Indrakshi Ray

According to our database1, Indrakshi Ray
  • authored at least 162 papers between 1995 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Substring search over encrypted data.
Journal of Computer Security, 2018

2017
AUC Maximization with K-hyperplane.
CoRR, 2017

On the formalization, design, and implementation of component-oriented access control in lightweight virtualized server environments.
Computers & Security, 2017

Using a History-based Profile to Detect and Respond to DDoS Attacks.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Using Attribute-Based Access Control for Remote Healthcare Monitoring.
Proceedings of the 2017 Fourth International Conference on Software Defined Systems, 2017

Keynote speech 2: Attribute-based access control status and directions.
Proceedings of the 2017 Fourth International Conference on Software Defined Systems, 2017

Fresh-Phish: A Framework for Auto-Detection of Phishing Websites.
Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, 2017

Keynote speech 2: Attribute-based access control status and directions.
Proceedings of the Second International Conference on Fog and Mobile Edge Computing, 2017

A Distributed Mechanism to Protect Against DDoS Attacks.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Attribute Based Access Control for Healthcare Resources.
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017

POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

POSTER: PriReMat: A Distributed Tool for Privacy Preserving Record Linking in Healthcare.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Confidence-Weighted Bipartite Ranking.
CoRR, 2016

Towards Access Control for Isolated Applications.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Enhancing applications with filtering of XML message streams.
Proceedings of the 20th International Database Engineering & Applications Symposium, 2016

Practical DoS Attacks on Embedded Networks in Commercial Vehicles.
Proceedings of the Information Systems Security - 12th International Conference, 2016

A Generic Digital Forensic Investigation Framework for Internet of Things (IoT).
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud, 2016

Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Compacted Bloom Filter.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Specification and Enforcement of Location-Aware Attribute-Based Access Control for Online Social Networks.
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016

Component-Oriented Access Control for Deployment of Application Services in Containerized Environments.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

Applying attribute based access control for privacy preserving health data disclosure.
Proceedings of the 2016 IEEE-EMBS International Conference on Biomedical and Health Informatics, 2016

Confidence-Weighted Bipartite Ranking.
Proceedings of the Advanced Data Mining and Applications - 12th International Conference, 2016

2015
Security, trust, and resilience of distributed networks and systems.
Security and Communication Networks, 2015

Using Slicing to Improve the Performance of Model Invariant Checking.
Journal of Object Technology, 2015

Building high assurance human-centric decision systems.
Autom. Softw. Eng., 2015

Analyzing Regulatory Conformance in Medical Research Systems Using Multi-Paradigm Modeling.
Proceedings of the Joint Proceedings of the 3rd International Workshop on the Globalization Of Modeling Languages and the 9th International Workshop on Multi-Paradigm Modeling co-located with ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems, 2015

Modeling of Online Social Network Policies Using an Attribute-Based Access Control Framework.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Stream Processing with Secure Information Flow Constraints.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Privacy Preserving Record Matching Using Automated Semi-trusted Broker.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Analysis of a Relationship Based Access Control Model.
Proceedings of the Eighth International C* Conference on Computer Science & Software Engineering, 2015

Towards Efficient Dissemination and Filtering of XML Data Streams.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Satisfiability Analysis of Workflows with Control-Flow Patterns and Authorization Constraints.
IEEE Trans. Services Computing, 2014

Enforcing the Chinese wall model for tenant conflict of interest in the service cloud.
IJBPIM, 2014

Enforcing spatio-temporal access control in mobile applications.
Computing, 2014

Analysing Requirements to Detect Latent Security Vulnerabilities.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Audit Log Management in MongoDB.
Proceedings of the 2014 IEEE World Congress on Services, 2014

A Responsive Defense Mechanism Against DDoS Attacks.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

ELITE: zEro Links Identity managemenT systEm.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2013
Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model.
IEEE Systems Journal, 2013

On the Efficient Processing of Multilevel Secure Continuous Queries.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Auditing Requirements for Implementing the Chinese Wall Model in the Service Cloud.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Information flow control for stream processing in clouds.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Specification and analysis of access control policies for mobile applications.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Analyzing Behavioral Refactoring of Class Models.
Proceedings of the Workshop on Models and Evolution co-located with ACM/IEEE 16th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2013), 2013

Contract-Aware Slicing of UML Class Models.
Proceedings of the Model-Driven Engineering Languages and Systems, 2013

An Approach to Analyzing Temporal Properties in UML Class Models.
Proceedings of the 10th International Workshop on Model Driven Engineering, 2013

Rigorous Analysis of Temporal Access Control Properties in Mobile Systems.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013

Distributed Multilevel Secure Data Stream Processing.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

A Model for Trust-Based Access Control and Delegation in Mobile Clouds.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Personal health record storage on privacy preserving green clouds.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

2012
Multilevel secure data stream processing: Architecture and implementation.
Journal of Computer Security, 2012

Utility driven optimization of real time data broadcast schedules.
Appl. Soft Comput., 2012

