, DC, Budapest, Hungary, September, 2-5, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {909}, pages = {12--19}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00063-9\_2}, doi = {10.1007/978-3-030-00063-9\_2}, timestamp = {Mon, 03 Sep 2018 16:52:13 +0200}, biburl = {https://dblp.org/rec/conf/adbis/BelyaevR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/BezawadaR18, author = {Bruhadeshwar Bezawada and Indrakshi Ray}, editor = {Pierangela Samarati and Indrajit Ray and Indrakshi Ray}, title = {Attribute-Based Encryption: Applications and Future Directions}, booktitle = {From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday}, series = {Lecture Notes in Computer Science}, volume = {11170}, pages = {353--374}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-04834-1\_18}, doi = {10.1007/978-3-030-04834-1\_18}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/BezawadaR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BezawadaBPSRR18, author = {Bruhadeshwar Bezawada and Maalvika Bachani and Jordan Peterson and Hossein Shirazi and Indrakshi Ray and Indrajit Ray}, editor = {Chip{-}Hong Chang and Ulrich R{\"{u}}hrmair and Daniel E. Holcomb and Jorge Guajardo}, title = {Behavioral Fingerprinting of IoT Devices}, booktitle = {Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, ASHES@CCS 2018, Toronto, ON, Canada, October 19, 2018}, pages = {41--50}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3266444.3266452}, doi = {10.1145/3266444.3266452}, timestamp = {Wed, 30 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BezawadaBPSRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmec/BasnetMPR18, author = {Rejina Basnet and Subhojeet Mukherjee and Vignesh M. Pagadala and Indrakshi Ray}, title = {An efficient implementation of next generation access control for the mobile health cloud}, booktitle = {Third International Conference on Fog and Mobile Edge Computing, {FMEC} 2018, Barcelona, Spain, April 23-26, 2018}, pages = {131--138}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/FMEC.2018.8364055}, doi = {10.1109/FMEC.2018.8364055}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/fmec/BasnetMPR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/PagadalaR18, author = {Vignesh M. Pagadala and Indrakshi Ray}, editor = {Nur Zincir{-}Heywood and Guillaume Bonfante and Mourad Debbabi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Achieving Mobile-Health Privacy Using Attribute-Based Access Control}, booktitle = {Foundations and Practice of Security - 11th International Symposium, {FPS} 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11358}, pages = {301--316}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-18419-3\_20}, doi = {10.1007/978-3-030-18419-3\_20}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/PagadalaR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ideas/HomayouniGR18, author = {Hajar Homayouni and Sudipto Ghosh and Indrakshi Ray}, editor = {Bipin C. Desai and Sergio Flesca and Ester Zumpano and Elio Masciari and Luciano Caroprese}, title = {An Approach for Testing the Extract-Transform-Load Process in Data Warehouse Systems}, booktitle = {Proceedings of the 22nd International Database Engineering {\&} Applications Symposium, {IDEAS} 2018, Villa San Giovanni, Italy, June 18-20, 2018}, pages = {236--245}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3216122.3216149}, doi = {10.1145/3216122.3216149}, timestamp = {Wed, 21 Nov 2018 12:44:24 +0100}, biburl = {https://dblp.org/rec/conf/ideas/HomayouniGR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkdd/KhalidRC18, author = {Majdi Khalid and Indrakshi Ray and Hamidreza Chitsaz}, editor = {Michele Berlingerio and Francesco Bonchi and Thomas G{\"{a}}rtner and Neil Hurley and Georgiana Ifrim}, title = {Scalable Nonlinear {AUC} Maximization Methods}, booktitle = {Machine Learning and Knowledge Discovery in Databases - European Conference, {ECML} {PKDD} 2018, Dublin, Ireland, September 10-14, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11052}, pages = {292--307}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-10928-8\_18}, doi = {10.1007/978-3-030-10928-8\_18}, timestamp = {Fri, 27 Mar 2020 08:53:11 +0100}, biburl = {https://dblp.org/rec/conf/pkdd/KhalidRC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/LazrigORRJV18, author = {Ibrahim Lazrig and Toan C. Ong and Indrajit Ray and Indrakshi Ray and Xiaoqian Jiang and Jaideep Vaidya}, editor = {Kieran McLaughlin and Ali A. Ghorbani and Sakir Sezer and Rongxing Lu and Liqun Chen and Robert H. Deng and Paul Miller and Stephen Marsh and Jason R. C. Nurse}, title = {Privacy Preserving Probabilistic Record Linkage Without Trusted Third Party}, booktitle = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/PST.2018.8514192}, doi = {10.1109/PST.2018.8514192}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/LazrigORRJV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/MulambaRR18, author = {Dieudonne Mulamba and Indrajit Ray and Indrakshi Ray}, editor = {Kieran McLaughlin and Ali A. Ghorbani and Sakir Sezer and Rongxing Lu and Liqun Chen and Robert H. Deng and Paul Miller and Stephen Marsh and Jason R. C. Nurse}, title = {On Sybil Classification in Online Social Networks Using Only Structural Features}, booktitle = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/PST.2018.8514162}, doi = {10.1109/PST.2018.8514162}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/MulambaRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BezawadaKRRL18, author = {Bruhadeshwar Bezawada and Sandeep S. Kulkarni and Indrajit Ray and Indrakshi Ray and Rui Li}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Independent Key Distribution Protocols for Broadcast Authentication}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {27--38}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205985}, doi = {10.1145/3205977.3205985}, timestamp = {Tue, 29 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BezawadaKRRL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ShiraziBR18, author = {Hossein Shirazi and Bruhadeshwar Bezawada and Indrakshi Ray}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {\emph{"Kn0w Thy Doma1n Name"}: Unbiased Phishing Detection Using Domain Name Based Features}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {69--75}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205992}, doi = {10.1145/3205977.3205992}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/ShiraziBR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/birthday/2018jajodia, editor = {Pierangela Samarati and Indrajit Ray and Indrakshi Ray}, title = {From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday}, series = {Lecture Notes in Computer Science}, volume = {11170}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-04834-1}, doi = {10.1007/978-3-030-04834-1}, isbn = {978-3-030-04833-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/2018jajodia.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/db/RayB18, author = {Indrakshi Ray and Thilina Buddhika}, editor = {Ling Liu and M. Tamer {\"{O}}zsu}, title = {Secure Transaction Processing}, booktitle = {Encyclopedia of Database Systems, Second Edition}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-1-4614-8265-9\_331}, doi = {10.1007/978-1-4614-8265-9\_331}, timestamp = {Thu, 14 Feb 2019 09:43:36 +0100}, biburl = {https://dblp.org/rec/reference/db/RayB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-03852, author = {Bruhadeshwar Bezawada and Maalvika Bachani and Jordan Peterson and Hossein Shirazi and Indrakshi Ray and Indrajit Ray}, title = {IoTSense: Behavioral Fingerprinting of IoT Devices}, journal = {CoRR}, volume = {abs/1804.03852}, year = {2018}, url = {http://arxiv.org/abs/1804.03852}, eprinttype = {arXiv}, eprint = {1804.03852}, timestamp = {Wed, 30 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-03852.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BelyaevR17, author = {Kirill Belyaev and Indrakshi Ray}, title = {On the formalization, design, and implementation of component-oriented access control in lightweight virtualized server environments}, journal = {Comput. Secur.}, volume = {71}, pages = {15--35}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2017.06.004}, doi = {10.1016/J.COSE.2017.06.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BelyaevR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KarLRR17, author = {Diptendu Mohan Kar and Ibrahim Lazrig and Indrajit Ray and Indrakshi Ray}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} PriReMat: {A} Distributed Tool for Privacy Preserving Record Linking in Healthcare}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2507--2509}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138845}, doi = {10.1145/3133956.3138845}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KarLRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MukherjeeCWWRR17, author = {Subhojeet Mukherjee and Noah Cain and Jacob Walker and David White and Indrajit Ray and Indrakshi Ray}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2559--2561}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138844}, doi = {10.1145/3133956.3138844}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MukherjeeCWWRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/MukherjeeRRSOK17, author = {Subhojeet Mukherjee and Indrakshi Ray and Indrajit Ray and Hossein Shirazi and Toan Ong and Michael G. Kahn}, editor = {Elisa Bertino and Ravi S. Sandhu and Ram Krishnan}, title = {Attribute Based Access Control for Healthcare Resources}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Attribute-Based Access Control, ABAC@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017}, pages = {29--40}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3041048.3041055}, doi = {10.1145/3041048.3041055}, timestamp = {Tue, 09 Feb 2021 08:50:28 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/MukherjeeRRSOK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MosharrafJR17, author = {Negar Mosharraf and Anura P. Jayasumana and Indrakshi Ray}, editor = {Giovanni Livraga and Sencun Zhu}, title = {A Distributed Mechanism to Protect Against DDoS Attacks}, booktitle = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP} {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10359}, pages = {529--540}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61176-1\_29}, doi = {10.1007/978-3-319-61176-1\_29}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MosharrafJR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmec/Ray17, author = {Indrakshi Ray}, title = {Keynote speech 2: Attribute-based access control status and directions}, booktitle = {Second International Conference on Fog and Mobile Edge Computing, {FMEC} 2017, Valencia, Spain, May 8-11, 2017}, pages = {2}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/FMEC.2017.7946397}, doi = {10.1109/FMEC.2017.7946397}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/fmec/Ray17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/MosharrafJRB17, author = {Negar Mosharraf and Anura P. Jayasumana and Indrakshi Ray and Bruhadeshwar Bezawada}, editor = {Mohammad S. Obaidat and Enrique Cabello}, title = {History-Based Throttling of Distributed Denial-of-Service Attacks}, booktitle = {E-Business and Telecommunications - 14th International Joint Conference, {ICETE} 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper}, series = {Communications in Computer and Information Science}, volume = {990}, pages = {199--223}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-11039-0\_10}, doi = {10.1007/978-3-030-11039-0\_10}, timestamp = {Fri, 31 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icete/MosharrafJRB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/ShiraziHR17, author = {Hossein Shirazi and Kyle Haefner and Indrakshi Ray}, editor = {Chengcui Zhang and Balaji Palanisamy and Latifur Khan and Sahra Sedigh Sarvestani}, title = {Fresh-Phish: {A} Framework for Auto-Detection of Phishing Websites}, booktitle = {2017 {IEEE} International Conference on Information Reuse and Integration, {IRI} 2017, San Diego, CA, USA, August 4-6, 2017}, pages = {137--143}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/IRI.2017.40}, doi = {10.1109/IRI.2017.