BibTeX records: Indrakshi Ray

download as .bib file

@article{DBLP:journals/jcs/GorbettSSR23,
  author       = {Matt Gorbett and
                  Caspian Siebert and
                  Hossein Shirazi and
                  Indrakshi Ray},
  title        = {The intrinsic dimensionality of network datasets and its applications},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {6},
  pages        = {679--704},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-220131},
  doi          = {10.3233/JCS-220131},
  timestamp    = {Thu, 21 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/GorbettSSR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdiq/ZuoBCSR23,
  author       = {Chaoyuan Zuo and
                  Ritwik Banerjee and
                  Fateme Hashemi Chaleshtori and
                  Hossein Shirazi and
                  Indrakshi Ray},
  title        = {Seeing Should Probably Not Be Believing: The Role of Deceptive Support
                  in {COVID-19} Misinformation on Twitter},
  journal      = {{ACM} J. Data Inf. Qual.},
  volume       = {15},
  number       = {1},
  pages        = {9:1--9:26},
  year         = {2023},
  url          = {https://doi.org/10.1145/3546914},
  doi          = {10.1145/3546914},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdiq/ZuoBCSR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/ShiraziMRJW23,
  author       = {Hossein Shirazi and
                  Shashika Ranga Muramudalige and
                  Indrakshi Ray and
                  Anura P. Jayasumana and
                  Haonan Wang},
  title        = {Adversarial Autoencoder Data Synthesis for Enhancing Machine Learning-Based
                  Phishing Detection Algorithms},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {16},
  number       = {4},
  pages        = {2411--2422},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSC.2023.3234806},
  doi          = {10.1109/TSC.2023.3234806},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/ShiraziMRJW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/GorbettSR23,
  author       = {Matt Gorbett and
                  Hossein Shirazi and
                  Indrakshi Ray},
  editor       = {Jingrui He and
                  Themis Palpanas and
                  Xiaohua Hu and
                  Alfredo Cuzzocrea and
                  Dejing Dou and
                  Dominik Slezak and
                  Wei Wang and
                  Aleksandra Gruca and
                  Jerry Chun{-}Wei Lin and
                  Rakesh Agrawal},
  title        = {Cross-Silo Federated Learning Across Divergent Domains with Iterative
                  Parameter Alignment},
  booktitle    = {{IEEE} International Conference on Big Data, BigData 2023, Sorrento,
                  Italy, December 15-18, 2023},
  pages        = {5233--5242},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/BigData59044.2023.10386280},
  doi          = {10.1109/BIGDATA59044.2023.10386280},
  timestamp    = {Fri, 02 Feb 2024 12:00:39 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/GorbettSR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MartinSR23,
  author       = {Eric Burton Samuel Martin and
                  Hossein Shirazi and
                  Indrakshi Ray},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Poster: Towards a Dataset for the Discrimination between Warranted
                  and Unwarranted Emails},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {3603--3605},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3624397},
  doi          = {10.1145/3576915.3624397},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MartinSR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/TaziSONDCR23,
  author       = {Faiza Tazi and
                  Suleiman Saka and
                  Griffin Opp and
                  Shradha Neupane and
                  Sanchari Das and
                  Lorenzo De Carli and
                  Indrakshi Ray},
  editor       = {Albrecht Schmidt and
                  Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and
                  Tesh Goyal and
                  Per Ola Kristensson and
                  Anicia Peters},
  title        = {Accessibility Evaluation of IoT Android Mobile Companion Apps},
  booktitle    = {Extended Abstracts of the 2023 {CHI} Conference on Human Factors in
                  Computing Systems, {CHI} {EA} 2023, Hamburg, Germany, April 23-28,
                  2023},
  pages        = {19:1--19:7},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3544549.3585652},
  doi          = {10.1145/3544549.3585652},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/TaziSONDCR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/GorbettSR23,
  author       = {Matt Gorbett and
                  Hossein Shirazi and
                  Indrakshi Ray},
  editor       = {Ambuj K. Singh and
                  Yizhou Sun and
                  Leman Akoglu and
                  Dimitrios Gunopulos and
                  Xifeng Yan and
                  Ravi Kumar and
                  Fatma Ozcan and
                  Jieping Ye},
  title        = {Sparse Binary Transformers for Multivariate Time Series Modeling},
  booktitle    = {Proceedings of the 29th {ACM} {SIGKDD} Conference on Knowledge Discovery
                  and Data Mining, {KDD} 2023, Long Beach, CA, USA, August 6-10, 2023},
  pages        = {544--556},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3580305.3599508},
  doi          = {10.1145/3580305.3599508},
  timestamp    = {Mon, 25 Sep 2023 08:29:22 +0200},
  biburl       = {https://dblp.org/rec/conf/kdd/GorbettSR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/AbdelgawadRAVS23,
  author       = {Mahmoud Abdelgawad and
                  Indrakshi Ray and
                  Saja Alqurashi and
                  Videep Venkatesha and
                  Hossein Shirazi},
  editor       = {Silvio Ranise and
                  Roberto Carbone and
                  Daniel Takabi},
  title        = {Synthesizing and Analyzing Attribute-Based Access Control Model Generated
                  from Natural Language Policy Statements},
  booktitle    = {Proceedings of the 28th {ACM} Symposium on Access Control Models and
                  Technologies, {SACMAT} 2023, Trento, Italy, June 7-9, 2023},
  pages        = {91--98},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3589608.3593844},
  doi          = {10.1145/3589608.3593844},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/AbdelgawadRAVS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/RayTVMARKRSSV023,
  author       = {Indrajit Ray and
                  Bhavani Thuraisingham and
                  Jaideep Vaidya and
                  Sharad Mehrotra and
                  Vijayalakshmi Atluri and
                  Indrakshi Ray and
                  Murat Kantarcioglu and
                  Ramesh Raskar and
                  Babak Salimi and
                  Steve Simske and
                  Nalini Venkatasubramanian and
                  Vivek K. Singh},
  editor       = {Silvio Ranise and
                  Roberto Carbone and
                  Daniel Takabi},
  title        = {{SAFE-PASS:} Stewardship, Advocacy, Fairness and Empowerment in Privacy,
                  Accountability, Security, and Safety for Vulnerable Groups},
  booktitle    = {Proceedings of the 28th {ACM} Symposium on Access Control Models and
                  Technologies, {SACMAT} 2023, Trento, Italy, June 7-9, 2023},
  pages        = {145--155},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3589608.3593830},
  doi          = {10.1145/3589608.3593830},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/RayTVMARKRSSV023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/AsifSR23,
  author       = {Asif Uz Zaman Asif and
                  Hossein Shirazi and
                  Indrakshi Ray},
  editor       = {Shlomi Dolev and
                  Baruch Schieber},
  title        = {Machine Learning-Based Phishing Detection Using {URL} Features: {A}
                  Comprehensive Review},
  booktitle    = {Stabilization, Safety, and Security of Distributed Systems - 25th
                  International Symposium, {SSS} 2023, Jersey City, NJ, USA, October
                  2-4, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14310},
  pages        = {481--497},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-44274-2\_36},
  doi          = {10.1007/978-3-031-44274-2\_36},
  timestamp    = {Sun, 08 Oct 2023 13:20:04 +0200},
  biburl       = {https://dblp.org/rec/conf/sss/AsifSR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/AbdelgawadRV23,
  author       = {Mahmoud Abdelgawad and
                  Indrakshi Ray and
                  Tomas Vasquez},
  editor       = {Shlomi Dolev and
                  Baruch Schieber},
  title        = {Workflow Resilience for Mission Critical Systems},
  booktitle    = {Stabilization, Safety, and Security of Distributed Systems - 25th
                  International Symposium, {SSS} 2023, Jersey City, NJ, USA, October
                  2-4, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14310},
  pages        = {498--512},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-44274-2\_37},
  doi          = {10.1007/978-3-031-44274-2\_37},
  timestamp    = {Sun, 08 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sss/AbdelgawadRV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/RaySPBR23,
  author       = {Indrajit Ray and
                  Sarath Sreedharan and
                  Rakesh Podder and
                  Shadaab Kawnain Bashir and
                  Indrakshi Ray},
  title        = {Explainable {AI} for Prioritizing and Deploying Defenses for Cyber-Physical
                  System Resiliency},
  booktitle    = {5th {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2023, Atlanta,
                  GA, USA, November 1-4, 2023},
  pages        = {184--192},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/TPS-ISA58951.2023.00032},
  doi          = {10.1109/TPS-ISA58951.2023.00032},
  timestamp    = {Tue, 05 Mar 2024 12:00:59 +0100},
  biburl       = {https://dblp.org/rec/conf/tpsisa/RaySPBR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/GowdanakatteRA23,
  author       = {Shwetha Gowdanakatte and
                  Indrakshi Ray and
                  Mahmoud Abdelgawad},
  title        = {Model Based Risk Assessment and Risk Mitigation Framework for Cyber-Physical
                  Systems},
  booktitle    = {5th {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2023, Atlanta,
                  GA, USA, November 1-4, 2023},
  pages        = {203--212},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/TPS-ISA58951.2023.00034},
  doi          = {10.1109/TPS-ISA58951.2023.00034},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tpsisa/GowdanakatteRA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/FaramarziCSRB23,
  author       = {Noushin Salek Faramarzi and
                  Fateme Hashemi Chaleshtori and
                  Hossein Shirazi and
                  Indrakshi Ray and
                  Ritwik Banerjee},
  editor       = {Ying Ding and
                  Jie Tang and
                  Juan F. Sequeda and
                  Lora Aroyo and
                  Carlos Castillo and
                  Geert{-}Jan Houben},
  title        = {Claim Extraction and Dynamic Stance Detection in {COVID-19} Tweets},
  booktitle    = {Companion Proceedings of the {ACM} Web Conference 2023, {WWW} 2023,
                  Austin, TX, USA, 30 April 2023 - 4 May 2023},
  pages        = {1059--1068},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3543873.3587643},
  doi          = {10.1145/3543873.3587643},
  timestamp    = {Mon, 28 Aug 2023 21:17:11 +0200},
  biburl       = {https://dblp.org/rec/conf/www/FaramarziCSRB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-04637,
  author       = {Matt Gorbett and
                  Hossein Shirazi and
                  Indrakshi Ray},
  title        = {Sparse Binary Transformers for Multivariate Time Series Modeling},
  journal      = {CoRR},
  volume       = {abs/2308.04637},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.04637},
  doi          = {10.48550/ARXIV.2308.04637},
  eprinttype    = {arXiv},
  eprint       = {2308.04637},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-04637.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-04818,
  author       = {Matt Gorbett and
                  Hossein Shirazi and
                  Indrakshi Ray},
  title        = {Cross-Silo Federated Learning Across Divergent Domains with Iterative
                  Parameter Alignment},
  journal      = {CoRR},
  volume       = {abs/2311.04818},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.04818},
  doi          = {10.48550/ARXIV.2311.04818},
  eprinttype    = {arXiv},
  eprint       = {2311.04818},
  timestamp    = {Tue, 14 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-04818.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/juspn/ShiraziHR22,
  author       = {Hossein Shirazi and
                  Katherine Haynes and
                  Indrakshi Ray},
  title        = {Towards Performance of {NLP} Transformers on URL-Based Phishing Detection
                  for Mobile Devices},
  journal      = {J. Ubiquitous Syst. Pervasive Networks},
  volume       = {17},
  number       = {1},
  pages        = {35--42},
  year         = {2022},
  url          = {https://doi.org/10.5383/juspn.17.01.005},
  doi          = {10.5383/JUSPN.17.01.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/juspn/ShiraziHR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/MuramudaligeHJR22,
  author       = {Shashika Ranga Muramudalige and
                  Benjamin W. K. Hung and
                  Anura P. Jayasumana and
                  Indrakshi Ray and
                  Jytte Klausen},
  title        = {Enhancing Investigative Pattern Detection via Inexact Matching and
                  Graph Databases},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {5},
  pages        = {2780--2794},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2021.3073145},
  doi          = {10.1109/TSC.2021.3073145},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/MuramudaligeHJR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GowdanakatteRH22,
  author       = {Shwetha Gowdanakatte and
                  Indrakshi Ray and
                  Siv Hilde Houmb},
  editor       = {Maanak Gupta and
                  Sajad Khorsandroo and
                  Mahmoud Abdelsalam},
  title        = {Attribute Based Access Control Model for Protecting Programmable Logic
                  Controllers},
  booktitle    = {Sat-CPS@CODASPY 2022: Proceedings of the 2022 {ACM} Workshop on Secure
                  and Trustworthy Cyber-Physical Systems, Baltimore, MD, USA, 27 April
                  2022},
  pages        = {47--56},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3510547.3517926},
  doi          = {10.1145/3510547.3517926},
  timestamp    = {Fri, 01 Jul 2022 13:06:12 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/GowdanakatteRH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ShiraziPRW22,
  author       = {Hossein Shirazi and
                  William Pickard and
                  Indrakshi Ray and
                  Haonan Wang},
  editor       = {Anupam Joshi and
                  Maribel Fern{\'{a}}ndez and
                  Rakesh M. Verma},
  title        = {Towards Resiliency of Heavy Vehicles through Compromised Sensor Data
                  Reconstruction},
  booktitle    = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security
                  and Privacy, Baltimore, MD, USA, April 24 - 27, 2022},
  pages        = {276--287},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3508398.3511523},
  doi          = {10.1145/3508398.3511523},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ShiraziPRW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/BertinoSTRLGM22,
  author       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Bhavani Thuraisingham and
                  Indrakshi Ray and
                  Wenjia Li and
                  Maanak Gupta and
                  Sudip Mittal},
  editor       = {Anupam Joshi and
                  Maribel Fern{\'{a}}ndez and
                  Rakesh M. Verma},
  title        = {Security and Privacy for Emerging IoT and {CPS} Domains},
  booktitle    = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security
                  and Privacy, Baltimore, MD, USA, April 24 - 27, 2022},
  pages        = {336--337},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3508398.3519314},
  doi          = {10.1145/3508398.3519314},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/BertinoSTRLGM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cogmi/MaurinaHGRD22,
  author       = {Gabriele Maurina and
                  Hajar Homayouni and
                  Sudipto Ghosh and
                  Indrakshi Ray and
                  Gerald P. Duggan},
  title        = {A Methodology for Energy Usage Prediction in Long-Lasting Abnormal
                  Events},
  booktitle    = {4th {IEEE} International Conference on Cognitive Machine Intelligence,
                  CogMI 2022, Atlanta, GA, USA, December 14-17, 2022},
  pages        = {91--100},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CogMI56440.2022.00023},
  doi          = {10.1109/COGMI56440.2022.00023},
  timestamp    = {Wed, 29 Mar 2023 11:07:46 +0200},
  biburl       = {https://dblp.org/rec/conf/cogmi/MaurinaHGRD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpss/PrabhuSRRG22,
  author       = {Vinayak S. Prabhu and
                  Mohit Singh and
                  Indrajit Ray and
                  Indrakshi Ray and
                  Sudipto Ghosh},
  editor       = {Alvaro A. C{\'{a}}rdenas and
                  Daisuke Mashima and
                  Ertem Esiner},
  title        = {Detecting Secure Memory Deallocation Violations with {CBMC}},
  booktitle    = {Proceedings of the 8th {ACM} on Cyber-Physical System Security Workshop,
                  CPSS@AsiaCCS 2022, Nagasaki, Japan, 30 May 2022},
  pages        = {27--38},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3494107.3522779},
  doi          = {10.1145/3494107.3522779},
  timestamp    = {Mon, 04 Jul 2022 17:06:15 +0200},
  biburl       = {https://dblp.org/rec/conf/cpss/PrabhuSRRG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/GorbettSR22,
  author       = {Matt Gorbett and
                  Hossein Shirazi and
                  Indrakshi Ray},
  editor       = {Shamik Sural and
                  Haibing Lu},
  title        = {Local Intrinsic Dimensionality of IoT Networks for Unsupervised Intrusion
                  Detection},
  booktitle    = {Data and Applications Security and Privacy {XXXVI} - 36th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13383},
  pages        = {143--161},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-10684-2\_9},
  doi          = {10.1007/978-3-031-10684-2\_9},
  timestamp    = {Thu, 14 Jul 2022 17:34:57 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/GorbettSR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/NeupaneTPBACDR22,
  author       = {Shradha Neupane and
                  Faiza Tazi and
                  Upakar Paudel and
                  Freddy Veloz Baez and
                  Merzia Adamjee and
                  Lorenzo De Carli and
                  Sanchari Das and
                  Indrakshi Ray},
  editor       = {Shamik Sural and
                  Haibing Lu},
  title        = {On the Data Privacy, Security, and Risk Postures of IoT Mobile Companion
                  Apps},
  booktitle    = {Data and Applications Security and Privacy {XXXVI} - 36th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13383},
  pages        = {162--182},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-10684-2\_10},
  doi          = {10.1007/978-3-031-10684-2\_10},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/NeupaneTPBACDR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChaleshtoriR22,
  author       = {Fateme Hashemi Chaleshtori and
                  Indrakshi Ray},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Jorge Maestre Vidal and
                  Marco Antonio Sotelo Monge and
                  Massimiliano Albanese and
                  Basel Katt and
                  Sandeep Pirbhulal and
                  Ankur Shukla},
  title        = {Automation of Vulnerability Information Extraction Using Transformer-Based
                  Language Models},
  booktitle    = {Computer Security. {ESORICS} 2022 International Workshops - CyberICPS
                  2022, {SECPRE} 2022, {SPOSE} 2022, {CPS4CIP} 2022, CDT{\&}SECOMANE
                  2022, {EIS} 2022, and SecAssure 2022, Copenhagen, Denmark, September
                  26-30, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13785},
  pages        = {645--665},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25460-4\_37},
  doi          = {10.1007/978-3-031-25460-4\_37},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ChaleshtoriR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/GorbettSR22,
  author       = {Matt Gorbett and
                  Hossein Shirazi and
                  Indrakshi Ray},
  editor       = {Sven Dietrich and
                  Omar Chowdhury and
                  Daniel Takabi},
  title        = {WiP: The Intrinsic Dimensionality of IoT Networks},
  booktitle    = {{SACMAT} '22: The 27th {ACM} Symposium on Access Control Models and
                  Technologies, New York, NY, USA, June 8 - 10, 2022},
  pages        = {245--250},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3532105.3535038},
  doi          = {10.1145/3532105.3535038},
