Indrajit Ray

Orcid: 0000-0001-5254-3144

Affiliations:
  • Colorado State University, USA


According to our database1, Indrajit Ray authored at least 151 papers between 1996 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Information revelation and coordination using cheap talk in a game with two-sided private information.
Int. J. Game Theory, December, 2023

Simple Mediation in a Cheap-Talk Game.
Games, 2023

Healthcare Policy Compliance: A Blockchain Smart Contract-Based Approach.
CoRR, 2023

Explainable AI for Prioritizing and Deploying Defenses for Cyber-Physical System Resiliency.
Proceedings of the 5th IEEE International Conference on Trust, 2023

Informed Consent as Patient Driven Policy for Clinical Diagnosis and Treatment: A Smart Contract Based Approach.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

Worst Attack Vulnerability and Fortification for IoT Security Management: An approach and An Illustration for Smart Home IoT.
Proceedings of the NOMS 2023, 2023

A Digital Healthcare Service Architecture for Seniors Safety Monitoring in Metaverse.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Message from the General Chairs and PC Chairs CIC 2023.
Proceedings of the 9th IEEE International Conference on Collaboration and Internet Computing, 2023

2022
Protecting Cyber-Physical System Testbeds from Red-Teaming/Blue-Teaming Experiments Gone Awry.
Proceedings of the Information Security Practice and Experience, 2022

Detecting Secure Memory Deallocation Violations with CBMC.
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022

Cyber-Security Threats and Response Models in Nuclear Power Plants
Springer Briefs in Computer Science, Springer, ISBN: 978-3-031-12710-6, 2022

2021
Behavioral fingerprinting of Internet-of-Things devices.
WIREs Data Mining Knowl. Discov., 2021

Situational Awareness for Smart Home IoT Security via Finite State Automata Based Attack Modeling.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Automated Identification of Social Media Bots Using Deepfake Text Detection.
Proceedings of the Information Systems Security - 17th International Conference, 2021

2020
TruckSTM: Runtime Realization of Operational State Transitions for Medium and Heavy Duty Vehicles.
ACM Trans. Cyber Phys. Syst., 2020

Synthesizing DNA molecules with identity-based digital signatures to prevent malicious tampering and enabling source attribution.
J. Comput. Secur., 2020

2019
Systematization of Knowledge and Implementation: Short Identity-Based Signatures.
CoRR, 2019

Enterprise Cyber Resiliency Against Lateral Movement: A Graph Theoretic Approach.
CoRR, 2019

Simulation for Cyber Risk Management - Where are we, and Where do we Want to Go?
Proceedings of the 2019 Winter Simulation Conference, 2019

That's My DNA: Detecting Malicious Tampering of Synthesized DNA.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

AGBuilder: An AI Tool for Automated Attack Graph Building, Analysis, and Refinement.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

Device Identity and Trust in IoT-sphere Forsaking Cryptography.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

2018
Substring search over encrypted data.
J. Comput. Secur., 2018

On the design and analysis of protocols for Personal Health Record storage on Personal Data Server devices.
Future Gener. Comput. Syst., 2018

IoTSense: Behavioral Fingerprinting of IoT Devices.
CoRR, 2018

Independent Key Distribution Protocols for Broadcast Authentication.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

On Sybil Classification in Online Social Networks Using Only Structural Features.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Privacy Preserving Probabilistic Record Linkage Without Trusted Third Party.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Digital Signatures to Ensure the Authenticity and Integrity of Synthetic DNA Molecules.
Proceedings of the New Security Paradigms Workshop, 2018

A Secure Hash Commitment Approach for Moving Target Defense of Security-critical Services.
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018

Behavioral Fingerprinting of IoT Devices.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

2017
Resilient Reference Monitor for Distributed Access Control via Moving Target Defense.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Attribute Based Access Control for Healthcare Resources.
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017

POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

POSTER: PriReMat: A Distributed Tool for Privacy Preserving Record Linking in Healthcare.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Secure Multi-keyword Similarity Search Over Encrypted Cloud Data Supporting Efficient Multi-user Setup.
Trans. Data Priv., 2016

Assessing vulnerability exploitability risk using software properties.
Softw. Qual. J., 2016

Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup.
Future Internet, 2016

From the user's perspective: Perceptions of risk relative to benefit associated with using the Internet.
Comput. Hum. Behav., 2016

Evaluating CVSS Base Score Using Vulnerability Rewards Programs.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

To Fear or Not to Fear That is the Question: Code Characteristics of a Vulnerable Functionwith an Existing Exploit.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Applying attribute based access control for privacy preserving health data disclosure.
Proceedings of the 2016 IEEE-EMBS International Conference on Biomedical and Health Informatics, 2016

2015
Multi-keyword Similarity Search Over Encrypted Cloud Data.
IACR Cryptol. ePrint Arch., 2015

Action Recommendation for Cyber Resilience.
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015

Substring Position Search over Encrypted Cloud Data Using Tree-Based Index.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

Privacy Preserving Record Matching Using Automated Semi-trusted Broker.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

DEMO: Action Recommendation for Cyber Resilience.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

POSTER: PsychoRithm: A Framework for Studying How Human Traits Affect User Response to Security Situations.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

CCSW 2015: The 7th ACM Cloud Computing Security Workshop.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Improving Nash by coarse correlation.
J. Econ. Theory, 2014

Using Attack Surface Entry Points and Reachability Analysis to Assess the Risk of Software Vulnerability Exploitability.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

Automated Extraction of Vulnerability Information for Home Computer Security.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

ELITE: zEro Links Identity managemenT systEm.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Evaluating Diversity in Classical Planning.
Proceedings of the Twenty-Fourth International Conference on Automated Planning and Scheduling, 2014

2013
Secure Logging as a Service - Delegating Log Management to the Cloud.
IEEE Syst. J., 2013

Coarse correlated equilibria in linear duopoly games.
Int. J. Game Theory, 2013

Towards a Networks-of-Networks Framework for Cyber Security
CoRR, 2013

Towards a Forensic-Based Service Oriented Architecture Framework for Auditing of Cloud Logs.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Towards a network-of-networks framework for cyber security.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

A Model for Trust-Based Access Control and Delegation in Mobile Clouds.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Personal health record storage on privacy preserving green clouds.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Accepting the inevitable: factoring the user into home computer security.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Dynamic Security Risk Management Using Bayesian Attack Graphs.
IEEE Trans. Dependable Secur. Comput., 2012

Optimal security hardening on attack tree models of networks: a cost-benefit analysis.
Int. J. Inf. Sec., 2012

Utility driven optimization of real time data broadcast schedules.
Appl. Soft Comput., 2012

The Psychology of Security for the Home Computer User.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Towards Enabling Behavioral Trust among Participating Cloud Forensic Data Center Agencies.
Proceedings of the Secure Data Management - 9th VLDB Workshop, 2012

Cloud Log Forensics Metadata Analysis.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
k-Anonymization in the Presence of Publisher Preferences.
IEEE Trans. Knowl. Data Eng., 2011

Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization.
J. Comput. Secur., 2011

Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011

Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit Logs.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

2010
Trust-Based Security Level Evaluation Using Bayesian Belief Networks.
Trans. Comput. Sci., 2010

Real time stochastic scheduling in broadcast systems with decentralized data storage.
Real Time Syst., 2010

Secure Personal Data Servers: a Vision Paper.
Proc. VLDB Endow., 2010

A difficulty in implementing correlated equilibrium distributions.
Games Econ. Behav., 2010

On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS.
Proceedings of the Security and Privacy in Communication Networks, 2010

Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

Using Trust-Based Information Aggregation for Predicting Security Level of Systems.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

On the Identification of Property Based Generalizations in Microdata Anonymization.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

2009
An interoperable context sensitive model of trust.
J. Intell. Inf. Syst., 2009

Comparative studies of chloride permeability, conductivity and salt-ponding tests of concrete containing different admixtures.
Int. J. Model. Identif. Control., 2009

A multi-objective approach to data sharing with privacy constraints and preference based objectives.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

On the comparison of microdata disclosure control algorithms.
Proceedings of the EDBT 2009, 2009

A Trust-Based Access Control Model for Pervasive Computing Applications.
Proceedings of the Data and Applications Security XXIII, 2009

POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents.
Int. J. Secur. Networks, 2008

Origins: an approach to trace fast spreading worms to their roots.
Int. J. Secur. Networks, 2008

Experiences in developing a fair-exchange e-commerce protocol using common off-the-shelf components.
Electron. Commer. Res. Appl., 2008

Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy.
Proceedings of the Parallel Problem Solving from Nature, 2008

Key pre-distribution based secure backbone formation in wireless sensor networks.
Proceedings of the LCN 2008, 2008

On the Optimal Selection of k in the k-Anonymity Problem.
Proceedings of the 24th International Conference on Data Engineering, 2008

Evolution strategy based optimization of on-demand dependent data broadcast scheduling.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Security Provisioning in Pervasive Environments Using Multi-objective Optimization.
Proceedings of the Computer Security, 2008

Optimizing on-demand data broadcast scheduling in pervasive environments.
Proceedings of the EDBT 2008, 2008

An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems.
Proceedings of the Data and Applications Security XXII, 2008

2007
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework.
J. Comput., 2007

Towards secure multi-sited transactional revision control systems.
Comput. Stand. Interfaces, 2007

Towards a new standard for allowing concurrency and ensuring consistency in revision control systems.
Comput. Stand. Interfaces, 2007

Measuring, analyzing and predicting security vulnerabilities in software systems.
Comput. Secur., 2007

Investigating Computer Attacks Using Attack Trees.
Proceedings of the Advances in Digital Forensics III, 2007

Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments.
Proceedings of the Data and Applications Security XXI, 2007

Optimal security hardening using multi-objective optimization on attack tree models of networks.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Sunspots, correlation and competition.
Games Econ. Behav., 2006

TrustBAC: integrating trust relationships into the RBAC model for access control in open systems.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation.
Proceedings of the Trust Management, 4th International Conference, 2006

Remote Upload of Evidence over Mobile Ad Hoc Networks.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

A Framework for Flexible Access Control in Digital Library Systems.
Proceedings of the Data and Applications Security XX, 2006

A Trust Model for Pervasive Computing Environments.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

2005
An anonymous and failure resilient fair-exchange e-commerce protocol.
Decis. Support Syst., 2005

Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback.
Proceedings of the Advances in Digital Forensics, 2005

VTrust: A Trust Management System Based on a Vector Model of Trust.
Proceedings of the Information Systems Security, First International Conference, 2005

System Security Track Chair's Message.
Proceedings of the Distributed Computing and Internet Technology, 2005

Using Attack Trees to Identify Malicious Attacks from Authorized Insiders.
Proceedings of the Computer Security, 2005

Reliably, Securely and Efficiently Distributing Electronic Content Using Multicasting.
Proceedings of the E-Commerce and Web Technologies: 6th International Conference, 2005

Security Vulnerabilities in Software Systems: A Quantitative Perspective.
Proceedings of the Data and Applications Security XIX, 2005

2004
A Secure TCP Connection Migration Protocol to Enable the Survivability of Client-Server Applications under Malicious Attack.
J. Netw. Syst. Manag., 2004

Collective Signature for Efficient Authentication of XML Documents.
Proceedings of the Security and Protection in Information Processing Systems, 2004

A Secure Checkpointing Protocol for Survivable Server Design.
Proceedings of the Distributed Computing and Internet Technology, 2004

A Vector Model of Trust for Developing Trustworthy Systems.
Proceedings of the Computer Security, 2004

Towards a Privacy Preserving e-Commerce Protocol.
Proceedings of the E-Commerce and Web Technologies, 5th International Conference, 2004

Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
A Secure Multi-Sited Version Control System.
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003

A certified e-mail protocol suitable for mobile environments.
Proceedings of the Global Telecommunications Conference, 2003

2002
Fair exchange in E-commerce.
SIGecom Exch., 2002

A cryptographic solution to implement access control in a hierarchy and more.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Using Compatible Keys for Secure Multicasting in E-Commerce.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

Anonymous and Secure Multicast Subscription.
Proceedings of the Research Directions in Data and Applications Security, 2002

2001
Game Theory via Revealed Preferences.
Games Econ. Behav., 2001

An Anonymous Electronic Voting Protocol for Voting Over The Internet.
Proceedings of the Third International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS '01), 2001

An Anomymous Fair Exchange E-commerce Protocol.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

Detecting Termination of Active Database Rules Using Symbolic Model Checking.
Proceedings of the Advances in Databases and Information Systems, 2001

2000
ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems.
IEEE Trans. Knowl. Data Eng., 2000

Consistency, dummy and independence of irrelevant strategies for strategic games.
Soc. Choice Welf., 2000

Flexible Transaction Dependencies in Database Systems.
Distributed Parallel Databases, 2000

Failure Analysis of an E-Commerce Protocol Using Model Checking.
Proceedings of the Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000), 2000

An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution.
Proceedings of the Electronic Commerce and Web Technologies, 2000

A Fair-exchange E-commerce Protocol with Automated Dispute Resolution.
Proceedings of the Data and Application Security, 2000

1998
Advanced Transaction Processing in Multilevel Secure File Stores.
IEEE Trans. Knowl. Data Eng., 1998

1997
A Two-tier Coarse Indexing Scheme for MLS Database Systems.
Proceedings of the Database Securty XI: Status and Prospects, 1997

Flexible Commit Protocols for Advanced Transaction Processing.
Proceedings of the Advanced Transaction Models and Architectures, 1997

1996
Secure Concurrency Control in MLS Databases with Two Versions of Data.
Proceedings of the Computer Security, 1996

Secure Locking Protocols for Multilevel Database Management Systems.
Proceedings of the Database Security Volume X, 1996

An Advanced Commit Protocol for MLS Distributed Database Systems.
Proceedings of the CCS '96, 1996


  Loading...