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iri/ShiraziHR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/MukherjeeWRD17, author = {Subhojeet Mukherjee and Jacob Walker and Indrakshi Ray and Jeremy Daily}, title = {A Precedence Graph-Based Approach to Detect Message Injection Attacks in {J1939} Based Networks}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {67--76}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00018}, doi = {10.1109/PST.2017.00018}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/MukherjeeWRD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sds/Ray17, author = {Indrakshi Ray}, title = {Keynote speech 2: Attribute-based access control status and directions}, booktitle = {2017 Fourth International Conference on Software Defined Systems, {SDS} 2017, Valencia, Spain, May 8-11, 2017}, pages = {2}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/SDS.2017.7939130}, doi = {10.1109/SDS.2017.7939130}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/sds/Ray17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sds/RayANA17, author = {Indrakshi Ray and Bithin Alangot and Shilpa Nair and Krishnashree Achuthan}, title = {Using Attribute-Based Access Control for Remote Healthcare Monitoring}, booktitle = {2017 Fourth International Conference on Software Defined Systems, {SDS} 2017, Valencia, Spain, May 8-11, 2017}, pages = {137--142}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/SDS.2017.7939154}, doi = {10.1109/SDS.2017.7939154}, timestamp = {Tue, 13 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sds/RayANA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MosharrafJR17, author = {Negar Mosharraf and Anura P. Jayasumana and Indrakshi Ray}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Using a History-based Profile to Detect and Respond to DDoS Attacks}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {175--186}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006435801750186}, doi = {10.5220/0006435801750186}, timestamp = {Thu, 17 Aug 2017 18:31:18 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MosharrafJR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1710-00760, author = {Majdi Khalid and Indrakshi Ray and Hamidreza Chitsaz}, title = {{AUC} Maximization with K-hyperplane}, journal = {CoRR}, volume = {abs/1710.00760}, year = {2017}, url = {http://arxiv.org/abs/1710.00760}, eprinttype = {arXiv}, eprint = {1710.00760}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1710-00760.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adma/KhalidRC16, author = {Majdi Khalid and Indrakshi Ray and Hamidreza Chitsaz}, editor = {Jinyan Li and Xue Li and Shuliang Wang and Jianxin Li and Quan Z. Sheng}, title = {Confidence-Weighted Bipartite Ranking}, booktitle = {Advanced Data Mining and Applications - 12th International Conference, {ADMA} 2016, Gold Coast, QLD, Australia, December 12-15, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10086}, pages = {35--49}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49586-6\_3}, doi = {10.1007/978-3-319-49586-6\_3}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/adma/KhalidRC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bhi/RayORK16, author = {Indrakshi Ray and Toan C. Ong and Indrajit Ray and Michael G. Kahn}, title = {Applying attribute based access control for privacy preserving health data disclosure}, booktitle = {2016 {IEEE-EMBS} International Conference on Biomedical and Health Informatics, {BHI} 2016, Las Vegas, NV, USA, February 24-27, 2016}, pages = {1--4}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/BHI.2016.7455820}, doi = {10.1109/BHI.2016.7455820}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/bhi/RayORK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/BelyaevR16, author = {Kirill Belyaev and Indrakshi Ray}, editor = {Sara Foresti and Giuseppe Persiano}, title = {Component-Oriented Access Control for Deployment of Application Services in Containerized Environments}, booktitle = {Cryptology and Network Security - 15th International Conference, {CANS} 2016, Milan, Italy, November 14-16, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10052}, pages = {383--399}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48965-0\_23}, doi = {10.1007/978-3-319-48965-0\_23}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/BelyaevR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/HsuR16, author = {Andy Chunliang Hsu and Indrakshi Ray}, editor = {Elisa Bertino and Ravi S. Sandhu and Ram Krishnan}, title = {Specification and Enforcement of Location-Aware Attribute-Based Access Control for Online Social Networks}, booktitle = {Proceedings of the 2016 {ACM} International Workshop on Attribute Based Access Control, ABAC@CODASPY 2016, New Orleans, Louisiana, USA, March 11, 2016}, pages = {25--34}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2875491.2875495}, doi = {10.1145/2875491.2875495}, timestamp = {Tue, 09 Feb 2021 08:50:28 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/HsuR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/MosharrafJR16, author = {Negar Mosharraf and Anura P. Jayasumana and Indrakshi Ray}, title = {Compacted Bloom Filter}, booktitle = {2nd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016}, pages = {304--311}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIC.2016.048}, doi = {10.1109/CIC.2016.048}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/MosharrafJR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LazrigORRK16, author = {Ibrahim Lazrig and Toan Ong and Indrajit Ray and Indrakshi Ray and Michael G. Kahn}, editor = {Silvio Ranise and Vipin Swarup}, title = {Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes}, booktitle = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP} {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9766}, pages = {61--76}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-41483-6\_5}, doi = {10.1007/978-3-319-41483-6\_5}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/LazrigORRK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficloud/KebandeR16, author = {Victor R. Kebande and Indrakshi Ray}, editor = {Muhammad Younas and Irfan Awan and Winston Seah}, title = {A Generic Digital Forensic Investigation Framework for Internet of Things (IoT)}, booktitle = {4th {IEEE} International Conference on Future Internet of Things and Cloud, FiCloud 2016, Vienna, Austria, August 22-24, 2016}, pages = {356--362}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/FiCloud.2016.57}, doi = {10.1109/FICLOUD.2016.57}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ficloud/KebandeR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/MukherjeeSRDG16, author = {Subhojeet Mukherjee and Hossein Shirazi and Indrakshi Ray and Jeremy Daily and Rose F. Gamble}, editor = {Indrajit Ray and Manoj Singh Gaur and Mauro Conti and Dheeraj Sanghi and V. Kamakoti}, title = {Practical DoS Attacks on Embedded Networks in Commercial Vehicles}, booktitle = {Information Systems Security - 12th International Conference, {ICISS} 2016, Jaipur, India, December 16-20, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {23--42}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49806-5\_2}, doi = {10.1007/978-3-319-49806-5\_2}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/MukherjeeSRDG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ideas/BelyaevR16, author = {Kirill Belyaev and Indrakshi Ray}, editor = {Evan Desai and Bipin C. Desai and Motomichi Toyama and Jorge Bernardino}, title = {Enhancing applications with filtering of {XML} message streams}, booktitle = {Proceedings of the 20th International Database Engineering {\&} Applications Symposium, {IDEAS} 2016, Montreal, QC, Canada, July 11-13, 2016}, pages = {322--327}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2938503.2938509}, doi = {10.1145/2938503.2938509}, timestamp = {Tue, 06 Nov 2018 16:58:58 +0100}, biburl = {https://dblp.org/rec/conf/ideas/BelyaevR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/MulambaRR16, author = {Dieudonne Mulamba and Indrajit Ray and Indrakshi Ray}, editor = {Jaap{-}Henk Hoepman and Stefan Katzenbeisser}, title = {SybilRadar: {A} Graph-Structure Based Framework for Sybil Detection in On-line Social Networks}, booktitle = {{ICT} Systems Security and Privacy Protection - 31st {IFIP} {TC} 11 International Conference, {SEC} 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {471}, pages = {179--193}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-33630-5\_13}, doi = {10.1007/978-3-319-33630-5\_13}, timestamp = {Fri, 19 May 2017 01:25:11 +0200}, biburl = {https://dblp.org/rec/conf/sec/MulambaRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BelyaevR16, author = {Kirill Belyaev and Indrakshi Ray}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Towards Access Control for Isolated Applications}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {171--182}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005970001710182}, doi = {10.5220/0005970001710182}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BelyaevR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spaccs/2016, editor = {Guojun Wang and Indrakshi Ray and Jose M. Alcaraz Calero and Sabu M. Thampi}, title = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10066}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49148-6}, doi = {10.1007/978-3-319-49148-6}, isbn = {978-3-319-49147-9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spaccs/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spaccs/2016w, editor = {Guojun Wang and Indrakshi Ray and Jose M. Alcaraz Calero and Sabu M. Thampi}, title = {Security, Privacy and Anonymity in Computation, Communication and Storage - SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10067}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49145-5}, doi = {10.1007/978-3-319-49145-5}, isbn = {978-3-319-49144-8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spaccs/2016w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KhaledRC16, author = {Majdi Khalid and Indrakshi Ray and Hamidreza Chitsaz}, title = {Confidence-Weighted Bipartite Ranking}, journal = {CoRR}, volume = {abs/1607.00847}, year = {2016}, url = {http://arxiv.org/abs/1607.00847}, eprinttype = {arXiv}, eprint = {1607.00847}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KhaledRC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ase/HeitmeyerPLARAT15, author = {Constance L. Heitmeyer and Marc Pickett and Elizabeth I. Leonard and Myla M. Archer and Indrakshi Ray and David W. Aha and J. Gregory Trafton}, title = {Building high assurance human-centric decision systems}, journal = {Autom. Softw. Eng.}, volume = {22}, number = {2}, pages = {159--197}, year = {2015}, url = {https://doi.org/10.1007/s10515-014-0157-z}, doi = {10.1007/S10515-014-0157-Z}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ase/HeitmeyerPLARAT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jot/SunCFBBR15, author = {Wuliang Sun and Beno{\^{\i}}t Combemale and Robert B. France and Arnaud Blouin and Benoit Baudry and Indrakshi Ray}, title = {Using Slicing to Improve the Performance of Model Invariant Checking}, journal = {J. Object Technol.