  timestamp    = {Mon, 13 Jun 2022 16:29:51 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/GorbettSR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ShiraziBRA21,
  author       = {Hossein Shirazi and
                  Bruhadeshwar Bezawada and
                  Indrakshi Ray and
                  Chuck Anderson},
  title        = {Directed adversarial sampling attacks on phishing detection},
  journal      = {J. Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {1--23},
  year         = {2021},
  url          = {https://doi.org/10.3233/JCS-191411},
  doi          = {10.3233/JCS-191411},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ShiraziBRA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/HomayouniRGGK21,
  author       = {Hajar Homayouni and
                  Indrakshi Ray and
                  Sudipto Ghosh and
                  Shlok Gondalia and
                  Michael G. Kahn},
  title        = {Anomaly Detection in {COVID-19} Time-Series Data},
  journal      = {{SN} Comput. Sci.},
  volume       = {2},
  number       = {4},
  pages        = {279},
  year         = {2021},
  url          = {https://doi.org/10.1007/s42979-021-00658-w},
  doi          = {10.1007/S42979-021-00658-W},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/HomayouniRGGK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/widm/BezawadaRR21,
  author       = {Bruhadeshwar Bezawada and
                  Indrakshi Ray and
                  Indrajit Ray},
  title        = {Behavioral fingerprinting of Internet-of-Things devices},
  journal      = {WIREs Data Mining Knowl. Discov.},
  volume       = {11},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.1002/widm.1337},
  doi          = {10.1002/WIDM.1337},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/widm/BezawadaRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bncod/CuomoHRG21,
  author       = {Joaquin Cuomo and
                  Hajar Homayouni and
                  Indrakshi Ray and
                  Sudipto Ghosh},
  editor       = {Holger Pirk and
                  Thomas Heinis},
  title        = {Detecting Temporal Dependencies in Data},
  booktitle    = {Proceedings of the The British International Conference on Databases
                  2021, London, United Kingdom, March 28, 2022},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3163},
  pages        = {29--39},
  publisher    = {CEUR-WS.org},
  year         = {2021},
  url          = {https://ceur-ws.org/Vol-3163/BICOD21\_paper\_5.pdf},
  timestamp    = {Wed, 07 Feb 2024 16:02:39 +0100},
  biburl       = {https://dblp.org/rec/conf/bncod/CuomoHRG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PaudelDMR21,
  author       = {Upakar Paudel and
                  Andy Dolan and
                  Suryadipta Majumdar and
                  Indrakshi Ray},
  title        = {Context-Aware IoT Device Functionality Extraction from Specifications
                  for Ensuring Consumer Security},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {155--163},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705050},
  doi          = {10.1109/CNS53000.2021.9705050},
  timestamp    = {Fri, 18 Feb 2022 10:36:40 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/PaudelDMR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DevalTBR21,
  author       = {Shalin Kumar Deval and
                  Meenakshi Tripathi and
                  Bruhadeshwar Bezawada and
                  Indrakshi Ray},
  title        = {"X-Phish: Days of Future Past"{\textdaggerdbl}: Adaptive
                  {\&} Privacy Preserving Phishing Detection},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {227--235},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705052},
  doi          = {10.1109/CNS53000.2021.9705052},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/DevalTBR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cogmi/BanerjeeR21,
  author       = {Ritwik Banerjee and
                  Indrakshi Ray},
  title        = {Diagnosis, Prevention, and Cure for Misinformation},
  booktitle    = {Third {IEEE} International Conference on Cognitive Machine Intelligence,
                  CogMI 2021, Atlanta, GA, USA, December 13-15, 2021},
  pages        = {156--162},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CogMI52975.2021.00028},
  doi          = {10.1109/COGMI52975.2021.00028},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cogmi/BanerjeeR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/HaefnerR21,
  author       = {Kyle Haefner and
                  Indrakshi Ray},
  editor       = {Shlomi Dolev and
                  Oded Margalit and
                  Benny Pinkas and
                  Alexander A. Schwarzmann},
  title        = {Trust and Verify: {A} Complexity-Based IoT Behavioral Enforcement
                  Method},
  booktitle    = {Cyber Security Cryptography and Machine Learning - 5th International
                  Symposium, {CSCML} 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12716},
  pages        = {432--450},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78086-9\_32},
  doi          = {10.1007/978-3-030-78086-9\_32},
  timestamp    = {Mon, 03 Jan 2022 22:32:47 +0100},
  biburl       = {https://dblp.org/rec/conf/cscml/HaefnerR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurousec/CarliRS21,
  author       = {Lorenzo De Carli and
                  Indrakshi Ray and
                  Erin Solovey},
  title        = {Vision: Stewardship of Smart Devices Security for the Aging Population},
  booktitle    = {EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe,
                  Germany, October 11 - 12, 2021},
  pages        = {236--241},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3481357.3481523},
  doi          = {10.1145/3481357.3481523},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurousec/CarliRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fnc/HaynesSR21,
  author       = {Katherine Haynes and
                  Hossein Shirazi and
                  Indrakshi Ray},
  editor       = {Elhadi M. Shakshuki and
                  Ansar{-}Ul{-}Haque Yasar},
  title        = {Lightweight URL-based phishing detection using natural language processing
                  transformers for mobile devices},
  booktitle    = {The 18th International Conference on Mobile Systems and Pervasive
                  Computing (MobiSPC 2021) / The 16th International Conference on Future
                  Networks and Communications {(FNC-2021)} / The 11th International
                  Conference on Sustainable Energy Information Technology, Leuven, Belgium,
                  August 9-12, 2021},
  series       = {Procedia Computer Science},
  volume       = {191},
  pages        = {127--134},
  publisher    = {Elsevier},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.procs.2021.07.040},
  doi          = {10.1016/J.PROCS.2021.07.040},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fnc/HaynesSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SaravaniRR21,
  author       = {Sina Mahdipour Saravani and
                  Indrajit Ray and
                  Indrakshi Ray},
  editor       = {Somanath Tripathy and
                  Rudrapatna K. Shyamasundar and
                  Rajiv Ranjan},
  title        = {Automated Identification of Social Media Bots Using Deepfake Text
                  Detection},
  booktitle    = {Information Systems Security - 17th International Conference, {ICISS}
                  2021, Patna, India, December 16-20, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13146},
  pages        = {111--123},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92571-0\_7},
  doi          = {10.1007/978-3-030-92571-0\_7},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/SaravaniRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/ReutimannR21,
  author       = {Brandt Reutimann and
                  Indrakshi Ray},
  editor       = {Jason Staggs and
                  Sujeet Shenoi},
  title        = {Simulating Measurement Attacks in a Scada System Testbed},
  booktitle    = {Critical Infrastructure Protection {XV} - 15th {IFIP} {WG} 11.10 International
                  Conference, {ICCIP} 2021, Virtual Event, March 15-16, 2021, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {636},
  pages        = {135--153},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93511-5\_7},
  doi          = {10.1007/978-3-030-93511-5\_7},
  timestamp    = {Wed, 09 Mar 2022 16:41:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/ReutimannR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotbd/BhosaleCR21,
  author       = {Vishwajeet Bhosale and
                  Lorenzo De Carli and
                  Indrakshi Ray},
  editor       = {Gary B. Wills and
                  P{\'{e}}ter Kacsuk and
                  Victor Chang},
  title        = {Detection of Anomalous User Activity for Home IoT Devices},
  booktitle    = {Proceedings of the 6th International Conference on Internet of Things,
                  Big Data and Security, IoTBDS 2021, Online Streaming, April 23-25,
                  2021},
  pages        = {309--314},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010476503090314},
  doi          = {10.5220/0010476503090314},
  timestamp    = {Mon, 31 May 2021 12:07:54 +0200},
  biburl       = {https://dblp.org/rec/conf/iotbd/BhosaleCR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotsms/AlqurashiSR21,
  author       = {Saja Alqurashi and
                  Hossein Shirazi and
                  Indrakshi Ray},
  editor       = {Jaime Mauri Lauret and
                  Mohamed Abdel{-}Maguid and
                  Yaser Jararweh and
                  Elhadj Benkhelifa},
  title        = {On the Performance of Isolation Forest and Multi Layer Perceptron
                  for Anomaly Detection in Industrial Control Systems Networks},
  booktitle    = {8th International Conference on Internet of Things: Systems, Management
                  and Security, {IOTSMS} 2021, Gandia, Spain, December 6-9, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IOTSMS53705.2021.9704986},
  doi          = {10.1109/IOTSMS53705.2021.9704986},
  timestamp    = {Fri, 18 Feb 2022 10:36:42 +0100},
  biburl       = {https://dblp.org/rec/conf/iotsms/AlqurashiSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KarRGPR20,
  author       = {Diptendu Mohan Kar and
                  Indrajit Ray and
                  Jenna Gallegos and
                  Jean Peccoud and
                  Indrakshi Ray},
  title        = {Synthesizing {DNA} molecules with identity-based digital signatures
                  to prevent malicious tampering and enabling source attribution},
  journal      = {J. Comput. Secur.},
  volume       = {28},
  number       = {4},
  pages        = {437--467},
  year         = {2020},
  url          = {https://doi.org/10.3233/JCS-191383},
  doi          = {10.3233/JCS-191383},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KarRGPR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcps/MukherjeeESWRR20,
  author       = {Subhojeet Mukherjee and
                  Jeffrey C. Van Etten and
                  Namburi Rani Samyukta and
                  Jacob Walker and
                  Indrakshi Ray and
                  Indrajit Ray},
  title        = {TruckSTM: Runtime Realization of Operational State Transitions for
                  Medium and Heavy Duty Vehicles},
  journal      = {{ACM} Trans. Cyber Phys. Syst.},
  volume       = {4},
  number       = {1},
  pages        = {4:1--4:25},
  year         = {2020},
  url          = {https://doi.org/10.1145/3300183},
  doi          = {10.1145/3300183},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcps/MukherjeeESWRR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/HomayouniGRGDK20,
  author       = {Hajar Homayouni and
                  Sudipto Ghosh and
                  Indrakshi Ray and
                  Shlok Gondalia and
                  Jerry Duggan and
                  Michael G. Kahn},
  editor       = {Xintao Wu and
                  Chris Jermaine and
                  Li Xiong and
                  Xiaohua Hu and
                  Olivera Kotevska and
                  Siyuan Lu and
                  Weija Xu and
                  Srinivas Aluru and
                  Chengxiang Zhai and
                  Eyhab Al{-}Masri and
                  Zhiyuan Chen and
                  Jeff Saltz},
  title        = {An Autocorrelation-based LSTM-Autoencoder for Anomaly Detection on
                  Time-Series Data},
  booktitle    = {2020 {IEEE} International Conference on Big Data {(IEEE} BigData 2020),
                  Atlanta, GA, USA, December 10-13, 2020},
  pages        = {5068--5077},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigData50022.2020.9378192},
  doi          = {10.1109/BIGDATA50022.2020.9378192},
  timestamp    = {Fri, 19 Nov 2021 16:08:20 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/HomayouniGRGDK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/DolanRM20,
  author       = {Andy Dolan and
                  Indrakshi Ray and
                  Suryadipta Majumdar},
  editor       = {Anoop Singhal and
                  Jaideep Vaidya},
  title        = {Proactively Extracting IoT Device Capabilities: An Application to
                  Smart Homes},
  booktitle    = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12122},
  pages        = {42--63},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-49669-2\_3},
  doi          = {10.1007/978-3-030-49669-2\_3},
  timestamp    = {Thu, 18 Jun 2020 13:44:27 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/DolanRM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/ShiraziZR20,
  author       = {Hossein Shirazi and
                  Landon Zweigle and
                  Indrakshi Ray},
  editor       = {Pierangela Samarati and
                  Sabrina De Capitani di Vimercati and
                  Mohammad S. Obaidat and
                  Jalel Ben{-}Othman},
  title        = {A Machine-learning based Unbiased Phishing Detection Approach},
  booktitle    = {Proceedings of the 17th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint,
                  Paris, France, July 8-10, 2020},
  pages        = {423--430},
  publisher    = {ScitePress},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009834204230430},
  doi          = {10.5220/0009834204230430},
  timestamp    = {Wed, 29 Jul 2020 16:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/ShiraziZR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/KhalidCR20,
  author       = {Majdi Khalid and
                  Hamidreza Chitsaz and
                  Indrakshi Ray},
  title        = {Proximal Stochastic {AUC} Maximization},
  booktitle    = {2020 International Joint Conference on Neural Networks, {IJCNN} 2020,
                  Glasgow, United Kingdom, July 19-24, 2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IJCNN48605.2020.9206926},
  doi          = {10.1109/IJCNN48605.2020.9206926},
  timestamp    = {Tue, 06 Oct 2020 15:44:04 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/KhalidCR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/ShiraziMRJ20,
  author       = {Hossein Shirazi and
                  Shashika Ranga Muramudalige and
                  Indrakshi Ray and
                  Anura P. Jayasumana},
  editor       = {Hwee{-}Pink Tan and
                  Lyes Khoukhi and
                  Sharief Oteafy},
  title        = {Improved Phishing Detection Algorithms using Adversarial Autoencoder
                  Synthesized Data},
  booktitle    = {45th {IEEE} Conference on Local Computer Networks, {LCN} 2020, Sydney,
                  Australia, November 16-19, 2020},
  pages        = {24--32},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/LCN48667.2020.9314775},
  doi          = {10.1109/LCN48667.2020.9314775},
  timestamp    = {Fri, 25 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/ShiraziMRJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/RavidasRZ20,
  author       = {Sowmya Ravidas and
                  Indrakshi Ray and
                  Nicola Zannone},
  title        = {Handling Incomplete Information in Policy Evaluation using Attribute
                  Similarity},
  booktitle    = {Second {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta,
                  GA, USA, October 28-31, 2020},
  pages        = {79--88},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TPS-ISA50397.2020.00021},
  doi          = {10.1109/TPS-ISA50397.2020.00021},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tpsisa/RavidasRZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-06579,
  author       = {Drew Johnston and
                  Jarret Flack and
                  Indrakshi Ray and
                  Francisco R. Ortega},
  title        = {Towards a Virtual Reality Home IoT Network Visualizer},
  journal      = {CoRR},
  volume       = {abs/2001.06579},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.06579},
  eprinttype    = {arXiv},
  eprint       = {2001.06579},
  timestamp    = {Fri, 04 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-06579.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/HomayouniGR19,
  author       = {Hajar Homayouni and
                  Sudipto Ghosh and
                  Indrakshi Ray},
  title        = {Chapter Five - Data Warehouse Testing},
  journal      = {Adv. Comput.},
  volume       = {112},
  pages        = {223--273},
  year         = {2019},
  url          = {https://doi.org/10.1016/bs.adcom.2017.12.005},
  doi          = {10.1016/BS.ADCOM.2017.12.005},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/HomayouniGR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/HomayouniGRK19,
  author       = {Hajar Homayouni and
                  Sudipto Ghosh and
                  Indrakshi Ray and
                  Michael G. Kahn},
  editor       = {Chaitanya K. Baru and
                  Jun Huan and
                  Latifur Khan and
                  Xiaohua Hu and
                  Ronay Ak and
                  Yuanyuan Tian and
                  Roger S. Barga and
                  Carlo Zaniolo and
                  Kisung Lee and
                  Yanfang (Fanny) Ye},
  title        = {An Interactive Data Quality Test Approach for Constraint Discovery
                  and Fault Detection},
  booktitle    = {2019 {IEEE} International Conference on Big Data {(IEEE} BigData),
                  Los Angeles, CA, USA, December 9-12, 2019},
  pages        = {200--205},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/BigData47090.2019.9006446},
  doi          = {10.1109/BIGDATA47090.2019.9006446},
  timestamp    = {Tue, 18 Oct 2022 14:44:48 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/HomayouniGRK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpss/RayAB19,
  author       = {Indrakshi Ray and
                  Ramadan Abdunabi and
                  Rejina Basnet},
  title        = {Access Control for Internet of Things Applications},
  booktitle    = {Proceedings of the 5th {ACM} on Cyber-Physical System Security Workshop,
                  CPSS@AsiaCCS 2019, Auckland, New Zealand, 8 July 2019},
  pages        = {35--36},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3327961.3329533},
  doi          = {10.1145/3327961.3329533},
  timestamp    = {Mon, 23 May 2022 17:59:02 +0200},
  biburl       = {https://dblp.org/rec/conf/cpss/RayAB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ShiraziBRA19,
  author       = {Hossein Shirazi and
                  Bruhadeshwar Bezawada and
                  Indrakshi Ray and
                  Charles Anderson},
  editor       = {Simon N. Foley},
  title        = {Adversarial Sampling Attacks Against Phishing Detection},
  booktitle    = {Data and Applications Security and Privacy {XXXIII} - 33rd Annual
                  {IFIP} {WG} 11.3 Conference, DBSec 2019, Charleston, SC, USA, July
                  15-17, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11559},
  pages        = {83--101},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22479-0\_5},
  doi          = {10.1007/978-3-030-22479-0\_5},
  timestamp    = {Wed, 20 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ShiraziBRA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/ShiraziRA19,
  author       = {Hossein Shirazi and
                  Indrakshi Ray and
                  Charles Anderson},
  editor       = {Abdelmalek Benzekri and
                  Michel Barbeau and
                  Guang Gong and
                  Romain Laborde and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Using Machine Learning to Detect Anomalies in Embedded Networks in
                  Heavy Vehicles},
  booktitle    = {Foundations and Practice of Security - 12th International Symposium,
                  {FPS} 2019, Toulouse, France, November 5-7, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12056},
  pages        = {39--55},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-45371-8\_3},
  doi          = {10.1007/978-3-030-45371-8\_3},
  timestamp    = {Wed, 07 Dec 2022 23:10:28 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/ShiraziRA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gc/MuramudaligeHJR19,
  author       = {Shashika Ranga Muramudalige and
                  Benjamin W. K. Hung and
                  Anura P. Jayasumana and
                  Indrakshi Ray},
  title        = {Investigative Graph Search using Graph Databases},
  booktitle    = {First International Conference on Graph Computing, {GC} 2019, Laguna
                  Hills, CA, USA, September 25-27, 2019},
  pages        = {60--67},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/GC46384.2019.00017},
  doi          = {10.1109/GC46384.2019.00017},
