default search action
Indrajit Ray
Person information
- affiliation: Colorado State University, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c105]Md. Al Amin, Hemanth Tummala, Rushabh Shah, Indrajit Ray:
Balancing Patient Privacy and Health Data Security: The Role of Compliance in Protected Health Information (PHI) Sharing. SECRYPT 2024: 211-223 - [i8]Md. Al Amin, Hemanth Tummala, Rushabh Shah, Indrajit Ray:
Balancing Patient Privacy and Health Data Security: The Role of Compliance in Protected Health Information (PHI) Sharing. CoRR abs/2407.02766 (2024) - [i7]Md. Al Amin, Rushabh Shah, Hemanth Tummala, Indrajit Ray:
Utilizing Blockchain and Smart Contracts for Enhanced Fraud Prevention and Minimization in Health Insurance through Multi-Signature Claim Processing. CoRR abs/2407.17765 (2024) - 2023
- [j41]Chirantan Ganguly, Indrajit Ray:
Simple Mediation in a Cheap-Talk Game. Games 14(3): 47 (2023) - [j40]Chirantan Ganguly, Indrajit Ray:
Information revelation and coordination using cheap talk in a game with two-sided private information. Int. J. Game Theory 52(4): 957-992 (2023) - [c104]Dimitrios Georgakopoulos, Mei-Ling Shyu, Indrajit Ray, Barbara Carminati:
Message from the General Chairs and PC Chairs CIC 2023. CIC 2023: viii-ix - [c103]Maxwel Bar-on, Bruhadeshwar Bezawada, Indrakshi Ray, Indrajit Ray:
A Small World-Privacy Preserving IoT Device-Type Fingerprinting with Small Datasets. FPS (1) 2023: 104-122 - [c102]Qian Qu, Ronghua Xu, Han Sun, Yu Chen, Sumantra Sarkar, Indrajit Ray:
A Digital Healthcare Service Architecture for Seniors Safety Monitoring in Metaverse. MetaCom 2023: 86-93 - [c101]Fathima James, Indrajit Ray, Deep Medhi:
Worst Attack Vulnerability and Fortification for IoT Security Management: An approach and An Illustration for Smart Home IoT. NOMS 2023: 1-6 - [c100]Indrajit Ray, Bhavani Thuraisingham, Jaideep Vaidya, Sharad Mehrotra, Vijayalakshmi Atluri, Indrakshi Ray, Murat Kantarcioglu, Ramesh Raskar, Babak Salimi, Steve Simske, Nalini Venkatasubramanian, Vivek K. Singh:
SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups. SACMAT 2023: 145-155 - [c99]Md. Al Amin, Amani Altarawneh, Indrajit Ray:
Informed Consent as Patient Driven Policy for Clinical Diagnosis and Treatment: A Smart Contract Based Approach. SECRYPT 2023: 159-170 - [c98]Indrajit Ray, Sarath Sreedharan, Rakesh Podder, Shadaab Kawnain Bashir, Indrakshi Ray:
Explainable AI for Prioritizing and Deploying Defenses for Cyber-Physical System Resiliency. TPS-ISA 2023: 184-192 - [i6]Md. Al Amin, Hemanth Tummala, Seshamalini Mohan, Indrajit Ray:
Healthcare Policy Compliance: A Blockchain Smart Contract-Based Approach. CoRR abs/2312.10214 (2023) - 2022
- [b1]Carol S. Smidts, Indrajit Ray, Quanyan Zhu, Pavan Kumar Vaddi, Yunfei Zhao, Linan Huang, Xiaoxu Diao, Rakibul Talukdar, Michael C. Pietrykowski:
Cyber-Security Threats and Response Models in Nuclear Power Plants. Springer Briefs in Computer Science, Springer 2022, ISBN 978-3-031-12710-6, pp. 1-90 - [c97]Vinayak S. Prabhu, Mohit Singh, Indrajit Ray, Indrakshi Ray, Sudipto Ghosh:
Detecting Secure Memory Deallocation Violations with CBMC. CPSS@AsiaCCS 2022: 27-38 - [c96]Md. Rakibul Hasan Talukder, Md. Al Amin, Indrajit Ray:
Protecting Cyber-Physical System Testbeds from Red-Teaming/Blue-Teaming Experiments Gone Awry. ISPEC 2022: 140-157 - 2021
