Research By Topic
Security and Privacy
Access Control Specification, Composition, Analysis, Enforcement, Evolution
Location-Aware and Spatio-Temporal Access Control Models
Trust Models and Trust Negotiations
Privacy and Anonymity
Secure Internet Protocols
Databases, Data Streams, and Event Processing
Data Streams and Event Processing
Real-Time Data Broadcasting
Workflows and Advanced Transaction Models
Semantics-Based Transaction Processing
Software Engineering
Aspect-Oriented
Software Design
UML Model Analysis
Other Publications
- Kirill Belyaev and Indrakshi Ray, "Component-Oriented Access Control for Deployment of Application Services in Containerized Environments", Proceedings of the 15th International Conference on Cryptology and Network Security, Milan, Italy, November 2016. (Acceptance ratio 30/116)
- Kirill Belyaev and Indrakshi Ray, "Towards Access Control for Isolated Applications", Proceedings of the 13 International Conference on Security and Cryptography, Lisbon, Portugal, July 2016. (Best Student Paper) (Acceptance ratio 15/108)
- Phillipa Bennett, Indrakshi Ray, and Robert France, "Modeling of Online Social Network Policies using Attribute-Based Access Control Framework", Proceedings of the 11th International Conference on Information Systems Security, Kolkata, India, December 2015. (Acceptance rate for full papers 24/133)
- Phillipa Bennett, Indrakshi Ray, and Robert France, "Analysis of a Relationship-Based Access Control Model", Proceedings of the 8th C* Conference on Computer Science \& Software Engineering, Yokohama, Japan, July 2015. (Acceptance rate 35%)
- Wuliang Sun, Robert France and Indrakshi Ray, "Supporting Iterative Development of Robust Operation Contracts in UML Requirements Models" Proceedings of the 13th IEEE International High Assurance Systems Engineering Symposium (HASE), Boca Raton, FL, November 2011.
- Wuliang Sun, Robert France and Indrakshi Ray, "Rigorous Analysis of UML Access Control Policy Models" Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), Pisa, Italy, June 2011. (Acceptance rate 16%)
- Eunjee Song, Robert France, Indrakshi Ray, and Hanil Kim, "Checking Policy Enforcement in an Access Control Aspect Model", Proceedings of the International Conference on Convergence Technology and Information Convergence, Anaheim, California, November 2007.
- Tai Xin and Indrakshi Ray, "A Lattice-Based Approach for Updating Access Control Policies in Real-time", Information Systems, 32(5), July 2007.
- Manachai Toahchoodee and Indrakshi Ray, "Validation of Policy Integration using Alloy", Proceedings of the 2nd International Conference on Distributed Computing and Internet Technology (ICDCIT), Bhubaneswar, India, December 2005. (Acceptance ratio for long papers 45/426)
- Eunjee Song, Raghu Reddy, Robert France, Indrakshi Ray, Geri Georg and Roger Alexander, "Verifiable Composition of Access Control and Application Features", Proceedings of the 10th ACM Symposium on Access Control Methodologies and Technologies (SACMAT), Stockholm, Sweden, June 2005. (Acceptance ratio 19/90)
- Indrakshi Ray, "Applying Semantic Knowledge to Real-Time Update of Access Control Policies", IEEE Transactions on Knowledge and Data Engineering, 17(6), June 2005, pages 844--858.
- Indrakshi Ray, Robert France, Na Li and Geri Georg, "An Aspect-Based Approach to Modeling Access Control Concerns", Information and Software Technology , 46(9), July 2004, pages 575-587.
- Indrakshi Ray and Tai Xin, "Implementing Real-Time Update of Access Control Policies", Proceedings of the 18th IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec), Sitges, Spain, July 2004. (Acceptance ratio 24/45)
- Indrakshi Ray, Na Li, Robert France and Dae-Kyoo Kim,"Using UML to Visualize Role-Based Access Control Constraints", Proceedings of the 9th ACM Symposium on Access Control Model and Technologies (SACMAT), Yorktown Heights, NY, June 2004. (Acceptance ratio 18/61)
- Indrakshi Ray, "Real Time Update of Access Control Policies", Data and Knowledge Engineering, 49(3), June 2004, pages 287 - 309.
- Dae-Kyoo Kim, Indrakshi Ray, Robert France and Na li, "Modeling Role-Based Access Control Using Parameterized UML Models", Proceedings of the 7th Conference on Fundamental Approaches to Software Engineering (FASE), Barcelona, Spain, March 2004. (Acceptance rate 23%)
- Indrakshi Ray, Na Li, Dae-Kyoo Kim and Robert France, "Using Parameterized UML to Specify and Compose Access Control Models", Proceedings of the 6th IFIP WG 11.5 Conference on Integrity and Control in Information Systems (IICIS), Lausanne, Switzerland, November 2003.
- Indrakshi Ray and Tai Xin, "Concurrent and Real-Time Update of Access Control Policies", Proceedings of the 14th International Conference on Database and Expert Systems (DEXA), Prague, Czech Republic, September 2003. (Acceptance ratio 91/236)
Access Control Specification, Composition, Analysis, Enforcement, Evaluation
- Andy Hsu and Indrakshi Ray, "Specification and Enforcement of Location-Aware Attribute-Based Access Control Model", Proceedings of ACM Workshop on Attribute Based Access Control New Orleans, Louisiana, March 2016.
- Ramadan Abdunabi, Wuliang Sun, and Indrakshi Ray, "Enforcing Spatio-Temporal Access Control for Mobile Applications", Computing, 96(4), 2014.
- Ramadan Abdunabi, Mustafa Al-Lail, Indrakshi Ray, and Robert France, "Specification and validation of a Generalized Spatio-Temporal Role-Based Access Control Model", IEEE Systems Journal, 7(3), 2013.
- Manachai Toahchoodee and Indrakshi Ray, "On the Formalization and Analysis of a Spatio-Temporal Role-Based Access Control Model", Journal of Computer Security, 19(3), 2011, pages 399 -- 452.
- Manachai Toahchoodee, Indrakshi Ray and Ross M.McConnell, "Using Graph Theory to Represent a Spatio-Temporal Role-Based Access Control Model", aInternational Journal of Next Generation Computing, 1(2), November 2010.
- Manachai Toahchoodee and Indrakshi Ray, "Using Alloy to Analyze a Spatio-Temporal Access Control Model Supporting Delegation", IET Information Security, 3(3), September 2009, pages 75 -- 127.
- Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anastasakis, Geri Georg and Behzad Bordbar, "Ensuring Spatio-Temporal Access Control for Real-World Applications", Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT), Stresa, Italy, June 2009. (Acceptance ratio 24/75)
- Manachai Toahchoodee and Indrakshi Ray, "A Spatio-Temporal Access Control Model Supporting Delegation for Pervasive Computing Applications", Proceedings of the 5th International Conference on Trust, Privacy, and Security in Digital Business (TrustBus) , Turin, Italy, September 2008. (Acceptance ratio 18/34)
- Manachai Toahchoodee and Indrakshi Ray, "On the Formal Analysis of a Spatio-Temporal Role-Based Access Control Model", Proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec), London, U.K, July 2008. (Acceptance ratio 22/56)
- Indrakshi Ray and Manachai Toahchoodee, "A Spatio-Temporal Role-Based Access Control Model", Proceedings of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec) , Redondo Beach, California, July 2007. (Acceptance ratio 18/44)
- Indrakshi Ray, Mahendra Kumar, and Lijun Yu, "LRBAC: A Location-Aware Role-Based Access Control Model", Proceedings of the 2nd International Conference on Information Systems Security (ICISS), Kolkata, India, December 2006. (Acceptance ratio 20/79)
- Indrakshi Ray and Mahendra Kumar, "Towards a Location-Based Mandatory Access Control Model", Computers & Security, 25(1), February 2006.
- Indrakshi Ray and Lijun Yu, "Short Paper: Towards a Location-Aware Role-Based Access Control Model", Proceedings of the 1st IEEE Conference on Security and Privacy for Emerging Areas in Commmunication Networks (SecureComm), Athens, Greece, September 2005. (Acceptance ratio 52/164)
Location-Aware and Spatio-Temporal Access Control Models
- Indrajit Ray, Dieudonne Mulamba, Indrakshi Ray, and Keesook Han, "A Model for Trust-based Access Control and Delegation in Mobile Clouds", Proceedings of the 27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Newark, New Jersey, July 2013. (Acceptance ratio for full papers: 16/45)
- Siv Hilde Houmb, Sudip Chakraborty, Indrakshi Ray and Indrajit Ray, "Using Trust-Based Information Aggregation for Predicting Security Level of Systems", Proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec), Rome, Italy, June 2010. (Acceptance ratio 18/61)
- Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray, Sudip Chakraborty, "Trust-Based Security Level Evaluation Using Bayesian Belief Networks", Transactions on Computational Science, Volume 10, 2010.
- Indrajit Ray, Indrakshi Ray and Sudip Chakraborty, "A Context-Aware Model of Trust for Facilitating Secure Ad Hoc Collaborations", Zheng Yan editor, Published in Trust Modeling and Management in Digital Environments: From Social Concept to System Development, editor Zheng Yan, IGI Global, January 2010.
- Manachai Toahchoodee, Xing Xie and Indrakshi Ray, "Towards Trustworthy Delegation in Role-Based Access Control Models", Proceedings of the 12th Information Security Conference (ISC) , Pisa, Italy, September 2009. (Acceptance ratio 29/105)
- Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi Ray and Indrajit Ray, "A Trust-Based Access Control Model for Pervasive Computing Systems" (Short Paper), Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec), Montreal, Canada, July 2009. (Acceptance ratio 23/41)
- Indrakshi Ray, Indrajit Ray and Sudip Chakraborty, "An Interoperable Context-Sensitive Model of Trust", Journal of Intelligent Information Systems , 32(1), February 2009.