  timestamp    = {Fri, 25 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gc/MuramudaligeHJR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/HomayouniGR19,
  author       = {Hajar Homayouni and
                  Sudipto Ghosh and
                  Indrakshi Ray},
  title        = {ADQuaTe: An Automated Data Quality Test Approach for Constraint Discovery
                  and Fault Detection},
  booktitle    = {20th {IEEE} International Conference on Information Reuse and Integration
                  for Data Science, {IRI} 2019, Los Angeles, CA, USA, July 30 - August
                  1, 2019},
  pages        = {61--68},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IRI.2019.00023},
  doi          = {10.1109/IRI.2019.00023},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/HomayouniGR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/HaefnerR19,
  author       = {Kyle Haefner and
                  Indrakshi Ray},
  title        = {ComplexIoT: Behavior-Based Trust For IoT Networks},
  booktitle    = {First {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2019, Los Angeles,
                  CA, USA, December 12-14, 2019},
  pages        = {56--65},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TPS-ISA48467.2019.00016},
  doi          = {10.1109/TPS-ISA48467.2019.00016},
  timestamp    = {Tue, 26 Jan 2021 14:05:24 +0100},
  biburl       = {https://dblp.org/rec/conf/tpsisa/HaefnerR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/BelyaevSRR18,
  author       = {Kirill Belyaev and
                  Wuliang Sun and
                  Indrakshi Ray and
                  Indrajit Ray},
  title        = {On the design and analysis of protocols for Personal Health Record
                  storage on Personal Data Server devices},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {80},
  pages        = {467--482},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2016.05.027},
  doi          = {10.1016/J.FUTURE.2016.05.027},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/BelyaevSRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/BelyaevR18,
  author       = {Kirill Belyaev and
                  Indrakshi Ray},
  title        = {Component-oriented access control - Application servers meet tuple
                  spaces for the masses},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {86},
  pages        = {726--739},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.05.003},
  doi          = {10.1016/J.FUTURE.2017.05.003},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/BelyaevR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmdem/ShiraziHR18,
  author       = {Hossein Shirazi and
                  Kyle Haefner and
                  Indrakshi Ray},
  title        = {Improving Auto-Detection of Phishing Websites using Fresh-Phish Framework},
  journal      = {Int. J. Multim. Data Eng. Manag.},
  volume       = {9},
  number       = {1},
  pages        = {51--64},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJMDEM.2018010104},
  doi          = {10.4018/IJMDEM.2018010104},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmdem/ShiraziHR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MoatazRRSCC18,
  author       = {Tarik Moataz and
                  Indrajit Ray and
                  Indrakshi Ray and
                  Abdullatif Shikfa and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens},
  title        = {Substring search over encrypted data},
  journal      = {J. Comput. Secur.},
  volume       = {26},
  number       = {1},
  pages        = {1--30},
  year         = {2018},
  url          = {https://doi.org/10.3233/JCS-14652},
  doi          = {10.3233/JCS-14652},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/MoatazRRSCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/BahlCCCHIINRRSS18,
  author       = {Victor Bahl and
                  Barbara Carminati and
                  James Caverlee and
                  Ing{-}Ray Chen and
                  Wynne Hsu and
                  Toru Ishida and
                  Val{\'{e}}rie Issarny and
                  Surya Nepal and
                  Indrakshi Ray and
                  Kui Ren and
                  Shamik Sural and
                  Mei{-}Ling Shyu},
  title        = {Editorial},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {11},
  number       = {1},
  pages        = {1--4},
  year         = {2018},
  url          = {https://doi.org/10.1109/TSC.2018.2793681},
  doi          = {10.1109/TSC.2018.2793681},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/BahlCCCHIINRRSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adbis/BelyaevR18,
  author       = {Kirill Belyaev and
                  Indrakshi Ray},
  editor       = {Andr{\'{a}}s Bencz{\'{u}}r and
                  Bernhard Thalheim and
                  Tom{\'{a}}s Horv{\'{a}}th and
                  Silvia Chiusano and
                  Tania Cerquitelli and
                  Csaba Istv{\'{a}}n Sidl{\'{o}} and
                  Peter Z. Revesz},
  title        = {Towards Service Orchestration in {XML} Filtering Overlays},
  booktitle    = {New Trends in Databases and Information Systems - {ADBIS} 2018 Short
                  Papers and Workshops, AI*QA, BIGPMED, CSACDB, M2U, BigDataMAPS, ISTREND,
                  DC, Budapest, Hungary, September, 2-5, 2018, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {909},
  pages        = {12--19},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00063-9\_2},
  doi          = {10.1007/978-3-030-00063-9\_2},
  timestamp    = {Mon, 03 Sep 2018 16:52:13 +0200},
  biburl       = {https://dblp.org/rec/conf/adbis/BelyaevR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/BezawadaR18,
  author       = {Bruhadeshwar Bezawada and
                  Indrakshi Ray},
  editor       = {Pierangela Samarati and
                  Indrajit Ray and
                  Indrakshi Ray},
  title        = {Attribute-Based Encryption: Applications and Future Directions},
  booktitle    = {From Database to Cyber Security - Essays Dedicated to Sushil Jajodia
                  on the Occasion of His 70th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {11170},
  pages        = {353--374},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-04834-1\_18},
  doi          = {10.1007/978-3-030-04834-1\_18},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/BezawadaR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BezawadaBPSRR18,
  author       = {Bruhadeshwar Bezawada and
                  Maalvika Bachani and
                  Jordan Peterson and
                  Hossein Shirazi and
                  Indrakshi Ray and
                  Indrajit Ray},
  editor       = {Chip{-}Hong Chang and
                  Ulrich R{\"{u}}hrmair and
                  Daniel E. Holcomb and
                  Jorge Guajardo},
  title        = {Behavioral Fingerprinting of IoT Devices},
  booktitle    = {Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware
                  Security, ASHES@CCS 2018, Toronto, ON, Canada, October 19, 2018},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3266444.3266452},
  doi          = {10.1145/3266444.3266452},
  timestamp    = {Wed, 30 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BezawadaBPSRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmec/BasnetMPR18,
  author       = {Rejina Basnet and
                  Subhojeet Mukherjee and
                  Vignesh M. Pagadala and
                  Indrakshi Ray},
  title        = {An efficient implementation of next generation access control for
                  the mobile health cloud},
  booktitle    = {Third International Conference on Fog and Mobile Edge Computing, {FMEC}
                  2018, Barcelona, Spain, April 23-26, 2018},
  pages        = {131--138},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/FMEC.2018.8364055},
  doi          = {10.1109/FMEC.2018.8364055},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/fmec/BasnetMPR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/PagadalaR18,
  author       = {Vignesh M. Pagadala and
                  Indrakshi Ray},
  editor       = {Nur Zincir{-}Heywood and
                  Guillaume Bonfante and
                  Mourad Debbabi and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Achieving Mobile-Health Privacy Using Attribute-Based Access Control},
  booktitle    = {Foundations and Practice of Security - 11th International Symposium,
                  {FPS} 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11358},
  pages        = {301--316},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-18419-3\_20},
  doi          = {10.1007/978-3-030-18419-3\_20},
  timestamp    = {Fri, 08 Dec 2023 07:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/PagadalaR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ideas/HomayouniGR18,
  author       = {Hajar Homayouni and
                  Sudipto Ghosh and
                  Indrakshi Ray},
  editor       = {Bipin C. Desai and
                  Sergio Flesca and
                  Ester Zumpano and
                  Elio Masciari and
                  Luciano Caroprese},
  title        = {An Approach for Testing the Extract-Transform-Load Process in Data
                  Warehouse Systems},
  booktitle    = {Proceedings of the 22nd International Database Engineering {\&}
                  Applications Symposium, {IDEAS} 2018, Villa San Giovanni, Italy, June
                  18-20, 2018},
  pages        = {236--245},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3216122.3216149},
  doi          = {10.1145/3216122.3216149},
  timestamp    = {Wed, 21 Nov 2018 12:44:24 +0100},
  biburl       = {https://dblp.org/rec/conf/ideas/HomayouniGR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkdd/KhalidRC18,
  author       = {Majdi Khalid and
                  Indrakshi Ray and
                  Hamidreza Chitsaz},
  editor       = {Michele Berlingerio and
                  Francesco Bonchi and
                  Thomas G{\"{a}}rtner and
                  Neil Hurley and
                  Georgiana Ifrim},
  title        = {Scalable Nonlinear {AUC} Maximization Methods},
  booktitle    = {Machine Learning and Knowledge Discovery in Databases - European Conference,
                  {ECML} {PKDD} 2018, Dublin, Ireland, September 10-14, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11052},
  pages        = {292--307},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-10928-8\_18},
  doi          = {10.1007/978-3-030-10928-8\_18},
  timestamp    = {Fri, 27 Mar 2020 08:53:11 +0100},
  biburl       = {https://dblp.org/rec/conf/pkdd/KhalidRC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/LazrigORRJV18,
  author       = {Ibrahim Lazrig and
                  Toan C. Ong and
                  Indrajit Ray and
                  Indrakshi Ray and
                  Xiaoqian Jiang and
                  Jaideep Vaidya},
  editor       = {Kieran McLaughlin and
                  Ali A. Ghorbani and
                  Sakir Sezer and
                  Rongxing Lu and
                  Liqun Chen and
                  Robert H. Deng and
                  Paul Miller and
                  Stephen Marsh and
                  Jason R. C. Nurse},
  title        = {Privacy Preserving Probabilistic Record Linkage Without Trusted Third
                  Party},
  booktitle    = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018,
                  Belfast, Northern Ireland, Uk, August 28-30, 2018},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/PST.2018.8514192},
  doi          = {10.1109/PST.2018.8514192},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/LazrigORRJV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/MulambaRR18,
  author       = {Dieudonne Mulamba and
                  Indrajit Ray and
                  Indrakshi Ray},
  editor       = {Kieran McLaughlin and
                  Ali A. Ghorbani and
                  Sakir Sezer and
                  Rongxing Lu and
                  Liqun Chen and
                  Robert H. Deng and
                  Paul Miller and
                  Stephen Marsh and
                  Jason R. C. Nurse},
  title        = {On Sybil Classification in Online Social Networks Using Only Structural
                  Features},
  booktitle    = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018,
                  Belfast, Northern Ireland, Uk, August 28-30, 2018},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/PST.2018.8514162},
  doi          = {10.1109/PST.2018.8514162},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/MulambaRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BezawadaKRRL18,
  author       = {Bruhadeshwar Bezawada and
                  Sandeep S. Kulkarni and
                  Indrajit Ray and
                  Indrakshi Ray and
                  Rui Li},
  editor       = {Elisa Bertino and
                  Dan Lin and
                  Jorge Lobo},
  title        = {Independent Key Distribution Protocols for Broadcast Authentication},
  booktitle    = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models
                  and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15,
                  2018},
  pages        = {27--38},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3205977.3205985},
  doi          = {10.1145/3205977.3205985},
  timestamp    = {Tue, 29 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/BezawadaKRRL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ShiraziBR18,
  author       = {Hossein Shirazi and
                  Bruhadeshwar Bezawada and
                  Indrakshi Ray},
  editor       = {Elisa Bertino and
                  Dan Lin and
                  Jorge Lobo},
  title        = {\emph{"Kn0w Thy Doma1n Name"}: Unbiased Phishing Detection
                  Using Domain Name Based Features},
  booktitle    = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models
                  and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15,
                  2018},
  pages        = {69--75},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3205977.3205992},
  doi          = {10.1145/3205977.3205992},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/ShiraziBR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/birthday/2018jajodia,
  editor       = {Pierangela Samarati and
                  Indrajit Ray and
                  Indrakshi Ray},
  title        = {From Database to Cyber Security - Essays Dedicated to Sushil Jajodia
                  on the Occasion of His 70th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {11170},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-04834-1},
  doi          = {10.1007/978-3-030-04834-1},
  isbn         = {978-3-030-04833-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/2018jajodia.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/db/RayB18,
  author       = {Indrakshi Ray and
                  Thilina Buddhika},
  editor       = {Ling Liu and
                  M. Tamer {\"{O}}zsu},
  title        = {Secure Transaction Processing},
  booktitle    = {Encyclopedia of Database Systems, Second Edition},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-1-4614-8265-9\_331},
  doi          = {10.1007/978-1-4614-8265-9\_331},
  timestamp    = {Thu, 14 Feb 2019 09:43:36 +0100},
  biburl       = {https://dblp.org/rec/reference/db/RayB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-03852,
  author       = {Bruhadeshwar Bezawada and
                  Maalvika Bachani and
                  Jordan Peterson and
                  Hossein Shirazi and
                  Indrakshi Ray and
                  Indrajit Ray},
  title        = {IoTSense: Behavioral Fingerprinting of IoT Devices},
  journal      = {CoRR},
  volume       = {abs/1804.03852},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.03852},
  eprinttype    = {arXiv},
  eprint       = {1804.03852},
  timestamp    = {Wed, 30 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-03852.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BelyaevR17,
  author       = {Kirill Belyaev and
                  Indrakshi Ray},
  title        = {On the formalization, design, and implementation of component-oriented
                  access control in lightweight virtualized server environments},
  journal      = {Comput. Secur.},
  volume       = {71},
  pages        = {15--35},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2017.06.004},
  doi          = {10.1016/J.COSE.2017.06.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BelyaevR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KarLRR17,
  author       = {Diptendu Mohan Kar and
                  Ibrahim Lazrig and
                  Indrajit Ray and
                  Indrakshi Ray},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{POSTER:} PriReMat: {A} Distributed Tool for Privacy Preserving Record
                  Linking in Healthcare},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2507--2509},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3138845},
  doi          = {10.1145/3133956.3138845},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KarLRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MukherjeeCWWRR17,
  author       = {Subhojeet Mukherjee and
                  Noah Cain and
                  Jacob Walker and
                  David White and
                  Indrajit Ray and
                  Indrakshi Ray},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{POSTER:} PenJ1939: An Interactive Framework for Design and Dissemination
                  of Exploits for Commercial Vehicles},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2559--2561},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3138844},
  doi          = {10.1145/3133956.3138844},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MukherjeeCWWRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MukherjeeRRSOK17,
  author       = {Subhojeet Mukherjee and
                  Indrakshi Ray and
                  Indrajit Ray and
                  Hossein Shirazi and
                  Toan Ong and
                  Michael G. Kahn},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  title        = {Attribute Based Access Control for Healthcare Resources},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Attribute-Based Access Control,
                  ABAC@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017},
  pages        = {29--40},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3041048.3041055},
  doi          = {10.1145/3041048.3041055},
  timestamp    = {Tue, 09 Feb 2021 08:50:28 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/MukherjeeRRSOK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MosharrafJR17,
  author       = {Negar Mosharraf and
                  Anura P. Jayasumana and
                  Indrakshi Ray},
  editor       = {Giovanni Livraga and
                  Sencun Zhu},
  title        = {A Distributed Mechanism to Protect Against DDoS Attacks},
  booktitle    = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10359},
  pages        = {529--540},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61176-1\_29},
  doi          = {10.1007/978-3-319-61176-1\_29},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/MosharrafJR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmec/Ray17,
  author       = {Indrakshi Ray},
  title        = {Keynote speech 2: Attribute-based access control status and directions},
  booktitle    = {Second International Conference on Fog and Mobile Edge Computing,
                  {FMEC} 2017, Valencia, Spain, May 8-11, 2017},
  pages        = {2},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/FMEC.2017.7946397},
  doi          = {10.1109/FMEC.2017.7946397},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/fmec/Ray17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/MosharrafJRB17,
  author       = {Negar Mosharraf and
                  Anura P. Jayasumana and
                  Indrakshi Ray and
                  Bruhadeshwar Bezawada},
  editor       = {Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {History-Based Throttling of Distributed Denial-of-Service Attacks},
  booktitle    = {E-Business and Telecommunications - 14th International Joint Conference,
                  {ICETE} 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper},
  series       = {Communications in Computer and Information Science},
  volume       = {990},
  pages        = {199--223},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-030-11039-0\_10},
  doi          = {10.1007/978-3-030-11039-0\_10},
  timestamp    = {Fri, 31 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icete/MosharrafJRB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/ShiraziHR17,
  author       = {Hossein Shirazi and
                  Kyle Haefner and
                  Indrakshi Ray},
  editor       = {Chengcui Zhang and
                  Balaji Palanisamy and
                  Latifur Khan and
                  Sahra Sedigh Sarvestani},
  title        = {Fresh-Phish: {A} Framework for Auto-Detection of Phishing Websites},
  booktitle    = {2017 {IEEE} International Conference on Information Reuse and Integration,
                  {IRI} 2017, San Diego, CA, USA, August 4-6, 2017},
  pages        = {137--143},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/IRI.2017.40},
  doi          = {10.1109/IRI.2017.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iri/ShiraziHR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/MukherjeeWRD17,
  author       = {Subhojeet Mukherjee and
                  Jacob Walker and
                  Indrakshi Ray and
                  Jeremy Daily},
  title        = {A Precedence Graph-Based Approach to Detect Message Injection Attacks
                  in {J1939} Based Networks},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {67--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00018},
