Refereed Journal Articles |
- Mikhail Strizhov and
Indrajit Ray, Secure Multi-keyword
Similarity Search over Encrypted Data Outsourced
to the Cloud, Computers and Security.
(Submitted)
- Tarik Moataz,
Indrajit Ray, Indrakshi Ray, Abdullatif Shikfa,
Frederic Cuppens and Nora Cuppens-Boulahia,
Substring Search Over Encrypted Data,
Journal of Computer Security. (Submitted).
- Awad A. Younis,
Yashwant Malaiya and Indrajit Ray, Assessing
Vulnerability Exploitability Risk Using Software
Properties, Software Quality Journal,
(Accepted for publication).
- Indrajit Ray,
Kirill Belyaev, Mikhail Strizhov, Dieudonne
Mulamba and Mariappan Rajaram, Secure
Logging as a Service – Delegating Log Management
to the Cloud, IEEE Systems Journal, Vol.
7(2) 2013.
- Sean Thorpe and
Indrajit Ray, Detecting Temporal
Inconsistency in Virtual Machine Activity
Timelines, Journal of Information Assurance
and Security, Vol. 7(1), 2012.
- Rinku Dewri, Nayot
Poolsappasit, Indrajit Ray and Darrell
Whitley, Optimal Security Hardening on
Attack Tree Models of Networks: A Cost Benefit
Analysis, International Journal of
Information Security, Vol. 11(3), 2012.
- Rinku Dewri,
Indrakshi Ray, Indrajit Ray and Darrell
Whitley, Utility Driven Optimization of Real
Time Data Broadcast Schedules, Applied Soft
Computing, Vol. 12(7), 2012.
- Nayot Poolsappasit,
Rinku Dewri, and Indrajit Ray, Dynamic
Security Risk Management Using Bayesian Attack
Graphs, IEEE Transactions on Dependable and
Secure Computing, Vol. 9(1), 2012.
- Sean Thorpe and
Indrajit Ray, File Timestamps for Digital
Cloud Investigations, Journal of Information
Assurance and Security, Vol. 6(6), 2011.
- Rinku Dewri,
Indrajit Ray, Indrakshi Ray and Darrell
Whitley, Exploring Privacy versus Data
Quality Tradeoffs in Anonymization Techniques
using Multi-objective Optimization, Journal
of Computer Security, Vol. 19(5), 2011.
- Sean Thorpe,
Indrajit Ray, Indrakshi Ray, and Tyrone
Grandison, A Formal Temporal Log Data Model
for the Global Synchronized Virtual Machine
Environment, Journal of Information
Assurance and Security, Vol. 6(5), 2011.
- Sean Thorpe,
Indrajit Ray, Indrakshi Ray, Tyrone Grandison, and
Abbie Barbir, A Global Virtual Machine
Attribute Access Control Policy for Auditing
Federated Digital Identities within a Compute
Cloud, Journal of Information Assurance and
Security, Vol. 6(4), 2011.
- Sean Thorpe,
Indrajit Ray, Tyrone Grandison, Abbie
Barbir. The Virtual Machine Log Auditor .
Information Assurance and Security Letters (IASL)
Journal, Vol. 2, 2011.
- Siv Hilde Houmb,
Indrakshi Ray, Indrajit Ray and Sudip
Chakraborty, Trust-Based Security Level
Evaluation using Bayesian Belief Networks,
Transactions on Computational Sciences X, Special
Issue on Security in Computing, LNCS 6340, 2010
- Rinku Dewri,
Indrajit Ray, Indrakshi Ray and Darrell
Whitley, k-Anonymization in the Presence of
Publisher Preferences, IEEE Transactions on
Knowledge and Data Engineering, Vol. 23(11), 2011.
- Rinku Dewri,
Indrakshi Ray, Indrajit Ray and Darrell
Whitley, Real Time Stochastic Scheduling in
Broadcast Systems with Decentralized Data
Storage, Real-Time Systems, Vol. 45(3),
2010.
- Indrakshi Ray,
Indrajit Ray and Sudip Chakraborty, An
Interoperable Context Sensitive Model of
Trust, Journal of Intelligent Information
Systems, Vol. 32(1), February 2009.
- Indrajit Ray and
Nayot Poolsappasit, Using Mobile Ad Hoc
Networks to Acquire Digital Evidence from Remote
Autonomous Agents, International Journal of
Security and Networks, Vol. 3(2), 2008.
- Andrew Burt, Mike
Darschewski, Indrajit Ray, Ramakrishna Thurimella
and Hailin Wu, Origins: An Approach to Trace
Fast Spreading Worms to Their Roots,
International Journal of Security and Networks,
Vol. 3(1), 2008.
- Indrajit Ray and
Hongjun Zhang, Experiences in Developing a
Secure and Optimistic Fair-exchange E-Commerce
Protocol using Common Off-the-shelf Components ,
Journal of Electronic Commerce Research and
Application, Vol. 7(3), Autumn 2008.
- Sudip Chakraborty
and Indrajit Ray, p-Trust: A New Model of
Trust to Allow Finer Control over Privacy in
Peer-to-Peer Environments, Journal of
Computers, Vol. 2(2), 2007.
- Omar Alhazmi,
Yashwant Malaiya and Indrajit Ray,
Measuring, Analyzing and Predicting Security
Vulnerabilities in Software Systems,
Computers & Security, Vol. 26, 2007.
- Junxing Zhang and
Indrajit Ray, Towards Secure Multi-sited
Transactional Revision Control System , Computer
Standards and Interfaces, Vol. 29(3), 2007.
- Indrajit Ray and
Junxing Zhang, Towards a New Standard for
Allowing Consistency in Revision Control Systems ,
Computer Standards and Interfaces, Vol. 29(3),
2007.
- Indrajit Ray,
Eunjong Kim and Dan Massey, A Framework to
Facilitate Forensic Investigation for Falsely
Advertised BGP Routes, Journal of
Information Systems Security, Vol. 3(2), 2007
- Indrajit Ray,
Indrakshi Ray and Narasimhamurthi Natarajan,
An Anonymous and Failure Resilient Fair-Exchange
E-Commerce Protocol , Decision Support Systems,
Vol. 39(3), April 2005.
- Indrajit Ray and
Sonja Tideman, A Secure TCP Connection
Migration Protocol to Enable the Survivability of
Client-Server Applications Under Malicious Attack
, Journal of Network and Systems Management, Vol.
12(2), June 2004.
- Indrajit Ray and
Indrakshi Ray, Fair Exchange in
E-Commerce, ACM SIGEcomm Exchange, Vol.
3(2), 2002.
- Indrajit Ray, Luigi
Mancini, Sushil Jajodia and Elisa Bertino,
ASEP: A Secure and Flexible Commit Protocol for
MLS Distributed Database Systems , IEEE
Transactions on Knowledge and Data Engineering,
Vol. 12(6) November/December 2000.
- Luigi Mancini,
Indrajit Ray, Sushil Jajodia and Elisa
Bertino, Flexible Transaction Dependencies
in Database Systems , Distributed and Parallel
Databases, An International Journal, Vol. 8(4)
October 2000.
- Elisa Bertino,
Sushil Jajodia, Luigi Mancini and Indrajit
Ray Advanced Transaction Processing in
Multilevel Secure File Stores , IEEE Transactions
on Knowledge and Data Engineering, Vol. 10(1)
January/February 1998.
|
Refereed Proceedings |
- Ibrahim Lazrig, Tarik Moataz, Indrajit Ray,
Indrakshi Ray, Toan Ong, Michael Kahn, Frederic
Cuppens and Nora Cuppens-Boulahia, Privacy
Preserving Record Matching Using Automated
Semi-trusted Broker, Proceedings of the 29th
Annual IFIP WG 11.3 Working Conference on Data and
Applications Security and Privacy, Fairfax, VA July
2015.
- Mikhail Strizhov and Indrajit Ray, Substring
Position Search Over Encrypted Data Using Tree-based
Index, Proceedings of the IEEE International
Conference on Cloud Engineering, Tempe, Arizona,
March 2015.
- Sachini Weerawardhana, Subhojeet Mukherjee,
Indrajit Ray and Adele Howe, Automated
Extraction of Vulnerability Information for Home
Computer Security, Proceedings of the 7th
International Symposium on Foundations and Practice
of Security, Montreal, Canada, November 2014.
- Mark Roberts, Adele Howe and Indrajit Ray,
Evaluating Diversity in Classical Planning,
Proceedings of the 24th International Conference on
Automated Planning and Scheduling, Portsmouth, USA,
June 2014.
- Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora
Cuppens-Boulahia, Frederic Cuppens, and Indrajit Ray
and Indrakshi Ray, Privacy-Preserving Multiple
Keyword Search on Outsourced Data in the
Clouds, Proceedings of the 28th Annual IFIP
11.3 Working Conference on Data and Privacy, Vienna,
Austria, July 2014.
- Tarik Moataz, Nora Cuppens-Boulahia, Frederic
Cuppens, Indrajit Ray and Indrakshi Ray,
ELITE: zEro Links Identity managemenT system,
Proceedings of the 28th Annual IFIP 11.3 Working
Conference on Data and Privacy, Vienna, Austria,
July 2014.
- Mikhail Strizhov and Indrajit Ray,
Multi-keyword Similarity Search Over Encrypted Cloud
Data, Proceedings of the 29th IFIP
International Information Security and Privacy
Conference, Marrakech, Morocco, June 2014.
- Awad Younis, Yashwant Malaiya and Indrajit
Ray, Using Attack Surface Entry Points and
Reachability Analysis to Assess the Risk of Software
Vulnerability Exploitability, Proceedings of
the 15th IEEE Symposium on High Assurance Systems
Engineering, Miami, FL, January 2014.
- Kirill Belyaev, Indrakshi Ray, Indrajit Ray and
Gary Luckasen, Personal Health Record Storage
on Privacy Preserving Green Clouds,
Proceedings of the 9th IEEE International Conference
on Collaborative Computing: Networking, Applications
and Worksharing, Austin, TX, October 2013.
- Indrajit Ray, Dieudonne Mulamba, Indrakshi Ray and
Keesook J. an, A Model for Trust Based Access
Control and Delegation in Mobile Clouds,
Proceedings of the 27th Annual IFIP WG 11.3 Working
Conference on Data and Applications Security and
Privacy, New Brunswick, NJ, July 2013.
- Mahantesh Halappanavar, Sutanay Choudhury, Emilie
Hogan, Peter Hui, John Johnson, Indrajit Ray and
Lawrence Holder, Towards a Network-of-Networks
Framework for Cyber Security, Proceedings of
the IEEE Intelligence and Security Informatics
Conference, Seattle, WA, June 2013.
- Sean Thorpe, Indrajit Ray, Tyrone Grandison, Abbie
Barbir and Robert France, Hypervisor Event
Logs as a Source of Virtual Machine Evidence for
Forensic Cloud Investigation, Proceedings of
the 27th Annual IFIP WG 11.3 Working
Conference on Data and Applications Security and
Privacy, New Brunswick, NJ, July 2013
- Malgorzata Urbanska, Mark Roberts, Indrajit Ray,
Adele Howe and Zinta Byrne, Accepting the
Inevitable: Factoring the User into Home Computer
Security, Proceedings of the 3rd ACM
Conference on Data and Application Security and
Privacy, San Antonio, TX, February 2013.
- Sean Thorpe, Indrajit Ray, Tyrone Grandison, Abbie
Barbir. Cloud Log Forensics Metadata Analysis
, Proceedings of the 36th IEEE International
Conference on Computer Software and Applications,
Izmir, Turkey 16-20 July 2012.
- Sean Thorpe, Indrajit Ray, Tyrone Grandison, and
Abbie Barbir, Cloud Digital Investigations
based on a Virtual Machine Computer History
Model, Proceedings of the 6th International
Symposium on Digital Forensics and Information
Security, Vancouver, Canada, June 26-28, 2012.
- Sean Thorpe, Tyrone Grandison, and Indrajit
Ray, Cloud Computing Log Evidence Forensic
Examination Analysis, Proceedings of the 2nd
Cybercrime Security, and Digital Forensics
Conference, London, UK, May 2012.
- Zinta Byrne, Janet Weidert, Josh Liff,
M. Horvath, C. Smith, Adele Howe and Indrajit
Ray, Perceptions of Internet Threats:
Behavioral Intent to Click Again,
Proceedings of the 2012 Society for Industrial and
Organizational Psychology Conference, April 2012.
- Sean Thorpe, Indrajit Ray, Tyrone
Grandison, and Abbie Barbir, Cloud Digital
Investigations based on a Virtual Machine Computer
History Model, Proceedings of the 6th
International Symposium on Digital Forensics and
Information Security, Vancouver, Canada, June
26-28, 2012.
- Adele Howe, Indrajit Ray, Zinta Byrne,
Mark Roberts and Malgorzata Urbanska, ''The
Psychology of Security for the Home Computer
User,'' Proceedings of the IEEE Symposium on
Security and Privacy, San Francisco, CA, May
20-23, 2012.
- Mark Roberts, Adele Howe, Indrajit
Ray, Malgorzata Urbanska, Zinta Byrne and Janet
Weidert, ''Personalized Vulnerability Analysis
through Automated Planning,'' International Joint
Conference on Artificial Intelligence, Workshop on
Intelligent Security, Barcelona, Spain, July 18,
2011.
- Sean Thorpe, Abbie Barbir, Indrakshi
Ray, Tyronne Grandison, Indrajit Ray and Robert
France, Formal Parameterization of Log
Synchronization Events within a Distributed
Forensic Compute Cloud Database Environment,'' 3rd
ICST International Conference on Digital Forensics
and Cyber Crime, Dublin, Ireland, October 26-28,
2011. (Short Paper).
- Sean Thorpe, Indrajit Ray and Tyronne
Grandison, Enforcing Data Quality Rules for
a Synchronized VM Log Audit Environment Using
Transformation Mapping Techniques,'' 4th
International Conference on Computational
Intelligence in Security for Information Systems,
Torremolinos, Malaga, Spain, June 810, 2011, LNCS
6694.
- Sean Thorpe, Indrajit Ray and Tyronne
Grandison, Use of Schema Associative Mapping
for Synchronization of the Virtual Machine Audit
Logs,'' 4th International Conference on
Computational Intelligence in Security for
Information Systems, Torremolinos, Malaga, Spain,
June 8-10, 2011.
- Sean Thorpe, Indrajit Ray and Tyronne
Grandison, Enabling Security Uniformly
Across Cloud Systems,'' 6th International
Conference on Architectural Support for
Programming Languages and Operating Systems.
Workshop on Runtime Environments/Systems, Layering
and Virtualized Environments, Newport Beach, CA,
March 13-15 2011.
- Tristan Allard, Nicolas Anciaux, Luc
Bouganim, Yanli Guo, Lionel Le Folgoc, Benjamin
Nguyen, Philippe Pucheral, Indrajit Ray, Indrakshi
Ray and Shaoyi Yin, Secure Personal Data
Servers: a Vision Paper,'' 36th International
Conference on Very Large Data Bases, VLDB 2010,
Singapore, September 1317, 2010.
- Rinku Dewri, Indrajit Ray, Indrakshi
Ray and Darrell Whitley On the Formation of
Historically k-Anonymous Anonymity Sets in a
Continuous LBS'', 6th International ICST
Conference on Security and Privacy in
Communication Networks, SecureComm 2010,
Singapore, September 7-9, 2010.
- Siv Hilde Houmb, Sudip Chakraborty,
Indrakshi Ray and Indrajit Ray, Using
Trust-Based Information Aggregation for Predicting
Security Level of Systems,'' 24th Annual IFIP WG
11.3 Working Conference on Data and Applications
Security, DBSec 2010, Rome, Italy, June 21-23,
2010.
- Rinku Dewri, Indrajit Ray, Indrakshi
Ray and Darrell Whitley On the
Identification of Property Based Generalizations
in Microdata Anonymization'', 24th Annual IFIP WG
11.3 Working Conference on Data and Applications
Security, DBSec 2010, Rome, Italy, June 21-23,
2010.
- Rinku Dewri, Indrakshi Ray, Indrajit
Ray and Darrell Whitley Query m-Invariance:
Preventing Query Disclosures in Continuous
Location-Based Services'', 11th International
Conference on Mobile Data Management, MDM 2010,
Kansas City, Missouri, USA, May 23-26, 2010.
- Rinku Dewri, Indrajit Ray, Indrakshi
Ray and Darrell Whitley, POkA: Identifying
Pareto-Optimal k-Anonymous Nodes in a Domain
Hierarchy Lattice,'' Proceedings of the 18th ACM
Conference on Information and Knowledge
Management, Hong Kong, China, November 2009.
- Indrakshi Ray and Indrajit Ray,
Access Control Challenges for Cyber-Physical
Systems,'' Proceedings of the 1st NSF Workshop on
Cyber-Physical Systems, Newark, NJ, July 2009.
- Manachai Toahchoodee, Ramadan
Abdunabi, Indrakshi Ray and Indrajit Ray, A
Trust-Based Access Control Model for Pervasive
Computing Applications,'' Proceedings of the 23rd
Annual IFIP TC-11 WG 11.3 Working Conference on
Data and Applications Security, Montreal, Canada,
July 2009.
- Rinku Dewri, Darrell Whitley, Indrajit
Ray and Indrakshi Ray, A Multi-Objective
Approach to Data Sharing with Privacy Constraints
and Preference Based Objectives,'' Proceedings of
the Genetic and Evolutionary Computation
Conference, Montreal, Canada, July 2009.
- Rinku Dewri, Indrajit Ray, Indrakshi
Ray and Darrell Whitley, On the Comparison
of Microdata Disclosure Control Algorithms,''
Proceedings of the 12th International Conference
on Extending Database Technology, St. Petersburg,
Russia, April 2009.
- H.M.N Dilum Bandara, Anura Jayasumana
and Indrajit Ray, Key Pre-Distribution Based
Secure Backbone Design in Wireless Sensor
Networks,'' Proceedings of the 3rd IEEE
International Workshop on Practical Issues in
Building Sensor Network Applications, October
2008, Montreal, Canada.
- Rinku Dewri, Indrakshi Ray, Indrajit
Ray and Darrell Whitley, Security
Provisioning in Pervasive Environments Using
Multi-objective Optimization,'' Proceedings of the
13th European Symposium on Research in Computer
Security, October 2008, Malaga, Spain.
- Rinku Dewri, Darrell Whitley, Indrajit
Ray and Indrakshi Ray, Optimizing Real-Time
Ordered-Data Broadcasts in Pervasive Environments
Using Evolution Strategy,'' Proceedings of the
10th International Conference on Parallel Problem
Solving From Nature, September 2008, Dortmund,
Germany.
- Sudip Chakraborty and Indrajit
Ray, Facilitating Privacy Related Decisions
in Different Privacy Contexts on the Internet by
Evaluating Trust in Recipients of Private Data,''
Proceedings of the 23rd IFIP TC-11 International
Information Security Conference, September 2008,
Milan, Italy.
- Rinku Dewri, Darrell Whitley,
Indrakshi Ray and Indrajit Ray, Evolution
Strategy Based Optimization of On-Demand Dependent
Data Broadcast Scheduling'', Proceedings of the
2008 Genetic and Evolutionary Computation
Conference, July 2008, Atlanta, GA.
- Indrajit Ray, Nayot Poolsappasit and
Rinku Dewri, An Opinion Model for Evaluating
Malicious Activities in Pervasive Environments,''
Proceedings of the 22nd IFIP TC-11 WG 11.3 Working
Conference on Data and Applications Security, July
2008, London, UK.
- Rinku Dewri, Indrajit Ray, Indrakshi
Ray and Darrel Whitley, On the Optimal
Selection of k in the k-Anonymity Problem,''
Proceedings of the 22nd IEEE International
Conference on Data Engineering, April 2008,
Cancun, Mexico.
- Rinku Dewri, Indrakshi Ray, Indrajit
Ray and Darrell Whitley, Optimizing
On-Demand Data Broadcast Scheduling in Pervasive
Environments,'' Proceedings of the 11th
International Conference on Extending Database
Technology, March 2008, Nantes, France.
- Rinku Dewri, Nayot Poolsappasit,
Indrajit Ray and Darrell Whitley, Optimal
Security Hardening Using Multi-Objective
Optimization on Attack Tree Models of Networks,''
Proceedings of the 14th ACM Conference on Computer
and Communications Security, October-November
2007, Alexandria, VA.
- Sudip Chakraborty, Nayot Poolsappasit
and Indrajit Ray, Reliable Delivery of Event
Triggered Obligation Policies from Sensors to
Actuators in Pervasive Computing Environments,''
Proceedings of the 21st IFIP TC-11 WG 11.3 Working
Conference on Data and Applications Security, July
2007, Redondo Beach, CA.
- Nayot Poolsappasit and Indrajit
Ray, Enhancing Internet Domain Name System
Availability by Building Rings of Cooperation
Among Cache Resolvers,'' Proceedings of the 8th
Annual IEEE SMC Information Assurance Workshop,
June 2007, USMA, West Point, NY.
- Nayot Poolsappasit and Indrajit
Ray, A Systematic Approach for Investigating
Computer Attacks Using Attack Trees,'' Proceedings
of the 3rd IFIP TC-11 WG 11.9 Working Conference
on Digital Forensics, January 2007, Orlando, FL.
- Shuxin Yin, Indrakshi Ray and Indrajit
Ray, A Trust Model for Pervasive Computing
Environments,'' Proceedings of the Workshop on
Trusted Collaboration, Atlanta, GA, November 2006.
- Indrajit Ray and Sudip
Chakraborty, A Framework for Flexible Access
Control in Digital Library Systems,'' Proceedings
of the 20th IFIP TC-11 WG 11.3 Working Conference
on Data and Applications Security, Sophia
Antipolis, France, July-August 2006.
- Sudip Chakraborty and Indrajit
Ray, Allowing Finer Control Over Privacy
Using Trust as a Benchmark,'' Proceedings of the
7th IEEE Information Assurance Workshop, West
Point, NY, June 2006.
- Sudip Chakraborty and Indrajit
Ray, TrustBAC -Integrating Trust
Relationships into the RBAC Model for Access
Control in Open Systems,'' Proceedings of the 11th
ACM Symposium on Access Control Models and
Technologies, Lake Tahoe, CA, June 2006.
- Indrajit Ray, Remote Upload of
Digital Evidence over Mobile Ad-hoc Networks,''
Proceedings of the 2nd IFIP TC-11 WG 11.9 Working
Conference on Digital Forensics, Orlando, Florida,
January 29 †February 1, 2006.
- Siv Hilde Houmb, Indrakshi Ray and
Indrajit Ray, Estimating the Relative
Trustworthiness of Information Sources in Security
Solution Evaluation,'' Proceedings of the 4th
International Conference on Trust Management,
Pisa, Tuscany, Italy, May 2006
- Indrajit Ray, Sudip Chakraborty and
Indrakshi Ray, VTrust: A Trust Management
System Based on a Vector Model of Trust'',
Proceedings of the 1st International Conference on
Information Systems Security, Kolkata, India,
December 2005.
- Indrajit Ray and Nayot
Poolsappasit, Using Attack Trees to Identify
Malicious Attacks from Authorized Insiders,''
Proceedings of the 10th European Symposium on
Research in Computer Security, Milan, Italy,
September 2005. (Acceptance ratio 26/158)
- Dan Matheson, Indrakshi Ray, Indrajit
Ray and Siv Hilde Houmb, Building Security
Requirement Patterns for Increased Effectiveness
Early in the Development Process,'' Proceedings of
the Symposium on Requirements Engineering for
Information Security, Paris, France, August 2005.
- Indrajit Ray, Eunjong Kim, Ross
McConnell and Dan Massey, Reliably, Securely
and Efficiently Distributing Electronic Content
Using Multicasting,'' Proceedings of the 6th
International Conference on Electronic Commerce
and Web Technologies, Copenhagen, Denmark, August
2005. (Acceptance ratio 39/113)
- Omar Alhazmi, Yashwant Malaiya and
Indrajit Ray, Security Vulnerabilities in
Software Systems: A Quantitative Perspective,''
Proceedings of the 19th IFIP TC-11 WG 11.3 Working
Conference on Data and Applications Security,
Storrs, CT, August 2005.