- Siv Hilde Houmb, Indrakshi Ray and Indrajit Ray, "Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation", Proceedings of the 4th International Conference on Trust Management (iTrust), Pisa, Italy, May 2006. (Acceptance ratio 30/88)
- Indrajit Ray, Sudip Chakraborty, and Indrakshi Ray, "VTrust: A Trust Management System Based on a Vector Model of Trust", Proceedings of the 1st International Conference on Information Systems Security (ICISS), Kolkata, India, December 2005. (Acceptance ratio 20/72)
Trust Models and Their Applications
- Ibrahim Lazrig, Toan Ong, Indrajit Ray, Indrakshi Ray, and Michael Kahn, "Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes", Proceedings of the 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Trento, Italy, July 2016. (Acceptance ratio 17/54)
- Indrakshi Ray, Toan Ong, Indrajit Ray, and Michael Kahn, "Applying Attribute-Based Access Control for Privacy Preserving Health Data Disclosure", Proceedings of the International Conference on Biomedical and Health Informatics, Las Vegas, NV, February 2016.
- Phillipa Bennett, Wuliang Sun, Wade Ted, Geri Georg, Indrakshi Ray and Michael Kahn, "Analyzing Regulatory Conformance in Medical Research Systems Using Multi-Paradigm Modeling", Proceedings of the 9th International Workshop on Multi-Paradigm Modeling, Ottawa, Canada, October 2015.
- Ibrahim Lazrig, Tarik Moataz, Indrajit Ray, Indrakshi Ray, Toan Ong, Michael G. Kahn, Frederic Cuppens, Nora Cuppens-Boulahia, "Privacy Preserving Record Matching using Automated Semi-trusted Broker", Proceedings of the 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Fairfax, VA, July 2015. (Acceptance ratio for full papers: 18/45)
- Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora Cuppens-Boulahia, Frederic Cuppens, and Indrajit Ray, "Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds", Proceedings of the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Vienna, Austria, June 2014. (Acceptance ratio 22/63)
- Tarik Moataz, Nora Cuppens-Boulahia, Frederic Cuppens, Indrajit Ray and Indrakshi Ray, "ELITE: zEro Links Identity managemenT systEm", Proceedings of the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Vienna, Austria, June 2014. (Acceptance ratio 22/63)
- Kirill Belyaev, Indrakshi Ray, Indrajit Ray, and Gary Luckasen, "Personal Health Record Storage on Privacy Preserving Green Clouds", Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, Texas, October 2013. (Acceptance rate 27\%)
- Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley, "k-Anonymization in the Presence of Publisher Preferences", IEEE Transactions on Knowledge and Data Engineering, 23(11), November 2011.
- Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley, "Exploring Privacy vs. Data Quality Trade-offs in Anonymization Techniques using Multi-Objective Optimizations", Journal of Computer Security, 19(5), 2011.
- Tristan Allard, Nicolas Anciaux, Luc Bougamin, Yanli Guo, Lionel Le Folgoc, Benjamin Nguyen, Philippe Pucheral, Indrajit Ray, Indrakshi Ray and Shaoyi Yin, "Secure Personal Data Servers: A Vision Paper", Proceedings of the 36th International Conference on Very Large Data Bases (VLDB), Singapore, September 2010.
- Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley, "On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS", Proceedings of the 6th International Conference on Security and Privacy in Communication Networks (SecureComm), Singapore, September 2010. (Acceptance ratio 28/112)
- Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley, "On the Identification of Property Based Generalizations in Microdata Anonymization", Proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec), Rome, Italy, June 2010. (Acceptance ratio 18/61)
- Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley, "Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services", Proceedings of the 11th International Conference on Mobile Data Management (MDM), Kansas City, Missouri, May 2010. (Acceptance ratio 16/63)
- Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley, "Multi-objective Evolutionary Optimization in Statistical Disclosure Control", Agusti Solanas and Antoni Martinez-Balleste editors, Advances in Artificial Intelligence for Privacy Protection and Security, Imperial College Press, August 2009.
- Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley, "POkA: Identifying Pareto-Optimal k-Anonymous Nodes in a Domain Hierarchy Lattice", Proceedings of the 18th ACM Conference on Information and Knowledge Management (CIKM) , Hong Kong, China, November 2009. (Acceptance ratio 123/847)
- Rinku Dewri, Darrell Whitley, Indrajit Ray and Indrakshi Ray, "A Multi-Objective Approach to Data Sharing with Privacy Constraints", Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), Montreal, Canada, July 2009. (Acceptance ratio 220/531)
- Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley, "On the Comparison of Microdata Disclosure Control Algorithms", Proceedings of the 12th International Conference on Extending Database Technology (EDBT), Saint-Petersburg, Russia, March 2009. (Acceptance ratio 92/283)
- Nayot Poolsappasit and Indrakshi Ray, "Towards Achieving Personalized Privacy for Location-Based Services", Transactions on Data Privacy, 2(1), 2009.
- Nayot Poolsappasit and Indrakshi Ray, "Towards a Scalable Model for Location Privacy", Proceedings of International Workshop on Security and Privacy in GIS and LBS (SPRINGL), Irvine, California, November 2008. (Invited Paper)
- Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley, "On the Optimal Selection of k in the k-anonymity Problem", Proceedings of the 24th International Conference on Data Engineering (ICDE), Cancun, Mexico, April 2008.