  doi          = {10.1109/PST.2017.00018},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/MukherjeeWRD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sds/Ray17,
  author       = {Indrakshi Ray},
  title        = {Keynote speech 2: Attribute-based access control status and directions},
  booktitle    = {2017 Fourth International Conference on Software Defined Systems,
                  {SDS} 2017, Valencia, Spain, May 8-11, 2017},
  pages        = {2},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/SDS.2017.7939130},
  doi          = {10.1109/SDS.2017.7939130},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/sds/Ray17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sds/RayANA17,
  author       = {Indrakshi Ray and
                  Bithin Alangot and
                  Shilpa Nair and
                  Krishnashree Achuthan},
  title        = {Using Attribute-Based Access Control for Remote Healthcare Monitoring},
  booktitle    = {2017 Fourth International Conference on Software Defined Systems,
                  {SDS} 2017, Valencia, Spain, May 8-11, 2017},
  pages        = {137--142},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/SDS.2017.7939154},
  doi          = {10.1109/SDS.2017.7939154},
  timestamp    = {Tue, 13 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sds/RayANA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MosharrafJR17,
  author       = {Negar Mosharraf and
                  Anura P. Jayasumana and
                  Indrakshi Ray},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Using a History-based Profile to Detect and Respond to DDoS Attacks},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {175--186},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006435801750186},
  doi          = {10.5220/0006435801750186},
  timestamp    = {Thu, 17 Aug 2017 18:31:18 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MosharrafJR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-00760,
  author       = {Majdi Khalid and
                  Indrakshi Ray and
                  Hamidreza Chitsaz},
  title        = {{AUC} Maximization with K-hyperplane},
  journal      = {CoRR},
  volume       = {abs/1710.00760},
  year         = {2017},
  url          = {http://arxiv.org/abs/1710.00760},
  eprinttype    = {arXiv},
  eprint       = {1710.00760},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1710-00760.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adma/KhalidRC16,
  author       = {Majdi Khalid and
                  Indrakshi Ray and
                  Hamidreza Chitsaz},
  editor       = {Jinyan Li and
                  Xue Li and
                  Shuliang Wang and
                  Jianxin Li and
                  Quan Z. Sheng},
  title        = {Confidence-Weighted Bipartite Ranking},
  booktitle    = {Advanced Data Mining and Applications - 12th International Conference,
                  {ADMA} 2016, Gold Coast, QLD, Australia, December 12-15, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10086},
  pages        = {35--49},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49586-6\_3},
  doi          = {10.1007/978-3-319-49586-6\_3},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/adma/KhalidRC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bhi/RayORK16,
  author       = {Indrakshi Ray and
                  Toan C. Ong and
                  Indrajit Ray and
                  Michael G. Kahn},
  title        = {Applying attribute based access control for privacy preserving health
                  data disclosure},
  booktitle    = {2016 {IEEE-EMBS} International Conference on Biomedical and Health
                  Informatics, {BHI} 2016, Las Vegas, NV, USA, February 24-27, 2016},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/BHI.2016.7455820},
  doi          = {10.1109/BHI.2016.7455820},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/bhi/RayORK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/BelyaevR16,
  author       = {Kirill Belyaev and
                  Indrakshi Ray},
  editor       = {Sara Foresti and
                  Giuseppe Persiano},
  title        = {Component-Oriented Access Control for Deployment of Application Services
                  in Containerized Environments},
  booktitle    = {Cryptology and Network Security - 15th International Conference, {CANS}
                  2016, Milan, Italy, November 14-16, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10052},
  pages        = {383--399},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48965-0\_23},
  doi          = {10.1007/978-3-319-48965-0\_23},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/BelyaevR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/HsuR16,
  author       = {Andy Chunliang Hsu and
                  Indrakshi Ray},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  title        = {Specification and Enforcement of Location-Aware Attribute-Based Access
                  Control for Online Social Networks},
  booktitle    = {Proceedings of the 2016 {ACM} International Workshop on Attribute
                  Based Access Control, ABAC@CODASPY 2016, New Orleans, Louisiana, USA,
                  March 11, 2016},
  pages        = {25--34},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2875491.2875495},
  doi          = {10.1145/2875491.2875495},
  timestamp    = {Tue, 09 Feb 2021 08:50:28 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/HsuR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/MosharrafJR16,
  author       = {Negar Mosharraf and
                  Anura P. Jayasumana and
                  Indrakshi Ray},
  title        = {Compacted Bloom Filter},
  booktitle    = {2nd {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016},
  pages        = {304--311},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CIC.2016.048},
  doi          = {10.1109/CIC.2016.048},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/MosharrafJR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LazrigORRK16,
  author       = {Ibrahim Lazrig and
                  Toan Ong and
                  Indrajit Ray and
                  Indrakshi Ray and
                  Michael G. Kahn},
  editor       = {Silvio Ranise and
                  Vipin Swarup},
  title        = {Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive
                  Hashes},
  booktitle    = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9766},
  pages        = {61--76},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-41483-6\_5},
  doi          = {10.1007/978-3-319-41483-6\_5},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/LazrigORRK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficloud/KebandeR16,
  author       = {Victor R. Kebande and
                  Indrakshi Ray},
  editor       = {Muhammad Younas and
                  Irfan Awan and
                  Winston Seah},
  title        = {A Generic Digital Forensic Investigation Framework for Internet of
                  Things (IoT)},
  booktitle    = {4th {IEEE} International Conference on Future Internet of Things and
                  Cloud, FiCloud 2016, Vienna, Austria, August 22-24, 2016},
  pages        = {356--362},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/FiCloud.2016.57},
  doi          = {10.1109/FICLOUD.2016.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ficloud/KebandeR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MukherjeeSRDG16,
  author       = {Subhojeet Mukherjee and
                  Hossein Shirazi and
                  Indrakshi Ray and
                  Jeremy Daily and
                  Rose F. Gamble},
  editor       = {Indrajit Ray and
                  Manoj Singh Gaur and
                  Mauro Conti and
                  Dheeraj Sanghi and
                  V. Kamakoti},
  title        = {Practical DoS Attacks on Embedded Networks in Commercial Vehicles},
  booktitle    = {Information Systems Security - 12th International Conference, {ICISS}
                  2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {23--42},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49806-5\_2},
  doi          = {10.1007/978-3-319-49806-5\_2},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/MukherjeeSRDG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ideas/BelyaevR16,
  author       = {Kirill Belyaev and
                  Indrakshi Ray},
  editor       = {Evan Desai and
                  Bipin C. Desai and
                  Motomichi Toyama and
                  Jorge Bernardino},
  title        = {Enhancing applications with filtering of {XML} message streams},
  booktitle    = {Proceedings of the 20th International Database Engineering {\&}
                  Applications Symposium, {IDEAS} 2016, Montreal, QC, Canada, July 11-13,
                  2016},
  pages        = {322--327},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2938503.2938509},
  doi          = {10.1145/2938503.2938509},
  timestamp    = {Tue, 06 Nov 2018 16:58:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ideas/BelyaevR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/MulambaRR16,
  author       = {Dieudonne Mulamba and
                  Indrajit Ray and
                  Indrakshi Ray},
  editor       = {Jaap{-}Henk Hoepman and
                  Stefan Katzenbeisser},
  title        = {SybilRadar: {A} Graph-Structure Based Framework for Sybil Detection
                  in On-line Social Networks},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 31st {IFIP} {TC} 11
                  International Conference, {SEC} 2016, Ghent, Belgium, May 30 - June
                  1, 2016, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {471},
  pages        = {179--193},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-33630-5\_13},
  doi          = {10.1007/978-3-319-33630-5\_13},
  timestamp    = {Fri, 19 May 2017 01:25:11 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/MulambaRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BelyaevR16,
  author       = {Kirill Belyaev and
                  Indrakshi Ray},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Towards Access Control for Isolated Applications},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {171--182},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005970001710182},
  doi          = {10.5220/0005970001710182},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BelyaevR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spaccs/2016,
  editor       = {Guojun Wang and
                  Indrakshi Ray and
                  Jose M. Alcaraz Calero and
                  Sabu M. Thampi},
  title        = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - 9th International Conference, SpaCCS 2016, Zhangjiajie,
                  China, November 16-18, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10066},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49148-6},
  doi          = {10.1007/978-3-319-49148-6},
  isbn         = {978-3-319-49147-9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spaccs/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spaccs/2016w,
  editor       = {Guojun Wang and
                  Indrakshi Ray and
                  Jose M. Alcaraz Calero and
                  Sabu M. Thampi},
  title        = {Security, Privacy and Anonymity in Computation, Communication and
                  Storage - SpaCCS 2016 International Workshops, TrustData, TSP, NOPE,
                  DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10067},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49145-5},
  doi          = {10.1007/978-3-319-49145-5},
  isbn         = {978-3-319-49144-8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spaccs/2016w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KhaledRC16,
  author       = {Majdi Khalid and
                  Indrakshi Ray and
                  Hamidreza Chitsaz},
  title        = {Confidence-Weighted Bipartite Ranking},
  journal      = {CoRR},
  volume       = {abs/1607.00847},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.00847},
  eprinttype    = {arXiv},
  eprint       = {1607.00847},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KhaledRC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ase/HeitmeyerPLARAT15,
  author       = {Constance L. Heitmeyer and
                  Marc Pickett and
                  Elizabeth I. Leonard and
                  Myla M. Archer and
                  Indrakshi Ray and
                  David W. Aha and
                  J. Gregory Trafton},
  title        = {Building high assurance human-centric decision systems},
  journal      = {Autom. Softw. Eng.},
  volume       = {22},
  number       = {2},
  pages        = {159--197},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10515-014-0157-z},
  doi          = {10.1007/S10515-014-0157-Z},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ase/HeitmeyerPLARAT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jot/SunCFBBR15,
  author       = {Wuliang Sun and
                  Beno{\^{\i}}t Combemale and
                  Robert B. France and
                  Arnaud Blouin and
                  Benoit Baudry and
                  Indrakshi Ray},
  title        = {Using Slicing to Improve the Performance of Model Invariant Checking},
  journal      = {J. Object Technol.},
  volume       = {14},
  number       = {4},
  pages        = {1:1--28},
  year         = {2015},
  url          = {https://doi.org/10.5381/jot.2015.14.4.a1},
  doi          = {10.5381/JOT.2015.14.4.A1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jot/SunCFBBR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SuWSR15,
  author       = {Jinshu Su and
                  Xiaofeng Wang and
                  Weisong Shi and
                  Indrakshi Ray},
  title        = {Security, trust, and resilience of distributed networks and systems},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {10},
  pages        = {1829--1830},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1276},
  doi          = {10.1002/SEC.1276},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SuWSR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/BelyaevR15,
  author       = {Kirill Belyaev and
                  Indrakshi Ray},
  editor       = {Yulei Wu and
                  Geyong Min and
                  Nektarios Georgalas and
                  Jia Hu and
                  Luigi Atzori and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Lei (Chris) Liu and
                  Ram{\'{o}}n Ag{\"{u}}ero Calvo},
  title        = {Towards Efficient Dissemination and Filtering of {XML} Data Streams},
  booktitle    = {15th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2015; 14th {IEEE} International Conference on Ubiquitous Computing
                  and Communications, {IUCC} 2015; 13th {IEEE} International Conference
                  on Dependable, Autonomic and Secure Computing, {DASC} 2015; 13th {IEEE}
                  International Conference on Pervasive Intelligence and Computing,
                  PICom 2015, Liverpool, United Kingdom, October 26-28, 2015},
  pages        = {1870--1877},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.278},
  doi          = {10.1109/CIT/IUCC/DASC/PICOM.2015.278},
  timestamp    = {Thu, 22 Oct 2020 17:33:50 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/BelyaevR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c3s2e/BennettRF15,
  author       = {Phillipa Bennett and
                  Indrakshi Ray and
                  Robert B. France},
  editor       = {Jake Yue Chen and
                  Mohammed J. Zaki and
                  Tamer Kahveci and
                  Saeed Salem and
                  Mehmet Koyut{\"{u}}rk},
  title        = {Analysis of a Relationship Based Access Control Model},
  booktitle    = {Proceedings of the Eighth International C* Conference on Computer
                  Science {\&} Software Engineering, Yokohama, Japan, July 13-15,
                  2015},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2790798.2790811},
  doi          = {10.1145/2790798.2790811},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/c3s2e/BennettRF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LazrigMRROKCC15,
  author       = {Ibrahim Lazrig and
                  Tarik Moataz and
                  Indrajit Ray and
                  Indrakshi Ray and
                  Toan Ong and
                  Michael G. Kahn and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  editor       = {Pierangela Samarati},
  title        = {Privacy Preserving Record Matching Using Automated Semi-trusted Broker},
  booktitle    = {Data and Applications Security and Privacy {XXIX} - 29th Annual {IFIP}
                  {WG} 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15,
                  2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9149},
  pages        = {103--118},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20810-7\_7},
  doi          = {10.1007/978-3-319-20810-7\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/LazrigMRROKCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/RayAXG15,
  author       = {Indrakshi Ray and
                  Raman Adaikkalavan and
                  Xing Xie and
                  Rose F. Gamble},
  editor       = {Pierangela Samarati},
  title        = {Stream Processing with Secure Information Flow Constraints},
  booktitle    = {Data and Applications Security and Privacy {XXIX} - 29th Annual {IFIP}
                  {WG} 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15,
                  2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9149},
  pages        = {311--329},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20810-7\_22},
  doi          = {10.1007/978-3-319-20810-7\_22},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/RayAXG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BennettRF15,
  author       = {Phillipa Bennett and
                  Indrakshi Ray and
                  Robert B. France},
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Modeling of Online Social Network Policies Using an Attribute-Based
                  Access Control Framework},
  booktitle    = {Information Systems Security - 11th International Conference, {ICISS}
                  2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {79--97},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26961-0\_6},
  doi          = {10.1007/978-3-319-26961-0\_6},
  timestamp    = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/BennettRF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/models/BennettSTGRK15,
  author       = {Phillipa Bennett and
                  Wuliang Sun and
                  Ted D. Wade and
                  Geri Georg and
                  Indrakshi Ray and
                  Michael G. Kahn},
  editor       = {Beno{\^{\i}}t Combemale and
                  Julien Deantoni and
                  Jeff Gray and
                  Daniel Balasubramanian and
                  Bruno Barroca and
                  Sahar Kokaly and
                  Gergely Mezei and
                  Pieter Van Gorp},
  title        = {Analyzing Regulatory Conformance in Medical Research Systems Using
                  Multi-Paradigm Modeling},
  booktitle    = {Joint Proceedings of the 3rd International Workshop on the Globalization
                  Of Modeling Languages and the 9th International Workshop on Multi-Paradigm
                  Modeling co-located with {ACM/IEEE} 18th International Conference
                  on Model Driven Engineering Languages and Systems, GEMOC+MPM@MoDELS
                  2015, Ottawa, Canada, September 28, 2015},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1511},
  pages        = {22--31},
  publisher    = {CEUR-WS.org},
  year         = {2015},
  url          = {https://ceur-ws.org/Vol-1511/paper-MPM01.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:20 +0100},
  biburl       = {https://dblp.org/rec/conf/models/BennettSTGRK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/AbdunabiSR14,
  author       = {Ramadan Abdunabi and
                  Wuliang Sun and
                  Indrakshi Ray},
  title        = {Enforcing spatio-temporal access control in mobile applications},
  journal      = {Computing},
  volume       = {96},
  number       = {4},
  pages        = {313--353},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00607-013-0340-2},
  doi          = {10.1007/S00607-013-0340-2},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/AbdunabiSR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbpim/AlqahtaniGR14,
  author       = {Sarra M. Alqahtani and
                  Rose F. Gamble and
                  Indrakshi Ray},
  title        = {Enforcing the Chinese wall model for tenant conflict of interest in
                  the service cloud},
  journal      = {Int. J. Bus. Process. Integr. Manag.},
  volume       = {7},
  number       = {2},
  pages        = {166--177},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJBPIM.2014.063520},
  doi          = {10.1504/IJBPIM.2014.063520},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbpim/AlqahtaniGR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/YangXRL14,
  author       = {Ping Yang and
                  Xing Xie and
                  Indrakshi Ray and
                  Shiyong Lu},
  title        = {Satisfiability Analysis of Workflows with Control-Flow Patterns and
                  Authorization Constraints},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {7},
  number       = {2},
  pages        = {237--251},
  year         = {2014},
  url          = {https://doi.org/10.1109/TSC.2013.31},
  doi          = {10.1109/TSC.2013.31},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/YangXRL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MoatazJRCCR14,