- Eunjong Kim, Dan Massey and Indrajit
Ray, Global Internet Routing Forensics:
Validation of BGP Paths Using ICMP Traceback,''
Proceedings of the 1st IFIP TC-11 WG 11.9 Working
Conference on Digital Forensics, Orlando, FL,
February 2005.
- Vamsi Kambhampati, Indrajit Ray and
Eunjong Kim, A Secure Checkpointing Protocol
for Survivable Server Design'', in R.K. Ghosh and
H. Mohanty editors, Proceedings of the 1st
International Conference on Distributed Computing
and Internet Technology, December 22-24, 2004,
Bhubaneshwar, India, LNCS 3347, Springer.
(Acceptance ratio 25%)
- Indrajit Ray and Sudip
Chakraborty, A Vector Model of Trust for
Developing Trustworthy Systems'', in . Samarati et
al. editors, Computer Security-ESORICS 2004,
Proceedings of the 9th European Symposium on
Research in Computer Security, September 13-15,
2004, Sophia Antipolis, France. LNCS 3193,
Springer. (Acceptance ratio 27/159.)
- Indrajit Ray and Eunjong Kim,
Collective Signature for Efficient Authentication
of XML Documents'', in Y. Deswarte et al. editors,
Security and Protection in Information Processing
Systems, Proceedings of the 19th IFIP TC 11
International Information Security Conference,
August 22-25, 2004, Toulouse, France, Kluwer
Academic Publisher. (Acceptance ratio, 35/159).
- Indrajit Ray and Mike
Geisterfer, Towards a Privacy Preserving
E-Commerce Protocol'', Proceedings of the 5th
International Conference on Electronic Commerce
and Web Technologies, Zaragosa, Spain, Aug-Sep,
2004. (Acceptance ratio 24%).
- Indrajit Ray and Tomas Hajek,
Securely Distributing Centralized Multimedia
Content Utilizing Peer-to-Peer Cooperation'', in
C. Farkas and P. Samarati editors, Research
Directions in data and Applications Security
XVIII, Proceedings of the 18th IFIP TC-11 WG 11.3
Working Conference on Data and Applications
Security, July 25-28, 2004, Sitges, Spain. Kluwer
Academic Publishers.
- Indrajit Ray and Sonja Tideman,
Secure TCP Connection Migration for
Survivability'', Proceedings of the IEEE/IEE
International Conference on Networking,
Guadeloupe, French Caribbean, March 1-4, 2004.
- Jung Min Park, Indrajit Ray, Edwin
Chong and Howard Siegel, A Certified E-mail
Protocol Suitable for Mobile Environment'',
Proceedings of IEEE GLOBECOM 2003 Communications
Security Symposium, San Francisco, CA, December
1-5, 2003
- Indrajit Ray and Junxing Zhang,
A Secure Multi-Sited Version Control System'',
Proceedings of the 6th IFIP TC 11 WG 11.5 Working
Conference on Integrity and Internal Control in
Information Systems, Lausanne, Switzerland,
November 13-14, 2003.
- Jung Min Park, Edwin Chong, Howard
Siegel and Indrajit Ray, Constructing
Fair-Exchange Protocols for E-commerce Via
Distributed Computation of RSA Signatures'',
Proceedings of 22nd ACM Symposium on Principles of
Distributed Computing, Boston, MA, July 13-16,
2003.
- Indrajit Ray and Indrakshi Ray,
Anonymous and Secure Multicast Subscription'', in
Ehud Gudes and Sujeet Shenoi, editors, Research
Directions in Data and Applications Security,
Proceedings of the 16th IFIP WG 11.3 Working
Conference on Data and Applications Security,
Cambridge, U.K, July 2002, Kluwer Academic
Publishers, 2003.