- Monte Lunacek, Darrell Whitley and Indrakshi Ray, "A Crossover Operator for the K-Anonymity Problem", Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), Seattle, Washington, July 2006.
- Anna C. Squicciarini, Elisa Bertino, Elena Ferrari and Indrakshi Ray, "Achieving Privacy with an Ontology-Based Approach in Trust Negotiations", IEEE Transactions on Dependable and Secure Computing, 3(1), January-March 2006.
- Indrakshi Ray, Elisa Bertino, Anna C. Squicciarini, and Elena Ferrari, "Anonymity Preserving Techniques in Trust Negotiations", Proceedings of the Workshop on Privacy Enhancing Technologies (PET), Dubrovnik, Croatia, May 2005. (Acceptance ratio 18/74)
Privacy and Anonymity
- Indrajit Ray, Indrakshi Ray and Narasimhamurthi Natarajan, "An Anonymous and Failure Resilient Fair-Exchange E-Commerce Protocol Using Off-line Third Parties", Decision Support Systems, 39(5), May 2005, pages 267--292.
- Indrajit Ray and Indrakshi Ray "An Anonymous Secure Multicasting Protocol", Proceedings of the 16th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec), Cambridge, U.K, July 2002.
- Indrajit Ray and Indrakshi Ray, "Fair-Exchange in E-Commerce", SIGecom Exchanges, Volume 3.2, Spring 2002, pages 9-17.
- Indrakshi Ray and Indrajit Ray "Using Compatible Keys for Secure Multicasting in E-Commerce" , Proceedings of the 2nd International Workshop on Internet Computing and E-Commerce, Fort Lauderdale, FL, April 2002. (Acceptance ratio 16/43)
- Indrajit Ray, Indrakshi Ray and Natarajan Narasimhamurthi "An Anonymous Electronic Voting Protocol for Voting over the Internet", Proceedings of the 3rd International Workshop on Advanced Issues of E-Commerce and Web-based Information Systems (WECWIS), San Jose, CA, June 2001.
- Indrakshi Ray and Indrajit Ray "An Anonymous Fair-Exchange E-Commerce Protocol", Proceedings of the 1st International Workshop on Internet Computing and E-Commerce , San Francisco, CA, April 2001.
- Indrakshi Ray and Indrajit Ray "An Optimistic Fair-Exchange E-Commerce Protocol with Automated Dispute Resolution" , Proceedings of the 1st International Conference on Electronic Commerce and Web Technologies (EC-Web), Greenwich, U.K., September 2000. Published as Lecture Notes in Computer Science, vol. 1875, 2000, Springer-Verlag, pages 84-93. (Acceptance ratio 43/120)
- Indrajit Ray, Indrakshi Ray and Natarajan Narasimhamurthi "A Fair Exchange E-Commerce Protocol with Automated Dispute Resolution", Proceedings of the 14th Annual IFIP WG 11.3 Working Conference on Database Security (DBSec), Schoorl, The Netherlands, August 2000. Also in Data and Applications Security: Developments and Directions, B. Thuraisingham, R. van de Riet, K. Dittrich and Z. Tari editors, Kluwer Academic Publishers, 2001. (Acceptance ratio 23/54)
- Indrakshi Ray and Indrajit Ray "Failure Analysis of an E-Commerce Protocol using Model Checking", Proceedings of the 2nd International Workshop on Advanced Issues of E-Commerce and Web-based Information Systems (WECWIS), San Jose, CA, June 2000, pages 176-183.
Secure Internet Protocols
- Kirill Belyaev and Indrakshi Ray, "Enhancing Applications with Filtering of XML Message Streams" (Short Paper), Proceedings of the 20th International Database Engineering and Applications Symposium, Montreal, Canada, July 2016. (Acceptance rate 29\%)
- Kirill Belyaev and Indrakshi Ray, "Towards Efficient Dissemination and Filtering of XML Data Streams", Proceedings of the 13th IEEE International Conference on Dependable, Autonomic, and Secure Computing, Liverpool, UK, October 2015. (Acceptance ratio 30\%)
- Indrakshi Ray, Raman Adaikkalavan, Xing Xie, and Rose Gamble, "Stream Processing with Secure Information Flow Constraints", Proceedings of the 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Fairfax, VA, July 2015. (Acceptance ratio for full papers: 18/45)
- Thilina Buddhika, Indrakshi Ray, Mark Linderman, and Anura Jayasumana, "Secure Complex Event Processing in a Heterogeneous and Dynamic Network", SPIE Defense and Security Sensing Conference, Baltimore, MD, May 2014.
- Xing Xie, Indrakshi Ray, and Raman Adaikkalavan, "On the Efficient Processing of Multilevel Secure Continuous Queries (Short Paper)", Proceedings of the ASE/IEEE International Conference on Privacy, Security, Risk and Trust, Washington D.C., September 2013. (Acceptance rate for short papers: 7\%)
- Xing Xie, Indrakshi Ray, Waruna Ranasinghe, Philips A. Gilbert, Pramod Shashidhara, Anoop Yadav, "Distributed Multilevel Secure Data Stream Processing", Proceedings of the 12th International Workshop on Assurance in Distributed Systems and Networks, Philadelphia, July 2013.
- Xing Xie, Indrakshi Ray, Raman Adaikkalavan and Rose Gamble, Information Flow Control for Stream Processing in Clouds,Proceedings of the 18th ACM Symposium on Access Control Models and Technologies (SACMAT), Amsterdam, The Netherlands, June 2013. (Acceptance ratio 19/62)
- Raman Adaikkalavan, Xing Xie and Indrakshi Ray, "Multilevel Secure Data Stream Processing: Architecture and Implementation", Journal of Computer Security, 20(5), 2012.
- Indrakshi Ray, Sanjay K. Madria, and Mark Linderman, "Query Plan Execution in a Heterogeneous Stream Management System for Situational Awareness", Proceedings of the 5th International Workshop on Dependable Network Computing and Mobile Systems (DNCMS), Irvine, CA, October 2012.
- Raman Adaikkalavan, Indrakshi Ray, and Xing Xie, "Multilevel Secure Data Stream Processing" Proceedings of the 25th Annual IFIP WG 11.3 Confernce on Data and Applications Security and Privacy (DBSEC), Richmond, Virginia, July 2011. (Acceptance ratio for full papers 14/37)
- Indrakshi Ray and Wei Huang,"Increasing Expressiveness of Events using Parameter Contexts", Proceedings of the 12th East-European Conferences on Advances in Databases and Information Systems (ADBIS), Pori, Finland, September 2008. (Acceptance ratio 21/63)
- Indrakshi Ray and Wei Huang, "Event Detection in Multilevel Secure Active Databases", Proceedings of the 1st International Conference on Information Systems Security (ICISS), Kolkata, India, December 2005. (Acceptance ratio 20/72)
- Indrakshi Ray, "Multi-level Secure Active Database Rules and Its Impact on the Design of Active Databases", Proceedings of the Twentieth British National Conference on Databases (BNCOD), Coventry, U.K., July 2003. (Acceptance rate 30%)
- Indrakshi Ray and Indrajit Ray "Detecting Termination of Active Database Rules using Symbolic Model Checking", Proceedings of the 5th East-European Conference on Advances in Databases and Information Systems (ADBIS), Vilnius, Lithuania, September 2001. Published as Lecture Notes in Computer Science, vol. 2151, 2001, editors A. Caplinskas and J. Eder, Springer-Verlag, pages 266-289. (Acceptance ratio 25/74)
Data Streams and Event Processing
- Rinku Dewri, Indrakshi Ray, Indrajit Ray, and Darrell Whitley, "Utility Driven Optimization of Real Time Data Broadcast Schedules", Applied Soft Computing, 12(7), July 2012.
- Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley, "Real-Time Stochastic Scheduling in Broadcast Systems with Decentralized Data Storage", Real-Time Systems, 45(3), August 2010.
- Rinku Dewri, Darrell Whitley, Indrajit Ray and Indrakshi Ray, "Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments using Evolution Strategy", Proceedings of the 10th International Conference on Parallel Problem Solving From Nature (PPSN), Dortmund, Germany, September 2008.
- Rinku Dewri, Darrell Whitley, Indrakshi Ray and Indrajit Ray, "Evolution Strategy Based Optimization of On-Demand Dependent Data Broadcast Scheduling", Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), Atlanta, Georgia, July 2008. (Poster Paper) (Acceptance ratio for Real-World Applications Track 34/75)
- Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley, "Optimizing On-Demand Data Broadcast Scheduling in Pervasive Environments", Proceedings of the 11th International Conference on Extending Database Technology (EDBT), Nantes, France, March 2008.
Real-Time Data Broadcasting
- Ping Yang, Xing Xie, Indrakshi Ray, and Shiyong Lu, "Satisfiability Analysis of Workflows with Control-Flow Patterns and Authorization Constraints", IEEE Transactions on Services Computing, 7(2), 2014.
- Prabhakaran Murugesan and Indrakshi Ray, "Audit Log Management in MongoDB", IEEE 2nd International Workshop on Cloud Security Auditing, Anchorage, Alaska, June 2014.
- \item Sarra M. Alqahtani, Rose Gamble, and Indrakshi Ray, ``Auditing Requirements for Implementing the Chinese Wall Model in the Service Cloud", IEEE 9th World Congress on Services, Santa Clara, California, June 2013.
- Parvathi Chundi, Tai Xin and Indrakshi Ray "When Does a Workflow Complete?", Computer Standards and Interfaces, 33(1), March 2011.
- Tai Xin, Indrakshi Ray, Parvathi Chundi and Sopak Chaichana, "On the Completion of Workflows", Proceedings of the 17th International Conference on Database and Expert Systems Applications (DEXA), Krakow, Poland, September 2006. (Acceptance ratio 90/388)
- Indrakshi Ray and Tai Xin, "Analysis of Dependencies for Advanced Transactions", Distributed and Parallel Databases, 20(1), July 2006.
- Yajie Zhu, Tai Xin, and Indrakshi Ray, "Recovering from Malicious Attacks in Workflow Systems", Proceedings of the 16th International Conference on Database and Expert Systems (DEXA), Copenhagen, Denmark, August 2005. slides (Acceptance ratio 92/390)
- Tai Xin, Yajie Zhu, and Indrakshi Ray, "Reliable Scheduling of Advanced Transactions", Proceedings of the 19th IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec), Storrs, Connecticut, August 2005. (Acceptance ratio 24/44)
- Tai Xin and Indrakshi Ray, "Detecting Dependency Conflicts in Advanced Transaction Models", Proceedings of the 9th International Database Applications and Engineering Symposium (IDEAS), Montreal, Canada, July 2005. (Acceptance ratio for full papers 30/144)
- Indrakshi Ray, Tai Xin and Yajie Zhu, "Ensuring Task Dependencies During Workflow Recovery", Proceedings of the 15th International Conference on Database and Expert Systems (DEXA), Zaragoza, Spain, August 2004, pages 24-33. (Acceptance ratio 92/304)
Workflows and Advanced Transaction Models
- Indrakshi Ray, Paul Ammann and Sushil Jajodia "Using Semantic Correctness in Multidatabases to Achieve Local Autonomy, Distribute Coordination, and Maintain Global Integrity",, Information Sciences, 129(1-4), Nov 2000, pages 155-195.
- Indrakshi Ray, Paul Ammann and Sushil Jajodia "A Semantic-Based Model for Multilevel Transactions", Journal of Computer Security, 6(3), Jan 1998, pages 181-217.
- Paul Ammann, Sushil Jajodia and Indrakshi Ray "Semantics-Based Decomposition of Transactions", Published in Advanced Transaction Models and Architectures, editors S. Jajodia and L. Kerschberg, Kluwer Academic Press, 1997, pages 153-180.
- Indrakshi Ray "Using Formal Methods in Semantic-Based Decomposition of Transactions", Ph.D. Dissertation, George Mason University, 1997.
- Paul Ammann, Sushil Jajodia and Indrakshi Ray "Applying Formal Methods to Semantics-Based Decomposition of Transactions", ACM Transactions on Database Systems, 22(2), June 1997, pages 215-254.
- Sushil Jajodia, Indrakshi Ray and Paul Ammann "Implementing Semantic-Based Decomposition of Transactions", Proceedings of the 9th International Conference on Advanced Information Systems Engineering (CAiSE), Barcelona, Catalonia, June 1997. Published as Lecture Notes in Computer Science, Vol. 1250, 1997, Springer-Verlag, pages 75-88. (Acceptance ratio 30/112)
- Paul Ammann, Sushil Jajodia and Indrakshi Ray "Ensuring Atomicity of Multilevel Transactions", Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, May 1996, pages 74-84. (Acceptance ratio 20/69)
- Paul Ammann, Sushil Jajodia and Indrakshi Ray "Using Formal Methods to Reason About Semantics-Based Decompositions of Transactions", Proceedings of the 21st International Conference on Very Large Data Bases (VLDB), Zurich, Switzerland, September 1995, pages 218-227. (Acceptance ratio 52/297)
Semantics-Based Transaction Processing
- Siv Hilde Houmb, Geri Georg, Dorina C. Petriu, Behzad Bordbar, Indrakshi Ray, Kyriakos Anastasakis and Robert France, "Balancing Security and Performance Properties During System Architectural Design", Software Engineering for Secure Systems: Industrial and Research Perspectives, IGI Publishing, 2011.
- Geri Georg, Kyriakos Anastasakis, Behzad Bordbar, Siv Hilde Houmb, Indrakshi Ray and Manachai Toahchoodee, "Verification and Trade-off Analysis of Security Properties in UML System Models", IEEE Transactions on Software Engineering - Special Issue on Evaluation and Improvement of Software Dependability, 36(3), May-June 2010.
- Siv Hilde Houmb, Geri Georg, Dorina C. Petriu, Behzad Bordbar, Indrakshi Ray, Kyriakos Anastasakis and Robert France, "Balancing Security and Performance Properties During System Architectural Design", To appear in Software Engineering for Secure Systems: Industrial and Research Perspectives, IGI Publishing.
- Geri Georg, Indrakshi Ray, Kyriakos Anastasakis, Behzad Bordbar, Manachai Toahchoodee and Siv Hilde Houmb,"An Aspect-Oriented Methodology for Designing Secure Applications", Information and Software Technology -- Special Issue on Model Based Development for Secure Information Systems, 51(5), May 2009.
- Geri Georg, Siv Hilde Houmb and Indrakshi Ray, "Aspect-Oriented Risk-Driven Development of Secure Applications", Proceedings of the 20th IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec), Sophia Antipolis, France, July 2006. (Acceptance ratio 22/56)
- Dan Matheson, Indrakshi Ray, Indrajit Ray, and Siv Hilde Houmb, "Building Security Requirement Patterns for Increased Effectiveness Early in the Development Process", Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS), Paris, France, August 2005. (Acceptance ratio 16/40)
- Robert France, Indrakshi Ray, Geri Georg and Sudipto Ghosh, "Aspect-oriented Approach to Early Design Modelling", IEE Proceedings - Software, Special Issue on Early Aspects: Aspect-Oriented Requirements Engineering and Architecture Design, 151(4), August 2004, pages 173-185.
- Robert B. France, Sudipto Ghosh, Indrakshi Ray, James M. Bieman, Geri Georg and Roger T. Alexander, "Evaluating Competing Dependability Concern Realizations in an Aspect-Oriented Modeling Framework (Fast Abstract)", Supplementary Proceedings of the International Symposium on Software Reliability Engineering, Denver, U.S.A., November 2003. (Acceptance ratio 40/51)
- Geri Georg, Robert B. France and Indrakshi Ray, "Creating Security Mechanism Aspect Models from Abstract Security Aspect Models", Proceedings of the Workshop on Critical Systems Development with UML , San Francisco, CA, October 2003.
- Geri Georg, Robert B. France and Indrakshi Ray, "Composing Aspect Models", Proceedings of the Workshop on Aspect Oriented Modeling with UML, San Francisco, CA, October 2003.
- Robert France, Geri Georg and Indrakshi Ray, "Supporting Multi-Dimensional Separation of Concerns", Proceedings of the Workshop on Aspect-Oriented Modeling with UML, Boston, MA, March 2003.
- Geri Georg, Indrakshi Ray and Robert France, "Using Aspects to Design a Secure System", Proceedings of the 8th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), Greenbelt, MD, December 2002. (Winner of Best Paper Award) (Acceptance ratio 23/49)
- Geri Georg, Robert France and Indrakshi Ray, "Designing High Integrity Systems using Aspects", Proceedings of the 5th Annual IFIP WG 11.5 Working Conference on Integrity and Internal Control in Information Systems (IICIS), Bonn, Germany, November 2002. (Acceptance rate 50%)
- Geri Georg, Robert France and Indrakshi Ray, "An Aspect-Based Approach to Modeling Security Concerns", Proceedings of the Workshop on Critical Systems Development with UML, Dresden, Germany, September 2002.
Aspect-Oriented Software Design
- Wuliang Sun, Benoit Combemale, Robert B. France, Arnaud Blouin, Benoit Baudry, and Indrakshi Ray, "Using Slicing to Improve the Performance of Model Invariant Checking", Journal of Object Technology, 14(4), 2015.
- Wuliang Sun, Robert France, and Indrakshi Ray, "Contract-Aware Slicing of UML Class Models", Proceedings of the ACM/IEEE 16th International Conference on Model Driven Engineering Languages and Systems, Miami, Florida, September 2013. (Acceptance ratio: 30/130)
- Wuliang Sun, Robert B. France, and Indrakshi Ray, "Analyzing Behavioral Refactoring of Class Models", Proceedings of the Workshop on Models and Evolution co-located with ACM/IEEE 16th International Conference on Model Driven Engineering Languages and Systems, Miami, Florida, September 2013.
- Mustafa Al-Lail, Ramadan Abdunabi, Robert B. France, and Indrakshi Ray, "An Approach to Analyzing Temporal Properties in UML Class Models", Proceedings of the Workshop on Models and Evolution co-located with ACM/IEEE 16th International Conference on Model Driven Engineering Languages and Systems, Miami, Florida, September 2013.
- Lijun Yu, Robert B. France, Indrakshi Ray, and Wuliang Sun, "Systematic Scenario-Based Analysis of UML Design Class Models", Proceedings of the 13th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS) , Paris, France, July 2012. (Acceptance rate 29%)
- Kyriakos Anastasakis, Behzad Bordbar, Geri Georg and Indrakshi Ray, "On Challenges of Model Transformation from UML to Alloy", Software and Systems Modeling, 9(1), January 2010.
- Lijun Yu, Robert France, Indrakshi Ray and Sudipto Ghosh, "A Rigorous Approach to Uncovering Security Violations in UML Designs", Proceedings of the 14th International Conference on Engineering of Complex Computer Systems (ICECCS), Potsdam, Germany, June 2009. (Acceptance ratio 19/65)
- Lijun Yu, Robert France and Indrakshi Ray, "Scenario-based Static Analysis of UML Behavioral Properties", Proceedings of the ACM/IEEE 11th International Conference on Model Driven Engineering Languages and Systems (MoDELS), Toulouse, France, September 2008. (Acceptance ratio 58/274)
- Kyriakos Anastasakis, Behzad Bordbar, Geri Georg and Indrakshi Ray, "UML2Alloy: A Challenging Model Transformation", Proceedings of the ACM/IEEE 10th International Conference on Model Driven Engineering Languages and Systems (MoDELS), Nashville, Tennessee, October 2007. (Acceptance rate 28%)
- Lijun Yu, Robert B. France, Indrakshi Ray, and Kevin Lano, "A Light-Weight Static Approach to Analyzing UML Behavioral Properties", Proceedings of the 12th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), Auckland, New Zealand, July 2007. (Acceptance ratio 20/70)
UML Model Analysis
- Subhojeet Mukherjee, Hossein Shirazi, Indrakshi Ray, Jeremy Daily, and Rose Gamble, "Demonstrating Practical Denial-of-Service Attacks in Embedded Networks of Commercial Vehicles", Proceedings of the 12th International Conference on Information Systems Security, Kolkata, India, December 2016. (Acceptance ratio 25/196)
- Jeremy Daily, Rose Gamble, Stephen Moffitt, Connor Raines, Paul Harris, Jannah Miran, Indrakshi Ray, Subhojeet Mukherjee, Hossein Shirazi, James Johnson, ``Towards a Cyber Assurance Testbed for Heavy Vehicle Electronic Controls", {\em SAE International Journal of Commercial Vehicles}, 9(2):339-349, 2016. (also published in Commercial Vehicle Engineering Congress, Rosemont, Illinois, October 2016). (One of the 10 Best Papers in COMVEC 2016)
- Majdi Khalid, Indrakshi Ray, and Hamidreza Chitsaz, "Confidence Weighted Bipartite Ranking", Proceedings of the 12th International Conference on Advanced Data Mining and Applications, Gold Coast, Australia, December 2016. (Spotlight Research Paper) (Acceptance ratio 18/105).