  author       = {Tarik Moataz and
                  Benjamin Justus and
                  Indrakshi Ray and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Indrajit Ray},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Privacy-Preserving Multiple Keyword Search on Outsourced Data in the
                  Clouds},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {66--81},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_5},
  doi          = {10.1007/978-3-662-43936-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/MoatazJRCCR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MoatazCCRR14,
  author       = {Tarik Moataz and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Indrajit Ray and
                  Indrakshi Ray},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {{ELITE:} zEro Links Identity managemenT systEm},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {195--210},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_13},
  doi          = {10.1007/978-3-662-43936-4\_13},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/MoatazCCRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/MosharrafJR14,
  author       = {Negar Mosharraf and
                  Anura P. Jayasumana and
                  Indrakshi Ray},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nur Zincir{-}Heywood and
                  Philip W. L. Fong},
  title        = {A Responsive Defense Mechanism Against DDoS Attacks},
  booktitle    = {Foundations and Practice of Security - 7th International Symposium,
                  {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8930},
  pages        = {347--355},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17040-4\_23},
  doi          = {10.1007/978-3-319-17040-4\_23},
  timestamp    = {Fri, 08 Dec 2023 07:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/MosharrafJR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/MurugesanR14,
  author       = {Prabhakaran Murugesan and
                  Indrakshi Ray},
  title        = {Audit Log Management in MongoDB},
  booktitle    = {2014 {IEEE} World Congress on Services, {SERVICES} 2014, Anchorage,
                  AK, USA, June 27 - July 2, 2014},
  pages        = {53--57},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERVICES.2014.19},
  doi          = {10.1109/SERVICES.2014.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/services/MurugesanR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/EarleFR14,
  author       = {Curtis C. R. Busby Earle and
                  Robert B. France and
                  Indrakshi Ray},
  title        = {Analysing Requirements to Detect Latent Security Vulnerabilities},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {168--175},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.35},
  doi          = {10.1109/SERE-C.2014.35},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/EarleFR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/AbdunabiARF13,
  author       = {Ramadan Abdunabi and
                  Mustafa Al{-}Lail and
                  Indrakshi Ray and
                  Robert B. France},
  title        = {Specification, Validation, and Enforcement of a Generalized Spatio-Temporal
                  Role-Based Access Control Model},
  journal      = {{IEEE} Syst. J.},
  volume       = {7},
  number       = {3},
  pages        = {501--515},
  year         = {2013},
  url          = {https://doi.org/10.1109/JSYST.2013.2242751},
  doi          = {10.1109/JSYST.2013.2242751},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/AbdunabiARF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/BelyaevRRL13,
  author       = {Kirill Belyaev and
                  Indrakshi Ray and
                  Indrajit Ray and
                  Gary Luckasen},
  editor       = {Elisa Bertino and
                  Dimitrios Georgakopoulos and
                  Mudhakar Srivatsa and
                  Surya Nepal and
                  Alessandro Vinciarelli},
  title        = {Personal health record storage on privacy preserving green clouds},
  booktitle    = {9th {IEEE} International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, Austin, TX, USA, October 20-23, 2013},
  pages        = {448--457},
  publisher    = {{ICST} / {IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2013.254117},
  doi          = {10.4108/ICST.COLLABORATECOM.2013.254117},
  timestamp    = {Fri, 15 Mar 2024 12:30:44 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/BelyaevRRL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/RayMRH13,
  author       = {Indrajit Ray and
                  Dieudonne Mulamba and
                  Indrakshi Ray and
                  Keesook J. Han},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {A Model for Trust-Based Access Control and Delegation in Mobile Clouds},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {242--257},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_16},
  doi          = {10.1007/978-3-642-39256-6\_16},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/RayMRH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/XieRRGSY13,
  author       = {Xing Xie and
                  Indrakshi Ray and
                  Waruna Ranasinghe and
                  Philips A. Gilbert and
                  Pramod Shashidhara and
                  Anoop Yadav},
  title        = {Distributed Multilevel Secure Data Stream Processing},
  booktitle    = {33rd International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2013 Workshops), Philadelphia, PA, USA, 8-11 July, 2013},
  pages        = {368--373},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICDCSW.2013.64},
  doi          = {10.1109/ICDCSW.2013.64},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/XieRRGSY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/Al-LailAFR13,
  author       = {Mustafa Al{-}Lail and
                  Ramadan Abdunabi and
                  Robert B. France and
                  Indrakshi Ray},
  title        = {Rigorous Analysis of Temporal Access Control Properties in Mobile
                  Systems},
  booktitle    = {2013 18th International Conference on Engineering of Complex Computer
                  Systems, Singapore, July 17-19, 2013},
  pages        = {246--251},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICECCS.2013.43},
  doi          = {10.1109/ICECCS.2013.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/Al-LailAFR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/models/SunFR13a,
  author       = {Wuliang Sun and
                  Robert B. France and
                  Indrakshi Ray},
  editor       = {Alfonso Pierantonio and
                  Bernhard Sch{\"{a}}tz},
  title        = {Analyzing Behavioral Refactoring of Class Models},
  booktitle    = {Proceedings of the Workshop on Models and Evolution co-located with
                  {ACM/IEEE} 16th International Conference on Model Driven Engineering
                  Languages and Systems (MoDELS 2013), Miami, Florida, USA, October
                  1, 2013},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1090},
  pages        = {70--79},
  publisher    = {CEUR-WS.org},
  year         = {2013},
  url          = {https://ceur-ws.org/Vol-1090/8.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:20 +0100},
  biburl       = {https://dblp.org/rec/conf/models/SunFR13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/models/Al-LailAFR13,
  author       = {Mustafa Al{-}Lail and
                  Ramadan Abdunabi and
                  Robert B. France and
                  Indrakshi Ray},
  editor       = {Fr{\'{e}}d{\'{e}}ric Boulanger and
                  Michalis Famelis and
                  Daniel Ratiu},
  title        = {An Approach to Analyzing Temporal Properties in {UML} Class Models},
  booktitle    = {Proceedings of the 10th International Workshop on Model Driven Engineering,
                  Verification and Validation MoDeVVa 2013, co-located with 16th International
                  Conference on Model Driven Engineering Languages and Systems (MoDELS
                  2013), Miami, Florida, USA, October 1st, 2013},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1069},
  pages        = {77--86},
  publisher    = {CEUR-WS.org},
  year         = {2013},
  url          = {https://ceur-ws.org/Vol-1069/11-paper.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:20 +0100},
  biburl       = {https://dblp.org/rec/conf/models/Al-LailAFR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/models/SunFR13,
  author       = {Wuliang Sun and
                  Robert B. France and
                  Indrakshi Ray},
  editor       = {Ana Moreira and
                  Bernhard Sch{\"{a}}tz and
                  Jeff Gray and
                  Antonio Vallecillo and
                  Peter J. Clarke},
  title        = {Contract-Aware Slicing of {UML} Class Models},
  booktitle    = {Model-Driven Engineering Languages and Systems - 16th International
                  Conference, {MODELS} 2013, Miami, FL, USA, September 29 - October
                  4, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8107},
  pages        = {724--739},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41533-3\_44},
  doi          = {10.1007/978-3-642-41533-3\_44},
  timestamp    = {Mon, 21 Jun 2021 12:26:18 +0200},
  biburl       = {https://dblp.org/rec/conf/models/SunFR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/XieRAG13,
  author       = {Xing Xie and
                  Indrakshi Ray and
                  Raman Adaikkalavan and
                  Rose F. Gamble},
  editor       = {Mauro Conti and
                  Jaideep Vaidya and
                  Andreas Schaad},
  title        = {Information flow control for stream processing in clouds},
  booktitle    = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '13, Amsterdam, The Netherlands, June 12-14, 2013},
  pages        = {89--100},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462410.2463205},
  doi          = {10.1145/2462410.2463205},
  timestamp    = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/XieRAG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/AbdunabiRF13,
  author       = {Ramadan Abdunabi and
                  Indrakshi Ray and
                  Robert B. France},
  editor       = {Mauro Conti and
                  Jaideep Vaidya and
                  Andreas Schaad},
  title        = {Specification and analysis of access control policies for mobile applications},
  booktitle    = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '13, Amsterdam, The Netherlands, June 12-14, 2013},
  pages        = {173--184},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462410.2463206},
  doi          = {10.1145/2462410.2463206},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/AbdunabiRF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/AlqahtaniGR13,
  author       = {Sarra M. Alqahtani and
                  Rose F. Gamble and
                  Indrakshi Ray},
  title        = {Auditing Requirements for Implementing the Chinese Wall Model in the
                  Service Cloud},
  booktitle    = {{IEEE} Ninth World Congress on Services, {SERVICES} 2013, Santa Clara,
                  CA, USA, June 28 - July 3, 2013},
  pages        = {298--305},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERVICES.2013.44},
  doi          = {10.1109/SERVICES.2013.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/services/AlqahtaniGR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/XieRA13,
  author       = {Xing Xie and
                  Indrakshi Ray and
                  Raman Adaikkalavan},
  title        = {On the Efficient Processing of Multilevel Secure Continuous Queries},
  booktitle    = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom
                  2013, Washington, DC, USA, 8-14 September, 2013},
  pages        = {417--422},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SocialCom.2013.65},
  doi          = {10.1109/SOCIALCOM.2013.65},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/XieRA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/css/2013,
  editor       = {Guojun Wang and
                  Indrakshi Ray and
                  Dengguo Feng and
                  Muttukrishnan Rajarajan},
  title        = {Cyberspace Safety and Security - 5th International Symposium, {CSS}
                  2013, Zhangjiajie, China, November 13-15, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8300},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03584-0},
  doi          = {10.1007/978-3-319-03584-0},
  isbn         = {978-3-319-03583-3},
  timestamp    = {Fri, 05 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/css/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2013,
  editor       = {Aditya Bagchi and
                  Indrakshi Ray},
  title        = {Information Systems Security - 9th International Conference, {ICISS}
                  2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-45204-8},
  doi          = {10.1007/978-3-642-45204-8},
  isbn         = {978-3-642-45203-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/DewriRRW12,
  author       = {Rinku Dewri and
                  Indrakshi Ray and
                  Indrajit Ray and
                  L. Darrell Whitley},
  title        = {Utility driven optimization of real time data broadcast schedules},
  journal      = {Appl. Soft Comput.},
  volume       = {12},
  number       = {7},
  pages        = {1832--1846},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.asoc.2011.04.006},
  doi          = {10.1016/J.ASOC.2011.04.006},
  timestamp    = {Tue, 11 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/asc/DewriRRW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AdaikkalavanXR12,
  author       = {Raman Adaikkalavan and
                  Xing Xie and
                  Indrakshi Ray},
  title        = {Multilevel secure data stream processing: Architecture and implementation},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {547--581},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0451},
  doi          = {10.3233/JCS-2012-0451},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AdaikkalavanXR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/YuFRS12,
  author       = {Lijun Yu and
                  Robert B. France and
                  Indrakshi Ray and
                  Wuliang Sun},
  editor       = {Isabelle Perseil and
                  Karin K. Breitman and
                  Marc Pouzet},
  title        = {Systematic Scenario-Based Analysis of {UML} Design Class Models},
  booktitle    = {17th {IEEE} International Conference on Engineering of Complex Computer
                  Systems, {ICECCS} 2012, Paris, France, July 18-20, 2012},
  pages        = {86--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICECCS.2012.37},
  doi          = {10.1109/ICECCS.2012.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/YuFRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/RayML12,
  author       = {Indrakshi Ray and
                  Sanjay Kumar Madria and
                  Mark Linderman},
  title        = {Query Plan Execution in a Heterogeneous Stream Management System for
                  Situational Awareness},
  booktitle    = {{IEEE} 31st Symposium on Reliable Distributed Systems, {SRDS} 2012,
                  Irvine, CA, USA, October 8-11, 2012},
  pages        = {424--429},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SRDS.2012.54},
  doi          = {10.1109/SRDS.2012.54},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/RayML12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/ChundiXR11,
  author       = {Parvathi Chundi and
                  Tai Xin and
                  Indrakshi Ray},
  title        = {When does a workflow complete?},
  journal      = {Comput. Stand. Interfaces},
  volume       = {33},
  number       = {3},
  pages        = {292--300},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.csi.2010.07.001},
  doi          = {10.1016/J.CSI.2010.07.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/ChundiXR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ToahchoodeeR11,
  author       = {Manachai Toahchoodee and
                  Indrakshi Ray},
  title        = {On the formalization and analysis of a spatio-temporal role-based
                  access control model},
  journal      = {J. Comput. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {399--452},
  year         = {2011},
  url          = {https://doi.org/10.3233/JCS-2010-0418},
  doi          = {10.3233/JCS-2010-0418},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ToahchoodeeR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DewriRRW11,
  author       = {Rinku Dewri and
                  Indrajit Ray and
                  Indrakshi Ray and
                  L. Darrell Whitley},
  title        = {Exploring privacy versus data quality trade-offs in anonymization
                  techniques using multi-objective optimization},
  journal      = {J. Comput. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {935--974},
  year         = {2011},
  url          = {https://doi.org/10.3233/JCS-2011-0428},
  doi          = {10.3233/JCS-2011-0428},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/DewriRRW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/DewriRRW11,
  author       = {Rinku Dewri and
                  Indrajit Ray and
                  Indrakshi Ray and
                  L. Darrell Whitley},
  title        = {k-Anonymization in the Presence of Publisher Preferences},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {23},
  number       = {11},
  pages        = {1678--1690},
  year         = {2011},
  url          = {https://doi.org/10.1109/TKDE.2011.106},
  doi          = {10.1109/TKDE.2011.106},
  timestamp    = {Tue, 11 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tkde/DewriRRW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AdaikkalavanRX11,
  author       = {Raman Adaikkalavan and
                  Indrakshi Ray and
                  Xing Xie},
  editor       = {Yingjiu Li},
  title        = {Multilevel Secure Data Stream Processing},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {122--137},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_11},
  doi          = {10.1007/978-3-642-22348-8\_11},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/AdaikkalavanRX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hase/SunFR11,
  author       = {Wuliang Sun and
                  Robert B. France and
                  Indrakshi Ray},
  editor       = {Taghi M. Khoshgoftaar},
  title        = {Supporting Iterative Development of Robust Operation Contracts in
                  {UML} Requirements Models},
  booktitle    = {13th {IEEE} International Symposium on High-Assurance Systems Engineering,
                  {HASE} 2011, Boca Raton, FL, USA, November 10-12, 2011},
  pages        = {9--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/HASE.2011.43},
  doi          = {10.1109/HASE.2011.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hase/SunFR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ThorpeRRGBF11,
  author       = {Sean S. E. Thorpe and
                  Indrakshi Ray and
                  Indrajit Ray and
                  Tyrone Grandison and
                  Abbie Barbir and
                  Robert B. France},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {Formal Parameterization of Log Synchronization Events within a Distributed
                  Forensic Compute Cloud Database Environment},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {156--171},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_13},
  doi          = {10.1007/978-3-642-35515-8\_13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ThorpeRRGBF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/SunFR11,
  author       = {Wuliang Sun and
                  Robert B. France and
                  Indrakshi Ray},
  title        = {Rigorous Analysis of {UML} Access Control Policy Models},
  booktitle    = {{POLICY} 2011, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, Pisa, Italy, 6-8 June 2011},
  pages        = {9--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/POLICY.2011.30},
  doi          = {10.1109/POLICY.2011.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/SunFR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijngc/Ray10,
  author       = {Indrakshi Ray},
  title        = {Using Graph Theory to Represent a Spatio-Temporal Role-Based Access
                  Control Model},
  journal      = {Int. J. Next Gener. Comput.},
  volume       = {1},
  number       = {2},
  year         = {2010},
  url          = {http://perpetualinnovation.net/ojs/index.php/ijngc/article/view/44},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijngc/Ray10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijngc/ToahchoodeeRM10,
  author       = {Manachai Toahchoodee and
                  Indrakshi Ray and
                  Ross M. McConnell},
  title        = {Using Graph Theory to Represent a Spatio-Temporal Role-Based Access
                  Control Model},
  journal      = {Int. J. Next Gener. Comput.},
  volume       = {1},
  number       = {2},
  year         = {2010},
  url          = {http://perpetualinnovation.net/ojs/index.php/ijngc/article/view/82},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijngc/ToahchoodeeRM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/AllardABGFNPRRY10,
  author       = {Tristan Allard and
                  Nicolas Anciaux and
                  Luc Bouganim and
                  Yanli Guo and
                  Lionel Le Folgoc and
                  Benjamin Nguyen and
                  Philippe Pucheral and
                  Indrajit Ray and