- Indrakshi Ray, Indrajit Ray and
Natarajan Narasimhamurthi, A Cryptographic
Solution to Implement Access Control in a
Hierarchy and More'', Proceedings of the 7th ACM
Symposium on Access Control Models and
Technologies, Monterey, CA, June 2002.
- Indrakshi Ray and Indrajit Ray,
Using Compatible Keys for Secure Multicasting in
E-Commerce'', Proceedings of the 2nd International
Workshop on Internet Computing and E-Commerce,
Fort Lauderdale, FL, April 2002.
- Indrakshi Ray and Indrajit Ray,
An Anonymous Fair-Exchange E-Commerce Protocol'',
Proceedings of the 2nd International Workshop on
Internet Computing and E-Commerce, San Francisco,
CA, April 2001.
- Indrakshi Ray and Indrajit Ray,
Detecting termination of Active Database Rules
Using Symbolic Model Checking'', Proceedings of
the 5th East-European Conference on Advances in
Databases and Information Systems, Vilnius,
Lithuania, September 2001. Published as Lecture
Notes in Computer Science, Vol. 2151, 2001,
editors in A. Caplinskas and J. Eder,
Springer-Verlag.
- Indrajit Ray, Indrakshi Ray and
Natarajan Narasimhamurthi An Anonymous
Electronic Voting Protocol for Voting over the
Internet'', Proceedings of the 3rd International
Workshop on Advanced Issues of E-Commerce and
Web-based Information Systems, San Jose, CA, June
2001.
- Indrakshi Ray and Indrajit Ray,
An Optimistic Fair-exchange E-commerce Protocol
with Automated Dispute Resolution'', Proceedings
of the 1st International Conference on Electronic
Commerce and Web Technologies, Greenwich, UK,
September 2000. Published as Lecture Notes in
Computer Science, Vol. 1875, Springer-Verlag.
- Indrajit Ray, Indrakshi Ray and
Natarajan Narasimhamurthi, A Fair Exchange
E-Commerce Protocol with Automated Dispute
Resolution'', in B. Thuraisingham et al editors,
Database Security XIV: Status and Prospects,
Chapman & Hall, 2001, Proceedings of the 14th
IFIP WG 11.3 Working Conference on Database
Security, Schoorl, The Netherlands, August 2000.
- Indrajit Ray, Bruce Maxim, Kiumi
Akingbehin, Indrakshi Ray and Qiang Zhu,
Design of a Center for Research in Information
Systems Security'', Proceedings of the 18th Annual
AoM/IAoM International Conference, San Antonio,
TX, August 2000.
- Indrakshi Ray and Indrajit
Ray, Failure Analysis of an E-commerce
Protocol Using Model Checking'', Proceedings of
the 2nd International Workshop on Advanced
Issues of E-Commerce and Web-based Information
Systems, Milpitas, CA, June 2000.
- Sushil Jajodia, Ravi Mukkamala and
Indrajit Ray, A Two-Tier Coarse Indexing
Scheme for MLS Database Systems'', in T. Y. Lin
and Shelly Qian editors, Database Security XI:
Status and Prospects, Proceedings of the 11th
IFIP WG 11.3 Working Conference on Database
Security, Lake Tahoe, CA, 1997 Chapman &
Hall, 1998.
- Sushil Jajodia, Luigi Mancini and
Indrajit Ray A Secure Locking Protocol for
Multilevel Database Management Systems'', in P.
Samarati and R. Sandhu editors, Database
Security X: Status and Prospects, Proceedings of
the 10th IFIP WG 11.3 Working Conference on
Database Security, Como Italy., 1996, Chapman
& Hall, 1997.
- Luigi Mancini and Indrajit Ray
Secure Transaction Processing in MLS Databases
with Two Version of Data'', in E. Bertino et al.
editors, Lecture Notes in Computer Science, Vol.
1146, 1996, Springer-Verlag, Proceedings of the
2nd European Symposium On Research In Computer
Security, Rome, Italy, September 1996.
- Indrajit Ray, Elisa Bertino, Sushil
Jajodia and Luigi Mancini An Advanced
Commit Protocol for MLS Distributed Database
Systems'', Proceedings of the ACM Conference on
Computer and Communications Security, New Delhi,
India, March 1996
|