}, volume = {14}, number = {4}, pages = {1:1--28}, year = {2015}, url = {https://doi.org/10.5381/jot.2015.14.4.a1}, doi = {10.5381/JOT.2015.14.4.A1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jot/SunCFBBR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SuWSR15, author = {Jinshu Su and Xiaofeng Wang and Weisong Shi and Indrakshi Ray}, title = {Security, trust, and resilience of distributed networks and systems}, journal = {Secur. Commun. Networks}, volume = {8}, number = {10}, pages = {1829--1830}, year = {2015}, url = {https://doi.org/10.1002/sec.1276}, doi = {10.1002/SEC.1276}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SuWSR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/BelyaevR15, author = {Kirill Belyaev and Indrakshi Ray}, editor = {Yulei Wu and Geyong Min and Nektarios Georgalas and Jia Hu and Luigi Atzori and Xiaolong Jin and Stephen A. Jarvis and Lei (Chris) Liu and Ram{\'{o}}n Ag{\"{u}}ero Calvo}, title = {Towards Efficient Dissemination and Filtering of {XML} Data Streams}, booktitle = {15th {IEEE} International Conference on Computer and Information Technology, {CIT} 2015; 14th {IEEE} International Conference on Ubiquitous Computing and Communications, {IUCC} 2015; 13th {IEEE} International Conference on Dependable, Autonomic and Secure Computing, {DASC} 2015; 13th {IEEE} International Conference on Pervasive Intelligence and Computing, PICom 2015, Liverpool, United Kingdom, October 26-28, 2015}, pages = {1870--1877}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.278}, doi = {10.1109/CIT/IUCC/DASC/PICOM.2015.278}, timestamp = {Thu, 22 Oct 2020 17:33:50 +0200}, biburl = {https://dblp.org/rec/conf/IEEEcit/BelyaevR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c3s2e/BennettRF15, author = {Phillipa Bennett and Indrakshi Ray and Robert B. France}, editor = {Jake Yue Chen and Mohammed J. Zaki and Tamer Kahveci and Saeed Salem and Mehmet Koyut{\"{u}}rk}, title = {Analysis of a Relationship Based Access Control Model}, booktitle = {Proceedings of the Eighth International C* Conference on Computer Science {\&} Software Engineering, Yokohama, Japan, July 13-15, 2015}, pages = {1--8}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2790798.2790811}, doi = {10.1145/2790798.2790811}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/c3s2e/BennettRF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LazrigMRROKCC15, author = {Ibrahim Lazrig and Tarik Moataz and Indrajit Ray and Indrakshi Ray and Toan Ong and Michael G. Kahn and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Pierangela Samarati}, title = {Privacy Preserving Record Matching Using Automated Semi-trusted Broker}, booktitle = {Data and Applications Security and Privacy {XXIX} - 29th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9149}, pages = {103--118}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20810-7\_7}, doi = {10.1007/978-3-319-20810-7\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/LazrigMRROKCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/RayAXG15, author = {Indrakshi Ray and Raman Adaikkalavan and Xing Xie and Rose F. Gamble}, editor = {Pierangela Samarati}, title = {Stream Processing with Secure Information Flow Constraints}, booktitle = {Data and Applications Security and Privacy {XXIX} - 29th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9149}, pages = {311--329}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20810-7\_22}, doi = {10.1007/978-3-319-20810-7\_22}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/RayAXG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/BennettRF15, author = {Phillipa Bennett and Indrakshi Ray and Robert B. France}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Modeling of Online Social Network Policies Using an Attribute-Based Access Control Framework}, booktitle = {Information Systems Security - 11th International Conference, {ICISS} 2015, Kolkata, India, December 16-20, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {79--97}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26961-0\_6}, doi = {10.1007/978-3-319-26961-0\_6}, timestamp = {Wed, 25 Sep 2019 18:06:16 +0200}, biburl = {https://dblp.org/rec/conf/iciss/BennettRF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/BennettSTGRK15, author = {Phillipa Bennett and Wuliang Sun and Ted D. Wade and Geri Georg and Indrakshi Ray and Michael G. Kahn}, editor = {Beno{\^{\i}}t Combemale and Julien Deantoni and Jeff Gray and Daniel Balasubramanian and Bruno Barroca and Sahar Kokaly and Gergely Mezei and Pieter Van Gorp}, title = {Analyzing Regulatory Conformance in Medical Research Systems Using Multi-Paradigm Modeling}, booktitle = {Joint Proceedings of the 3rd International Workshop on the Globalization Of Modeling Languages and the 9th International Workshop on Multi-Paradigm Modeling co-located with {ACM/IEEE} 18th International Conference on Model Driven Engineering Languages and Systems, GEMOC+MPM@MoDELS 2015, Ottawa, Canada, September 28, 2015}, series = {{CEUR} Workshop Proceedings}, volume = {1511}, pages = {22--31}, publisher = {CEUR-WS.org}, year = {2015}, url = {https://ceur-ws.org/Vol-1511/paper-MPM01.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:20 +0100}, biburl = {https://dblp.org/rec/conf/models/BennettSTGRK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/AbdunabiSR14, author = {Ramadan Abdunabi and Wuliang Sun and Indrakshi Ray}, title = {Enforcing spatio-temporal access control in mobile applications}, journal = {Computing}, volume = {96}, number = {4}, pages = {313--353}, year = {2014}, url = {https://doi.org/10.1007/s00607-013-0340-2}, doi = {10.1007/S00607-013-0340-2}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/AbdunabiSR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbpim/AlqahtaniGR14, author = {Sarra M. Alqahtani and Rose F. Gamble and Indrakshi Ray}, title = {Enforcing the Chinese wall model for tenant conflict of interest in the service cloud}, journal = {Int. J. Bus. Process. Integr. Manag.}, volume = {7}, number = {2}, pages = {166--177}, year = {2014}, url = {https://doi.org/10.1504/IJBPIM.2014.063520}, doi = {10.1504/IJBPIM.2014.063520}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbpim/AlqahtaniGR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/YangXRL14, author = {Ping Yang and Xing Xie and Indrakshi Ray and Shiyong Lu}, title = {Satisfiability Analysis of Workflows with Control-Flow Patterns and Authorization Constraints}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {7}, number = {2}, pages = {237--251}, year = {2014}, url = {https://doi.org/10.1109/TSC.2013.31}, doi = {10.1109/TSC.2013.31}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/YangXRL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MoatazJRCCR14, author = {Tarik Moataz and Benjamin Justus and Indrakshi Ray and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Indrajit Ray}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {66--81}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_5}, doi = {10.1007/978-3-662-43936-4\_5}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MoatazJRCCR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MoatazCCRR14, author = {Tarik Moataz and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Indrajit Ray and Indrakshi Ray}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {{ELITE:} zEro Links Identity managemenT systEm}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {195--210}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_13}, doi = {10.1007/978-3-662-43936-4\_13}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MoatazCCRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/MosharrafJR14, author = {Negar Mosharraf and Anura P. Jayasumana and Indrakshi Ray}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood and Philip W. L. Fong}, title = {A Responsive Defense Mechanism Against DDoS Attacks}, booktitle = {Foundations and Practice of Security - 7th International Symposium, {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8930}, pages = {347--355}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17040-4\_23}, doi = {10.1007/978-3-319-17040-4\_23}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/MosharrafJR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/MurugesanR14, author = {Prabhakaran Murugesan and Indrakshi Ray}, title = {Audit Log Management in MongoDB}, booktitle = {2014 {IEEE} World Congress on Services, {SERVICES} 2014, Anchorage, AK, USA, June 27 - July 2, 2014}, pages = {53--57}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SERVICES.2014.19}, doi = {10.1109/SERVICES.2014.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/services/MurugesanR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/EarleFR14, author = {Curtis C. R. Busby Earle and Robert B. France and Indrakshi Ray}, title = {Analysing Requirements to Detect Latent Security Vulnerabilities}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {168--175}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.35}, doi = {10.1109/SERE-C.2014.35}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/EarleFR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/AbdunabiARF13, author = {Ramadan Abdunabi and Mustafa Al{-}Lail and Indrakshi Ray and Robert B. France}, title = {Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model}, journal = {{IEEE} Syst. J.}, volume = {7}, number = {3}, pages = {501--515}, year = {2013}, url = {https://doi.org/10.1109/JSYST.2013.2242751}, doi = {10.1109/JSYST.2013.2242751}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/AbdunabiARF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/BelyaevRRL13, author = {Kirill Belyaev and Indrakshi Ray and Indrajit Ray and Gary Luckasen}, editor = {Elisa Bertino and Dimitrios Georgakopoulos and Mudhakar Srivatsa and Surya Nepal and Alessandro Vinciarelli}, title = {Personal health record storage on privacy preserving green clouds}, booktitle = {9th {IEEE} International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, October 20-23, 2013}, pages = {448--457}, publisher = {{ICST} / {IEEE}}, year = {2013}, url = {https://doi.org/10.4108/icst.collaboratecom.2013.254117}, doi = {10.4108/ICST.COLLABORATECOM.2013.254117}, timestamp = {Fri, 15 Mar 2024 12:30:44 +0100}, biburl = {https://dblp.org/rec/conf/colcom/BelyaevRRL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/RayMRH13, author = {Indrajit Ray and Dieudonne Mulamba and Indrakshi Ray and Keesook J. Han}, editor = {Lingyu Wang and Basit Shafiq}, title = {A Model for Trust-Based Access Control and Delegation in Mobile Clouds}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {242--257}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_16}, doi = {10.1007/978-3-642-39256-6\_16}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/RayMRH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/XieRRGSY13, author = {Xing Xie and Indrakshi Ray and Waruna Ranasinghe and Philips A. Gilbert and Pramod Shashidhara and Anoop Yadav}, title = {Distributed Multilevel Secure Data Stream Processing}, booktitle = {33rd International Conference on Distributed Computing Systems Workshops {(ICDCS} 2013 Workshops), Philadelphia, PA, USA, 8-11 July, 2013}, pages = {368--373}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICDCSW.2013.64}, doi = {10.1109/ICDCSW.2013.64}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/XieRRGSY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/Al-LailAFR13, author = {Mustafa Al{-}Lail and Ramadan Abdunabi and Robert B. France and Indrakshi Ray}, title = {Rigorous Analysis of Temporal Access Control Properties in Mobile Systems}, booktitle = {2013 18th International Conference on Engineering of Complex Computer Systems, Singapore, July 17-19, 2013}, pages = {246--251}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICECCS.2013.43}, doi = {10.1109/ICECCS.2013.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceccs/Al-LailAFR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/SunFR13a, author = {Wuliang Sun and Robert B. France and Indrakshi Ray}, editor = {Alfonso Pierantonio and Bernhard Sch{\"{a}}tz}, title = {Analyzing Behavioral Refactoring of Class Models}, booktitle = {Proceedings of the Workshop on Models and Evolution co-located with {ACM/IEEE} 16th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2013), Miami, Florida, USA, October 1, 2013}, series = {{CEUR} Workshop Proceedings}, volume = {1090}, pages = {70--79}, publisher = {CEUR-WS.org}, year = {2013}, url = {https://ceur-ws.org/Vol-1090/8.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:20 +0100}, biburl = {https://dblp.org/rec/conf/models/SunFR13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/Al-LailAFR13, author = {Mustafa Al{-}Lail and Ramadan Abdunabi and Robert B. France and Indrakshi Ray}, editor = {Fr{\'{e}}d{\'{e}}ric Boulanger and Michalis Famelis and Daniel Ratiu}, title = {An Approach to Analyzing Temporal Properties in {UML} Class Models}, booktitle = {Proceedings of the 10th International Workshop on Model Driven Engineering, Verification and Validation MoDeVVa 2013, co-located with 16th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2013), Miami, Florida, USA, October 1st, 2013}, series = {{CEUR} Workshop Proceedings}, volume = {1069}, pages = {77--86}, publisher = {CEUR-WS.org}, year = {2013}, url = {https://ceur-ws.org/Vol-1069/11-paper.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:20 +0100}, biburl = {https://dblp.org/rec/conf/models/Al-LailAFR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/SunFR13, author = {Wuliang Sun and Robert B. France and Indrakshi Ray}, editor = {Ana Moreira and Bernhard Sch{\"{a}}tz and Jeff Gray and Antonio Vallecillo and Peter J. Clarke}, title = {Contract-Aware Slicing of {UML} Class Models}, booktitle = {Model-Driven Engineering Languages and Systems - 16th International Conference, {MODELS} 2013, Miami, FL, USA, September 29 - October 4, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8107}, pages = {724--739}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41533-3\_44}, doi = {10.1007/978-3-642-41533-3\_44}, timestamp = {Mon, 21 Jun 2021 12:26:18 +0200}, biburl = {https://dblp.org/rec/conf/models/SunFR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/XieRAG13, author = {Xing Xie and Indrakshi Ray and Raman Adaikkalavan and Rose F. Gamble}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Information flow control for stream processing in clouds}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {89--100}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2463205}, doi = {10.1145/2462410.2463205}, timestamp = {Tue, 06 Nov 2018 16:57:58 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/XieRAG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/AbdunabiRF13, author = {Ramadan Abdunabi and Indrakshi Ray and Robert B. France}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Specification and analysis of access control policies for mobile applications}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {173--184}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2463206}, doi = {10.1145/2462410.2463206}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/AbdunabiRF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/AlqahtaniGR13, author = {Sarra M. Alqahtani and Rose F. Gamble and Indrakshi Ray}, title = {Auditing Requirements for Implementing the Chinese Wall Model in the Service Cloud}, booktitle = {{IEEE} Ninth World Congress on Services, {SERVICES} 2013, Santa Clara, CA, USA, June 28 - July 3, 2013}, pages = {298--305}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SERVICES.2013.44}, doi = {10.1109/SERVICES.2013.44}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/services/AlqahtaniGR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/XieRA13, author = {Xing Xie and Indrakshi Ray and Raman Adaikkalavan}, title = {On the Efficient Processing of Multilevel Secure Continuous Queries}, booktitle = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013, Washington, DC, USA, 8-14 September, 2013}, pages = {417--422}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SocialCom.2013.65}, doi = {10.1109/SOCIALCOM.2013.65}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/XieRA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/css/2013, editor = {Guojun Wang and Indrakshi Ray and Dengguo Feng and Muttukrishnan Rajarajan}, title = {Cyberspace Safety and Security - 5th International Symposium, {CSS} 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8300}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03584-0}, doi = {10.1007/978-3-319-03584-0}, isbn = {978-3-319-03583-3}, timestamp = {Fri, 05 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/css/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iciss/2013, editor = {Aditya Bagchi and Indrakshi Ray}, title = {Information Systems Security - 9th International Conference, {ICISS} 2013, Kolkata, India, December 16-20, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8303}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45204-8}, doi = {10.1007/978-3-642-45204-8}, isbn = {978-3-642-45203-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/DewriRRW12, author = {Rinku Dewri and Indrakshi Ray and Indrajit Ray and L. Darrell Whitley}, title = {Utility driven optimization of real time data broadcast schedules}, journal = {Appl. Soft Comput.}, volume = {12}, number = {7}, pages = {1832--1846}, year = {2012}, url = {https://doi.org/10.1016/j.asoc.2011.04.006}, doi = {10.1016/J.ASOC.2011.04.006}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/asc/DewriRRW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/AdaikkalavanXR12, author = {Raman Adaikkalavan and Xing Xie and Indrakshi Ray}, title = {Multilevel secure data stream processing: Architecture and implementation}, journal = {J. Comput. Secur.}, volume = {20}, number = {5}, pages = {547--581}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0451}, doi = {10.3233/JCS-2012-0451}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AdaikkalavanXR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/YuFRS12, author = {Lijun Yu and Robert B. France and Indrakshi Ray and Wuliang Sun}, editor = {Isabelle Perseil and Karin K. Breitman and Marc Pouzet}, title = {Systematic Scenario-Based Analysis of {UML} Design Class Models}, booktitle = {17th {IEEE} International Conference on Engineering of Complex Computer Systems, {ICECCS} 2012, Paris, France, July 18-20, 2012}, pages = {86--95}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.ieeecomputersociety.org/10.1109/ICECCS.2012.37}, doi = {10.1109/ICECCS.2012.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceccs/YuFRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/RayML12, author = {Indrakshi Ray and Sanjay Kumar Madria and Mark Linderman}, title = {Query Plan Execution in a Heterogeneous Stream Management System for Situational Awareness}, booktitle = {{IEEE} 31st Symposium on Reliable Distributed Systems, {SRDS} 2012, Irvine, CA, USA, October 8-11, 2012}, pages = {424--429}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SRDS.2012.54}, doi = {10.1109/SRDS.2012.54}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/RayML12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/ChundiXR11, author = {Parvathi Chundi and Tai Xin and Indrakshi Ray}, title = {When does a workflow complete?}, journal = {Comput. Stand. Interfaces}, volume = {33}, number = {3}, pages = {292--300}, year = {2011}, url = {https://doi.org/10.1016/j.csi.2010.07.001}, doi = {10.1016/J.CSI.2010.07.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/ChundiXR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ToahchoodeeR11, author = {Manachai Toahchoodee and Indrakshi Ray}, title = {On the formalization and analysis of a spatio-temporal role-based access control model}, journal = {J. Comput. Secur.}, volume = {19}, number = {3}, pages = {399--452}, year = {2011}, url = {https://doi.org/10.3233/JCS-2010-0418}, doi = {10.3233/JCS-2010-0418}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ToahchoodeeR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DewriRRW11, author = {Rinku Dewri and Indrajit Ray and Indrakshi Ray and L. Darrell Whitley}, title = {Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization}, journal = {J. Comput. Secur.}, volume = {19}, number = {5}, pages = {935--974}, year = {2011}, url = {https://doi.org/10.3233/JCS-2011-0428}, doi = {10.3233/JCS-2011-0428}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DewriRRW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/DewriRRW11, author = {Rinku Dewri and Indrajit Ray and Indrakshi Ray and L. Darrell Whitley}, title = {k-Anonymization in the Presence of Publisher Preferences}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {23}, number = {11}, pages = {1678--1690}, year = {2011}, url = {https://doi.org/10.1109/TKDE.2011.106}, doi = {10.1109/TKDE.2011.106}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tkde/DewriRRW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AdaikkalavanRX11, author = {Raman Adaikkalavan and Indrakshi Ray and Xing Xie}, editor = {Yingjiu Li}, title = {Multilevel Secure Data Stream Processing}, booktitle = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP} {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6818}, pages = {122--137}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22348-8\_11}, doi = {10.1007/978-3-642-22348-8\_11}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/AdaikkalavanRX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hase/SunFR11, author = {Wuliang Sun and Robert B. France and Indrakshi Ray}, editor = {Taghi M. Khoshgoftaar}, title = {Supporting Iterative Development of Robust Operation Contracts in {UML} Requirements Models}, booktitle = {13th {IEEE} International Symposium on High-Assurance Systems Engineering, {HASE} 2011, Boca Raton, FL, USA, November 10-12, 2011}, pages = {9--16}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/HASE.2011.43}, doi = {10.1109/HASE.2011.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hase/SunFR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ThorpeRRGBF11, author = {Sean S. E. Thorpe and Indrakshi Ray and Indrajit Ray and Tyrone Grandison and Abbie Barbir and Robert B. France}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {156--171}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_13}, doi = {10.1007/978-3-642-35515-8\_13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ThorpeRRGBF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/SunFR11, author = {Wuliang Sun and Robert B. France and Indrakshi Ray}, title = {Rigorous Analysis of {UML} Access Control Policy Models}, booktitle = {{POLICY} 2011, {IEEE} International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011}, pages = {9--16}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/POLICY.2011.30}, doi = {10.1109/POLICY.2011.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/SunFR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijngc/Ray10, author = {Indrakshi Ray}, title = {Using Graph Theory to Represent a Spatio-Temporal Role-Based Access Control Model}, journal = {Int. J. Next Gener. Comput.}, volume = {1}, number = {2}, year = {2010}, url = {http://perpetualinnovation.net/ojs/index.php/ijngc/article/view/44}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijngc/Ray10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijngc/ToahchoodeeRM10, author = {Manachai Toahchoodee and Indrakshi Ray and Ross M. McConnell}, title = {Using Graph Theory to Represent a Spatio-Temporal Role-Based Access Control Model}, journal = {Int. J. Next Gener. Comput.}, volume = {1}, number = {2}, year = {2010}, url = {http://perpetualinnovation.net/ojs/index.php/ijngc/article/view/82}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijngc/ToahchoodeeRM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/AllardABGFNPRRY10, author = {Tristan Allard and Nicolas Anciaux and Luc Bouganim and Yanli Guo and Lionel Le Folgoc and Benjamin Nguyen and Philippe Pucheral and Indrajit Ray and Indrakshi Ray and Shaoyi Yin}, title = {Secure Personal Data Servers: a Vision Paper}, journal = {Proc. {VLDB} Endow.}, volume = {3}, number = {1}, pages = {25--35}, year = {2010}, url = {http://www.vldb.org/pvldb/vldb2010/pvldb\_vol3/R02.pdf}, doi = {10.14778/1920841.1920850}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/AllardABGFNPRRY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rts/DewriRRW10, author = {Rinku Dewri and Indrakshi Ray and Indrajit Ray and L. Darrell Whitley}, title = {Real time stochastic scheduling in broadcast systems with decentralized data storage}, journal = {Real Time Syst.}, volume = {45}, number = {3}, pages = {143--175}, year = {2010}, url = {https://doi.org/10.1007/s11241-010-9102-9}, doi = {10.1007/S11241-010-9102-9}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rts/DewriRRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sosym/AnastasakisBGR10, author = {Kyriakos Anastasakis and Behzad Bordbar and Geri Georg and Indrakshi Ray}, title = {On challenges of model transformation from {UML} to Alloy}, journal = {Softw. Syst. Model.}, volume = {9}, number = {1}, pages = {69--86}, year = {2010}, url = {https://doi.org/10.1007/s10270-008-0110-3}, doi = {10.1007/S10270-008-0110-3}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sosym/AnastasakisBGR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcos/HoumbRRC10, author = {Siv Hilde Houmb and Indrakshi Ray and Indrajit Ray and Sudip Chakraborty}, title = {Trust-Based Security Level Evaluation Using Bayesian Belief Networks}, journal = {Trans. Comput. Sci.}, volume = {10}, pages = {154--186}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17499-5\_7}, doi = {10.1007/978-3-642-17499-5\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcos/HoumbRRC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/GeorgABHRT10, author = {Geri Georg and Kyriakos Anastasakis and Behzad Bordbar and Siv Hilde Houmb and Indrakshi Ray and Manachai Toahchoodee}, title = {Verification and Trade-Off Analysis of Security Properties in {UML} System Models}, journal = {{IEEE} Trans. Software Eng.}, volume = {36}, number = {3}, pages = {338--356}, year = {2010}, url = {https://doi.org/10.1109/TSE.2010.36}, doi = {10.1109/TSE.2010.36}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/GeorgABHRT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/DewriRRW10, author = {Rinku Dewri and Indrajit Ray and Indrakshi Ray and L. Darrell Whitley}, editor = {Sara Foresti and Sushil Jajodia}, title = {On the Identification of Property Based Generalizations in Microdata Anonymization}, booktitle = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP} {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6166}, pages = {81--96}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13739-6\_6}, doi = {10.1007/978-3-642-13739-6\_6}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/DewriRRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/HoumbCRR10, author = {Siv Hilde Houmb and Sudip Chakraborty and Indrakshi Ray and Indrajit Ray}, editor = {Sara Foresti and Sushil Jajodia}, title = {Using Trust-Based Information Aggregation for Predicting Security Level of Systems}, booktitle = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP} {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6166}, pages = {241--256}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13739-6\_16}, doi = {10.1007/978-3-642-13739-6\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/HoumbCRR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdm/DewriRRW10, author = {Rinku Dewri and Indrakshi Ray and Indrajit Ray and L. Darrell Whitley}, editor = {Takahiro Hara and Christian S. Jensen and Vijay Kumar and Sanjay Madria and Demetrios Zeinalipour{-}Yazti}, title = {Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services}, booktitle = {Eleventh International Conference on Mobile Data Management, {MDM} 2010, Kanas City, Missouri, USA, 23-26 May 2010}, pages = {95--104}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MDM.2010.52}, doi = {10.1109/MDM.2010.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mdm/DewriRRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/DewriRRW10, author = {Rinku Dewri and Indrakshi Ray and Indrajit Ray and L. Darrell Whitley}, editor = {Sushil Jajodia and Jianying Zhou}, title = {On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous {LBS}}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, pages = {71--88}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2\_5}, doi = {10.1007/978-3-642-16161-2\_5}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/DewriRRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ToahchoodeeR09, author = {Manachai Toahchoodee and Indrakshi Ray}, title = {Using alloy to analyse a spatio-temporal access control model supporting delegation}, journal = {{IET} Inf. Secur.}, volume = {3}, number = {3}, pages = {75--113}, year = {2009}, url = {https://doi.org/10.1049/iet-ifs.2008.0074}, doi = {10.1049/IET-IFS.2008.0074}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ToahchoodeeR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/GeorgRABTH09, author = {Geri Georg and Indrakshi Ray and Kyriakos Anastasakis and Behzad Bordbar and Manachai Toahchoodee and Siv Hilde Houmb}, title = {An aspect-oriented methodology for designing secure applications}, journal = {Inf. Softw. Technol.}, volume = {51}, number = {5}, pages = {846--864}, year = {2009}, url = {https://doi.org/10.1016/j.infsof.2008.05.004}, doi = {10.1016/J.INFSOF.2008.05.004}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/GeorgRABTH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jiis/RayRC09, author = {Indrakshi Ray and Indrajit Ray and Sudip Chakraborty}, title = {An interoperable context sensitive model of trust}, journal = {J. Intell. Inf. Syst.}, volume = {32}, number = {1}, pages = {75--104}, year = {2009}, url = {https://doi.org/10.1007/s10844-007-0049-9}, doi = {10.1007/S10844-007-0049-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jiis/RayRC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdp/PoolsappasitR09, author = {Nayot Poolsappasit and Indrakshi Ray}, title = {Towards Achieving Personalized Privacy for Location-Based Services}, journal = {Trans. Data Priv.}, volume = {2}, number = {1}, pages = {77--99}, year = {2009}, url = {http://www.tdp.cat/issues/abs.a021a09.php}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdp/PoolsappasitR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/DewriRRW09, author = {Rinku Dewri and Indrajit Ray and Indrakshi Ray and L. Darrell Whitley}, editor = {David Wai{-}Lok Cheung and Il{-}Yeol Song and Wesley W. Chu and Xiaohua Hu and Jimmy Lin}, title = {POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice}, booktitle = {Proceedings of the 18th {ACM} Conference on Information and Knowledge Management, {CIKM} 2009, Hong Kong, China, November 2-6, 2009}, pages = {1037--1046}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1645953.1646085}, doi = {10.1145/1645953.1646085}, timestamp = {Fri, 27 Aug 2021 11:13:00 +0200}, biburl = {https://dblp.org/rec/conf/cikm/DewriRRW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ToahchoodeeARR09, author = {Manachai Toahchoodee and Ramadan Abdunabi and Indrakshi Ray and Indrajit Ray}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {A Trust-Based Access Control Model for Pervasive Computing Applications}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {307--314}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_22}, doi = {10.1007/978-3-642-03007-9\_22}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/ToahchoodeeARR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbt/DewriRRW09, author = {Rinku Dewri and Indrajit Ray and Indrakshi Ray and L. Darrell Whitley}, editor = {Martin L. Kersten and Boris Novikov and Jens Teubner and Vladimir Polutin and Stefan Manegold}, title = {On the comparison of microdata disclosure control algorithms}, booktitle = {{EDBT} 2009, 12th International Conference on Extending Database Technology, Saint Petersburg, Russia, March 24-26, 2009, Proceedings}, series = {{ACM} International Conference Proceeding Series}, volume = {360}, pages = {240--251}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1516360.1516389}, doi = {10.1145/1516360.1516389}, timestamp = {Wed, 04 May 2022 13:02:27 +0200}, biburl = {https://dblp.org/rec/conf/edbt/DewriRRW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/DewriWRR09, author = {Rinku Dewri and L. Darrell Whitley and Indrajit Ray and Indrakshi Ray}, editor = {Franz Rothlauf}, title = {A multi-objective approach to data sharing with privacy constraints and preference based objectives}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2009, Proceedings, Montreal, Qu{\'{e}}bec, Canada, July 8-12, 2009}, pages = {1499--1506}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1569901.1570102}, doi = {10.1145/1569901.1570102}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/DewriWRR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/YuFRG09, author = {Lijun Yu and Robert B. France and Indrakshi Ray and Sudipto Ghosh}, title = {A Rigorous Approach to Uncovering Security Policy Violations in {UML} Designs}, booktitle = {14th {IEEE} International Conference on Engineering of Complex Computer Systems, {ICECCS} 2009, Potsdam, Germany, 2-4 June 2009}, pages = {126--135}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICECCS.2009.16}, doi = {10.1109/ICECCS.2009.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceccs/YuFRG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ToahchoodeeXR09, author = {Manachai Toahchoodee and Xing Xie and Indrakshi Ray}, editor = {Pierangela Samarati and Moti Yung and Fabio Martinelli and Claudio A. Ardagna}, title = {Towards Trustworthy Delegation in Role-Based Access Control Model}, booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa, Italy, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5735}, pages = {379--394}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04474-8\_30}, doi = {10.1007/978-3-642-04474-8\_30}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/isw/ToahchoodeeXR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ToahchoodeeRAGB09, author = {Manachai Toahchoodee and Indrakshi Ray and Kyriakos Anastasakis and Geri Georg and Behzad Bordbar}, editor = {Barbara Carminati and James Joshi}, title = {Ensuring spatio-temporal access control for real-world applications}, booktitle = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2009, Stresa, Italy, June 3-5, 2009, Proceedings}, pages = {13--22}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1542207.1542212}, doi = {10.1145/1542207.1542212}, timestamp = {Tue, 06 Nov 2018 16:57:59 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/ToahchoodeeRAGB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/db/Ray09, author = {Indrakshi Ray}, editor = {Ling Liu and M. Tamer {\"{O}}zsu}, title = {Secure Transaction Processing}, booktitle = {Encyclopedia of Database Systems}, pages = {2540--2546}, publisher = {Springer {US}}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-39940-9\_331}, doi = {10.1007/978-0-387-39940-9\_331}, timestamp = {Sun, 02 Jun 2019 21:10:27 +0200}, biburl = {https://dblp.org/rec/reference/db/Ray09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Ray08, author = {Indrakshi Ray}, title = {Editorial}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {1}, pages = {1:1}, year = {2008}, url = {https://doi.org/10.1145/1330295.1330296}, doi = {10.1145/1330295.1330296}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Ray08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adbis/RayH08, author = {Indrakshi Ray and Wei Huang}, editor = {Paolo Atzeni and Albertas Caplinskas and Hannu Jaakkola}, title = {Increasing Expressiveness of Composite Events Using Parameter Contexts}, booktitle = {Advances in Databases and Information Systems, 12th East European Conference, {ADBIS} 2008, Pori, Finland, September 5-9, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5207}, pages = {215--230}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85713-6\_16}, doi = {10.1007/978-3-540-85713-6\_16}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/adbis/RayH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ToahchoodeeR08, author = {Manachai Toahchoodee and Indrakshi Ray}, editor = {Vijay Atluri}, title = {On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {17--32}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_2}, doi = {10.1007/978-3-540-70567-3\_2}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/ToahchoodeeR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbt/DewriRRW08, author = {Rinku Dewri and Indrakshi Ray and Indrajit Ray and L. Darrell Whitley}, editor = {Alfons Kemper and Patrick Valduriez and Noureddine Mouaddib and Jens Teubner and Mokrane Bouzeghoub and Volker Markl and Laurent Amsaleg and Ioana Manolescu}, title = {Optimizing on-demand data broadcast scheduling in pervasive environments}, booktitle = {{EDBT} 2008, 11th International Conference on Extending Database Technology, Nantes, France, March 25-29, 2008, Proceedings}, series = {{ACM} International Conference Proceeding Series}, volume = {261}, pages = {559--569}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1353343.1353411}, doi = {10.1145/1353343.1353411}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edbt/DewriRRW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DewriRRW08, author = {Rinku Dewri and Indrakshi Ray and Indrajit Ray and L. Darrell Whitley}, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {Security Provisioning in Pervasive Environments Using Multi-objective Optimization}, booktitle = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, pages = {349--363}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5\_23}, doi = {10.1007/978-3-540-88313-5\_23}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/DewriRRW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/DewriWRR08, author = {Rinku Dewri and L. Darrell Whitley and Indrakshi Ray and Indrajit Ray}, editor = {Conor Ryan and Maarten Keijzer}, title = {Evolution strategy based optimization of on-demand dependent data broadcast scheduling}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008}, pages = {1699--1700}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1389095.1389416}, doi = {10.1145/1389095.1389416}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/DewriWRR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gis/PoolsappasitR08, author = {Nayot Poolsappasit and Indrakshi Ray}, editor = {Elisa Bertino and Maria Luisa Damiani}, title = {Towards a scalable model for location privacy}, booktitle = {Proceedings of the {SIGSPATIAL} {ACM} {GIS} 2008 International Workshop on Security and Privacy in {GIS} and LBS, {SPRINGL} 2008, November 4, 2008, Irvine, California, USA, Proceedings}, pages = {46--51}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1503402.1503412}, doi = {10.1145/1503402.1503412}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gis/PoolsappasitR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/DewriRRW08, author = {Rinku Dewri and Indrajit Ray and Indrakshi Ray and L. Darrell Whitley}, editor = {Gustavo Alonso and Jos{\'{e}} A. Blakeley and Arbee L. P. Chen}, title = {On the Optimal Selection of k in the k-Anonymity Problem}, booktitle = {Proceedings of the 24th International Conference on Data Engineering, {ICDE} 2008, April 7-12, 2008, Canc{\'{u}}n, Mexico}, pages = {1364--1366}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICDE.2008.4497557}, doi = {10.1109/ICDE.2008.4497557}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/DewriRRW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/YuFR08, author = {Lijun Yu and Robert B. France and Indrakshi Ray}, editor = {Krzysztof Czarnecki and Ileana Ober and Jean{-}Michel Bruel and Axel Uhl and Markus V{\"{o}}lter}, title = {Scenario-Based Static Analysis of {UML} Class Models}, booktitle = {Model Driven Engineering Languages and Systems, 11th International Conference, MoDELS 2008, Toulouse, France, September 28 - October 3, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5301}, pages = {234--248}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87875-9\_17}, doi = {10.1007/978-3-540-87875-9\_17}, timestamp = {Fri, 30 Dec 2022 23:08:54 +0100}, biburl = {https://dblp.org/rec/conf/models/YuFR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppsn/DewriWRR08, author = {Rinku Dewri and L. Darrell Whitley and Indrajit Ray and Indrakshi Ray}, editor = {G{\"{u}}nter Rudolph and Thomas Jansen and Simon M. Lucas and Carlo Poloni and Nicola Beume}, title = {Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy}, booktitle = {Parallel Problem Solving from Nature - {PPSN} X, 10th International Conference Dortmund, Germany, September 13-17, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5199}, pages = {991--1000}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87700-4\_98}, doi = {10.1007/978-3-540-87700-4\_98}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ppsn/DewriWRR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/RayT08, author = {Indrakshi Ray and Manachai Toahchoodee}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {48--58}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_6}, doi = {10.1007/978-3-540-85735-8\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/RayT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacmat/2008, editor = {Indrakshi Ray and Ninghui Li}, title = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836}, doi = {10.1145/1377836}, isbn = {978-1-60558-129-3}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/SongYR07, author = {Eunjee Song and Shuxin Yin and Indrakshi Ray}, title = {Using {UML} to model relational database operations}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {3}, pages = {343--354}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.05.006}, doi = {10.1016/J.CSI.2006.05.006}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/SongYR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/is/XinR07, author = {Tai Xin and Indrakshi Ray}, title = {A lattice-based approach for updating access control policies in real-time}, journal = {Inf. Syst.}, volume = {32}, number = {5}, pages = {755--772}, year = {2007}, url = {https://doi.org/10.1016/j.is.2006.06.002}, doi = {10.1016/J.IS.2006.06.002}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/is/XinR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/RayT07, author = {Indrakshi Ray and Manachai Toahchoodee}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {A Spatio-temporal Role-Based Access Control Model}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {211--226}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_16}, doi = {10.1007/978-3-540-73538-0\_16}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/RayT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hase/KimMR07, author = {Jinyoo Kim and Yashwant K. Malaiya and Indrakshi Ray}, title = {Vulnerability Discovery in Multi-Version Software Systems}, booktitle = {Tenth {IEEE} International Symposium on High Assurance Systems Engineering {(HASE} 2007), November 14-16, 2007, Dallas, Texas, {USA}}, pages = {141--148}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/HASE.2007.55}, doi = {10.1109/HASE.2007.55}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hase/KimMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/YuFRL07, author = {Lijun Yu and Robert B. France and Indrakshi Ray and Kevin Lano}, title = {A light-weight static approach to analyzing {UML} behavioral properties}, booktitle = {12th International Conference on Engineering of Complex Computer Systems {(ICECCS} 2007), 10-14 July 2007, Auckland, New Zealand}, pages = {56--63}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICECCS.2007.10}, doi = {10.1109/ICECCS.2007.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceccs/YuFRL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/RayG07, author = {Indrakshi Ray and C. J. Michael Geisterfer}, editor = {Jorge Cardoso and Jos{\'{e}} Cordeiro and Joaquim Filipe}, title = {A method for early correspondence discovery using instance data}, booktitle = {{ICEIS} 2007 - Proceedings of the Ninth International Conference on Enterprise Information Systems, Volume DISI, Funchal, Madeira, Portugal, June 12-16, 2007}, pages = {258--263}, year = {2007}, timestamp = {Thu, 03 Feb 2022 09:27:49 +0100}, biburl = {https://dblp.org/rec/conf/iceis/RayG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/AnastasakisBGR07, author = {Kyriakos Anastasakis and Behzad Bordbar and Geri Georg and Indrakshi Ray}, editor = {Gregor Engels and Bill Opdyke and Douglas C. Schmidt and Frank Weil}, title = {UML2Alloy: {A} Challenging Model Transformation}, booktitle = {Model Driven Engineering Languages and Systems, 10th International Conference, MoDELS 2007, Nashville, USA, September 30 - October 5, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4735}, pages = {436--450}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75209-7\_30}, doi = {10.1007/978-3-540-75209-7\_30}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/models/AnastasakisBGR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RayK06, author = {Indrakshi Ray and Mahendra Kumar}, title = {Towards a location-based mandatory access control model}, journal = {Comput. Secur.}, volume = {25}, number = {1}, pages = {36--44}, year = {2006}, url = {https://doi.org/10.1016/j.cose.2005.06.007}, doi = {10.1016/J.COSE.2005.06.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RayK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dpd/RayX06, author = {Indrakshi Ray and Tai Xin}, title = {Analysis of dependencies in advanced transaction models}, journal = {Distributed Parallel Databases}, volume = {20}, number = {1}, pages = {5--27}, year = {2006}, url = {https://doi.org/10.1007/s10619-006-8593-9}, doi = {10.1007/S10619-006-8593-9}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dpd/RayX06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SquicciariniBFR06, author = {Anna Cinzia Squicciarini and Elisa Bertino and Elena Ferrari and Indrakshi Ray}, title = {Achieving Privacy in Trust Negotiations with an Ontology-Based Approach}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {1}, pages = {13--30}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.3}, doi = {10.1109/TDSC.2006.3}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SquicciariniBFR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/YinRR06, author = {Shuxin Yin and Indrakshi Ray and Indrajit Ray}, editor = {Enrico Blanzieri and Tao Zhang}, title = {A Trust Model for Pervasive Computing Environments}, booktitle = {2nd International {ICST} Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2006, Atlanta, GA, USA, November 17-20, 2006}, publisher = {{IEEE} Computer Society / {ICST}}, year = {2006}, url = {https://doi.org/10.1109/COLCOM.2006.361880}, doi = {10.1109/COLCOM.2006.361880}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colcom/YinRR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/GeorgHR06, author = {Geri Georg and Siv Hilde Houmb and Indrakshi Ray}, editor = {Ernesto Damiani and Peng Liu}, title = {Aspect-Oriented Risk Driven Development of Secure Applications}, booktitle = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4127}, pages = {282--296}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11805588\_20}, doi = {10.1007/11805588\_20}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/GeorgHR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/XinRCC06, author = {Tai Xin and Indrakshi Ray and Parvathi Chundi and Sopak Chaichana}, editor = {St{\'{e}}phane Bressan and Josef K{\"{u}}ng and Roland R. Wagner}, title = {On the Completion of Workflows}, booktitle = {Database and Expert Systems Applications, 17th International Conference, {DEXA} 2006, Krak{\'{o}}w, Poland, September 4-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4080}, pages = {582--591}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11827405\_57}, doi = {10.1007/11827405\_57}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/dexa/XinRCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/LunacekWR06, author = {Monte Lunacek and L. Darrell Whitley and Indrakshi Ray}, editor = {Mike Cattolico}, title = {A crossover operator for the \emph{k-} anonymity problem}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2006, Proceedings, Seattle, Washington, USA, July 8-12, 2006}, pages = {1713--1720}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1143997.1144277}, doi = {10.1145/1143997.1144277}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/LunacekWR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iat/SquicciariniBBFR06, author = {Anna Cinzia Squicciarini and Abhilasha Bhargav{-}Spantzel and Elisa Bertino and Elena Ferrari and Indrakshi Ray}, title = {Trust Negotiations with Customizable Anonymity}, booktitle = {Proceedings of the 2006 {IEEE/WIC/ACM} International Conference on Intelligent Agent Technology - Workshops, Hong Kong, China, 18-22 December 2006}, pages = {69--72}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/WI-IATW.2006.138}, doi = {10.1109/WI-IATW.2006.138}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iat/SquicciariniBBFR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/RayKY06, author = {Indrakshi Ray and Mahendra Kumar and Lijun Yu}, editor = {Aditya Bagchi and Vijayalakshmi Atluri}, title = {{LRBAC:} {A} Location-Aware Role-Based Access Control Model}, booktitle = {Information Systems Security, Second International Conference, {ICISS} 2006, Kolkata, India, December 19-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {147--161}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11961635\_10}, doi = {10.1007/11961635\_10}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/iciss/RayKY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itrust/HoumbRR06, author = {Siv Hilde Houmb and Indrakshi Ray and Indrajit Ray}, editor = {Ketil St{\o}len and William H. Winsborough and Fabio Martinelli and Fabio Massacci}, title = {Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation}, booktitle = {Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3986}, pages = {135--149}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11755593\_11}, doi = {10.1007/11755593\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/itrust/HoumbRR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacmat/2006, editor = {David F. Ferraiolo and Indrakshi Ray}, title = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1133058}, doi = {10.1145/1133058}, isbn = {1-59593-353-0}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/RayRN05, author = {Indrajit Ray and Indrakshi Ray and Natarajan Narasimhamurthi}, title = {An anonymous and failure resilient fair-exchange e-commerce protocol}, journal = {Decis. Support Syst.}, volume = {39}, number = {3}, pages = {267--292}, year = {2005}, url = {https://doi.org/10.1016/j.dss.2003.10.011}, doi = {10.1016/J.DSS.2003.10.011}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/RayRN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/Ray05, author = {Indrakshi Ray}, title = {Applying Semantic Knowledge to Real-Time Update of Access Control Policies}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {17}, number = {6}, pages = {844--858}, year = {2005}, url = {https://doi.org/10.1109/TKDE.2005.88}, doi = {10.1109/TKDE.2005.88}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/Ray05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/YinR05, author = {Shuxin Yin and Indrakshi Ray}, title = {Relational Database Operations Modeling with {UML}}, booktitle = {19th International Conference on Advanced Information Networking and Applications {(AINA} 2005), 28-30 March 2005, Taipei, Taiwan}, pages = {927--932}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/AINA.2005.294}, doi = {10.1109/AINA.2005.294}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/YinR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/XinZR05, author = {Tai Xin and Yajie Zhu and Indrakshi Ray}, editor = {Sushil Jajodia and Duminda Wijesekera}, title = {Reliable Scheduling of Advanced Transactions}, booktitle = {Data and Applications Security XIX, 19th Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3654}, pages = {124--138}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535706\_10}, doi = {10.1007/11535706\_10}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/XinZR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/ZhuXR05, author = {Yajie Zhu and Tai Xin and Indrakshi Ray}, editor = {Kim Viborg Andersen and John K. Debenham and Roland R. Wagner}, title = {Recovering from Malicious Attacks in Workflow Systems}, booktitle = {Database and Expert Systems Applications, 16th International Conference, {DEXA} 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3588}, pages = {14--23}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11546924\_2}, doi = {10.1007/11546924\_2}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/dexa/ZhuXR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcit/ToahchoodeeR05, author = {Manachai Toahchoodee and Indrakshi Ray}, editor = {Goutam Chakraborty}, title = {Validation of Policy Integration Using Alloy}, booktitle = {Distributed Computing and Internet Technology, Second International Conference, {ICDCIT} 2005, Bhubaneswar, India, December 22-24, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3816}, pages = {420--431}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604655\_48}, doi = {10.1007/11604655\_48}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/icdcit/ToahchoodeeR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/RayCR05, author = {Indrajit Ray and Sudip Chakraborty and Indrakshi Ray}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {VTrust: {A} Trust Management System Based on a Vector Model of Trust}, booktitle = {Information Systems Security, First International Conference, {ICISS} 2005, Kolkata, India, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {91--105}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593980\_7}, doi = {10.1007/11593980\_7}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/iciss/RayCR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/RayH05, author = {Indrakshi Ray and Wei Huang}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Event Detection in Multilevel Secure Active Databases}, booktitle = {Information Systems Security, First International Conference, {ICISS} 2005, Kolkata, India, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {177--190}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593980\_13}, doi = {10.1007/11593980\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/RayH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ideas/XinR05, author = {Tai Xin and Indrakshi Ray}, editor = {Bipin C. Desai and Gottfried Vossen}, title = {Detection for Conflicts of Dependencies in Advanced Transaction Models}, booktitle = {Ninth International Database Engineering and Applications Symposium {(IDEAS} 2005), 25-27 July 2005, Montreal, Canada}, pages = {17--26}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IDEAS.2005.20}, doi = {10.1109/IDEAS.2005.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ideas/XinR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/RayBSF05, author = {Indrakshi Ray and Elisa Bertino and Anna Cinzia Squicciarini and Elena Ferrari}, editor = {George Danezis and David M. Martin Jr.}, title = {Anonymity Preserving Techniques in Trust Negotiations}, booktitle = {Privacy Enhancing Technologies, 5th International Workshop, {PET} 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3856}, pages = {93--109}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11767831\_7}, doi = {10.1007/11767831\_7}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/RayBSF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/SongRFRGA05, author = {Eunjee Song and Raghu Reddy and Robert B. France and Indrakshi Ray and Geri Georg and Roger T. Alexander}, editor = {Elena Ferrari and Gail{-}Joon Ahn}, title = {Verifiable composition of access control and application features}, booktitle = {10th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings}, pages = {120--129}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1063979.1064001}, doi = {10.1145/1063979.1064001}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/SongRFRGA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/RayY05, author = {Indrakshi Ray and Lijun Yu}, title = {Short Paper: Towards a Location-Aware Role-Based Access Control Model}, booktitle = {First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, Athens, Greece, 5-9 September, 2005}, pages = {234--236}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/SECURECOMM.2005.50}, doi = {10.1109/SECURECOMM.2005.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/RayY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/Ray04, author = {Indrakshi Ray}, title = {Real-time update of access control policies}, journal = {Data Knowl. Eng.}, volume = {49}, number = {3}, pages = {287--309}, year = {2004}, url = {https://doi.org/10.1016/j.datak.2003.09.003}, doi = {10.1016/J.DATAK.2003.09.003}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/Ray04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iee/FranceRGG04, author = {Robert B. France and Indrakshi Ray and Geri Georg and Sudipto Ghosh}, title = {Aspect-oriented approach to early design modelling}, journal = {{IEE} Proc. Softw.}, volume = {151}, number = {4}, pages = {173--186}, year = {2004}, url = {https://doi.org/10.1049/ip-sen:20040920}, doi = {10.1049/IP-SEN:20040920}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iee/FranceRGG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/RayFLG04, author = {Indrakshi Ray and Robert B. France and Na Li and Geri Georg}, title = {An aspect-based approach to modeling access control concerns}, journal = {Inf. Softw. Technol.}, volume = {46}, number = {9}, pages = {575--587}, year = {2004}, url = {https://doi.org/10.1016/j.infsof.2003.10.007}, doi = {10.1016/J.INFSOF.2003.10.007}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/infsof/RayFLG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jodl/AtluriR04, author = {Vijayalakshmi Atluri and Indrakshi Ray}, title = {Editors' message for the special issue on security}, journal = {Int. J. Digit. Libr.}, volume = {4}, number = {3}, pages = {137--138}, year = {2004}, url = {https://doi.org/10.1007/s00799-004-0087-7}, doi = {10.1007/S00799-004-0087-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jodl/AtluriR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/PrabhuKRY04, author = {Nitin Prabhu and Vijay Kumar and Indrakshi Ray and Gi{-}Chul Yang}, title = {Concurrency Control in Mobile Database Systems}, booktitle = {18th International Conference on Advanced Information Networking and Applications {(AINA} 2004), 29-31 March 2004, Fukuoka, Japan}, pages = {83--86}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/AINA.2004.1283761}, doi = {10.1109/AINA.2004.1283761}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/PrabhuKRY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bncod/RayMLK04, author = {Indrakshi Ray and Ross M. McConnell and Monte Lunacek and Vijay Kumar}, editor = {M. Howard Williams and Lachlan M. MacKinnon}, title = {Reducing Damage Assessment Latency in Survivable Databases}, booktitle = {Key Technologies for Data Management, 21st British National Conference on Databases, {BNCOD} 21, Edinburgh, UK, July 7-9, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3112}, pages = {106--111}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27811-5\_10}, doi = {10.1007/978-3-540-27811-5\_10}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/bncod/RayMLK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/RayX04, author = {Indrakshi Ray and Tai Xin}, editor = {Csilla Farkas and Pierangela Samarati}, title = {Implementing Real-Time Update of Access Control Policies}, booktitle = {Research Directions in Data and Applications Security XVIII, {IFIP} {TC11/WG} 11.3 Eighteenth Annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain}, series = {{IFIP}}, volume = {144}, pages = {65--80}, publisher = {Kluwer/Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8128-6\_5}, doi = {10.1007/1-4020-8128-6\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/RayX04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/RayXZ04, author = {Indrakshi Ray and Tai Xin and Yajie Zhu}, editor = {Fernando Galindo and Makoto Takizawa and Roland Traunm{\"{u}}ller}, title = {Ensuring Task Dependencies During Workflow Recovery}, booktitle = {Database and Expert Systems Applications, 15th International Conference, {DEXA} 2004 Zaragoza, Spain, August 30-September 3, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3180}, pages = {24--33}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30075-5\_3}, doi = {10.1007/978-3-540-30075-5\_3}, timestamp = {Sat, 30 Sep 2023 09:38:52 +0200}, biburl = {https://dblp.org/rec/conf/dexa/RayXZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fase/KimRFL04, author = {Dae{-}Kyoo Kim and Indrakshi Ray and Robert B. France and Na Li}, editor = {Michel Wermelinger and Tiziana Margaria}, title = {Modeling Role-Based Access Control Using Parameterized {UML} Models}, booktitle = {Fundamental Approaches to Software Engineering, 7th International Conference, {FASE} 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2004 Barcelona, Spain, March 29 - april 2, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2984}, pages = {180--193}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24721-0\_13}, doi = {10.1007/978-3-540-24721-0\_13}, timestamp = {Sun, 02 Jun 2019 21:17:06 +0200}, biburl = {https://dblp.org/rec/conf/fase/KimRFL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcit/RayM04, author = {Indrakshi Ray and Marianna Muller}, editor = {R. K. Ghosh and Hrushikesha Mohanty}, title = {Using Schemas to Simplify Access Control for {XML} Documents}, booktitle = {Distributed Computing and Internet Technology, First International Conference, {ICDCIT} 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3347}, pages = {363--368}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30555-2\_42}, doi = {10.1007/978-3-540-30555-2\_42}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/icdcit/RayM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ista/PrabhuKR04, author = {Nitin Prabhu and Vijay Kumar and Indrakshi Ray}, editor = {Anatoly E. Doroshenko and Terry A. Halpin and Stephen W. Liddle and Heinrich C. Mayr}, title = {Periodic Scheduling in On-Demand Broadcast System}, booktitle = {Information Systems Technology and its Applications, 3rd International Conference ISTA'2004, June 15-17, 2004, Salt Lake City, Utah, USA, Proceedings}, series = {{LNI}}, volume = {{P-48}}, pages = {107--121}, publisher = {{GI}}, year = {2004}, url = {https://dl.gi.de/handle/20.500.12116/29110}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ista/PrabhuKR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/RayLFK04, author = {Indrakshi Ray and Na Li and Robert B. France and Dae{-}Kyoo Kim}, editor = {Trent Jaeger and Elena Ferrari}, title = {Using uml to visualize role-based access control constraints}, booktitle = {9th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings}, pages = {115--124}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/990036.990054}, doi = {10.1145/990036.990054}, timestamp = {Tue, 06 Nov 2018 16:57:58 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/RayLFK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2003, editor = {Sabrina De Capitani di Vimercati and Indrakshi Ray and Indrajit Ray}, title = {Data and Applications Security {XVII:} Status and Prospects, {IFIP} {TC-11} {WG} 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, {USA}}, series = {{IFIP}}, volume = {142}, publisher = {Kluwer/Springer}, year = {2004}, isbn = {1-4020-8069-7}, timestamp = {Wed, 29 Mar 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bncod/Ray03, author = {Indrakshi Ray}, editor = {Anne E. James and Brian Lings and Muhammad Younas}, title = {Multilevel Secure Rules and Its Impact on the Design of Active Database Systems}, booktitle = {New Horizons in Information Management, 20th British National Conference on Databases, {BNCOD} 20, Coventry, UK, July 15-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2712}, pages = {226--244}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45073-4\_18}, doi = {10.1007/3-540-45073-4\_18}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/bncod/Ray03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/RayX03, author = {Indrakshi Ray and Tai Xin}, editor = {Vladim{\'{\i}}r Mar{\'{\i}}k and Werner Retschitzegger and Olga Step{\'{a}}nkov{\'{a}}}, title = {Concurrent and Real-Time Update of Access Control Policies}, booktitle = {Database and Expert Systems Applications, 14th International Conference, {DEXA} 2003, Prague, Czech Republic, September 1-5, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2736}, pages = {330--339}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45227-0\_33}, doi = {10.1007/978-3-540-45227-0\_33}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/dexa/RayX03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tc11-5/RayLKF03, author = {Indrakshi Ray and Na Li and Dae{-}Kyoo Kim and Robert B. France}, editor = {Sushil Jajodia and Leon Strous}, title = {Using Parameterized {UML} to Specify and Compose Access Control Models}, booktitle = {Integrity and Internal Control in Information Systems {VI} - {IFIP} {TC11/WG11.5} Sixth Working Conference on Integrity and Internal Control in Information Systems {(IICIS)} 13-14 November 2003, Lausanne, Switzerland}, series = {{IFIP}}, volume = {140}, pages = {49--65}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/1-4020-7901-X\_4}, doi = {10.1007/1-4020-7901-X\_4}, timestamp = {Tue, 23 May 2017 01:07:20 +0200}, biburl = {https://dblp.org/rec/conf/tc11-5/RayLKF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigecom/RayR02, author = {Indrajit Ray and Indrakshi Ray}, title = {Fair exchange in E-commerce}, journal = {SIGecom Exch.}, volume = {3}, number = {2}, pages = {9--17}, year = {2002}, url = {https://doi.org/10.1145/844340.844345}, doi = {10.1145/844340.844345}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigecom/RayR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/RayR02, author = {Indrajit Ray and Indrakshi Ray}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Anonymous and Secure Multicast Subscription}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {313--327}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 07:52:21 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/RayR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/GeorgRF02, author = {Geri Georg and Indrakshi Ray and Robert B. France}, title = {Using Aspects to Design a Secure System}, booktitle = {8th International Conference on Engineering of Complex Computer Systems {(ICECCS} 2002), 2-4 December 2002, Greenbelt, MD, {USA}}, pages = {117}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ICECCS.2002.1181504}, doi = {10.1109/ICECCS.2002.1181504}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceccs/GeorgRF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/RayR02, author = {Indrakshi Ray and Indrajit Ray}, title = {Using Compatible Keys for Secure Multicasting in E-Commerce}, booktitle = {16th International Parallel and Distributed Processing Symposium {(IPDPS} 2002), 15-19 April 2002, Fort Lauderdale, FL, USA, CD-ROM/Abstracts Proceedings}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/IPDPS.2002.1016642}, doi = {10.1109/IPDPS.2002.1016642}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/RayR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/RayRN02, author = {Indrakshi Ray and Indrajit Ray and Natu Narasimhamurthi}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {A cryptographic solution to implement access control in a hierarchy and more}, booktitle = {7th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002}, pages = {65--73}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/507711.507723}, doi = {10.1145/507711.507723}, timestamp = {Tue, 09 Feb 2021 08:50:30 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/RayRN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tc11-5/GeorgFR02, author = {Geri Georg and Robert B. France and Indrakshi Ray}, editor = {Michael Gertz}, title = {Designing High Integrity Systems Using Aspects}, booktitle = {Integrity and Internal Control in Information Systems V, {IFIP} {TC11/WG11.5} Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany}, series = {{IFIP} Conference Proceedings}, volume = {251}, pages = {37--57}, publisher = {Kluwer}, year = {2002}, timestamp = {Mon, 07 Dec 2020 17:16:29 +0100}, biburl = {https://dblp.org/rec/conf/tc11-5/GeorgFR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adbis/RayR01, author = {Indrakshi Ray and Indrajit Ray}, editor = {Albertas Caplinskas and Johann Eder}, title = {Detecting Termination of Active Database Rules Using Symbolic Model Checking}, booktitle = {Advances in Databases and Information Systems, 5th East European Conference, {ADBIS} 2001, Vilnius, Lithuania, September 25-28, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2151}, pages = {266--279}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44803-9\_21}, doi = {10.1007/3-540-44803-9\_21}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/adbis/RayR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/RayR01, author = {Indrakshi Ray and Indrajit Ray}, title = {An Anomymous Fair Exchange E-commerce Protocol}, booktitle = {Proceedings of the 15th International Parallel {\&} Distributed Processing Symposium (IPDPS-01), San Francisco, CA, USA, April 23-27, 2001}, pages = {172}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/IPDPS.2001.925168}, doi = {10.1109/IPDPS.2001.925168}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/RayR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wecwis/RayRN01, author = {Indrajit Ray and Indrakshi Ray and Natarajan Narasimhamurthi}, title = {An Anonymous Electronic Voting Protocol for Voting Over The Internet}, booktitle = {Third International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems {(WECWIS} '01), San Jose, California, USA, June 21-22, 2001}, pages = {188--191}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/WECWIS.2001.933922}, doi = {10.1109/WECWIS.2001.933922}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wecwis/RayRN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/RayAJ00, author = {Indrakshi Ray and Paul Ammann and Sushil Jajodia}, title = {Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity}, journal = {Inf. Sci.}, volume = {129}, number = {1-4}, pages = {155--195}, year = {2000}, url = {https://doi.org/10.1016/S0020-0255(00)00062-1}, doi = {10.1016/S0020-0255(00)00062-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/RayAJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/RayRN00, author = {Indrajit Ray and Indrakshi Ray and Natarajan Narasimhamurthy}, editor = {Bhavani Thuraisingham and Reind P. van de Riet and Klaus R. Dittrich and Zahir Tari}, title = {A Fair-exchange E-commerce Protocol with Automated Dispute Resolution}, booktitle = {Data and Application Security, Development and Directions, {IFIP} {TC11/} {WG11.3} Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000}, series = {{IFIP} Conference Proceedings}, volume = {201}, pages = {27--38}, publisher = {Kluwer}, year = {2000}, url = {https://doi.org/10.1007/0-306-47008-X\_3}, doi = {10.1007/0-306-47008-X\_3}, timestamp = {Wed, 29 Jun 2022 15:37:44 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/RayRN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecweb/RayR00, author = {Indrakshi Ray and Indrajit Ray}, editor = {Kurt Bauknecht and Sanjay Kumar Madria and G{\"{u}}nther Pernul}, title = {An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution}, booktitle = {Electronic Commerce and Web Technologies, First International Conference, EC-Web 2000, London, UK, September 4-6, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1875}, pages = {84--93}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44463-7\_8}, doi = {10.1007/3-540-44463-7\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ecweb/RayR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wecwis/RayR00, author = {Indrakshi Ray and Indrajit Ray}, title = {Failure Analysis of an E-Commerce Protocol Using Model Checking}, booktitle = {Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems {(WECWIS} 2000), Milpitas, California, USA, June 8-9, 2000}, pages = {176--183}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/WECWIS.2000.853873}, doi = {10.1109/WECWIS.2000.853873}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wecwis/RayR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/RayAJ98, author = {Indrakshi Ray and Paul Ammann and Sushil Jajodia}, title = {A Semantic-Based Transaction Processing Model for Multilevel Transactions}, journal = {J. Comput. Secur.}, volume = {6}, number = {3}, pages = {181--217}, year = {1998}, url = {https://doi.org/10.3233/jcs-980108}, doi = {10.3233/JCS-980108}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/RayAJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tods/AmmannJR97, author = {Paul Ammann and Sushil Jajodia and Indrakshi Ray}, title = {Applying Formal Methods to Semantic-Based Decomposition of Transactions}, journal = {{ACM} Trans. Database Syst.}, volume = {22}, number = {2}, pages = {215--254}, year = {1997}, url = {https://doi.org/10.1145/249978.249981}, doi = {10.1145/249978.249981}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tods/AmmannJR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/JajodiaRA97, author = {Sushil Jajodia and Indrakshi Ray and Paul Ammann}, editor = {Antoni Oliv{\'{e}} and Joan Antoni Pastor}, title = {Implementing Semantic-Based Decomposition of Transactions}, booktitle = {Advanced Information Systems Engineering, 9th International Conference CAiSE'97, Barcelona, Catalonia, Spain, June 16-20, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1250}, pages = {75--88}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-63107-0\_6}, doi = {10.1007/3-540-63107-0\_6}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/caise/JajodiaRA97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/kl/jajodiaK97/AmmannJR97, author = {Paul Ammann and Sushil Jajodia and Indrakshi Ray}, editor = {Sushil Jajodia and Larry Kerschberg}, title = {Semantic-Based Decomposition of Transactions}, booktitle = {Advanced Transaction Models and Architectures}, publisher = {Kluwer}, year = {1997}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/kl/jajodiaK97/AmmannJR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AmmannJR96, author = {Paul Ammann and Sushil Jajodia and Indrakshi Ray}, title = {Ensuring Atomicity of Multilevel Transactions}, booktitle = {1996 {IEEE} Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, {USA}}, pages = {74--84}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/SECPRI.1996.502671}, doi = {10.1109/SECPRI.1996.502671}, timestamp = {Thu, 21 Sep 2023 15:57:36 +0200}, biburl = {https://dblp.org/rec/conf/sp/AmmannJR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vldb/AmmannJR95, author = {Paul Ammann and Sushil Jajodia and Indrakshi Ray}, editor = {Umeshwar Dayal and Peter M. D. Gray and Shojiro Nishio}, title = {Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions}, booktitle = {VLDB'95, Proceedings of 21th International Conference on Very Large Data Bases, September 11-15, 1995, Zurich, Switzerland}, pages = {218--227}, publisher = {Morgan Kaufmann}, year = {1995}, url = {http://www.vldb.org/conf/1995/P218.PDF}, timestamp = {Tue, 20 Feb 2018 15:19:44 +0100}, biburl = {https://dblp.org/rec/conf/vldb/AmmannJR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.