                  Indrakshi Ray and
                  Shaoyi Yin},
  title        = {Secure Personal Data Servers: a Vision Paper},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {3},
  number       = {1},
  pages        = {25--35},
  year         = {2010},
  url          = {http://www.vldb.org/pvldb/vldb2010/pvldb\_vol3/R02.pdf},
  doi          = {10.14778/1920841.1920850},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/AllardABGFNPRRY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rts/DewriRRW10,
  author       = {Rinku Dewri and
                  Indrakshi Ray and
                  Indrajit Ray and
                  L. Darrell Whitley},
  title        = {Real time stochastic scheduling in broadcast systems with decentralized
                  data storage},
  journal      = {Real Time Syst.},
  volume       = {45},
  number       = {3},
  pages        = {143--175},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11241-010-9102-9},
  doi          = {10.1007/S11241-010-9102-9},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rts/DewriRRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sosym/AnastasakisBGR10,
  author       = {Kyriakos Anastasakis and
                  Behzad Bordbar and
                  Geri Georg and
                  Indrakshi Ray},
  title        = {On challenges of model transformation from {UML} to Alloy},
  journal      = {Softw. Syst. Model.},
  volume       = {9},
  number       = {1},
  pages        = {69--86},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10270-008-0110-3},
  doi          = {10.1007/S10270-008-0110-3},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sosym/AnastasakisBGR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcos/HoumbRRC10,
  author       = {Siv Hilde Houmb and
                  Indrakshi Ray and
                  Indrajit Ray and
                  Sudip Chakraborty},
  title        = {Trust-Based Security Level Evaluation Using Bayesian Belief Networks},
  journal      = {Trans. Comput. Sci.},
  volume       = {10},
  pages        = {154--186},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17499-5\_7},
  doi          = {10.1007/978-3-642-17499-5\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcos/HoumbRRC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/GeorgABHRT10,
  author       = {Geri Georg and
                  Kyriakos Anastasakis and
                  Behzad Bordbar and
                  Siv Hilde Houmb and
                  Indrakshi Ray and
                  Manachai Toahchoodee},
  title        = {Verification and Trade-Off Analysis of Security Properties in {UML}
                  System Models},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {36},
  number       = {3},
  pages        = {338--356},
  year         = {2010},
  url          = {https://doi.org/10.1109/TSE.2010.36},
  doi          = {10.1109/TSE.2010.36},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/GeorgABHRT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/DewriRRW10,
  author       = {Rinku Dewri and
                  Indrajit Ray and
                  Indrakshi Ray and
                  L. Darrell Whitley},
  editor       = {Sara Foresti and
                  Sushil Jajodia},
  title        = {On the Identification of Property Based Generalizations in Microdata
                  Anonymization},
  booktitle    = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP}
                  {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6166},
  pages        = {81--96},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13739-6\_6},
  doi          = {10.1007/978-3-642-13739-6\_6},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/DewriRRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/HoumbCRR10,
  author       = {Siv Hilde Houmb and
                  Sudip Chakraborty and
                  Indrakshi Ray and
                  Indrajit Ray},
  editor       = {Sara Foresti and
                  Sushil Jajodia},
  title        = {Using Trust-Based Information Aggregation for Predicting Security
                  Level of Systems},
  booktitle    = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP}
                  {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6166},
  pages        = {241--256},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13739-6\_16},
  doi          = {10.1007/978-3-642-13739-6\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/HoumbCRR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdm/DewriRRW10,
  author       = {Rinku Dewri and
                  Indrakshi Ray and
                  Indrajit Ray and
                  L. Darrell Whitley},
  editor       = {Takahiro Hara and
                  Christian S. Jensen and
                  Vijay Kumar and
                  Sanjay Madria and
                  Demetrios Zeinalipour{-}Yazti},
  title        = {Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based
                  Services},
  booktitle    = {Eleventh International Conference on Mobile Data Management, {MDM}
                  2010, Kanas City, Missouri, USA, 23-26 May 2010},
  pages        = {95--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MDM.2010.52},
  doi          = {10.1109/MDM.2010.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mdm/DewriRRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/DewriRRW10,
  author       = {Rinku Dewri and
                  Indrakshi Ray and
                  Indrajit Ray and
                  L. Darrell Whitley},
  editor       = {Sushil Jajodia and
                  Jianying Zhou},
  title        = {On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous
                  {LBS}},
  booktitle    = {Security and Privacy in Communication Networks - 6th Iternational
                  {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {50},
  pages        = {71--88},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16161-2\_5},
  doi          = {10.1007/978-3-642-16161-2\_5},
  timestamp    = {Tue, 11 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/DewriRRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ToahchoodeeR09,
  author       = {Manachai Toahchoodee and
                  Indrakshi Ray},
  title        = {Using alloy to analyse a spatio-temporal access control model supporting
                  delegation},
  journal      = {{IET} Inf. Secur.},
  volume       = {3},
  number       = {3},
  pages        = {75--113},
  year         = {2009},
  url          = {https://doi.org/10.1049/iet-ifs.2008.0074},
  doi          = {10.1049/IET-IFS.2008.0074},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ToahchoodeeR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/GeorgRABTH09,
  author       = {Geri Georg and
                  Indrakshi Ray and
                  Kyriakos Anastasakis and
                  Behzad Bordbar and
                  Manachai Toahchoodee and
                  Siv Hilde Houmb},
  title        = {An aspect-oriented methodology for designing secure applications},
  journal      = {Inf. Softw. Technol.},
  volume       = {51},
  number       = {5},
  pages        = {846--864},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.infsof.2008.05.004},
  doi          = {10.1016/J.INFSOF.2008.05.004},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/GeorgRABTH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jiis/RayRC09,
  author       = {Indrakshi Ray and
                  Indrajit Ray and
                  Sudip Chakraborty},
  title        = {An interoperable context sensitive model of trust},
  journal      = {J. Intell. Inf. Syst.},
  volume       = {32},
  number       = {1},
  pages        = {75--104},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10844-007-0049-9},
  doi          = {10.1007/S10844-007-0049-9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jiis/RayRC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/PoolsappasitR09,
  author       = {Nayot Poolsappasit and
                  Indrakshi Ray},
  title        = {Towards Achieving Personalized Privacy for Location-Based Services},
  journal      = {Trans. Data Priv.},
  volume       = {2},
  number       = {1},
  pages        = {77--99},
  year         = {2009},
  url          = {http://www.tdp.cat/issues/abs.a021a09.php},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdp/PoolsappasitR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/DewriRRW09,
  author       = {Rinku Dewri and
                  Indrajit Ray and
                  Indrakshi Ray and
                  L. Darrell Whitley},
  editor       = {David Wai{-}Lok Cheung and
                  Il{-}Yeol Song and
                  Wesley W. Chu and
                  Xiaohua Hu and
                  Jimmy Lin},
  title        = {POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy
                  lattice},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Information and Knowledge
                  Management, {CIKM} 2009, Hong Kong, China, November 2-6, 2009},
  pages        = {1037--1046},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1645953.1646085},
  doi          = {10.1145/1645953.1646085},
  timestamp    = {Fri, 27 Aug 2021 11:13:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cikm/DewriRRW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ToahchoodeeARR09,
  author       = {Manachai Toahchoodee and
                  Ramadan Abdunabi and
                  Indrakshi Ray and
                  Indrajit Ray},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {A Trust-Based Access Control Model for Pervasive Computing Applications},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {307--314},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_22},
  doi          = {10.1007/978-3-642-03007-9\_22},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ToahchoodeeARR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edbt/DewriRRW09,
  author       = {Rinku Dewri and
                  Indrajit Ray and
                  Indrakshi Ray and
                  L. Darrell Whitley},
  editor       = {Martin L. Kersten and
                  Boris Novikov and
                  Jens Teubner and
                  Vladimir Polutin and
                  Stefan Manegold},
  title        = {On the comparison of microdata disclosure control algorithms},
  booktitle    = {{EDBT} 2009, 12th International Conference on Extending Database Technology,
                  Saint Petersburg, Russia, March 24-26, 2009, Proceedings},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {360},
  pages        = {240--251},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1516360.1516389},
  doi          = {10.1145/1516360.1516389},
  timestamp    = {Wed, 04 May 2022 13:02:27 +0200},
  biburl       = {https://dblp.org/rec/conf/edbt/DewriRRW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/DewriWRR09,
  author       = {Rinku Dewri and
                  L. Darrell Whitley and
                  Indrajit Ray and
                  Indrakshi Ray},
  editor       = {Franz Rothlauf},
  title        = {A multi-objective approach to data sharing with privacy constraints
                  and preference based objectives},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2009, Proceedings,
                  Montreal, Qu{\'{e}}bec, Canada, July 8-12, 2009},
  pages        = {1499--1506},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1569901.1570102},
  doi          = {10.1145/1569901.1570102},
  timestamp    = {Tue, 11 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/DewriWRR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/YuFRG09,
  author       = {Lijun Yu and
                  Robert B. France and
                  Indrakshi Ray and
                  Sudipto Ghosh},
  title        = {A Rigorous Approach to Uncovering Security Policy Violations in {UML}
                  Designs},
  booktitle    = {14th {IEEE} International Conference on Engineering of Complex Computer
                  Systems, {ICECCS} 2009, Potsdam, Germany, 2-4 June 2009},
  pages        = {126--135},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICECCS.2009.16},
  doi          = {10.1109/ICECCS.2009.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/YuFRG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ToahchoodeeXR09,
  author       = {Manachai Toahchoodee and
                  Xing Xie and
                  Indrakshi Ray},
  editor       = {Pierangela Samarati and
                  Moti Yung and
                  Fabio Martinelli and
                  Claudio A. Ardagna},
  title        = {Towards Trustworthy Delegation in Role-Based Access Control Model},
  booktitle    = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
                  Italy, September 7-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5735},
  pages        = {379--394},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04474-8\_30},
  doi          = {10.1007/978-3-642-04474-8\_30},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/ToahchoodeeXR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ToahchoodeeRAGB09,
  author       = {Manachai Toahchoodee and
                  Indrakshi Ray and
                  Kyriakos Anastasakis and
                  Geri Georg and
                  Behzad Bordbar},
  editor       = {Barbara Carminati and
                  James Joshi},
  title        = {Ensuring spatio-temporal access control for real-world applications},
  booktitle    = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2009, Stresa, Italy, June 3-5, 2009, Proceedings},
  pages        = {13--22},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1542207.1542212},
  doi          = {10.1145/1542207.1542212},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/ToahchoodeeRAGB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/db/Ray09,
  author       = {Indrakshi Ray},
  editor       = {Ling Liu and
                  M. Tamer {\"{O}}zsu},
  title        = {Secure Transaction Processing},
  booktitle    = {Encyclopedia of Database Systems},
  pages        = {2540--2546},
  publisher    = {Springer {US}},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-39940-9\_331},
  doi          = {10.1007/978-0-387-39940-9\_331},
  timestamp    = {Sun, 02 Jun 2019 21:10:27 +0200},
  biburl       = {https://dblp.org/rec/reference/db/Ray09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Ray08,
  author       = {Indrakshi Ray},
  title        = {Editorial},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {1:1},
  year         = {2008},
  url          = {https://doi.org/10.1145/1330295.1330296},
  doi          = {10.1145/1330295.1330296},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Ray08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adbis/RayH08,
  author       = {Indrakshi Ray and
                  Wei Huang},
  editor       = {Paolo Atzeni and
                  Albertas Caplinskas and
                  Hannu Jaakkola},
  title        = {Increasing Expressiveness of Composite Events Using Parameter Contexts},
  booktitle    = {Advances in Databases and Information Systems, 12th East European
                  Conference, {ADBIS} 2008, Pori, Finland, September 5-9, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5207},
  pages        = {215--230},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85713-6\_16},
  doi          = {10.1007/978-3-540-85713-6\_16},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/adbis/RayH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ToahchoodeeR08,
  author       = {Manachai Toahchoodee and
                  Indrakshi Ray},
  editor       = {Vijay Atluri},
  title        = {On the Formal Analysis of a Spatio-temporal Role-Based Access Control
                  Model},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_2},
  doi          = {10.1007/978-3-540-70567-3\_2},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ToahchoodeeR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edbt/DewriRRW08,
  author       = {Rinku Dewri and
                  Indrakshi Ray and
                  Indrajit Ray and
                  L. Darrell Whitley},
  editor       = {Alfons Kemper and
                  Patrick Valduriez and
                  Noureddine Mouaddib and
                  Jens Teubner and
                  Mokrane Bouzeghoub and
                  Volker Markl and
                  Laurent Amsaleg and
                  Ioana Manolescu},
  title        = {Optimizing on-demand data broadcast scheduling in pervasive environments},
  booktitle    = {{EDBT} 2008, 11th International Conference on Extending Database Technology,
                  Nantes, France, March 25-29, 2008, Proceedings},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {261},
  pages        = {559--569},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1353343.1353411},
  doi          = {10.1145/1353343.1353411},
  timestamp    = {Tue, 11 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edbt/DewriRRW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DewriRRW08,
  author       = {Rinku Dewri and
                  Indrakshi Ray and
                  Indrajit Ray and
                  L. Darrell Whitley},
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {Security Provisioning in Pervasive Environments Using Multi-objective
                  Optimization},
  booktitle    = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  pages        = {349--363},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5\_23},
  doi          = {10.1007/978-3-540-88313-5\_23},
  timestamp    = {Tue, 11 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/DewriRRW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/DewriWRR08,
  author       = {Rinku Dewri and
                  L. Darrell Whitley and
                  Indrakshi Ray and
                  Indrajit Ray},
  editor       = {Conor Ryan and
                  Maarten Keijzer},
  title        = {Evolution strategy based optimization of on-demand dependent data
                  broadcast scheduling},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2008, Proceedings,
                  Atlanta, GA, USA, July 12-16, 2008},
  pages        = {1699--1700},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1389095.1389416},
  doi          = {10.1145/1389095.1389416},
  timestamp    = {Tue, 11 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/DewriWRR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gis/PoolsappasitR08,
  author       = {Nayot Poolsappasit and
                  Indrakshi Ray},
  editor       = {Elisa Bertino and
                  Maria Luisa Damiani},
  title        = {Towards a scalable model for location privacy},
  booktitle    = {Proceedings of the {SIGSPATIAL} {ACM} {GIS} 2008 International Workshop
                  on Security and Privacy in {GIS} and LBS, {SPRINGL} 2008, November
                  4, 2008, Irvine, California, USA, Proceedings},
  pages        = {46--51},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1503402.1503412},
  doi          = {10.1145/1503402.1503412},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gis/PoolsappasitR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/DewriRRW08,
  author       = {Rinku Dewri and
                  Indrajit Ray and
                  Indrakshi Ray and
                  L. Darrell Whitley},
  editor       = {Gustavo Alonso and
                  Jos{\'{e}} A. Blakeley and
                  Arbee L. P. Chen},
  title        = {On the Optimal Selection of k in the k-Anonymity Problem},
  booktitle    = {Proceedings of the 24th International Conference on Data Engineering,
                  {ICDE} 2008, April 7-12, 2008, Canc{\'{u}}n, Mexico},
  pages        = {1364--1366},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICDE.2008.4497557},
  doi          = {10.1109/ICDE.2008.4497557},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/DewriRRW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/models/YuFR08,
  author       = {Lijun Yu and
                  Robert B. France and
                  Indrakshi Ray},
  editor       = {Krzysztof Czarnecki and
                  Ileana Ober and
                  Jean{-}Michel Bruel and
                  Axel Uhl and
                  Markus V{\"{o}}lter},
  title        = {Scenario-Based Static Analysis of {UML} Class Models},
  booktitle    = {Model Driven Engineering Languages and Systems, 11th International
                  Conference, MoDELS 2008, Toulouse, France, September 28 - October
                  3, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5301},
  pages        = {234--248},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87875-9\_17},
  doi          = {10.1007/978-3-540-87875-9\_17},
  timestamp    = {Fri, 30 Dec 2022 23:08:54 +0100},
  biburl       = {https://dblp.org/rec/conf/models/YuFR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppsn/DewriWRR08,
  author       = {Rinku Dewri and
                  L. Darrell Whitley and
                  Indrajit Ray and
                  Indrakshi Ray},
  editor       = {G{\"{u}}nter Rudolph and
                  Thomas Jansen and
                  Simon M. Lucas and
                  Carlo Poloni and
                  Nicola Beume},
  title        = {Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments
                  Using Evolution Strategy},
  booktitle    = {Parallel Problem Solving from Nature - {PPSN} X, 10th International
                  Conference Dortmund, Germany, September 13-17, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5199},
  pages        = {991--1000},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87700-4\_98},
  doi          = {10.1007/978-3-540-87700-4\_98},
  timestamp    = {Tue, 11 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ppsn/DewriWRR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/RayT08,
  author       = {Indrakshi Ray and
