Ravi Mukkamala

Orcid: 0000-0001-6323-9789

Affiliations:
  • Old Dominion University, Norfolk, Virginia, USA


According to our database1, Ravi Mukkamala authored at least 139 papers between 1988 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Lightweight, geo-scalable deterministic blockchain design for 5G networks sliced applications with hierarchical CFT/BFT consensus groups, IPFS and novel hardware design.
Internet Things, April, 2024

Towards Trust and Reputation as a Service in a Blockchain-based Decentralized Marketplace.
CoRR, 2024

Improving Query Performance in RaaS: A Framework for Reputation As a Service in Decentralized Marketplaces.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

SliceGPT - OpenAI GPT-3.5 LLM, Blockchain and Non-Fungible Token Enabled Intelligent 5G/6G Network Slice Broker and Marketplace.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Reasoning About Expected Job Completion Time in Dynamic Vehicular Clouds.
IEEE Trans. Intell. Transp. Syst., August, 2023

Octopus: privacy preserving peer-to-peer transactions system with InterPlanetary file system (IPFS).
Int. J. Inf. Sec., June, 2023

Blockchain, NFT, Federated Learning and Model Cards enabled UAV Surveillance System for 5G/6G Network Sliced Environment.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

Improved Schemes for Managing Reputation in a Blockchain-based Decentralized Marketplace.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

A Smart Contract-based Decentralized Marketplace System to Promote Reviewer Anonymity.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

Using Cuckoo Filters to Improve Performance in Object Store-based Very Large Databases.
Proceedings of the 13th IEEE Annual Computing and Communication Workshop and Conference, 2023

GreenThread - Blockchain, Non-Fungible Token(NFT), Model Cards, Self-Sovereign Identity and IPFS Enabled Sustainable Circular Fashion Platform.
Proceedings of the Annual Modeling and Simulation Conference, 2023

2022
Casper: a blockchain-based system for efficient and secure customer credential verification.
J. Bank. Financial Technol., 2022

A Framework for a Blockchain-Based Decentralized Data Marketplace.
Proceedings of the Wireless Internet - 15th EAI International Conference, 2022

Moose: A Scalable Blockchain Architecture for 5G Enabled IoT with Sharding and Network Slicing.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Managing Reputation Scores in a Blockchain-based Decentralized Marketplace.
Proceedings of the 4th IEEE International Conference on Trust, 2022

Skunk - A Blockchain and Zero Trust Security Enabled Federated Learning Platform for 5G/6G Network Slicing.
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022

Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace.
Proceedings of the IEEE Military Communications Conference, 2022

Job Migration in Dynamic Vehicular Cloud Under Multiple Access Points.
Proceedings of the IEEE Global Conference on Artificial Intelligence and Internet of Things, 2022

Bassa-ML - A Blockchain and Model Card Integrated Federated Learning Provenance Platform.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

LUUNU - Blockchain, MISP, Model Cards and Federated Learning Enabled Cyber Threat Intelligence Sharing Platform.
Proceedings of the Annual Modeling and Simulation Conference, 2022

2021
Approximating Expected Job Completion Time in Dynamic Vehicular Clouds.
Proceedings of the MobiWac '21: Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access, Alicante, Spain, November 22, 2021

Let'sTrace - Blockchain, Federated Learning and TUF/In-ToTo Enabled Cyber Supply Chain Provenance Platform.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

2020
A Tight Estimate of Job Completion Time in Vehicular Clouds.
IEEE Trans. Cloud Comput., 2020

Measuring Decentrality in Blockchain Based Systems.
IEEE Access, 2020

Is Ethereum's ProgPoW ASIC Resistant?
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Leveraging Federated Clouds for Improving Blockchain Performance.
Proceedings of the Cloud Computing - CLOUD 2020, 2020

2019
ASAP: An Agent-Assisted Smart Auction-Based Parking System in Internet of Things.
Proceedings of the 9th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2019

Towards Approximating Expected Job Completion Time in Dynamic Vehicular Clouds.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019

2017
Validating the Correctness of Outsourced Computational Tasks Using Pseudorandom Number Generators.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
Privacy-Aware Big Data Warehouse Architecture.
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016

2015
Deep convolutional neural networks for annotating gene expression patterns in the mouse brain.
BMC Bioinform., 2015

Dataless Data Mining: Association Rules-Based Distributed Privacy-Preserving Data Mining.
Proceedings of the 12th International Conference on Information Technology, 2015

Privacy-preserving frequent itemset mining in outsourced transaction databases.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

2014
Scheduling in vehicular cloud using mixed integer linear programming.
Proceedings of the first international workshop on Mobile sensing, 2014

A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom Filters.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2013
Data Integrity Evaluation in Cloud Database-as-a-Service.
Proceedings of the IEEE Ninth World Congress on Services, 2013

2012
Analyzing a subsystem to identify properties of a large system: an application in airline routing decisions.
Proceedings of the 2012 Spring Simulation Multiconference, 2012

Privacy-Preserving Data Management in Mobile Environments: A Partial Encryption Approach.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012

Data Outsourcing in Cloud Environments: A Privacy Preserving Approach.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

Preserving privacy of outsourced data: A cluster-based approach.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

Efficient privacy-preserving data distribution in outsourced environments: a fragmentation-based approach.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

2011
Data mining without data: a novel approach to privacy-preserving collaborative distributed data mining.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Fuzzy-based Methods for Privacy-Preserving Data Mining.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

Employing Bloom Filters for Enforcing Integrity of Outsourced Databases in Cloud Environments.
Proceedings of the Advances in Computing and Communications, 2011

Space-Efficient Bloom Filters for Enforcing Integrity of Outsourced Data in Cloud Environments.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Scheduling-capable autonomic manager for policy-based IT change management system.
Enterp. Inf. Syst., 2010

Similarity coefficient generators for network forensics.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Improving Transaction Success Rate by Detecting and Correcting Access Control Misconfigurations.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Measuring The Effect of Modeling Assumptions on Estimating Origin-Destination Airport Passenger Traffic.
Proceedings of the 2009 International Conference on Modeling, 2009

Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper).
Proceedings of the Information Systems Security, 5th International Conference, 2009

Design and Anlysis of Cryptographically Strong S-Boxes: A Novel Approach.
Proceedings of the 2009 International Conference on Security & Management, 2009

Towards Energy Efficient Change Management in a Cloud Computing Environment.
Proceedings of the Scalability of Networks and Services, 2009

2008
Improving runway capacity: an integrated approach using modeling, simulation, and analysis.
Proceedings of the 2008 Spring Simulation Multiconference, 2008

Secure Web-Based Sharing of Health Information Services Using Ad-Hoc Dynamic Coalitions.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Revisiting Bluetooth Security (Short Paper).
Proceedings of the Information Systems Security, 4th International Conference, 2008

High Performance Implementation of Binomial Option Pricing.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

Coalition Service Registry for Ad-hoc Dynamic Coalitions.
Proceedings of the International Conference on Enterprise Information Systems and Web Technologies, 2008

Efficient Parallel Implementations of Binomial Tree Option Price Valuation.
Proceedings of the ISCA 21st International Conference on Parallel and Distributed Computing and Communication Systems, 2008

2007
A decentralized execution model for inter-organizational workflows.
Distributed Parallel Databases, 2007

Using semantics for automatic enforcement of access control policies among dynamic coalitions.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Infrastructure-Aware Autonomic Manager for Change Management.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Framework for Information Sharing Across Multiple Government Agencies under Dynamic Access Policies.
Proceedings of the The Second International Conference on Availability, 2007

2006
Dynamic combinatorial key management scheme for sensor networks.
Wirel. Commun. Mob. Comput., 2006

A novel collusion-resilient architecture for secure group communication in wireless ad-hoc networks.
J. High Speed Networks, 2006

Dynamic key management in sensor networks.
IEEE Commun. Mag., 2006

Fair and secure m-cash.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach.
Proceedings of the Data and Applications Security XX, 2006

2005
An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies.
Proceedings of the Information Systems Security, First International Conference, 2005

A Standards-Based Approach for Supporting Dynamic Access Policies for a Federated Digital Library.
Proceedings of the Digital Libraries: Implementing Strategies and Sharing Experiences, 2005

A Flexible Framework for Content-Based Access Management for Federated Digital Libraries.
Proceedings of the Research and Advanced Technology for Digital Libraries, 2005

A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights.
Proceedings of the Digital Rights Management: Technologies, 2005

A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions.
Proceedings of the Data and Applications Security XIX, 2005

2004
A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions.
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

CKDS: an efficient combinatorial key distribution scheme for wireless ad-hoc networks.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Efficient Secure Multicast with Well-Populated Multicast Key Trees.
Proceedings of the 10th International Conference on Parallel and Distributed Systems, 2004

MobiCoin: Digital Cash for M-Commerce.
Proceedings of the Distributed Computing and Internet Technology, 2004

TKGS: Verifiable Threshold-Based Key Generation Scheme in Open Wireless Ad Hoc Networks.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004

Access Management in Federated Digital Libraries.
Proceedings of the IADIS International Conference WWW/Internet 2004, 2004

Policy-based Security Management for Enterprise Systems.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

A Systematic Approach to Security Deployment in a Networking Environment.
Proceedings of the International Conference on Security and Management, 2004

EZ-Park: An Innovative Secure M-Commerce Application.
Proceedings of the International Conference on Security and Management, 2004

Delegation Active Certificates: Protocols and Privilege Management.
Proceedings of the 2nd International Conference Computing, 2004

2003
A Reasoning Framework for Optimal Design Decisions.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'03, June 23, 2003

ECPV: Efficient Certificate Path Validation in Public-key Infrastructure.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

A PKI Architecture for Academic Institutions: Design and Prototype.
Proceedings of the International Conference on Security and Management, 2003

2002
Employing an extended transaction model in multilevel secure transaction processing.
Informatica (Slovenia), 2002

QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI).
Proceedings of the Progress in Cryptology, 2002

Security in Distributed Digital Libraries: Issues and Challenges .
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002

Active Certificates: A New Paradigm in Digital Certificate Management.
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002

Recertification: A Technique to Improve Services in PKI.
Proceedings of the Research Directions in Data and Applications Security, 2002

2001
Correction to 'Integrating Security and Real-Time Requirements Using Covert Channel Capacity'.
IEEE Trans. Knowl. Data Eng., 2001

Multilevel Security Transaction Processing.
J. Comput. Secur., 2001

Modeling and Evaluation of Distributed Workflow Algorithms.
Proceedings of the World Multiconference on Systemics, Cybernetics and Informatics, 2001

A Novel Approach to Certificate Revocation Management.
Proceedings of the Database and Application Security XV, 2001

An Extended Transaction Model Approach for Multilevel Secure Transaction Processing.
Proceedings of the Database and Application Security XV, 2001

2000
Integrating Security and Real-Time Requirements Using Covert Channel Capacity.
IEEE Trans. Knowl. Data Eng., 2000

Modeling and Evaluation of Redesigning Methodologies for Distributed Workflows.
Proceedings of the MASCOTS 2000, Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 29 August, 2000

1999
Modeling Memory Reference Patterns of Programs in Cache Memory Systems.
Proceedings of the MASCOTS 1999, 1999

Integrating Data Mining Techniques with Intrusion Detection Methods.
Proceedings of the Research Advances in Database and Information Systems Security, 1999

1998
Routing and admission control of real-time channels.
Proceedings of the 10th Euromicro Conference on Real-Time Systems (ECRTS 1998), 1998

1997
CoProcess: A Java-based Environment for Collaborative Process Management Over the Web.
Proceedings of WebNet 97, 1997

A Two-tier Coarse Indexing Scheme for MLS Database Systems.
Proceedings of the Database Securty XI: Status and Prospects, 1997

1996
Scalability in real-time systems with end-to-end requirements.
J. Syst. Archit., 1996

A Performance Comparison of Five Transaction Processing Algorithms for the SINTRA Replicated-Architecture Database system.
J. Comput. Secur., 1996

A privilege management and enforcement system for distributed resource sharing.
Proceedings of the 5th Workshop on Enabling Technologies, 1996

PMES: privilege mangagement and enforcement system for secure distributed resource sharing.
Proceedings of the Advanced IT Tools, 1996

Multilevel Secure Transaction Processing: Status and Prospects.
Proceedings of the Database Security Volume X, 1996

Reduction in Transaction Conflicts Using Semantics-Based Concurrency Control.
Proceedings of the Performance of Concurrency Control Mechanisms in Centralized Database Systems., 1996

1995
Mosaic + XTV = CoReview.
Comput. Networks ISDN Syst., 1995

Supporting security requirements in multilevel real-time databases.
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995

Schedulability related issues in end-to-end systems.
Proceedings of the 1st IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '95), 1995

Issues in schedulability analysis of real-time systems.
Proceedings of the 7th Euromicro Workshop on Real-Time Systems, 1995

A Secure Concurrency Control Protocol for Real-Time Databases.
Proceedings of the Database Security IX: Status and Prospects, 1995

1994
Storage Efficient and Secure Replicated Distribted Databases.
IEEE Trans. Knowl. Data Eng., 1994

A View-Based Dynamic Replication Control Algorithm.
Nord. J. Comput., 1994

RAIN (Redundant Array of Inexpensive Networks): Expanding Existing Networks to Support Multitraffic Performance.
Proceedings of the High Performance Networking V, Proceedings of the IFIP TC6/WG6.4 Fifth International Conference on High Performance Networking, Grenoble, France, 27 June, 1994

Architectural impact on performance of a multilevel database system.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994

1993
Measuring the effect of commutative transactions on distributed database performance.
Inf. Sci., 1993

A Performance Comparison of two Decomposition Techniques for Multilevel Secure Database Systems.
Proceedings of the Database Security, 1993

Performance Analysis of Transaction Management Algorithms for the SINTRA Replicated-Architecture Database System.
Proceedings of the Database Security, 1993

1992
Measuring the Effects of Distributed Database Models on Transaction Availability Measures.
Perform. Evaluation, 1992

Dynamic Allocation of Bandwidth in Multichannel Metropolitan Area Networks.
Comput. Networks ISDN Syst., 1992

Modeling and analysis of high speed parallel token ring networks.
Proceedings of the 17th Conference on Local Computer Networks, 1992

Multiprocessor Architectures for High Speed Networks: A Performance Study.
Proceedings of the Algorithms, Software, Architecture, 1992

Concurrent Use of Parallel Communication to Enable Remote Visualization.
Proceedings of the Computing and Information, 1992

Parallel TCP/IP for Multiprocessor Workstations.
Proceedings of the High Performance Networking IV, 1992

1991
A Note on Estimating the Cardinality of the Projection of a Database Relation.
ACM Trans. Database Syst., 1991

A Distributed Scheduling Algorithm for Heterogeneous Real-Time Systems.
Proceedings of the Advances in Computing and Information, 1991

Effects of SeaView Decomposition of Multilevel Relations on Database Performance.
Proceedings of the Database Security, 1991

1990
Efficient Schemes to Evaluate Transaction Performance in Distributed Database Systems.
Comput. J., 1990

Pipelining Data Compression Algorithms.
Comput. J., 1990

Effects of distributed database modeling on evaluation of transaction rollbacks.
Proceedings of the 22th Winter Simulation Conference, 1990

1989
Measuring the Effects of Data Distribution Models on Performance Evaluation of Distributed Database Systems.
IEEE Trans. Knowl. Data Eng., 1989

Some Properties of View-Based Replication Control Algorithms for Distributed Systems.
Inf. Process. Lett., 1989

Traffic Placement Policies for Multi-Band Network.
Proceedings of the ACM Symposium on Communications Architectures & Protocols, 1989

Measuring the Effect of Data Distribution and Replication Models on Performance Evaluation of Distributed Database Systems.
Proceedings of the Fifth International Conference on Data Engineering, 1989

1988
Design of Partially Replicated Distributed Database Systems: An Integrated Methodology.
Proceedings of the 1988 ACM SIGMETRICS conference on Measurement and modeling of computer systems, 1988

Performance Comparision of Two Multiprocessor B-Link Tree Implementations.
Proceedings of the International Conference on Parallel Processing, 1988

A Heuristic Algorithm for Determining a Near-optimal Set of Nodes to Access in a Partially Replicated Distributed Database System.
Proceedings of the Fourth International Conference on Data Engineering, 1988


  Loading...