- Dieudonne Mulamba, Indrajit Ray, and Indrakshi Ray, ``SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks", Proceedings of the International Information Security and Privacy Conference, Ghent, Belgium, May 2016. (Acceptance rate 27/139)
- Constance L. Heitmeyer, Marc Pickett, Elizabeth I. Leonard, Myla M. Archer, Indrakshi Ray, David W. Aha, and J. Gregory Trafton, "Building High Assurance Human-Centric Decision Systems", Automated Software Engineering, 22(2), June 2015.
- Curtis C. R. Busby Earle, Robert B. France, and Indrakshi Ray, "Analysing Requirements to Detect Latent Security Vulnerabilities", Proceedings of the 8th International Conference on Software Security \& Reliability Companion Volume, San Francisco, CA, June 2014.
- Negar Mosharraf, Anura P. Jayasumana, and Indrakshi Ray, "A Responsive Defense Mechanism against DDoS Attacks", Proceedings of the 7th International Symposium on Foundations & Practice of Security, Montreal, Canada, November 2014. (Acceptance ratio 25/48).
- Indrakshi Ray, "Secure Transaction Processing", Encyclopedia of Database Systems, Tamer Ozsu and Ling Liu editors, Springer 2009.
- Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley, "Security Provisioning in Pervasive Environments Using Multi-objective Optimization", Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS), Malaga, Spain, October 2008. (Acceptance ratio 37/168)
- Jinyoo Kim, Yashwant Malaiya and Indrakshi Ray, "Vulnerability Discovery in Multi-Version Software Systems", Proceedings of the 10th IEEE High Assurance Systems Engineering Symposium (HASE), Dallas, Texas, November 2007. (Acceptance ratio 33/100)
- Eunjee Song, Shuxin Yin, and Indrakshi Ray, "Using UML to Model Relational Database Operations", Computer Standards and Interfaces, 29(3), March 2007.
- Shuxin Yin and Indrakshi Ray, "Relational Database Operations Modeling with UML", Proceedings of the IEEE 19th International Conference on Advanced Information Networking and Applications (AINA), Taipei, Taiwan, March 2005. (Acceptance rate 33%)
- Indrakshi Ray and Mariana Muller, "Using Schemas to Simplify Access Control for XML Documents", Proceedings of the International Conference on Distributed Computing and Internet Technology (ICDCIT) (Short Paper), Bhubaneswar, India, December 2004. (Acceptance rate 51/211)
- Nitin Prabhu, Vijay Kumar and Indrakshi Ray, "Periodic Scheduling in On-demand Broadcast Systems", Proceedings of the 3rd International Conference on Information Systems Technology and its Applications (ISTA), Salt Lake City, Utah, July 2004. (Acceptance ratio 15/43)
- Indrakshi Ray, Ross M. McConnell, Monte Lunacek and Vijay Kumar, "Reducing Damage Assessment Latency in Survivable Databases", Proceedings of the 21st British National Conference on Databases (BNCOD), Edinburgh, Scotland, July 2004. (Acceptance ratio 18/70)
- Nitin Prabhu, Vijay Kumar, Indrakshi Ray and G-Chul Yang,"Concurrency Control in Mobile Database Systems", Proceedings of the 18th International Conference on Advanced Networking and Applications (AINA), Volume 2, pages 83-86, Fukuoka, Japan, March 2004.
- Indrakshi Ray, Indrajit Ray and Natarajan Narasimhamurthi "A Cryptographic Solution to Implement Access Control in a Hierarchy and More" , Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT), Monterey, CA, June 2002. (Acceptance ratio 17/53)
- Indrajit Ray, Bruce Maxim, Kiumi Akingbehin, Indrakshi Ray and Qiang Zhu "Design of a Center for Research in Information System Security", Proceedings of the 18th Annual AoM/IAoM International Conference, San Antonio, TX, August 2000, pages 131-136.
- Indrakshi Ray and Paul Ammann "Using the B-Toolkit to Ensure Safety in SCR Specifications", Proceedings of the Annual Conference on Computer Assurance, Gaithersburg, MD, June 1997, pages 1-12.