                  Manachai Toahchoodee},
  editor       = {Steven Furnell and
                  Sokratis K. Katsikas and
                  Antonio Lioy},
  title        = {A Spatio-temporal Access Control Model Supporting Delegation for Pervasive
                  Computing Applications},
  booktitle    = {Trust, Privacy and Security in Digital Business, 5th International
                  Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5185},
  pages        = {48--58},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85735-8\_6},
  doi          = {10.1007/978-3-540-85735-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/RayT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2008,
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836},
  doi          = {10.1145/1377836},
  isbn         = {978-1-60558-129-3},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/SongYR07,
  author       = {Eunjee Song and
                  Shuxin Yin and
                  Indrakshi Ray},
  title        = {Using {UML} to model relational database operations},
  journal      = {Comput. Stand. Interfaces},
  volume       = {29},
  number       = {3},
  pages        = {343--354},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.csi.2006.05.006},
  doi          = {10.1016/J.CSI.2006.05.006},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/SongYR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/is/XinR07,
  author       = {Tai Xin and
                  Indrakshi Ray},
  title        = {A lattice-based approach for updating access control policies in real-time},
  journal      = {Inf. Syst.},
  volume       = {32},
  number       = {5},
  pages        = {755--772},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.is.2006.06.002},
  doi          = {10.1016/J.IS.2006.06.002},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/is/XinR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/RayT07,
  author       = {Indrakshi Ray and
                  Manachai Toahchoodee},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {A Spatio-temporal Role-Based Access Control Model},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {211--226},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_16},
  doi          = {10.1007/978-3-540-73538-0\_16},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/RayT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hase/KimMR07,
  author       = {Jinyoo Kim and
                  Yashwant K. Malaiya and
                  Indrakshi Ray},
  title        = {Vulnerability Discovery in Multi-Version Software Systems},
  booktitle    = {Tenth {IEEE} International Symposium on High Assurance Systems Engineering
                  {(HASE} 2007), November 14-16, 2007, Dallas, Texas, {USA}},
  pages        = {141--148},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/HASE.2007.55},
  doi          = {10.1109/HASE.2007.55},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hase/KimMR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/YuFRL07,
  author       = {Lijun Yu and
                  Robert B. France and
                  Indrakshi Ray and
                  Kevin Lano},
  title        = {A light-weight static approach to analyzing {UML} behavioral properties},
  booktitle    = {12th International Conference on Engineering of Complex Computer Systems
                  {(ICECCS} 2007), 10-14 July 2007, Auckland, New Zealand},
  pages        = {56--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICECCS.2007.10},
  doi          = {10.1109/ICECCS.2007.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/YuFRL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/RayG07,
  author       = {Indrakshi Ray and
                  C. J. Michael Geisterfer},
  editor       = {Jorge Cardoso and
                  Jos{\'{e}} Cordeiro and
                  Joaquim Filipe},
  title        = {A method for early correspondence discovery using instance data},
  booktitle    = {{ICEIS} 2007 - Proceedings of the Ninth International Conference on
                  Enterprise Information Systems, Volume DISI, Funchal, Madeira, Portugal,
                  June 12-16, 2007},
  pages        = {258--263},
  year         = {2007},
  timestamp    = {Thu, 03 Feb 2022 09:27:49 +0100},
  biburl       = {https://dblp.org/rec/conf/iceis/RayG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/models/AnastasakisBGR07,
  author       = {Kyriakos Anastasakis and
                  Behzad Bordbar and
                  Geri Georg and
                  Indrakshi Ray},
  editor       = {Gregor Engels and
                  Bill Opdyke and
                  Douglas C. Schmidt and
                  Frank Weil},
  title        = {UML2Alloy: {A} Challenging Model Transformation},
  booktitle    = {Model Driven Engineering Languages and Systems, 10th International
                  Conference, MoDELS 2007, Nashville, USA, September 30 - October 5,
                  2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4735},
  pages        = {436--450},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75209-7\_30},
  doi          = {10.1007/978-3-540-75209-7\_30},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/models/AnastasakisBGR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RayK06,
  author       = {Indrakshi Ray and
                  Mahendra Kumar},
  title        = {Towards a location-based mandatory access control model},
  journal      = {Comput. Secur.},
  volume       = {25},
  number       = {1},
  pages        = {36--44},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.cose.2005.06.007},
  doi          = {10.1016/J.COSE.2005.06.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RayK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dpd/RayX06,
  author       = {Indrakshi Ray and
                  Tai Xin},
  title        = {Analysis of dependencies in advanced transaction models},
  journal      = {Distributed Parallel Databases},
  volume       = {20},
  number       = {1},
  pages        = {5--27},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10619-006-8593-9},
  doi          = {10.1007/S10619-006-8593-9},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dpd/RayX06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SquicciariniBFR06,
  author       = {Anna Cinzia Squicciarini and
                  Elisa Bertino and
                  Elena Ferrari and
                  Indrakshi Ray},
  title        = {Achieving Privacy in Trust Negotiations with an Ontology-Based Approach},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {1},
  pages        = {13--30},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.3},
  doi          = {10.1109/TDSC.2006.3},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SquicciariniBFR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/YinRR06,
  author       = {Shuxin Yin and
                  Indrakshi Ray and
                  Indrajit Ray},
  editor       = {Enrico Blanzieri and
                  Tao Zhang},
  title        = {A Trust Model for Pervasive Computing Environments},
  booktitle    = {2nd International {ICST} Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2006, Atlanta, GA, USA,
                  November 17-20, 2006},
  publisher    = {{IEEE} Computer Society / {ICST}},
  year         = {2006},
  url          = {https://doi.org/10.1109/COLCOM.2006.361880},
  doi          = {10.1109/COLCOM.2006.361880},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/YinRR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/GeorgHR06,
  author       = {Geri Georg and
                  Siv Hilde Houmb and
                  Indrakshi Ray},
  editor       = {Ernesto Damiani and
                  Peng Liu},
  title        = {Aspect-Oriented Risk Driven Development of Secure Applications},
  booktitle    = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Sophia Antipolis, France,
                  July 31-August 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4127},
  pages        = {282--296},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11805588\_20},
  doi          = {10.1007/11805588\_20},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/GeorgHR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/XinRCC06,
  author       = {Tai Xin and
                  Indrakshi Ray and
                  Parvathi Chundi and
                  Sopak Chaichana},
  editor       = {St{\'{e}}phane Bressan and
                  Josef K{\"{u}}ng and
                  Roland R. Wagner},
  title        = {On the Completion of Workflows},
  booktitle    = {Database and Expert Systems Applications, 17th International Conference,
                  {DEXA} 2006, Krak{\'{o}}w, Poland, September 4-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4080},
  pages        = {582--591},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11827405\_57},
  doi          = {10.1007/11827405\_57},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/XinRCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/LunacekWR06,
  author       = {Monte Lunacek and
                  L. Darrell Whitley and
                  Indrakshi Ray},
  editor       = {Mike Cattolico},
  title        = {A crossover operator for the \emph{k-} anonymity problem},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2006, Proceedings,
                  Seattle, Washington, USA, July 8-12, 2006},
  pages        = {1713--1720},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1143997.1144277},
  doi          = {10.1145/1143997.1144277},
  timestamp    = {Tue, 11 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/LunacekWR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iat/SquicciariniBBFR06,
  author       = {Anna Cinzia Squicciarini and
                  Abhilasha Bhargav{-}Spantzel and
                  Elisa Bertino and
                  Elena Ferrari and
                  Indrakshi Ray},
  title        = {Trust Negotiations with Customizable Anonymity},
  booktitle    = {Proceedings of the 2006 {IEEE/WIC/ACM} International Conference on
                  Intelligent Agent Technology - Workshops, Hong Kong, China, 18-22
                  December 2006},
  pages        = {69--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/WI-IATW.2006.138},
  doi          = {10.1109/WI-IATW.2006.138},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iat/SquicciariniBBFR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RayKY06,
  author       = {Indrakshi Ray and
                  Mahendra Kumar and
                  Lijun Yu},
  editor       = {Aditya Bagchi and
                  Vijayalakshmi Atluri},
  title        = {{LRBAC:} {A} Location-Aware Role-Based Access Control Model},
  booktitle    = {Information Systems Security, Second International Conference, {ICISS}
                  2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {147--161},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11961635\_10},
  doi          = {10.1007/11961635\_10},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/RayKY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itrust/HoumbRR06,
  author       = {Siv Hilde Houmb and
                  Indrakshi Ray and
                  Indrajit Ray},
  editor       = {Ketil St{\o}len and
                  William H. Winsborough and
                  Fabio Martinelli and
                  Fabio Massacci},
  title        = {Estimating the Relative Trustworthiness of Information Sources in
                  Security Solution Evaluation},
  booktitle    = {Trust Management, 4th International Conference, iTrust 2006, Pisa,
                  Italy, May 16-19, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3986},
  pages        = {135--149},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11755593\_11},
  doi          = {10.1007/11755593\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/itrust/HoumbRR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2006,
  editor       = {David F. Ferraiolo and
                  Indrakshi Ray},
  title        = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1133058},
  doi          = {10.1145/1133058},
  isbn         = {1-59593-353-0},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/RayRN05,
  author       = {Indrajit Ray and
                  Indrakshi Ray and
                  Natarajan Narasimhamurthi},
  title        = {An anonymous and failure resilient fair-exchange e-commerce protocol},
  journal      = {Decis. Support Syst.},
  volume       = {39},
  number       = {3},
  pages        = {267--292},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.dss.2003.10.011},
  doi          = {10.1016/J.DSS.2003.10.011},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/RayRN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/Ray05,
  author       = {Indrakshi Ray},
  title        = {Applying Semantic Knowledge to Real-Time Update of Access Control
                  Policies},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {17},
  number       = {6},
  pages        = {844--858},
  year         = {2005},
  url          = {https://doi.org/10.1109/TKDE.2005.88},
  doi          = {10.1109/TKDE.2005.88},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/Ray05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/YinR05,
  author       = {Shuxin Yin and
                  Indrakshi Ray},
  title        = {Relational Database Operations Modeling with {UML}},
  booktitle    = {19th International Conference on Advanced Information Networking and
                  Applications {(AINA} 2005), 28-30 March 2005, Taipei, Taiwan},
  pages        = {927--932},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/AINA.2005.294},
  doi          = {10.1109/AINA.2005.294},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/YinR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/XinZR05,
  author       = {Tai Xin and
                  Yajie Zhu and
                  Indrakshi Ray},
  editor       = {Sushil Jajodia and
                  Duminda Wijesekera},
  title        = {Reliable Scheduling of Advanced Transactions},
  booktitle    = {Data and Applications Security XIX, 19th Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Storrs, CT, USA, August
                  7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3654},
  pages        = {124--138},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535706\_10},
  doi          = {10.1007/11535706\_10},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/XinZR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/ZhuXR05,
  author       = {Yajie Zhu and
                  Tai Xin and
                  Indrakshi Ray},
  editor       = {Kim Viborg Andersen and
                  John K. Debenham and
                  Roland R. Wagner},
  title        = {Recovering from Malicious Attacks in Workflow Systems},
  booktitle    = {Database and Expert Systems Applications, 16th International Conference,
                  {DEXA} 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3588},
  pages        = {14--23},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11546924\_2},
  doi          = {10.1007/11546924\_2},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/ZhuXR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcit/ToahchoodeeR05,
  author       = {Manachai Toahchoodee and
                  Indrakshi Ray},
  editor       = {Goutam Chakraborty},
  title        = {Validation of Policy Integration Using Alloy},
  booktitle    = {Distributed Computing and Internet Technology, Second International
                  Conference, {ICDCIT} 2005, Bhubaneswar, India, December 22-24, 2005,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3816},
  pages        = {420--431},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604655\_48},
  doi          = {10.1007/11604655\_48},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcit/ToahchoodeeR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RayCR05,
  author       = {Indrajit Ray and
                  Sudip Chakraborty and
                  Indrakshi Ray},
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {VTrust: {A} Trust Management System Based on a Vector Model of Trust},
  booktitle    = {Information Systems Security, First International Conference, {ICISS}
                  2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {91--105},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593980\_7},
  doi          = {10.1007/11593980\_7},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/RayCR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RayH05,
  author       = {Indrakshi Ray and
                  Wei Huang},
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Event Detection in Multilevel Secure Active Databases},
  booktitle    = {Information Systems Security, First International Conference, {ICISS}
                  2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {177--190},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593980\_13},
  doi          = {10.1007/11593980\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/RayH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ideas/XinR05,
  author       = {Tai Xin and
                  Indrakshi Ray},
  editor       = {Bipin C. Desai and
                  Gottfried Vossen},
  title        = {Detection for Conflicts of Dependencies in Advanced Transaction Models},
  booktitle    = {Ninth International Database Engineering and Applications Symposium
                  {(IDEAS} 2005), 25-27 July 2005, Montreal, Canada},
  pages        = {17--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IDEAS.2005.20},
  doi          = {10.1109/IDEAS.2005.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ideas/XinR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/RayBSF05,
  author       = {Indrakshi Ray and
                  Elisa Bertino and
                  Anna Cinzia Squicciarini and
                  Elena Ferrari},
  editor       = {George Danezis and
                  David M. Martin Jr.},
  title        = {Anonymity Preserving Techniques in Trust Negotiations},
  booktitle    = {Privacy Enhancing Technologies, 5th International Workshop, {PET}
                  2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3856},
  pages        = {93--109},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11767831\_7},
  doi          = {10.1007/11767831\_7},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/RayBSF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/SongRFRGA05,
  author       = {Eunjee Song and
                  Raghu Reddy and
                  Robert B. France and
                  Indrakshi Ray and
                  Geri Georg and
                  Roger T. Alexander},
  editor       = {Elena Ferrari and
                  Gail{-}Joon Ahn},
  title        = {Verifiable composition of access control and application features},
  booktitle    = {10th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2005, Stockholm, Sweden, June 1-3, 2005, Proceedings},
  pages        = {120--129},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1063979.1064001},
  doi          = {10.1145/1063979.1064001},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/SongRFRGA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/RayY05,
  author       = {Indrakshi Ray and
                  Lijun Yu},
  title        = {Short Paper: Towards a Location-Aware Role-Based Access Control Model},
  booktitle    = {First International Conference on Security and Privacy for Emerging
                  Areas in Communications Networks, SecureComm 2005, Athens, Greece,
                  5-9 September, 2005},
  pages        = {234--236},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/SECURECOMM.2005.50},
  doi          = {10.1109/SECURECOMM.2005.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/RayY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/Ray04,
  author       = {Indrakshi Ray},
  title        = {Real-time update of access control policies},
  journal      = {Data Knowl. Eng.},
  volume       = {49},
  number       = {3},
  pages        = {287--309},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.datak.2003.09.003},
  doi          = {10.1016/J.DATAK.2003.09.003},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/Ray04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iee/FranceRGG04,
  author       = {Robert B. France and
                  Indrakshi Ray and
                  Geri Georg and
                  Sudipto Ghosh},
  title        = {Aspect-oriented approach to early design modelling},
  journal      = {{IEE} Proc. Softw.},
  volume       = {151},
  number       = {4},
  pages        = {173--186},
  year         = {2004},
  url          = {https://doi.org/10.1049/ip-sen:20040920},
  doi          = {10.1049/IP-SEN:20040920},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iee/FranceRGG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/RayFLG04,
  author       = {Indrakshi Ray and
                  Robert B. France and
                  Na Li and
                  Geri Georg},
  title        = {An aspect-based approach to modeling access control concerns},
  journal      = {Inf. Softw. Technol.},
  volume       = {46},
  number       = {9},
  pages        = {575--587},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.infsof.2003.10.007},
  doi          = {10.1016/J.INFSOF.2003.10.007},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/infsof/RayFLG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jodl/AtluriR04,
  author       = {Vijayalakshmi Atluri and
                  Indrakshi Ray},
  title        = {Editors' message for the special issue on security},
  journal      = {Int. J. Digit. Libr.},
  volume       = {4},
  number       = {3},
  pages        = {137--138},
  year         = {2004},
  url          = {https://doi.org/10.1007/s00799-004-0087-7},