Query Plan Execution in a Heterogeneous Stream Management System for Situational Awareness.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Systematic Scenario-Based Analysis of UML Design Class Models.
Proceedings of the 17th IEEE International Conference on Engineering of Complex Computer Systems, 2012

2011
k-Anonymization in the Presence of Publisher Preferences.
IEEE Trans. Knowl. Data Eng., 2011

On the formalization and analysis of a spatio-temporal role-based access control model.
Journal of Computer Security, 2011

Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization.
Journal of Computer Security, 2011

When does a workflow complete?
Computer Standards & Interfaces, 2011

Rigorous Analysis of UML Access Control Policy Models.
Proceedings of the POLICY 2011, 2011

Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011

Supporting Iterative Development of Robust Operation Contracts in UML Requirements Models.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

Multilevel Secure Data Stream Processing.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

2010
Verification and Trade-Off Analysis of Security Properties in UML System Models.
IEEE Trans. Software Eng., 2010

Trust-Based Security Level Evaluation Using Bayesian Belief Networks.
Trans. Computational Science, 2010

On challenges of model transformation from UML to Alloy.
Software and System Modeling, 2010

Real time stochastic scheduling in broadcast systems with decentralized data storage.
Real-Time Systems, 2010

Secure Personal Data Servers: a Vision Paper.
PVLDB, 2010

Using Graph Theory to Represent a Spatio-Temporal Role-Based Access Control Model.
IJNGC, 2010

Using Graph Theory to Represent a Spatio-Temporal Role-Based Access Control Model.
IJNGC, 2010

On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS.
Proceedings of the Security and Privacy in Communication Networks, 2010

Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

Using Trust-Based Information Aggregation for Predicting Security Level of Systems.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

On the Identification of Property Based Generalizations in Microdata Anonymization.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

2009
Secure Transaction Processing.
Proceedings of the Encyclopedia of Database Systems, 2009

Towards Achieving Personalized Privacy for Location-Based Services.
Trans. Data Privacy, 2009

An interoperable context sensitive model of trust.
J. Intell. Inf. Syst., 2009

An aspect-oriented methodology for designing secure applications.
Information & Software Technology, 2009

Using alloy to analyse a spatio-temporal access control model supporting delegation.
IET Information Security, 2009

Ensuring spatio-temporal access control for real-world applications.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Towards Trustworthy Delegation in Role-Based Access Control Model.
Proceedings of the Information Security, 12th International Conference, 2009

A Rigorous Approach to Uncovering Security Policy Violations in UML Designs.
Proceedings of the 14th IEEE International Conference on Engineering of Complex Computer Systems, 2009

A multi-objective approach to data sharing with privacy constraints and preference based objectives.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

On the comparison of microdata disclosure control algorithms.
Proceedings of the EDBT 2009, 2009

A Trust-Based Access Control Model for Pervasive Computing Applications.
Proceedings of the Data and Applications Security XXIII, 2009

POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
Editorial.
ACM Trans. Inf. Syst. Secur., 2008

A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications.
Proceedings of the Trust, 2008

Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy.
Proceedings of the Parallel Problem Solving from Nature, 2008

Scenario-Based Static Analysis of UML Class Models.
Proceedings of the Model Driven Engineering Languages and Systems, 2008

On the Optimal Selection of k in the k-Anonymity Problem.
Proceedings of the 24th International Conference on Data Engineering, 2008

Towards a scalable model for location privacy.
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, 2008

Evolution strategy based optimization of on-demand dependent data broadcast scheduling.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Security Provisioning in Pervasive Environments Using Multi-objective Optimization.
Proceedings of the Computer Security, 2008

Optimizing on-demand data broadcast scheduling in pervasive environments.
Proceedings of the EDBT 2008, 2008

On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model.
Proceedings of the Data and Applications Security XXII, 2008

Increasing Expressiveness of Composite Events Using Parameter Contexts.
Proceedings of the Advances in Databases and Information Systems, 2008

2007
A lattice-based approach for updating access control policies in real-time.
Inf. Syst., 2007

Using UML to model relational database operations.
Computer Standards & Interfaces, 2007

UML2Alloy: A Challenging Model Transformation.
Proceedings of the Model Driven Engineering Languages and Systems, 2007

A method for early correspondence discovery using instance data.
Proceedings of the ICEIS 2007, 2007

A light-weight static approach to analyzing UML behavioral properties.
Proceedings of the 12th International Conference on Engineering of Complex Computer Systems (ICECCS 2007), 2007

Vulnerability Discovery in Multi-Version Software Systems.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

A Spatio-temporal Role-Based Access Control Model.
Proceedings of the Data and Applications Security XXI, 2007

2006
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach.
IEEE Trans. Dependable Sec. Comput., 2006

Analysis of dependencies in advanced transaction models.
Distributed and Parallel Databases, 2006

Towards a location-based mandatory access control model.
Computers & Security, 2006

Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation.
Proceedings of the Trust Management, 4th International Conference, 2006

LRBAC: A Location-Aware Role-Based Access Control Model.
Proceedings of the Information Systems Security, Second International Conference, 2006

Trust Negotiations with Customizable Anonymity.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

A crossover operator for the k- anonymity problem.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006

On the Completion of Workflows.
Proceedings of the Database and Expert Systems Applications, 17th International Conference, 2006

Aspect-Oriented Risk Driven Development of Secure Applications.
Proceedings of the Data and Applications Security XX, 2006

A Trust Model for Pervasive Computing Environments.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

2005
Applying Semantic Knowledge to Real-Time Update of Access Control Policies.
IEEE Trans. Knowl. Data Eng., 2005

An anonymous and failure resilient fair-exchange e-commerce protocol.
Decision Support Systems, 2005

Short Paper: Towards a Location-Aware Role-Based Access Control Model.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Verifiable composition of access control and application features.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

Anonymity Preserving Techniques in Trust Negotiations.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

Detection for Conflicts of Dependencies in Advanced Transaction Models.
Proceedings of the Ninth International Database Engineering and Applications Symposium (IDEAS 2005), 2005

Event Detection in Multilevel Secure Active Databases.
Proceedings of the Information Systems Security, First International Conference, 2005

VTrust: A Trust Management System Based on a Vector Model of Trust.
Proceedings of the Information Systems Security, First International Conference, 2005

Validation of Policy Integration Using Alloy.
Proceedings of the Distributed Computing and Internet Technology, 2005

Recovering from Malicious Attacks in Workflow Systems.
Proceedings of the Database and Expert Systems Applications, 16th International Conference, 2005

Reliable Scheduling of Advanced Transactions.
Proceedings of the Data and Applications Security XIX, 2005

Relational Database Operations Modeling with UML.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Editors' message for the special issue on security.
Int. J. on Digital Libraries, 2004

An aspect-based approach to modeling access control concerns.
Information & Software Technology, 2004

Aspect-oriented approach to early design modelling.
IEE Proceedings - Software, 2004

Real-time update of access control policies.
Data Knowl. Eng., 2004

Using uml to visualize role-based access control constraints.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

Periodic Scheduling in On-Demand Broadcast System.
Proceedings of the Information Systems Technology and its Applications, 2004

Using Schemas to Simplify Access Control for XML Documents.
Proceedings of the Distributed Computing and Internet Technology, 2004

Modeling Role-Based Access Control Using Parameterized UML Models.
Proceedings of the Fundamental Approaches to Software Engineering, 2004

Ensuring Task Dependencies During Workflow Recovery.
Proceedings of the Database and Expert Systems Applications, 15th International Conference, 2004

Implementing Real-Time Update of Access Control Policies.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

Reducing Damage Assessment Latency in Survivable Databases.
Proceedings of the Key Technologies for Data Management, 2004

Concurrency Control in Mobile Database Systems.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Using Parameterized UML to Specify and Compose Access Control Models.
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003

Concurrent and Real-Time Update of Access Control Policies.
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003

Multilevel Secure Rules and Its Impact on the Design of Active Database Systems.
Proceedings of the New Horizons in Information Management, 2003

2002
Fair exchange in E-commerce.
SIGecom Exchanges, 2002

Designing High Integrity Systems Using Aspects.
Proceedings of the Integrity and Internal Control in Information Systems V, 2002

A cryptographic solution to implement access control in a hierarchy and more.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Using Compatible Keys for Secure Multicasting in E-Commerce.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

Using Aspects to Design a Secure System.
Proceedings of the 8th International Conference on Engineering of Complex Computer Systems (ICECCS 2002), 2002

Anonymous and Secure Multicast Subscription.
Proceedings of the Research Directions in Data and Applications Security, 2002

2001
An Anonymous Electronic Voting Protocol for Voting Over The Internet.
Proceedings of the Third International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS '01), 2001

An Anomymous Fair Exchange E-commerce Protocol.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

Detecting Termination of Active Database Rules Using Symbolic Model Checking.
Proceedings of the Advances in Databases and Information Systems, 2001

2000
Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity.
Inf. Sci., 2000

Failure Analysis of an E-Commerce Protocol Using Model Checking.
Proceedings of the Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000), 2000

An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution.
Proceedings of the Electronic Commerce and Web Technologies, 2000

A Fair-exchange E-commerce Protocol with Automated Dispute Resolution.
Proceedings of the Data and Application Security, 2000

1998
A Semantic-Based Transaction Processing Model for Multilevel Transactions.
Journal of Computer Security, 1998

1997
Applying Formal Methods to Semantic-Based Decomposition of Transactions.
ACM Trans. Database Syst., 1997

Implementing Semantic-Based Decomposition of Transactions.
Proceedings of the Advanced Information Systems Engineering, 1997

Semantic-Based Decomposition of Transactions.
Advanced Transaction Models and Architectures, 1997

1996
Ensuring Atomicity of Multilevel Transactions.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

1995
Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions.
Proceedings of the VLDB'95, 1995


  Loading...