Indrajit Ray

According to our database1, Indrajit Ray
  • authored at least 121 papers between 1996 and 2018.
  • has a "Dijkstra number"2 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Substring search over encrypted data.
Journal of Computer Security, 2018

2017
Resilient Reference Monitor for Distributed Access Control via Moving Target Defense.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Attribute Based Access Control for Healthcare Resources.
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017

POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

POSTER: PriReMat: A Distributed Tool for Privacy Preserving Record Linking in Healthcare.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Secure Multi-keyword Similarity Search Over Encrypted Cloud Data Supporting Efficient Multi-user Setup.
Transactions on Data Privacy, 2016

Assessing vulnerability exploitability risk using software properties.
Software Quality Journal, 2016

Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup.
Future Internet, 2016

From the user's perspective: Perceptions of risk relative to benefit associated with using the Internet.
Computers in Human Behavior, 2016

Evaluating CVSS Base Score Using Vulnerability Rewards Programs.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

To Fear or Not to Fear That is the Question: Code Characteristics of a Vulnerable Functionwith an Existing Exploit.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Applying attribute based access control for privacy preserving health data disclosure.
Proceedings of the 2016 IEEE-EMBS International Conference on Biomedical and Health Informatics, 2016

2015
Multi-keyword Similarity Search Over Encrypted Cloud Data.
IACR Cryptology ePrint Archive, 2015

Action Recommendation for Cyber Resilience.
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015

Substring Position Search over Encrypted Cloud Data Using Tree-Based Index.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

Privacy Preserving Record Matching Using Automated Semi-trusted Broker.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

DEMO: Action Recommendation for Cyber Resilience.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

POSTER: PsychoRithm: A Framework for Studying How Human Traits Affect User Response to Security Situations.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

CCSW 2015: The 7th ACM Cloud Computing Security Workshop.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Improving Nash by coarse correlation.
J. Economic Theory, 2014

Multi-keyword Similarity Search over Encrypted Cloud Data.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Using Attack Surface Entry Points and Reachability Analysis to Assess the Risk of Software Vulnerability Exploitability.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

Automated Extraction of Vulnerability Information for Home Computer Security.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

ELITE: zEro Links Identity managemenT systEm.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Evaluating Diversity in Classical Planning.
Proceedings of the Twenty-Fourth International Conference on Automated Planning and Scheduling, 2014

2013
Secure Logging as a Service - Delegating Log Management to the Cloud.
IEEE Systems Journal, 2013

Coarse correlated equilibria in linear duopoly games.
Int. J. Game Theory, 2013

Towards a Networks-of-Networks Framework for Cyber Security
CoRR, 2013

Towards a Forensic-Based Service Oriented Architecture Framework for Auditing of Cloud Logs.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Towards a network-of-networks framework for cyber security.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

A Model for Trust-Based Access Control and Delegation in Mobile Clouds.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Personal health record storage on privacy preserving green clouds.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Accepting the inevitable: factoring the user into home computer security.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Dynamic Security Risk Management Using Bayesian Attack Graphs.
IEEE Trans. Dependable Sec. Comput., 2012

Optimal security hardening on attack tree models of networks: a cost-benefit analysis.
Int. J. Inf. Sec., 2012

Utility driven optimization of real time data broadcast schedules.
Appl. Soft Comput., 2012

The Psychology of Security for the Home Computer User.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Towards Enabling Behavioral Trust among Participating Cloud Forensic Data Center Agencies.
Proceedings of the Secure Data Management - 9th VLDB Workshop, 2012

Cloud Log Forensics Metadata Analysis.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
k-Anonymization in the Presence of Publisher Preferences.
IEEE Trans. Knowl. Data Eng., 2011

Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization.
Journal of Computer Security, 2011

Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011

Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit Logs.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

2010
Trust-Based Security Level Evaluation Using Bayesian Belief Networks.
Trans. Computational Science, 2010

Real time stochastic scheduling in broadcast systems with decentralized data storage.
Real-Time Systems, 2010

Secure Personal Data Servers: a Vision Paper.
PVLDB, 2010

A difficulty in implementing correlated equilibrium distributions.
Games and Economic Behavior, 2010

On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS.
Proceedings of the Security and Privacy in Communication Networks, 2010

Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

Using Trust-Based Information Aggregation for Predicting Security Level of Systems.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

On the Identification of Property Based Generalizations in Microdata Anonymization.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

2009
An interoperable context sensitive model of trust.
J. Intell. Inf. Syst., 2009

Comparative studies of chloride permeability, conductivity and salt-ponding tests of concrete containing different admixtures.
IJMIC, 2009

A multi-objective approach to data sharing with privacy constraints and preference based objectives.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

On the comparison of microdata disclosure control algorithms.
Proceedings of the EDBT 2009, 2009

A Trust-Based Access Control Model for Pervasive Computing Applications.
Proceedings of the Data and Applications Security XXIII, 2009

POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents.
IJSN, 2008

Origins: an approach to trace fast spreading worms to their roots.
IJSN, 2008

Experiences in developing a fair-exchange e-commerce protocol using common off-the-shelf components.
Electronic Commerce Research and Applications, 2008

Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy.
Proceedings of the Parallel Problem Solving from Nature, 2008

Key pre-distribution based secure backbone formation in wireless sensor networks.
Proceedings of the LCN 2008, 2008

On the Optimal Selection of k in the k-Anonymity Problem.
Proceedings of the 24th International Conference on Data Engineering, 2008

Evolution strategy based optimization of on-demand dependent data broadcast scheduling.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Security Provisioning in Pervasive Environments Using Multi-objective Optimization.
Proceedings of the Computer Security, 2008

Optimizing on-demand data broadcast scheduling in pervasive environments.
Proceedings of the EDBT 2008, 2008

An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems.
Proceedings of the Data and Applications Security XXII, 2008

2007
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework.
JCP, 2007

Towards secure multi-sited transactional revision control systems.
Computer Standards & Interfaces, 2007

Towards a new standard for allowing concurrency and ensuring consistency in revision control systems.
Computer Standards & Interfaces, 2007

Measuring, analyzing and predicting security vulnerabilities in software systems.
Computers & Security, 2007

Investigating Computer Attacks Using Attack Trees.
Proceedings of the Advances in Digital Forensics III, 2007

Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments.
Proceedings of the Data and Applications Security XXI, 2007

Optimal security hardening using multi-objective optimization on attack tree models of networks.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Sunspots, correlation and competition.
Games and Economic Behavior, 2006

TrustBAC: integrating trust relationships into the RBAC model for access control in open systems.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation.
Proceedings of the Trust Management, 4th International Conference, 2006

Remote Upload of Evidence over Mobile Ad Hoc Networks.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

A Framework for Flexible Access Control in Digital Library Systems.
Proceedings of the Data and Applications Security XX, 2006

A Trust Model for Pervasive Computing Environments.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

2005
An anonymous and failure resilient fair-exchange e-commerce protocol.
Decision Support Systems, 2005

Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback.
Proceedings of the Advances in Digital Forensics, 2005

VTrust: A Trust Management System Based on a Vector Model of Trust.
Proceedings of the Information Systems Security, First International Conference, 2005

System Security Track Chair's Message.
Proceedings of the Distributed Computing and Internet Technology, 2005

Using Attack Trees to Identify Malicious Attacks from Authorized Insiders.
Proceedings of the Computer Security, 2005

Reliably, Securely and Efficiently Distributing Electronic Content Using Multicasting.
Proceedings of the E-Commerce and Web Technologies: 6th International Conference, 2005

Security Vulnerabilities in Software Systems: A Quantitative Perspective.
Proceedings of the Data and Applications Security XIX, 2005

2004
A Secure TCP Connection Migration Protocol to Enable the Survivability of Client-Server Applications under Malicious Attack.
J. Network Syst. Manage., 2004

Collective Signature for Efficient Authentication of XML Documents.
Proceedings of the Security and Protection in Information Processing Systems, 2004

A Secure Checkpointing Protocol for Survivable Server Design.
Proceedings of the Distributed Computing and Internet Technology, 2004

A Vector Model of Trust for Developing Trustworthy Systems.
Proceedings of the Computer Security, 2004

Towards a Privacy Preserving e-Commerce Protocol.
Proceedings of the E-Commerce and Web Technologies, 5th International Conference, 2004

Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
A Secure Multi-Sited Version Control System.
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003

A certified e-mail protocol suitable for mobile environments.
Proceedings of the Global Telecommunications Conference, 2003

2002
Fair exchange in E-commerce.
SIGecom Exchanges, 2002

A cryptographic solution to implement access control in a hierarchy and more.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Using Compatible Keys for Secure Multicasting in E-Commerce.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

Anonymous and Secure Multicast Subscription.
Proceedings of the Research Directions in Data and Applications Security, 2002

2001
Game Theory via Revealed Preferences.
Games and Economic Behavior, 2001

An Anonymous Electronic Voting Protocol for Voting Over The Internet.
Proceedings of the Third International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS '01), 2001

An Anomymous Fair Exchange E-commerce Protocol.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

Detecting Termination of Active Database Rules Using Symbolic Model Checking.
Proceedings of the Advances in Databases and Information Systems, 2001

2000
ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems.
IEEE Trans. Knowl. Data Eng., 2000

Consistency, dummy and independence of irrelevant strategies for strategic games.
Social Choice and Welfare, 2000

Flexible Transaction Dependencies in Database Systems.
Distributed and Parallel Databases, 2000

Failure Analysis of an E-Commerce Protocol Using Model Checking.
Proceedings of the Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000), 2000

An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution.
Proceedings of the Electronic Commerce and Web Technologies, 2000

A Fair-exchange E-commerce Protocol with Automated Dispute Resolution.
Proceedings of the Data and Application Security, 2000

1998
Advanced Transaction Processing in Multilevel Secure File Stores.
IEEE Trans. Knowl. Data Eng., 1998

1997
A Two-tier Coarse Indexing Scheme for MLS Database Systems.
Proceedings of the Database Securty XI: Status and Prospects, 1997

Flexible Commit Protocols for Advanced Transaction Processing.
Advanced Transaction Models and Architectures, 1997

1996
Secure Concurrency Control in MLS Databases with Two Versions of Data.
Proceedings of the Computer Security, 1996

Secure Locking Protocols for Multilevel Database Management Systems.
Proceedings of the Database Security Volume X, 1996

An Advanced Commit Protocol for MLS Distributed Database Systems.
Proceedings of the CCS '96, 1996


  Loading...