  doi          = {10.1007/S00799-004-0087-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jodl/AtluriR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/PrabhuKRY04,
  author       = {Nitin Prabhu and
                  Vijay Kumar and
                  Indrakshi Ray and
                  Gi{-}Chul Yang},
  title        = {Concurrency Control in Mobile Database Systems},
  booktitle    = {18th International Conference on Advanced Information Networking and
                  Applications {(AINA} 2004), 29-31 March 2004, Fukuoka, Japan},
  pages        = {83--86},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/AINA.2004.1283761},
  doi          = {10.1109/AINA.2004.1283761},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/PrabhuKRY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bncod/RayMLK04,
  author       = {Indrakshi Ray and
                  Ross M. McConnell and
                  Monte Lunacek and
                  Vijay Kumar},
  editor       = {M. Howard Williams and
                  Lachlan M. MacKinnon},
  title        = {Reducing Damage Assessment Latency in Survivable Databases},
  booktitle    = {Key Technologies for Data Management, 21st British National Conference
                  on Databases, {BNCOD} 21, Edinburgh, UK, July 7-9, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3112},
  pages        = {106--111},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27811-5\_10},
  doi          = {10.1007/978-3-540-27811-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/bncod/RayMLK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/RayX04,
  author       = {Indrakshi Ray and
                  Tai Xin},
  editor       = {Csilla Farkas and
                  Pierangela Samarati},
  title        = {Implementing Real-Time Update of Access Control Policies},
  booktitle    = {Research Directions in Data and Applications Security XVIII, {IFIP}
                  {TC11/WG} 11.3 Eighteenth Annual Conference on Data and Applications
                  Security, July 25-28, 2004, Sitges, Catalonia, Spain},
  series       = {{IFIP}},
  volume       = {144},
  pages        = {65--80},
  publisher    = {Kluwer/Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8128-6\_5},
  doi          = {10.1007/1-4020-8128-6\_5},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/RayX04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/RayXZ04,
  author       = {Indrakshi Ray and
                  Tai Xin and
                  Yajie Zhu},
  editor       = {Fernando Galindo and
                  Makoto Takizawa and
                  Roland Traunm{\"{u}}ller},
  title        = {Ensuring Task Dependencies During Workflow Recovery},
  booktitle    = {Database and Expert Systems Applications, 15th International Conference,
                  {DEXA} 2004 Zaragoza, Spain, August 30-September 3, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3180},
  pages        = {24--33},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30075-5\_3},
  doi          = {10.1007/978-3-540-30075-5\_3},
  timestamp    = {Sat, 30 Sep 2023 09:38:52 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/RayXZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fase/KimRFL04,
  author       = {Dae{-}Kyoo Kim and
                  Indrakshi Ray and
                  Robert B. France and
                  Na Li},
  editor       = {Michel Wermelinger and
                  Tiziana Margaria},
  title        = {Modeling Role-Based Access Control Using Parameterized {UML} Models},
  booktitle    = {Fundamental Approaches to Software Engineering, 7th International
                  Conference, {FASE} 2004, Held as Part of the Joint European Conferences
                  on Theory and Practice of Software, {ETAPS} 2004 Barcelona, Spain,
                  March 29 - april 2, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2984},
  pages        = {180--193},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24721-0\_13},
  doi          = {10.1007/978-3-540-24721-0\_13},
  timestamp    = {Sun, 02 Jun 2019 21:17:06 +0200},
  biburl       = {https://dblp.org/rec/conf/fase/KimRFL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcit/RayM04,
  author       = {Indrakshi Ray and
                  Marianna Muller},
  editor       = {R. K. Ghosh and
                  Hrushikesha Mohanty},
  title        = {Using Schemas to Simplify Access Control for {XML} Documents},
  booktitle    = {Distributed Computing and Internet Technology, First International
                  Conference, {ICDCIT} 2004, Bhubaneswar, India, December 22-24, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3347},
  pages        = {363--368},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30555-2\_42},
  doi          = {10.1007/978-3-540-30555-2\_42},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcit/RayM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ista/PrabhuKR04,
  author       = {Nitin Prabhu and
                  Vijay Kumar and
                  Indrakshi Ray},
  editor       = {Anatoly E. Doroshenko and
                  Terry A. Halpin and
                  Stephen W. Liddle and
                  Heinrich C. Mayr},
  title        = {Periodic Scheduling in On-Demand Broadcast System},
  booktitle    = {Information Systems Technology and its Applications, 3rd International
                  Conference ISTA'2004, June 15-17, 2004, Salt Lake City, Utah, USA,
                  Proceedings},
  series       = {{LNI}},
  volume       = {{P-48}},
  pages        = {107--121},
  publisher    = {{GI}},
  year         = {2004},
  url          = {https://dl.gi.de/handle/20.500.12116/29110},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ista/PrabhuKR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/RayLFK04,
  author       = {Indrakshi Ray and
                  Na Li and
                  Robert B. France and
                  Dae{-}Kyoo Kim},
  editor       = {Trent Jaeger and
                  Elena Ferrari},
  title        = {Using uml to visualize role-based access control constraints},
  booktitle    = {9th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings},
  pages        = {115--124},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/990036.990054},
  doi          = {10.1145/990036.990054},
  timestamp    = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/RayLFK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2003,
  editor       = {Sabrina De Capitani di Vimercati and
                  Indrakshi Ray and
                  Indrajit Ray},
  title        = {Data and Applications Security {XVII:} Status and Prospects, {IFIP}
                  {TC-11} {WG} 11.3 Seventeenth Annual Working Conference on Data and
                  Application Security, August4-6, 2003, Estes Park, Colorado, {USA}},
  series       = {{IFIP}},
  volume       = {142},
  publisher    = {Kluwer/Springer},
  year         = {2004},
  isbn         = {1-4020-8069-7},
  timestamp    = {Wed, 29 Mar 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bncod/Ray03,
  author       = {Indrakshi Ray},
  editor       = {Anne E. James and
                  Brian Lings and
                  Muhammad Younas},
  title        = {Multilevel Secure Rules and Its Impact on the Design of Active Database
                  Systems},
  booktitle    = {New Horizons in Information Management, 20th British National Conference
                  on Databases, {BNCOD} 20, Coventry, UK, July 15-17, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2712},
  pages        = {226--244},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45073-4\_18},
  doi          = {10.1007/3-540-45073-4\_18},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/bncod/Ray03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/RayX03,
  author       = {Indrakshi Ray and
                  Tai Xin},
  editor       = {Vladim{\'{\i}}r Mar{\'{\i}}k and
                  Werner Retschitzegger and
                  Olga Step{\'{a}}nkov{\'{a}}},
  title        = {Concurrent and Real-Time Update of Access Control Policies},
  booktitle    = {Database and Expert Systems Applications, 14th International Conference,
                  {DEXA} 2003, Prague, Czech Republic, September 1-5, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2736},
  pages        = {330--339},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45227-0\_33},
  doi          = {10.1007/978-3-540-45227-0\_33},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/RayX03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tc11-5/RayLKF03,
  author       = {Indrakshi Ray and
                  Na Li and
                  Dae{-}Kyoo Kim and
                  Robert B. France},
  editor       = {Sushil Jajodia and
                  Leon Strous},
  title        = {Using Parameterized {UML} to Specify and Compose Access Control Models},
  booktitle    = {Integrity and Internal Control in Information Systems {VI} - {IFIP}
                  {TC11/WG11.5} Sixth Working Conference on Integrity and Internal Control
                  in Information Systems {(IICIS)} 13-14 November 2003, Lausanne, Switzerland},
  series       = {{IFIP}},
  volume       = {140},
  pages        = {49--65},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/1-4020-7901-X\_4},
  doi          = {10.1007/1-4020-7901-X\_4},
  timestamp    = {Tue, 23 May 2017 01:07:20 +0200},
  biburl       = {https://dblp.org/rec/conf/tc11-5/RayLKF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigecom/RayR02,
  author       = {Indrajit Ray and
                  Indrakshi Ray},
  title        = {Fair exchange in E-commerce},
  journal      = {SIGecom Exch.},
  volume       = {3},
  number       = {2},
  pages        = {9--17},
  year         = {2002},
  url          = {https://doi.org/10.1145/844340.844345},
  doi          = {10.1145/844340.844345},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigecom/RayR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/RayR02,
  author       = {Indrajit Ray and
                  Indrakshi Ray},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Anonymous and Secure Multicast Subscription},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {313--327},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 07:52:21 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/RayR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/GeorgRF02,
  author       = {Geri Georg and
                  Indrakshi Ray and
                  Robert B. France},
  title        = {Using Aspects to Design a Secure System},
  booktitle    = {8th International Conference on Engineering of Complex Computer Systems
                  {(ICECCS} 2002), 2-4 December 2002, Greenbelt, MD, {USA}},
  pages        = {117},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/ICECCS.2002.1181504},
  doi          = {10.1109/ICECCS.2002.1181504},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/GeorgRF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/RayR02,
  author       = {Indrakshi Ray and
                  Indrajit Ray},
  title        = {Using Compatible Keys for Secure Multicasting in E-Commerce},
  booktitle    = {16th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2002), 15-19 April 2002, Fort Lauderdale, FL, USA, CD-ROM/Abstracts
                  Proceedings},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/IPDPS.2002.1016642},
  doi          = {10.1109/IPDPS.2002.1016642},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/RayR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/RayRN02,
  author       = {Indrakshi Ray and
                  Indrajit Ray and
                  Natu Narasimhamurthi},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {A cryptographic solution to implement access control in a hierarchy
                  and more},
  booktitle    = {7th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2002, Naval Postgraduate School, Monterey, California, USA, June 3-4,
                  2002},
  pages        = {65--73},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/507711.507723},
  doi          = {10.1145/507711.507723},
  timestamp    = {Tue, 09 Feb 2021 08:50:30 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/RayRN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tc11-5/GeorgFR02,
  author       = {Geri Georg and
                  Robert B. France and
                  Indrakshi Ray},
  editor       = {Michael Gertz},
  title        = {Designing High Integrity Systems Using Aspects},
  booktitle    = {Integrity and Internal Control in Information Systems V, {IFIP} {TC11/WG11.5}
                  Fifth Working Conference on Integrity and Internal Control in Information
                  Systems (IICIS), November 11-12, 2002, Bonn, Germany},
  series       = {{IFIP} Conference Proceedings},
  volume       = {251},
  pages        = {37--57},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Mon, 07 Dec 2020 17:16:29 +0100},
  biburl       = {https://dblp.org/rec/conf/tc11-5/GeorgFR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adbis/RayR01,
  author       = {Indrakshi Ray and
                  Indrajit Ray},
  editor       = {Albertas Caplinskas and
                  Johann Eder},
  title        = {Detecting Termination of Active Database Rules Using Symbolic Model
                  Checking},
  booktitle    = {Advances in Databases and Information Systems, 5th East European Conference,
                  {ADBIS} 2001, Vilnius, Lithuania, September 25-28, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2151},
  pages        = {266--279},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44803-9\_21},
  doi          = {10.1007/3-540-44803-9\_21},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/adbis/RayR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/RayR01,
  author       = {Indrakshi Ray and
                  Indrajit Ray},
  title        = {An Anomymous Fair Exchange E-commerce Protocol},
  booktitle    = {Proceedings of the 15th International Parallel {\&} Distributed
                  Processing Symposium (IPDPS-01), San Francisco, CA, USA, April 23-27,
                  2001},
  pages        = {172},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/IPDPS.2001.925168},
  doi          = {10.1109/IPDPS.2001.925168},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/RayR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/RayRN01,
  author       = {Indrajit Ray and
                  Indrakshi Ray and
                  Natarajan Narasimhamurthi},
  title        = {An Anonymous Electronic Voting Protocol for Voting Over The Internet},
  booktitle    = {Third International Workshop on Advanced Issues of E-Commerce and
                  Web-Based Information Systems {(WECWIS} '01), San Jose, California,
                  USA, June 21-22, 2001},
  pages        = {188--191},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/WECWIS.2001.933922},
  doi          = {10.1109/WECWIS.2001.933922},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wecwis/RayRN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/RayAJ00,
  author       = {Indrakshi Ray and
                  Paul Ammann and
                  Sushil Jajodia},
  title        = {Using semantic correctness in multidatabases to achieve local autonomy,
                  distribute coordination, and maintain global integrity},
  journal      = {Inf. Sci.},
  volume       = {129},
  number       = {1-4},
  pages        = {155--195},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0020-0255(00)00062-1},
  doi          = {10.1016/S0020-0255(00)00062-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/RayAJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/RayRN00,
  author       = {Indrajit Ray and
                  Indrakshi Ray and
                  Natarajan Narasimhamurthy},
  editor       = {Bhavani Thuraisingham and
                  Reind P. van de Riet and
                  Klaus R. Dittrich and
                  Zahir Tari},
  title        = {A Fair-exchange E-commerce Protocol with Automated Dispute Resolution},
  booktitle    = {Data and Application Security, Development and Directions, {IFIP}
                  {TC11/} {WG11.3} Fourteenth Annual Working Conference on Database
                  Security, Schoorl, The Netherlands, August 21-23, 2000},
  series       = {{IFIP} Conference Proceedings},
  volume       = {201},
  pages        = {27--38},
  publisher    = {Kluwer},
  year         = {2000},
  url          = {https://doi.org/10.1007/0-306-47008-X\_3},
  doi          = {10.1007/0-306-47008-X\_3},
  timestamp    = {Wed, 29 Jun 2022 15:37:44 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/RayRN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecweb/RayR00,
  author       = {Indrakshi Ray and
                  Indrajit Ray},
  editor       = {Kurt Bauknecht and
                  Sanjay Kumar Madria and
                  G{\"{u}}nther Pernul},
  title        = {An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute
                  Resolution},
  booktitle    = {Electronic Commerce and Web Technologies, First International Conference,
                  EC-Web 2000, London, UK, September 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1875},
  pages        = {84--93},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44463-7\_8},
  doi          = {10.1007/3-540-44463-7\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ecweb/RayR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/RayR00,
  author       = {Indrakshi Ray and
                  Indrajit Ray},
  title        = {Failure Analysis of an E-Commerce Protocol Using Model Checking},
  booktitle    = {Second International Workshop on Advance Issues of E-Commerce and
                  Web-Based Information Systems {(WECWIS} 2000), Milpitas, California,
                  USA, June 8-9, 2000},
  pages        = {176--183},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/WECWIS.2000.853873},
  doi          = {10.1109/WECWIS.2000.853873},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wecwis/RayR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/RayAJ98,
  author       = {Indrakshi Ray and
                  Paul Ammann and
                  Sushil Jajodia},
  title        = {A Semantic-Based Transaction Processing Model for Multilevel Transactions},
  journal      = {J. Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {181--217},
  year         = {1998},
  url          = {https://doi.org/10.3233/jcs-980108},
  doi          = {10.3233/JCS-980108},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/RayAJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tods/AmmannJR97,
  author       = {Paul Ammann and
                  Sushil Jajodia and
                  Indrakshi Ray},
  title        = {Applying Formal Methods to Semantic-Based Decomposition of Transactions},
  journal      = {{ACM} Trans. Database Syst.},
  volume       = {22},
  number       = {2},
  pages        = {215--254},
  year         = {1997},
  url          = {https://doi.org/10.1145/249978.249981},
  doi          = {10.1145/249978.249981},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tods/AmmannJR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/JajodiaRA97,
  author       = {Sushil Jajodia and
                  Indrakshi Ray and
                  Paul Ammann},
  editor       = {Antoni Oliv{\'{e}} and
                  Joan Antoni Pastor},
  title        = {Implementing Semantic-Based Decomposition of Transactions},
  booktitle    = {Advanced Information Systems Engineering, 9th International Conference
                  CAiSE'97, Barcelona, Catalonia, Spain, June 16-20, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1250},
  pages        = {75--88},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-63107-0\_6},
  doi          = {10.1007/3-540-63107-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/JajodiaRA97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/kl/jajodiaK97/AmmannJR97,
  author       = {Paul Ammann and
                  Sushil Jajodia and
                  Indrakshi Ray},
  editor       = {Sushil Jajodia and
                  Larry Kerschberg},
  title        = {Semantic-Based Decomposition of Transactions},
  booktitle    = {Advanced Transaction Models and Architectures},
  publisher    = {Kluwer},
  year         = {1997},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/kl/jajodiaK97/AmmannJR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AmmannJR96,
  author       = {Paul Ammann and
                  Sushil Jajodia and
                  Indrakshi Ray},
  title        = {Ensuring Atomicity of Multilevel Transactions},
  booktitle    = {1996 {IEEE} Symposium on Security and Privacy, May 6-8, 1996, Oakland,
                  CA, {USA}},
  pages        = {74--84},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/SECPRI.1996.502671},
  doi          = {10.1109/SECPRI.1996.502671},
  timestamp    = {Thu, 21 Sep 2023 15:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AmmannJR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vldb/AmmannJR95,
  author       = {Paul Ammann and
                  Sushil Jajodia and
                  Indrakshi Ray},
  editor       = {Umeshwar Dayal and
                  Peter M. D. Gray and
                  Shojiro Nishio},
  title        = {Using Formal Methods to Reason about Semantics-Based Decompositions
                  of Transactions},
  booktitle    = {VLDB'95, Proceedings of 21th International Conference on Very Large
                  Data Bases, September 11-15, 1995, Zurich, Switzerland},
  pages        = {218--227},
  publisher    = {Morgan Kaufmann},
  year         = {1995},
  url          = {http://www.vldb.org/conf/1995/P218.PDF},
  timestamp    = {Tue, 20 Feb 2018 15:19:44 +0100},
  biburl       = {https://dblp.org/rec/conf/vldb/AmmannJR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics