Indrakshi Ray

Orcid: 0000-0002-0714-7676

Affiliations:
  • Colorado State University, USA


According to our database1, Indrakshi Ray authored at least 235 papers between 1995 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Seeing Should Probably Not Be Believing: The Role of Deceptive Support in COVID-19 Misinformation on Twitter.
ACM J. Data Inf. Qual., March, 2023

Adversarial Autoencoder Data Synthesis for Enhancing Machine Learning-Based Phishing Detection Algorithms.
IEEE Trans. Serv. Comput., 2023

The intrinsic dimensionality of network datasets and its applications.
J. Comput. Secur., 2023

Claim Extraction and Dynamic Stance Detection in COVID-19 Tweets.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

Explainable AI for Prioritizing and Deploying Defenses for Cyber-Physical System Resiliency.
Proceedings of the 5th IEEE International Conference on Trust, 2023

Model Based Risk Assessment and Risk Mitigation Framework for Cyber-Physical Systems.
Proceedings of the 5th IEEE International Conference on Trust, 2023

Machine Learning-Based Phishing Detection Using URL Features: A Comprehensive Review.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2023

Workflow Resilience for Mission Critical Systems.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2023

SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

Synthesizing and Analyzing Attribute-Based Access Control Model Generated from Natural Language Policy Statements.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

Sparse Binary Transformers for Multivariate Time Series Modeling.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

Accessibility Evaluation of IoT Android Mobile Companion Apps.
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Poster: Towards a Dataset for the Discrimination between Warranted and Unwarranted Emails.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Cross-Silo Federated Learning Across Divergent Domains with Iterative Parameter Alignment.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Enhancing Investigative Pattern Detection via Inexact Matching and Graph Databases.
IEEE Trans. Serv. Comput., 2022

Towards Performance of NLP Transformers on URL-Based Phishing Detection for Mobile Devices.
J. Ubiquitous Syst. Pervasive Networks, 2022

WiP: The Intrinsic Dimensionality of IoT Networks.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

Automation of Vulnerability Information Extraction Using Transformer-Based Language Models.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

On the Data Privacy, Security, and Risk Postures of IoT Mobile Companion Apps.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

Local Intrinsic Dimensionality of IoT Networks for Unsupervised Intrusion Detection.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

Detecting Secure Memory Deallocation Violations with CBMC.
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022

A Methodology for Energy Usage Prediction in Long-Lasting Abnormal Events.
Proceedings of the 4th IEEE International Conference on Cognitive Machine Intelligence, 2022

Towards Resiliency of Heavy Vehicles through Compromised Sensor Data Reconstruction.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

Attribute Based Access Control Model for Protecting Programmable Logic Controllers.
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022

Security and Privacy for Emerging IoT and CPS Domains.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2021
Behavioral fingerprinting of Internet-of-Things devices.
WIREs Data Mining Knowl. Discov., 2021

Anomaly Detection in COVID-19 Time-Series Data.
SN Comput. Sci., 2021

Directed adversarial sampling attacks on phishing detection.
J. Comput. Secur., 2021

On the Performance of Isolation Forest and Multi Layer Perceptron for Anomaly Detection in Industrial Control Systems Networks.
Proceedings of the 8th International Conference on Internet of Things: Systems, 2021

Detection of Anomalous User Activity for Home IoT Devices.
Proceedings of the 6th International Conference on Internet of Things, 2021

Simulating Measurement Attacks in a Scada System Testbed.
Proceedings of the Critical Infrastructure Protection XV, 2021

Automated Identification of Social Media Bots Using Deepfake Text Detection.
Proceedings of the Information Systems Security - 17th International Conference, 2021

Lightweight URL-based phishing detection using natural language processing transformers for mobile devices.
Proceedings of the 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2021) / The 16th International Conference on Future Networks and Communications (FNC-2021) / The 11th International Conference on Sustainable Energy Information Technology, 2021

Vision: Stewardship of Smart Devices Security for the Aging Population.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021

Trust and Verify: A Complexity-Based IoT Behavioral Enforcement Method.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

Diagnosis, Prevention, and Cure for Misinformation.
Proceedings of the Third IEEE International Conference on Cognitive Machine Intelligence, 2021

Context-Aware IoT Device Functionality Extraction from Specifications for Ensuring Consumer Security.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

"X-Phish: Days of Future Past"‡: Adaptive & Privacy Preserving Phishing Detection.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

Detecting Temporal Dependencies in Data.
Proceedings of the The British International Conference on Databases 2021, 2021

