Ravi Mukkamala
Orcid: 0000-0001-6323-9789Affiliations:
- Old Dominion University, Norfolk, Virginia, USA
According to our database1,
Ravi Mukkamala
authored at least 144 papers
between 1988 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on cs.odu.edu
On csauthors.net:
Bibliography
2024
Lightweight, geo-scalable deterministic blockchain design for 5G networks sliced applications with hierarchical CFT/BFT consensus groups, IPFS and novel hardware design.
Internet Things, April, 2024
Towards Trust and Reputation as a Service in a Blockchain-based Decentralized Marketplace.
CoRR, 2024
Autonomous Strike UAVs in Support of Homeland Security Missions: Challenges and Preliminary Solutions.
IEEE Access, 2024
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2024
RMF-GPT - OpenAI GPT-3.5 LLM, Blockchain, NFT, Model Cards and OpenScap Enabled Intelligent RMF Automation System.
Proceedings of the International Conference on Computing, Networking and Communications, 2024
Improving Query Performance in RaaS: A Framework for Reputation As a Service in Decentralized Marketplaces.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
An Adaptive Drone-based Multigenerational Sensor System for Monitoring Large Ecosystems.
Proceedings of the 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2024
SliceGPT - OpenAI GPT-3.5 LLM, Blockchain and Non-Fungible Token Enabled Intelligent 5G/6G Network Slice Broker and Marketplace.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024
2023
IEEE Trans. Intell. Transp. Syst., August, 2023
Octopus: privacy preserving peer-to-peer transactions system with InterPlanetary file system (IPFS).
Int. J. Inf. Sec., June, 2023
Proceedings of the 2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2023
Blockchain, NFT, Federated Learning and Model Cards enabled UAV Surveillance System for 5G/6G Network Sliced Environment.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023
Improved Schemes for Managing Reputation in a Blockchain-based Decentralized Marketplace.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023
A Smart Contract-based Decentralized Marketplace System to Promote Reviewer Anonymity.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023
Using Cuckoo Filters to Improve Performance in Object Store-based Very Large Databases.
Proceedings of the 13th IEEE Annual Computing and Communication Workshop and Conference, 2023
GreenThread - Blockchain, Non-Fungible Token(NFT), Model Cards, Self-Sovereign Identity and IPFS Enabled Sustainable Circular Fashion Platform.
Proceedings of the Annual Modeling and Simulation Conference, 2023
2022
Casper: a blockchain-based system for efficient and secure customer credential verification.
J. Bank. Financial Technol., 2022
Proceedings of the Wireless Internet - 15th EAI International Conference, 2022
Moose: A Scalable Blockchain Architecture for 5G Enabled IoT with Sharding and Network Slicing.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
Proceedings of the 4th IEEE International Conference on Trust, 2022
Skunk - A Blockchain and Zero Trust Security Enabled Federated Learning Platform for 5G/6G Network Slicing.
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022
Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace.
Proceedings of the IEEE Military Communications Conference, 2022
Proceedings of the IEEE Global Conference on Artificial Intelligence and Internet of Things, 2022
Bassa-ML - A Blockchain and Model Card Integrated Federated Learning Provenance Platform.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
LUUNU - Blockchain, MISP, Model Cards and Federated Learning Enabled Cyber Threat Intelligence Sharing Platform.
Proceedings of the Annual Modeling and Simulation Conference, 2022
2021
Proceedings of the MobiWac '21: Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access, Alicante, Spain, November 22, 2021
Let'sTrace - Blockchain, Federated Learning and TUF/In-ToTo Enabled Cyber Supply Chain Provenance Platform.
Proceedings of the 2021 IEEE Military Communications Conference, 2021
2020
IEEE Trans. Cloud Comput., 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the Cloud Computing - CLOUD 2020, 2020
2019
Proceedings of the 9th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2019
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019
2017
Validating the Correctness of Outsourced Computational Tasks Using Pseudorandom Number Generators.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
2016
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016
2015
Deep convolutional neural networks for annotating gene expression patterns in the mouse brain.
BMC Bioinform., 2015
Dataless Data Mining: Association Rules-Based Distributed Privacy-Preserving Data Mining.
Proceedings of the 12th International Conference on Information Technology, 2015
Proceedings of the 2015 International Conference on Advances in Computing, 2015
2014
Proceedings of the first international workshop on Mobile sensing, 2014
A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom Filters.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
2013
Proceedings of the IEEE Ninth World Congress on Services, 2013
2012
Analyzing a subsystem to identify properties of a large system: an application in airline routing decisions.
Proceedings of the 2012 Spring Simulation Multiconference, 2012
Privacy-Preserving Data Management in Mobile Environments: A Partial Encryption Approach.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012
Efficient privacy-preserving data distribution in outsourced environments: a fragmentation-based approach.
