Indrajit Ray
Orcid: 0000-0001-5254-3144Affiliations:
- Colorado State University, USA
According to our database1,
Indrajit Ray
authored at least 151 papers
between 1996 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2023
Information revelation and coordination using cheap talk in a game with two-sided private information.
Int. J. Game Theory, December, 2023
Explainable AI for Prioritizing and Deploying Defenses for Cyber-Physical System Resiliency.
Proceedings of the 5th IEEE International Conference on Trust, 2023
Informed Consent as Patient Driven Policy for Clinical Diagnosis and Treatment: A Smart Contract Based Approach.
Proceedings of the 20th International Conference on Security and Cryptography, 2023
SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
Worst Attack Vulnerability and Fortification for IoT Security Management: An approach and An Illustration for Smart Home IoT.
Proceedings of the NOMS 2023, 2023
A Digital Healthcare Service Architecture for Seniors Safety Monitoring in Metaverse.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
Proceedings of the 9th IEEE International Conference on Collaboration and Internet Computing, 2023
2022
Protecting Cyber-Physical System Testbeds from Red-Teaming/Blue-Teaming Experiments Gone Awry.
Proceedings of the Information Security Practice and Experience, 2022
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022
Springer Briefs in Computer Science, Springer, ISBN: 978-3-031-12710-6, 2022
2021
WIREs Data Mining Knowl. Discov., 2021
Situational Awareness for Smart Home IoT Security via Finite State Automata Based Attack Modeling.
Proceedings of the 3rd IEEE International Conference on Trust, 2021
Proceedings of the Information Systems Security - 17th International Conference, 2021
2020
TruckSTM: Runtime Realization of Operational State Transitions for Medium and Heavy Duty Vehicles.
ACM Trans. Cyber Phys. Syst., 2020
Synthesizing DNA molecules with identity-based digital signatures to prevent malicious tampering and enabling source attribution.
J. Comput. Secur., 2020
2019
CoRR, 2019
CoRR, 2019
Proceedings of the 2019 Winter Simulation Conference, 2019
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019
2018
On the design and analysis of protocols for Personal Health Record storage on Personal Data Server devices.
Future Gener. Comput. Syst., 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Digital Signatures to Ensure the Authenticity and Integrity of Synthetic DNA Molecules.
Proceedings of the New Security Paradigms Workshop, 2018
A Secure Hash Commitment Approach for Moving Target Defense of Security-critical Services.
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018
2017
Resilient Reference Monitor for Distributed Access Control via Moving Target Defense.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017
POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
POSTER: PriReMat: A Distributed Tool for Privacy Preserving Record Linking in Healthcare.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Secure Multi-keyword Similarity Search Over Encrypted Cloud Data Supporting Efficient Multi-user Setup.
Trans. Data Priv., 2016
Softw. Qual. J., 2016
Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup.
Future Internet, 2016
From the user's perspective: Perceptions of risk relative to benefit associated with using the Internet.
Comput. Hum. Behav., 2016
Proceedings of the ICT Systems Security and Privacy Protection, 2016
SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks.
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
To Fear or Not to Fear That is the Question: Code Characteristics of a Vulnerable Functionwith an Existing Exploit.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Applying attribute based access control for privacy preserving health data disclosure.
Proceedings of the 2016 IEEE-EMBS International Conference on Biomedical and Health Informatics, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
POSTER: PsychoRithm: A Framework for Studying How Human Traits Affect User Response to Security Situations.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Using Attack Surface Entry Points and Reachability Analysis to Assess the Risk of Software Vulnerability Exploitability.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the Twenty-Fourth International Conference on Automated Planning and Scheduling, 2014
2013
IEEE Syst. J., 2013
Towards a Forensic-Based Service Oriented Architecture Framework for Auditing of Cloud Logs.
Proceedings of the IEEE Ninth World Congress on Services, 2013
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013
Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
Optimal security hardening on attack tree models of networks: a cost-benefit analysis.
Int. J. Inf. Sec., 2012
Appl. Soft Comput., 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Towards Enabling Behavioral Trust among Participating Cloud Forensic Data Center Agencies.
Proceedings of the Secure Data Management - 9th VLDB Workshop, 2012
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
2011
IEEE Trans. Knowl. Data Eng., 2011
Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization.
J. Comput. Secur., 2011
Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011
Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit Logs.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
2010
Trans. Comput. Sci., 2010
Real time stochastic scheduling in broadcast systems with decentralized data storage.
Real Time Syst., 2010
Games Econ. Behav., 2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
2009
Comparative studies of chloride permeability, conductivity and salt-ponding tests of concrete containing different admixtures.
Int. J. Model. Identif. Control., 2009
A multi-objective approach to data sharing with privacy constraints and preference based objectives.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009
Proceedings of the EDBT 2009, 2009
Proceedings of the Data and Applications Security XXIII, 2009
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009
2008
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents.
Int. J. Secur. Networks, 2008
Int. J. Secur. Networks, 2008
Experiences in developing a fair-exchange e-commerce protocol using common off-the-shelf components.
Electron. Commer. Res. Appl., 2008
Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy.
Proceedings of the Parallel Problem Solving from Nature, 2008
Proceedings of the LCN 2008, 2008
Proceedings of the 24th International Conference on Data Engineering, 2008
Evolution strategy based optimization of on-demand dependent data broadcast scheduling.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008
Proceedings of the Computer Security, 2008
Proceedings of the EDBT 2008, 2008
Proceedings of the Data and Applications Security XXII, 2008
2007
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework.
J. Comput., 2007
Comput. Stand. Interfaces, 2007
Towards a new standard for allowing concurrency and ensuring consistency in revision control systems.
Comput. Stand. Interfaces, 2007
Comput. Secur., 2007
Proceedings of the Advances in Digital Forensics III, 2007
Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments.
Proceedings of the Data and Applications Security XXI, 2007
Optimal security hardening using multi-objective optimization on attack tree models of networks.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation.
Proceedings of the Trust Management, 4th International Conference, 2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
Proceedings of the Data and Applications Security XX, 2006
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006
2005
Decis. Support Syst., 2005
Proceedings of the Advances in Digital Forensics, 2005
Proceedings of the Information Systems Security, First International Conference, 2005
Proceedings of the Distributed Computing and Internet Technology, 2005
Proceedings of the Computer Security, 2005
Reliably, Securely and Efficiently Distributing Electronic Content Using Multicasting.
Proceedings of the E-Commerce and Web Technologies: 6th International Conference, 2005
Proceedings of the Data and Applications Security XIX, 2005
2004
A Secure TCP Connection Migration Protocol to Enable the Survivability of Client-Server Applications under Malicious Attack.
J. Netw. Syst. Manag., 2004
Proceedings of the Security and Protection in Information Processing Systems, 2004
Proceedings of the Distributed Computing and Internet Technology, 2004
Proceedings of the Computer Security, 2004
Proceedings of the E-Commerce and Web Technologies, 5th International Conference, 2004
Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
2003
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003
Proceedings of the Global Telecommunications Conference, 2003
2002
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002
Anonymous and Secure Multicast Subscription.
Proceedings of the Research Directions in Data and Applications Security, 2002
2001
Proceedings of the Third International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS '01), 2001
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001
Proceedings of the Advances in Databases and Information Systems, 2001
2000
IEEE Trans. Knowl. Data Eng., 2000
Soc. Choice Welf., 2000
Distributed Parallel Databases, 2000
Proceedings of the Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000), 2000
Proceedings of the Electronic Commerce and Web Technologies, 2000
Proceedings of the Data and Application Security, 2000
1998
IEEE Trans. Knowl. Data Eng., 1998
1997
A Two-tier Coarse Indexing Scheme for MLS Database Systems.
Proceedings of the Database Securty XI: Status and Prospects, 1997
Flexible Commit Protocols for Advanced Transaction Processing.
Proceedings of the Advanced Transaction Models and Architectures, 1997
1996
Proceedings of the Computer Security, 1996
Secure Locking Protocols for Multilevel Database Management Systems.
Proceedings of the Database Security Volume X, 1996
Proceedings of the CCS '96, 1996