2020
TruckSTM: Runtime Realization of Operational State Transitions for Medium and Heavy Duty Vehicles.
ACM Trans. Cyber Phys. Syst., 2020

Synthesizing DNA molecules with identity-based digital signatures to prevent malicious tampering and enabling source attribution.
J. Comput. Secur., 2020

Towards a Virtual Reality Home IoT Network Visualizer.
CoRR, 2020

Handling Incomplete Information in Policy Evaluation using Attribute Similarity.
Proceedings of the Second IEEE International Conference on Trust, 2020

Improved Phishing Detection Algorithms using Adversarial Autoencoder Synthesized Data.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

Proximal Stochastic AUC Maximization.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

A Machine-learning based Unbiased Phishing Detection Approach.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Proactively Extracting IoT Device Capabilities: An Application to Smart Homes.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

An Autocorrelation-based LSTM-Autoencoder for Anomaly Detection on Time-Series Data.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Chapter Five - Data Warehouse Testing.
Adv. Comput., 2019

ComplexIoT: Behavior-Based Trust For IoT Networks.
Proceedings of the First IEEE International Conference on Trust, 2019

ADQuaTe: An Automated Data Quality Test Approach for Constraint Discovery and Fault Detection.
Proceedings of the 20th IEEE International Conference on Information Reuse and Integration for Data Science, 2019

Investigative Graph Search using Graph Databases.
Proceedings of the First International Conference on Graph Computing, 2019

Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

Adversarial Sampling Attacks Against Phishing Detection.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

Access Control for Internet of Things Applications.
Proceedings of the 5th ACM on Cyber-Physical System Security Workshop, 2019

An Interactive Data Quality Test Approach for Constraint Discovery and Fault Detection.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Secure Transaction Processing.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Editorial.
IEEE Trans. Serv. Comput., 2018

Substring search over encrypted data.
J. Comput. Secur., 2018

Improving Auto-Detection of Phishing Websites using Fresh-Phish Framework.
Int. J. Multim. Data Eng. Manag., 2018

On the design and analysis of protocols for Personal Health Record storage on Personal Data Server devices.
Future Gener. Comput. Syst., 2018

Component-oriented access control - Application servers meet tuple spaces for the masses.
Future Gener. Comput. Syst., 2018

IoTSense: Behavioral Fingerprinting of IoT Devices.
CoRR, 2018

<i>"Kn0w Thy Doma1n Name"</i>: Unbiased Phishing Detection Using Domain Name Based Features.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Independent Key Distribution Protocols for Broadcast Authentication.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

On Sybil Classification in Online Social Networks Using Only Structural Features.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Privacy Preserving Probabilistic Record Linkage Without Trusted Third Party.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Scalable Nonlinear AUC Maximization Methods.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2018

An Approach for Testing the Extract-Transform-Load Process in Data Warehouse Systems.
Proceedings of the 22nd International Database Engineering & Applications Symposium, 2018

Achieving Mobile-Health Privacy Using Attribute-Based Access Control.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

An efficient implementation of next generation access control for the mobile health cloud.
Proceedings of the Third International Conference on Fog and Mobile Edge Computing, 2018

Behavioral Fingerprinting of IoT Devices.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

Attribute-Based Encryption: Applications and Future Directions.
Proceedings of the From Database to Cyber Security, 2018

Towards Service Orchestration in XML Filtering Overlays.
Proceedings of the New Trends in Databases and Information Systems, 2018

2017
AUC Maximization with K-hyperplane.
CoRR, 2017

On the formalization, design, and implementation of component-oriented access control in lightweight virtualized server environments.
Comput. Secur., 2017

Using a History-based Profile to Detect and Respond to DDoS Attacks.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Using Attribute-Based Access Control for Remote Healthcare Monitoring.
Proceedings of the 2017 Fourth International Conference on Software Defined Systems, 2017

Keynote speech 2: Attribute-based access control status and directions.
Proceedings of the 2017 Fourth International Conference on Software Defined Systems, 2017

A Precedence Graph-Based Approach to Detect Message Injection Attacks in J1939 Based Networks.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Fresh-Phish: A Framework for Auto-Detection of Phishing Websites.
Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, 2017

History-Based Throttling of Distributed Denial-of-Service Attacks.
Proceedings of the E-Business and Telecommunications - 14th International Joint Conference, 2017

A Distributed Mechanism to Protect Against DDoS Attacks.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Attribute Based Access Control for Healthcare Resources.
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017

POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

POSTER: PriReMat: A Distributed Tool for Privacy Preserving Record Linking in Healthcare.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Towards Access Control for Isolated Applications.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Enhancing applications with filtering of XML message streams.
Proceedings of the 20th International Database Engineering & Applications Symposium, 2016

Practical DoS Attacks on Embedded Networks in Commercial Vehicles.
Proceedings of the Information Systems Security - 12th International Conference, 2016

A Generic Digital Forensic Investigation Framework for Internet of Things (IoT).
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud, 2016

Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Compacted Bloom Filter.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Specification and Enforcement of Location-Aware Attribute-Based Access Control for Online Social Networks.
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016

Component-Oriented Access Control for Deployment of Application Services in Containerized Environments.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

Applying attribute based access control for privacy preserving health data disclosure.
Proceedings of the 2016 IEEE-EMBS International Conference on Biomedical and Health Informatics, 2016

Confidence-Weighted Bipartite Ranking.
Proceedings of the Advanced Data Mining and Applications - 12th International Conference, 2016

2015
Security, trust, and resilience of distributed networks and systems.
Secur. Commun. Networks, 2015

Using Slicing to Improve the Performance of Model Invariant Checking.
J. Object Technol., 2015

Building high assurance human-centric decision systems.
Autom. Softw. Eng., 2015

Analyzing Regulatory Conformance in Medical Research Systems Using Multi-Paradigm Modeling.
Proceedings of the Joint Proceedings of the 3rd International Workshop on the Globalization Of Modeling Languages and the 9th International Workshop on Multi-Paradigm Modeling co-located with ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems, 2015

Modeling of Online Social Network Policies Using an Attribute-Based Access Control Framework.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Stream Processing with Secure Information Flow Constraints.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Privacy Preserving Record Matching Using Automated Semi-trusted Broker.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Analysis of a Relationship Based Access Control Model.
Proceedings of the Eighth International C* Conference on Computer Science & Software Engineering, 2015

Towards Efficient Dissemination and Filtering of XML Data Streams.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Satisfiability Analysis of Workflows with Control-Flow Patterns and Authorization Constraints.
IEEE Trans. Serv. Comput., 2014

Enforcing the Chinese wall model for tenant conflict of interest in the service cloud.
Int. J. Bus. Process. Integr. Manag., 2014

Enforcing spatio-temporal access control in mobile applications.
Computing, 2014

Analysing Requirements to Detect Latent Security Vulnerabilities.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Audit Log Management in MongoDB.
Proceedings of the 2014 IEEE World Congress on Services, 2014

A Responsive Defense Mechanism Against DDoS Attacks.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

ELITE: zEro Links Identity managemenT systEm.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2013
Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model.
IEEE Syst. J., 2013

On the Efficient Processing of Multilevel Secure Continuous Queries.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Auditing Requirements for Implementing the Chinese Wall Model in the Service Cloud.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Information flow control for stream processing in clouds.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Specification and analysis of access control policies for mobile applications.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Analyzing Behavioral Refactoring of Class Models.
Proceedings of the Workshop on Models and Evolution co-located with ACM/IEEE 16th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2013), 2013

Contract-Aware Slicing of UML Class Models.
Proceedings of the Model-Driven Engineering Languages and Systems, 2013

An Approach to Analyzing Temporal Properties in UML Class Models.
Proceedings of the 10th International Workshop on Model Driven Engineering, 2013

Rigorous Analysis of Temporal Access Control Properties in Mobile Systems.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013

Distributed Multilevel Secure Data Stream Processing.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

A Model for Trust-Based Access Control and Delegation in Mobile Clouds.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Personal health record storage on privacy preserving green clouds.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

2012
Multilevel secure data stream processing: Architecture and implementation.
J. Comput. Secur., 2012

Utility driven optimization of real time data broadcast schedules.
Appl. Soft Comput., 2012

Query Plan Execution in a Heterogeneous Stream Management System for Situational Awareness.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Systematic Scenario-Based Analysis of UML Design Class Models.
Proceedings of the 17th IEEE International Conference on Engineering of Complex Computer Systems, 2012

2011
k-Anonymization in the Presence of Publisher Preferences.
IEEE Trans. Knowl. Data Eng., 2011

On the formalization and analysis of a spatio-temporal role-based access control model.
J. Comput. Secur., 2011

Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization.
J. Comput. Secur., 2011

When does a workflow complete?
Comput. Stand. Interfaces, 2011

Rigorous Analysis of UML Access Control Policy Models.
Proceedings of the POLICY 2011, 2011

Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011

Supporting Iterative Development of Robust Operation Contracts in UML Requirements Models.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

Multilevel Secure Data Stream Processing.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

2010
Verification and Trade-Off Analysis of Security Properties in UML System Models.
IEEE Trans. Software Eng., 2010

Trust-Based Security Level Evaluation Using Bayesian Belief Networks.
Trans. Comput. Sci., 2010

On challenges of model transformation from UML to Alloy.
Softw. Syst. Model., 2010

Real time stochastic scheduling in broadcast systems with decentralized data storage.
Real Time Syst., 2010

Secure Personal Data Servers: a Vision Paper.
Proc. VLDB Endow., 2010

Using Graph Theory to Represent a Spatio-Temporal Role-Based Access Control Model.
Int. J. Next Gener. Comput., 2010

Using Graph Theory to Represent a Spatio-Temporal Role-Based Access Control Model.
Int. J. Next Gener. Comput., 2010

On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS.
Proceedings of the Security and Privacy in Communication Networks, 2010

Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

Using Trust-Based Information Aggregation for Predicting Security Level of Systems.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

On the Identification of Property Based Generalizations in Microdata Anonymization.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

2009
Secure Transaction Processing.
Proceedings of the Encyclopedia of Database Systems, 2009

Towards Achieving Personalized Privacy for Location-Based Services.
Trans. Data Priv., 2009

An interoperable context sensitive model of trust.
J. Intell. Inf. Syst., 2009

An aspect-oriented methodology for designing secure applications.
Inf. Softw. Technol., 2009

Using alloy to analyse a spatio-temporal access control model supporting delegation.
IET Inf. Secur., 2009

Ensuring spatio-temporal access control for real-world applications.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Towards Trustworthy Delegation in Role-Based Access Control Model.
Proceedings of the Information Security, 12th International Conference, 2009

A Rigorous Approach to Uncovering Security Policy Violations in UML Designs.
Proceedings of the 14th IEEE International Conference on Engineering of Complex Computer Systems, 2009

A multi-objective approach to data sharing with privacy constraints and preference based objectives.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

On the comparison of microdata disclosure control algorithms.
Proceedings of the EDBT 2009, 2009

A Trust-Based Access Control Model for Pervasive Computing Applications.
Proceedings of the Data and Applications Security XXIII, 2009

POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
Editorial.
ACM Trans. Inf. Syst. Secur., 2008

A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications.
Proceedings of the Trust, 2008

Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy.
Proceedings of the Parallel Problem Solving from Nature, 2008

Scenario-Based Static Analysis of UML Class Models.
Proceedings of the Model Driven Engineering Languages and Systems, 2008

On the Optimal Selection of k in the k-Anonymity Problem.
Proceedings of the 24th International Conference on Data Engineering, 2008

Towards a scalable model for location privacy.
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, 2008

Evolution strategy based optimization of on-demand dependent data broadcast scheduling.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Security Provisioning in Pervasive Environments Using Multi-objective Optimization.
Proceedings of the Computer Security, 2008

Optimizing on-demand data broadcast scheduling in pervasive environments.
Proceedings of the EDBT 2008, 2008

On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model.
Proceedings of the Data and Applications Security XXII, 2008

Increasing Expressiveness of Composite Events Using Parameter Contexts.
Proceedings of the Advances in Databases and Information Systems, 2008

2007
A lattice-based approach for updating access control policies in real-time.
Inf. Syst., 2007

Using UML to model relational database operations.
Comput. Stand. Interfaces, 2007

UML2Alloy: A Challenging Model Transformation.
Proceedings of the Model Driven Engineering Languages and Systems, 2007

A method for early correspondence discovery using instance data.
Proceedings of the ICEIS 2007, 2007

A light-weight static approach to analyzing UML behavioral properties.
Proceedings of the 12th International Conference on Engineering of Complex Computer Systems (ICECCS 2007), 2007

Vulnerability Discovery in Multi-Version Software Systems.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

A Spatio-temporal Role-Based Access Control Model.
Proceedings of the Data and Applications Security XXI, 2007

2006
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach.
IEEE Trans. Dependable Secur. Comput., 2006

Analysis of dependencies in advanced transaction models.
Distributed Parallel Databases, 2006

Towards a location-based mandatory access control model.
Comput. Secur., 2006

Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation.
Proceedings of the Trust Management, 4th International Conference, 2006

LRBAC: A Location-Aware Role-Based Access Control Model.
Proceedings of the Information Systems Security, Second International Conference, 2006

Trust Negotiations with Customizable Anonymity.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

A crossover operator for the <i>k-</i> anonymity problem.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006

On the Completion of Workflows.
Proceedings of the Database and Expert Systems Applications, 17th International Conference, 2006

Aspect-Oriented Risk Driven Development of Secure Applications.
Proceedings of the Data and Applications Security XX, 2006

A Trust Model for Pervasive Computing Environments.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

2005
Applying Semantic Knowledge to Real-Time Update of Access Control Policies.
IEEE Trans. Knowl. Data Eng., 2005

An anonymous and failure resilient fair-exchange e-commerce protocol.
Decis. Support Syst., 2005

Short Paper: Towards a Location-Aware Role-Based Access Control Model.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Verifiable composition of access control and application features.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

Anonymity Preserving Techniques in Trust Negotiations.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

Detection for Conflicts of Dependencies in Advanced Transaction Models.
Proceedings of the Ninth International Database Engineering and Applications Symposium (IDEAS 2005), 2005

Event Detection in Multilevel Secure Active Databases.
Proceedings of the Information Systems Security, First International Conference, 2005

VTrust: A Trust Management System Based on a Vector Model of Trust.
Proceedings of the Information Systems Security, First International Conference, 2005

Validation of Policy Integration Using Alloy.
Proceedings of the Distributed Computing and Internet Technology, 2005

Recovering from Malicious Attacks in Workflow Systems.
Proceedings of the Database and Expert Systems Applications, 16th International Conference, 2005

Reliable Scheduling of Advanced Transactions.
Proceedings of the Data and Applications Security XIX, 2005

Relational Database Operations Modeling with UML.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Editors' message for the special issue on security.
Int. J. Digit. Libr., 2004

An aspect-based approach to modeling access control concerns.
Inf. Softw. Technol., 2004

Aspect-oriented approach to early design modelling.
IEE Proc. Softw., 2004

Real-time update of access control policies.
Data Knowl. Eng., 2004

Using uml to visualize role-based access control constraints.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

Periodic Scheduling in On-Demand Broadcast System.
Proceedings of the Information Systems Technology and its Applications, 2004

Using Schemas to Simplify Access Control for XML Documents.
Proceedings of the Distributed Computing and Internet Technology, 2004

Modeling Role-Based Access Control Using Parameterized UML Models.
Proceedings of the Fundamental Approaches to Software Engineering, 2004

Ensuring Task Dependencies During Workflow Recovery.
Proceedings of the Database and Expert Systems Applications, 15th International Conference, 2004

Implementing Real-Time Update of Access Control Policies.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

Reducing Damage Assessment Latency in Survivable Databases.
Proceedings of the Key Technologies for Data Management, 2004

Concurrency Control in Mobile Database Systems.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Using Parameterized UML to Specify and Compose Access Control Models.
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003

Concurrent and Real-Time Update of Access Control Policies.
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003

Multilevel Secure Rules and Its Impact on the Design of Active Database Systems.
Proceedings of the New Horizons in Information Management, 2003

2002
Fair exchange in E-commerce.
SIGecom Exch., 2002

Designing High Integrity Systems Using Aspects.
Proceedings of the Integrity and Internal Control in Information Systems V, 2002

A cryptographic solution to implement access control in a hierarchy and more.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Using Compatible Keys for Secure Multicasting in E-Commerce.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

Using Aspects to Design a Secure System.
Proceedings of the 8th International Conference on Engineering of Complex Computer Systems (ICECCS 2002), 2002

Anonymous and Secure Multicast Subscription.
Proceedings of the Research Directions in Data and Applications Security, 2002

2001
An Anonymous Electronic Voting Protocol for Voting Over The Internet.
Proceedings of the Third International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS '01), 2001

An Anomymous Fair Exchange E-commerce Protocol.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

Detecting Termination of Active Database Rules Using Symbolic Model Checking.
Proceedings of the Advances in Databases and Information Systems, 2001

2000
Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity.
Inf. Sci., 2000

Failure Analysis of an E-Commerce Protocol Using Model Checking.
Proceedings of the Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000), 2000

An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution.
Proceedings of the Electronic Commerce and Web Technologies, 2000

A Fair-exchange E-commerce Protocol with Automated Dispute Resolution.
Proceedings of the Data and Application Security, 2000

1998
A Semantic-Based Transaction Processing Model for Multilevel Transactions.
J. Comput. Secur., 1998

1997
Applying Formal Methods to Semantic-Based Decomposition of Transactions.
ACM Trans. Database Syst., 1997

Implementing Semantic-Based Decomposition of Transactions.
Proceedings of the Advanced Information Systems Engineering, 1997

Semantic-Based Decomposition of Transactions.
Proceedings of the Advanced Transaction Models and Architectures, 1997

1996
Ensuring Atomicity of Multilevel Transactions.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

1995
Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions.
Proceedings of the VLDB'95, 1995


  Loading...