Proceedings of the 2012 International Conference on Advances in Computing, 2012
2011
Data mining without data: a novel approach to privacy-preserving collaborative distributed data mining.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011
Employing Bloom Filters for Enforcing Integrity of Outsourced Databases in Cloud Environments.
Proceedings of the Advances in Computing and Communications, 2011
Space-Efficient Bloom Filters for Enforcing Integrity of Outsourced Data in Cloud Environments.
Proceedings of the IEEE International Conference on Cloud Computing, 2011
2010
Enterp. Inf. Syst., 2010
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010
Improving Transaction Success Rate by Detecting and Correcting Access Control Misconfigurations.
Proceedings of the 2010 International Conference on Security & Management, 2010
2009
Measuring The Effect of Modeling Assumptions on Estimating Origin-Destination Airport Passenger Traffic.
Proceedings of the 2009 International Conference on Modeling, 2009
Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper).
Proceedings of the Information Systems Security, 5th International Conference, 2009
Design and Anlysis of Cryptographically Strong S-Boxes: A Novel Approach.
Proceedings of the 2009 International Conference on Security & Management, 2009
Proceedings of the Scalability of Networks and Services, 2009
2008
Improving runway capacity: an integrated approach using modeling, simulation, and analysis.
Proceedings of the 2008 Spring Simulation Multiconference, 2008
Secure Web-Based Sharing of Health Information Services Using Ad-Hoc Dynamic Coalitions.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008
Coalition Service Registry for Ad-hoc Dynamic Coalitions.
Proceedings of the International Conference on Enterprise Information Systems and Web Technologies, 2008
Efficient Parallel Implementations of Binomial Tree Option Price Valuation.
Proceedings of the ISCA 21st International Conference on Parallel and Distributed Computing and Communication Systems, 2008
2007
Distributed Parallel Databases, 2007
Using semantics for automatic enforcement of access control policies among dynamic coalitions.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Framework for Information Sharing Across Multiple Government Agencies under Dynamic Access Policies.
Proceedings of the The Second International Conference on Availability, 2007
2006
Wirel. Commun. Mob. Comput., 2006
A novel collusion-resilient architecture for secure group communication in wireless ad-hoc networks.
J. High Speed Networks, 2006
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006
A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach.
Proceedings of the Data and Applications Security XX, 2006
2005
An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies.
Proceedings of the Information Systems Security, First International Conference, 2005
A Standards-Based Approach for Supporting Dynamic Access Policies for a Federated Digital Library.
Proceedings of the Digital Libraries: Implementing Strategies and Sharing Experiences, 2005
A Flexible Framework for Content-Based Access Management for Federated Digital Libraries.
Proceedings of the Research and Advanced Technology for Digital Libraries, 2005
A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights.
Proceedings of the Digital Rights Management: Technologies, 2005
A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions.
Proceedings of the Data and Applications Security XIX, 2005
2004
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004
CKDS: an efficient combinatorial key distribution scheme for wireless ad-hoc networks.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004
Proceedings of the 10th International Conference on Parallel and Distributed Systems, 2004
Proceedings of the Distributed Computing and Internet Technology, 2004
TKGS: Verifiable Threshold-Based Key Generation Scheme in Open Wireless Ad Hoc Networks.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004
Access Management in Federated Digital Libraries.
Proceedings of the IADIS International Conference WWW/Internet 2004, 2004
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
A Systematic Approach to Security Deployment in a Networking Environment.
Proceedings of the International Conference on Security and Management, 2004
EZ-Park: An Innovative Secure M-Commerce Application.
Proceedings of the International Conference on Security and Management, 2004
Delegation Active Certificates: Protocols and Privilege Management.
Proceedings of the 2nd International Conference Computing, 2004
2003
A Reasoning Framework for Optimal Design Decisions.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'03, June 23, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
A PKI Architecture for Academic Institutions: Design and Prototype.
Proceedings of the International Conference on Security and Management, 2003
2002
Employing an extended transaction model in multilevel secure transaction processing.
Informatica (Slovenia), 2002
Proceedings of the Progress in Cryptology, 2002
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002
Recertification: A Technique to Improve Services in PKI.
Proceedings of the Research Directions in Data and Applications Security, 2002
2001
Correction to 'Integrating Security and Real-Time Requirements Using Covert Channel Capacity'.
IEEE Trans. Knowl. Data Eng., 2001
Modeling and Evaluation of Distributed Workflow Algorithms.
Proceedings of the World Multiconference on Systemics, Cybernetics and Informatics, 2001
A Novel Approach to Certificate Revocation Management.
Proceedings of the Database and Application Security XV, 2001
An Extended Transaction Model Approach for Multilevel Secure Transaction Processing.
Proceedings of the Database and Application Security XV, 2001
2000
IEEE Trans. Knowl. Data Eng., 2000
Proceedings of the MASCOTS 2000, Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 29 August, 2000
1999
Proceedings of the MASCOTS 1999, 1999
Integrating Data Mining Techniques with Intrusion Detection Methods.
Proceedings of the Research Advances in Database and Information Systems Security, 1999
1998
Proceedings of the 10th Euromicro Conference on Real-Time Systems (ECRTS 1998), 1998
1997
CoProcess: A Java-based Environment for Collaborative Process Management Over the Web.
Proceedings of WebNet 97, 1997
A Two-tier Coarse Indexing Scheme for MLS Database Systems.
Proceedings of the Database Securty XI: Status and Prospects, 1997
1996
J. Syst. Archit., 1996
A Performance Comparison of Five Transaction Processing Algorithms for the SINTRA Replicated-Architecture Database system.
J. Comput. Secur., 1996
Proceedings of the 5th Workshop on Enabling Technologies, 1996
PMES: privilege mangagement and enforcement system for secure distributed resource sharing.
Proceedings of the Advanced IT Tools, 1996
Multilevel Secure Transaction Processing: Status and Prospects.
Proceedings of the Database Security Volume X, 1996
Reduction in Transaction Conflicts Using Semantics-Based Concurrency Control.
Proceedings of the Performance of Concurrency Control Mechanisms in Centralized Database Systems., 1996
1995
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995
Proceedings of the 1st IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '95), 1995
Proceedings of the 7th Euromicro Workshop on Real-Time Systems, 1995
A Secure Concurrency Control Protocol for Real-Time Databases.
Proceedings of the Database Security IX: Status and Prospects, 1995
1994
IEEE Trans. Knowl. Data Eng., 1994
A View-Based Dynamic Replication Control Algorithm.
Nord. J. Comput., 1994
RAIN (Redundant Array of Inexpensive Networks): Expanding Existing Networks to Support Multitraffic Performance.
Proceedings of the High Performance Networking V, Proceedings of the IFIP TC6/WG6.4 Fifth International Conference on High Performance Networking, Grenoble, France, 27 June, 1994
Proceedings of the 10th Annual Computer Security Applications Conference, 1994
1993
Measuring the effect of commutative transactions on distributed database performance.
Inf. Sci., 1993
A Performance Comparison of two Decomposition Techniques for Multilevel Secure Database Systems.
Proceedings of the Database Security, 1993
Performance Analysis of Transaction Management Algorithms for the SINTRA Replicated-Architecture Database System.
Proceedings of the Database Security, 1993
1992
Measuring the Effects of Distributed Database Models on Transaction Availability Measures.
Perform. Evaluation, 1992
Comput. Networks ISDN Syst., 1992
Proceedings of the 17th Conference on Local Computer Networks, 1992
Multiprocessor Architectures for High Speed Networks: A Performance Study.
Proceedings of the Algorithms, Software, Architecture, 1992
Concurrent Use of Parallel Communication to Enable Remote Visualization.
Proceedings of the Computing and Information, 1992
Parallel TCP/IP for Multiprocessor Workstations.
Proceedings of the High Performance Networking IV, 1992
1991
ACM Trans. Database Syst., 1991
Proceedings of the Advances in Computing and Information, 1991
Effects of SeaView Decomposition of Multilevel Relations on Database Performance.
Proceedings of the Database Security, 1991
1990
Efficient Schemes to Evaluate Transaction Performance in Distributed Database Systems.
Comput. J., 1990
Proceedings of the 22th Winter Simulation Conference, 1990
1989
Measuring the Effects of Data Distribution Models on Performance Evaluation of Distributed Database Systems.
IEEE Trans. Knowl. Data Eng., 1989
Some Properties of View-Based Replication Control Algorithms for Distributed Systems.
Inf. Process. Lett., 1989
Proceedings of the ACM Symposium on Communications Architectures & Protocols, 1989
Measuring the Effect of Data Distribution and Replication Models on Performance Evaluation of Distributed Database Systems.
Proceedings of the Fifth International Conference on Data Engineering, 1989
1988
Design of Partially Replicated Distributed Database Systems: An Integrated Methodology.
Proceedings of the 1988 ACM SIGMETRICS conference on Measurement and modeling of computer systems, 1988
Performance Comparision of Two Multiprocessor B-Link Tree Implementations.
Proceedings of the International Conference on Parallel Processing, 1988
A Heuristic Algorithm for Determining a Near-optimal Set of Nodes to Access in a Partially Replicated Distributed Database System.
Proceedings of the Fourth International Conference on Data Engineering, 1988