- [j39]Bruhadeshwar Bezawada, Indrakshi Ray, Indrajit Ray:
Behavioral fingerprinting of Internet-of-Things devices. WIREs Data Mining Knowl. Discov. 11(1) (2021) - [c95]Sina Mahdipour Saravani, Indrajit Ray, Indrakshi Ray:
Automated Identification of Social Media Bots Using Deepfake Text Detection. ICISS 2021: 111-123 - [c94]Fathima James, Indrajit Ray, Deep Medhi:
Situational Awareness for Smart Home IoT Security via Finite State Automata Based Attack Modeling. TPS-ISA 2021: 61-69 - 2020
- [j38]Diptendu Mohan Kar, Indrajit Ray, Jenna Gallegos, Jean Peccoud, Indrakshi Ray:
Synthesizing DNA molecules with identity-based digital signatures to prevent malicious tampering and enabling source attribution. J. Comput. Secur. 28(4): 437-467 (2020) - [j37]Subhojeet Mukherjee, Jeffrey C. Van Etten, Namburi Rani Samyukta, Jacob Walker, Indrakshi Ray, Indrajit Ray:
TruckSTM: Runtime Realization of Operational State Transitions for Medium and Heavy Duty Vehicles. ACM Trans. Cyber Phys. Syst. 4(1): 4:1-4:25 (2020)
2010 – 2019
- 2019
- [c93]Indrajit Ray, Diptendu Mohan Kar, Jordan Peterson, Steve Goeringer:
Device Identity and Trust in IoT-sphere Forsaking Cryptography. CIC 2019: 204-213 - [c92]Bruhadeshwar Bezawada, Indrajit Ray, Kushagra Tiwary:
AGBuilder: An AI Tool for Automated Attack Graph Building, Analysis, and Refinement. DBSec 2019: 23-42 - [c91]Diptendu Mohan Kar, Indrajit Ray:
That's My DNA: Detecting Malicious Tampering of Synthesized DNA. DBSec 2019: 61-80 - [c90]Sachin Shetty, Indrajit Ray, Nurcin Celik, Michael Mesham, Nathaniel Bastian, Quanyan Zhu:
Simulation for Cyber Risk Management - Where are we, and Where do we Want to Go? WSC 2019: 726-737 - [i5]Pin-Yu Chen, Sutanay Choudhury, Luke Rodriguez, Alfred O. Hero III, Indrajit Ray:
Enterprise Cyber Resiliency Against Lateral Movement: A Graph Theoretic Approach. CoRR abs/1905.01002 (2019) - [i4]Diptendu Mohan Kar, Indrajit Ray:
Systematization of Knowledge and Implementation: Short Identity-Based Signatures. CoRR abs/1908.05366 (2019) - 2018
- [j36]Kirill Belyaev, Wuliang Sun, Indrakshi Ray, Indrajit Ray:
On the design and analysis of protocols for Personal Health Record storage on Personal Data Server devices. Future Gener. Comput. Syst. 80: 467-482 (2018) - [j35]Tarik Moataz, Indrajit Ray, Indrakshi Ray, Abdullatif Shikfa, Frédéric Cuppens, Nora Cuppens:
Substring search over encrypted data. J. Comput. Secur. 26(1): 1-30 (2018) - [c89]Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray:
Behavioral Fingerprinting of IoT Devices. ASHES@CCS 2018: 41-50 - [c88]Dieudonne Mulamba, Athith Amarnath, Bruhadeshwar Bezawada, Indrajit Ray:
A Secure Hash Commitment Approach for Moving Target Defense of Security-critical Services. MTD@CCS 2018: 59-68 - [c87]Diptendu Mohan Kar, Indrajit Ray, Jenna Gallegos, Jean Peccoud:
Digital Signatures to Ensure the Authenticity and Integrity of Synthetic DNA Molecules. NSPW 2018: 110-122 - [c86]Ibrahim Lazrig, Toan C. Ong, Indrajit Ray, Indrakshi Ray, Xiaoqian Jiang, Jaideep Vaidya:
Privacy Preserving Probabilistic Record Linkage Without Trusted Third Party. PST 2018: 1-10 - [c85]Dieudonne Mulamba, Indrajit Ray, Indrakshi Ray:
On Sybil Classification in Online Social Networks Using Only Structural Features. PST 2018: 1-10 - [c84]Bruhadeshwar Bezawada, Sandeep S. Kulkarni, Indrajit Ray, Indrakshi Ray, Rui Li:
Independent Key Distribution Protocols for Broadcast Authentication. SACMAT 2018: 27-38 - [e13]Pierangela Samarati, Indrajit Ray, Indrakshi Ray:
From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday. Lecture Notes in Computer Science 11170, Springer 2018, ISBN 978-3-030-04833-4 [contents] - [i3]Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray:
IoTSense: Behavioral Fingerprinting of IoT Devices. CoRR abs/1804.03852 (2018) - 2017
- [c83]Diptendu Mohan Kar, Ibrahim Lazrig, Indrajit Ray, Indrakshi Ray:
POSTER: PriReMat: A Distributed Tool for Privacy Preserving Record Linking in Healthcare. CCS 2017: 2507-2509 - [c82]Subhojeet Mukherjee, Noah Cain, Jacob Walker, David White, Indrajit Ray, Indrakshi Ray:
POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles. CCS 2017: 2559-2561 - [c81]Subhojeet Mukherjee, Indrakshi Ray, Indrajit Ray, Hossein Shirazi, Toan Ong, Michael G. Kahn:
Attribute Based Access Control for Healthcare Resources. ABAC@CODASPY 2017: 29-40 - [c80]Dieudonne Mulamba, Indrajit Ray:
Resilient Reference Monitor for Distributed Access Control via Moving Target Defense. DBSec 2017: 20-40 - 2016
- [j34]Zinta S. Byrne, Kyla J. Dvorak, Janet M. Peters, Indrajit Ray, Adele E. Howe, Diana R. Sanchez:
From the user's perspective: Perceptions of risk relative to benefit associated with using the Internet. Comput. Hum. Behav. 59: 456-468 (2016) - [j33]Mikhail Strizhov, Zachary Osman, Indrajit Ray:
Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup. Future Internet 8(3): 28 (2016) - [j32]Awad A. Younis, Yashwant K. Malaiya, Indrajit Ray:
Assessing vulnerability exploitability risk using software properties. Softw. Qual. J. 24(1): 159-202 (2016) - [j31]Mikhail Strizhov, Indrajit Ray:
Secure Multi-keyword Similarity Search Over Encrypted Cloud Data Supporting Efficient Multi-user Setup. Trans. Data Priv. 9(2): 131-159 (2016) - [c79]Indrakshi Ray, Toan C. Ong, Indrajit Ray, Michael G. Kahn:
Applying attribute based access control for privacy preserving health data disclosure. BHI 2016: 1-4 - [c78]Awad A. Younis, Yashwant K. Malaiya, Charles Anderson, Indrajit Ray:
To Fear or Not to Fear That is the Question: Code Characteristics of a Vulnerable Functionwith an Existing Exploit. CODASPY 2016: 97-104 - [c77]Ibrahim Lazrig, Toan Ong, Indrajit Ray, Indrakshi Ray, Michael G. Kahn:
Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes. DBSec 2016: 61-76 - [c76]Awad A. Younis, Yashwant K. Malaiya, Indrajit Ray:
Evaluating CVSS Base Score Using Vulnerability Rewards Programs. SEC 2016: 62-75 - [c75]Dieudonne Mulamba, Indrajit Ray, Indrakshi Ray:
SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks. SEC 2016: 179-193 - [e12]Javier García Blas, Jesús Carretero, Indrajit Ray, Qun Jin, Nektarios Georgalas:
15th International Conference on Ubiquitous Computing and 8th Communications and International Symposium on Cyberspace Safety and Security, IUCC-CSS 2016, Granada, Spain, December 14-16, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-5566-1 [contents] - [e11]Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti:
Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings. Lecture Notes in Computer Science 10063, Springer 2016, ISBN 978-3-319-49805-8 [contents] - 2015
- [c74]Luke Rodriguez, Darren S. Curtis, Sutanay Choudhury, Kiri Oler, Peter Nordquist, Pin-Yu Chen, Indrajit Ray:
DEMO: Action Recommendation for Cyber Resilience. CCS 2015: 1620-1622 - [c73]Subhojeet Mukherjee, Sachini S. Weerawardhana, Chancey Dunn, Indrajit Ray, Adele E. Howe:
POSTER: PsychoRithm: A Framework for Studying How Human Traits Affect User Response to Security Situations. CCS 2015: 1662-1664 - [c72]Florian Kerschbaum, Cristina Nita-Rotaru, Indrajit Ray:
CCSW 2015: The 7th ACM Cloud Computing Security Workshop. CCS 2015: 1703-1704 - [c71]Ibrahim Lazrig, Tarik Moataz, Indrajit Ray, Indrakshi Ray, Toan Ong, Michael G. Kahn, Frédéric Cuppens, Nora Cuppens-Boulahia:
Privacy Preserving Record Matching Using Automated Semi-trusted Broker. DBSec 2015: 103-118 - [c70]Mikhail Strizhov, Indrajit Ray:
Substring Position Search over Encrypted Cloud Data Using Tree-Based Index. IC2E 2015: 165-174 - [c69]Sutanay Choudhury, Luke Rodriguez, Darren S. Curtis, Kiri Oler, Peter Nordquist, Pin-Yu Chen, Indrajit Ray:
Action Recommendation for Cyber Resilience. SafeConfig@CCS 2015: 3-8 - [e10]Indrajit Ray, Ninghui Li, Christopher Kruegel:
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015. ACM 2015, ISBN 978-1-4503-3832-5 [contents] - [e9]Indrajit Ray, Xiaofeng Wang, Kui Ren, Christos Dimitrakakis, Aikaterini Mitrokotsa, Arunesh Sinha:
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, AISec 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN 978-1-4503-3826-4 [contents] - [e8]Indrajit Ray, Xiaofeng Wang, Kui Ren, Florian Kerschbaum, Cristina Nita-Rotaru:
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, CCSW 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN 978-1-4503-3825-7 [contents] - [e7]Indrajit Ray, Roshan K. Thomas, Alvaro A. Cárdenas:
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, CPS-SPC 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN 978-1-4503-3827-1 [contents] - [e6]Indrajit Ray, Xiaofeng Wang, Kui Ren:
Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN 978-1-4503-3828-8 [contents] - [e5]Indrajit Ray, Tomas Sander, Moti Yung:
Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, WISCS 2015, Denver, Colorado, USA, October 12, 2015. ACM 2015, ISBN 978-1-4503-3822-6 [contents] - [e4]Javier López, Indrajit Ray, Bruno Crispo:
Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8924, Springer 2015, ISBN 978-3-319-17126-5 [contents] - [e3]Indrajit Ray, Nicholas Hopper, Rob Jansen:
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, WPES 2015, Denver, Colorado, USA, October 12, 2015. ACM 2015, ISBN 978-1-4503-3820-2 [contents] - [i2]Mikhail Strizhov, Indrajit Ray:
Multi-keyword Similarity Search Over Encrypted Cloud Data. IACR Cryptol. ePrint Arch. 2015: 137 (2015) - 2014
- [j30]Hervé Moulin, Indrajit Ray, Sonali Sen Gupta:
Improving Nash by coarse correlation. J. Econ. Theory 150: 852-865 (2014) - [c68]Mark Roberts, Adele E. Howe, Indrajit Ray:
Evaluating Diversity in Classical Planning. ICAPS 2014 - [c67]Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray:
Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds. DBSec 2014: 66-81 - [c66]Tarik Moataz, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray, Indrakshi Ray:
ELITE: zEro Links Identity managemenT systEm. DBSec 2014: 195-210 - [c65]Sachini S. Weerawardhana, Subhojeet Mukherjee, Indrajit Ray, Adele E. Howe:
Automated Extraction of Vulnerability Information for Home Computer Security. FPS 2014: 356-366 - [c64]Awad A. Younis, Yashwant K. Malaiya, Indrajit Ray:
Using Attack Surface Entry Points and Reachability Analysis to Assess the Risk of Software Vulnerability Exploitability. HASE 2014: 1-8 - [c63]Mikhail Strizhov, Indrajit Ray:
Multi-keyword Similarity Search over Encrypted Cloud Data. SEC 2014: 52-65 - 2013
- [j29]Indrajit Ray, Sonali Sen Gupta:
Coarse correlated equilibria in linear duopoly games. Int. J. Game Theory 42(2): 541-562 (2013) - [j28]Indrajit Ray, Kirill Belyaev, Mikhail Strizhov, Dieudonne Mulamba, Mariappan Rajaram:
Secure Logging as a Service - Delegating Log Management to the Cloud. IEEE Syst. J. 7(2): 323-334 (2013) - [c62]Malgorzata Urbanska, Mark Roberts, Indrajit Ray, Adele E. Howe, Zinta S. Byrne:
Accepting the inevitable: factoring the user into home computer security. CODASPY 2013: 325-332 - [c61]Kirill Belyaev, Indrakshi Ray, Indrajit Ray, Gary Luckasen:
Personal health record storage on privacy preserving green clouds. CollaborateCom 2013: 448-457 - [c60]Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert B. France:
Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations. DBSec 2013: 97-112 - [c59]Indrajit Ray, Dieudonne Mulamba, Indrakshi Ray, Keesook J. Han:
A Model for Trust-Based Access Control and Delegation in Mobile Clouds. DBSec 2013: 242-257 - [c58]Mahantesh Halappanavar, Sutanay Choudhury, Emilie Hogan, Peter Hui, John R. Johnson, Indrajit Ray, Lawrence B. Holder:
Towards a network-of-networks framework for cyber security. ISI 2013: 106-108 - [c57]Sean S. E. Thorpe, Tyrone Grandison, Arnett Campbell, Janet Williams, Khalilah Burrell, Indrajit Ray:
Towards a Forensic-Based Service Oriented Architecture Framework for Auditing of Cloud Logs. SERVICES 2013: 75-83 - [i1]Mahantesh Halappanavar, Sutanay Choudhury, Emilie Hogan, Peter Hui, John R. Johnson, Indrajit Ray, Lawrence B. Holder:
Towards a Networks-of-Networks Framework for Cyber Security. CoRR abs/1304.6761 (2013) - 2012
- [j27]Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
Utility driven optimization of real time data broadcast schedules. Appl. Soft Comput. 12(7): 1832-1846 (2012) - [j26]Rinku Dewri, Indrajit Ray, Nayot Poolsappasit, L. Darrell Whitley:
Optimal security hardening on attack tree models of networks: a cost-benefit analysis. Int. J. Inf. Sec. 11(3): 167-188 (2012) - [j25]Nayot Poolsappasit, Rinku Dewri, Indrajit Ray:
Dynamic Security Risk Management Using Bayesian Attack Graphs. IEEE Trans. Dependable Secur. Comput. 9(1): 61-74 (2012) - [c56]Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir:
Cloud Log Forensics Metadata Analysis. COMPSAC Workshops 2012: 194-199 - [c55]Sean S. E. Thorpe, Tyrone Grandison, Indrajit Ray, Abbie Barbir:
Towards Enabling Behavioral Trust among Participating Cloud Forensic Data Center Agencies. Secure Data Management 2012: 156-161 - [c54]Adele E. Howe, Indrajit Ray, Mark Roberts, Malgorzata Urbanska, Zinta S. Byrne:
The Psychology of Security for the Home Computer User. IEEE Symposium on Security and Privacy 2012: 209-223 - 2011
- [j24]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization. J. Comput. Secur. 19(5): 935-974 (2011) - [j23]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
k-Anonymization in the Presence of Publisher Preferences. IEEE Trans. Knowl. Data Eng. 23(11): 1678-1690 (2011) - [c53]Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison:
Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit Logs. CISIS 2011: 259-264 - [c52]Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison:
Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques. CISIS 2011: 265-271 - [c51]Sean S. E. Thorpe, Indrakshi Ray, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert B. France:
Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment. ICDF2C 2011: 156-171 - 2010
- [j22]Anirban Kar, Indrajit Ray, Roberto Serrano:
A difficulty in implementing correlated equilibrium distributions. Games Econ. Behav. 69(1): 189-193 (2010) - [j21]Tristan Allard, Nicolas Anciaux, Luc Bouganim, Yanli Guo, Lionel Le Folgoc, Benjamin Nguyen, Philippe Pucheral, Indrajit Ray, Indrakshi Ray, Shaoyi Yin:
Secure Personal Data Servers: a Vision Paper. Proc. VLDB Endow. 3(1): 25-35 (2010) - [j20]Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
Real time stochastic scheduling in broadcast systems with decentralized data storage. Real Time Syst. 45(3): 143-175 (2010) - [j19]Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray, Sudip Chakraborty:
Trust-Based Security Level Evaluation Using Bayesian Belief Networks. Trans. Comput. Sci. 10: 154-186 (2010) - [c50]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
On the Identification of Property Based Generalizations in Microdata Anonymization. DBSec 2010: 81-96 - [c49]Siv Hilde Houmb, Sudip Chakraborty, Indrakshi Ray, Indrajit Ray:
Using Trust-Based Information Aggregation for Predicting Security Level of Systems. DBSec 2010: 241-256 - [c48]Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services. Mobile Data Management 2010: 95-104 - [c47]Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS. SecureComm 2010: 71-88
2000 – 2009
- 2009
- [j18]Silvia B. Uchoa, Indrajit Ray, Julio F. Davalos, Josealdo Tonholo:
Comparative studies of chloride permeability, conductivity and salt-ponding tests of concrete containing different admixtures. Int. J. Model. Identif. Control. 7(2): 160-170 (2009) - [j17]Indrakshi Ray, Indrajit Ray, Sudip Chakraborty:
An interoperable context sensitive model of trust. J. Intell. Inf. Syst. 32(1): 75-104 (2009) - [c46]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice. CIKM 2009: 1037-1046 - [c45]Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi Ray, Indrajit Ray:
A Trust-Based Access Control Model for Pervasive Computing Applications. DBSec 2009: 307-314 - [c44]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
On the comparison of microdata disclosure control algorithms. EDBT 2009: 240-251 - [c43]Rinku Dewri, L. Darrell Whitley, Indrajit Ray, Indrakshi Ray:
A multi-objective approach to data sharing with privacy constraints and preference based objectives. GECCO 2009: 1499-1506 - 2008
- [j16]Indrajit Ray, Hongjun Zhang:
Experiences in developing a fair-exchange e-commerce protocol using common off-the-shelf components. Electron. Commer. Res. Appl. 7(2): 247-259 (2008) - [j15]Andrew Burt, Michael Darschewski, Indrajit Ray, Ramakrishna Thurimella, Hailin Wu:
Origins: an approach to trace fast spreading worms to their roots. Int. J. Secur. Networks 3(1): 36-46 (2008) - [j14]Indrajit Ray, Nayot Poolsappasit:
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents. Int. J. Secur. Networks 3(2): 80-94 (2008) - [c42]