The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Indrakshi Ray: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Paul Ammann, Sushil Jajodia, Indrakshi Ray
    Applying Formal Methods to Semantic-Based Decomposition of Transactions. [Citation Graph (3, 22)][DBLP]
    ACM Trans. Database Syst., 1997, v:22, n:2, pp:215-254 [Journal]
  2. Paul Ammann, Sushil Jajodia, Indrakshi Ray
    Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions. [Citation Graph (1, 17)][DBLP]
    VLDB, 1995, pp:218-227 [Conf]
  3. Indrakshi Ray, Indrajit Ray
    Detecting Termination of Active Database Rules Using Symbolic Model Checking. [Citation Graph (0, 0)][DBLP]
    ADBIS, 2001, pp:266-279 [Conf]
  4. Nitin Prabhu, Vijay Kumar, Indrakshi Ray, Gi-Chul Yang
    Concurrency Control in Mobile Database Systems. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:83-86 [Conf]
  5. Shuxin Yin, Indrakshi Ray
    Relational Database Operations Modeling with UML. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:927-932 [Conf]
  6. Indrakshi Ray
    Multilevel Secure Rules and Its Impact on the Design of Active Database Systems. [Citation Graph (0, 0)][DBLP]
    BNCOD, 2003, pp:226-244 [Conf]
  7. Indrakshi Ray, Ross M. McConnell, Monte Lunacek, Vijay Kumar
    Reducing Damage Assessment Latency in Survivable Databases. [Citation Graph (0, 0)][DBLP]
    BNCOD, 2004, pp:106-111 [Conf]
  8. Sushil Jajodia, Indrakshi Ray, Paul Ammann
    Implementing Semantic-Based Decomposition of Transactions. [Citation Graph (0, 0)][DBLP]
    CAiSE, 1997, pp:75-88 [Conf]
  9. Geri Georg, Siv Hilde Houmb, Indrakshi Ray
    Aspect-Oriented Risk Driven Development of Secure Applications. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:282-296 [Conf]
  10. Indrajit Ray, Indrakshi Ray
    Anonymous and Secure Multicast Subscription. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:313-327 [Conf]
  11. Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthy
    A Fair-exchange E-commerce Protocol with Automated Dispute Resolution. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:27-38 [Conf]
  12. Indrakshi Ray, Tai Xin
    Implementing Real-Time Update of Access Control Policies. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:65-80 [Conf]
  13. Tai Xin, Yajie Zhu, Indrakshi Ray
    Reliable Scheduling of Advanced Transactions. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:124-138 [Conf]
  14. Indrakshi Ray, Tai Xin
    Concurrent and Real-Time Update of Access Control Policies. [Citation Graph (0, 0)][DBLP]
    DEXA, 2003, pp:330-339 [Conf]
  15. Indrakshi Ray, Tai Xin, Yajie Zhu
    Ensuring Task Dependencies During Workflow Recovery. [Citation Graph (0, 0)][DBLP]
    DEXA, 2004, pp:24-33 [Conf]
  16. Tai Xin, Indrakshi Ray, Parvathi Chundi, Sopak Chaichana
    On the Completion of Workflows. [Citation Graph (0, 0)][DBLP]
    DEXA, 2006, pp:582-591 [Conf]
  17. Yajie Zhu, Tai Xin, Indrakshi Ray
    Recovering from Malicious Attacks in Workflow Systems. [Citation Graph (0, 0)][DBLP]
    DEXA, 2005, pp:14-23 [Conf]
  18. Indrakshi Ray, Indrajit Ray
    An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2000, pp:84-93 [Conf]
  19. Dae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na Li
    Modeling Role-Based Access Control Using Parameterized UML Models. [Citation Graph (0, 0)][DBLP]
    FASE, 2004, pp:180-193 [Conf]
  20. Monte Lunacek, Darrell Whitley, Indrakshi Ray
    A crossover operator for the k- anonymity problem. [Citation Graph (0, 0)][DBLP]
    GECCO, 2006, pp:1713-1720 [Conf]
  21. Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Elena Ferrari, Indrakshi Ray
    Trust Negotiations with Customizable Anonymity. [Citation Graph (0, 0)][DBLP]
    IAT Workshops, 2006, pp:69-72 [Conf]
  22. Indrakshi Ray, Marianna Muller
    Using Schemas to Simplify Access Control for XML Documents. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:363-368 [Conf]
  23. Manachai Toahchoodee, Indrakshi Ray
    Validation of Policy Integration Using Alloy. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:420-431 [Conf]
  24. Geri Georg, Indrakshi Ray, Robert B. France
    Using Aspects to Design a Secure System. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2002, pp:117-0 [Conf]
  25. Indrajit Ray, Sudip Chakraborty, Indrakshi Ray
    VTrust: A Trust Management System Based on a Vector Model of Trust. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:91-105 [Conf]
  26. Indrakshi Ray, Wei Huang
    Event Detection in Multilevel Secure Active Databases. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:177-190 [Conf]
  27. Indrakshi Ray, Mahendra Kumar, Lijun Yu
    LRBAC: A Location-Aware Role-Based Access Control Model. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:147-161 [Conf]
  28. Tai Xin, Indrakshi Ray
    Detection for Conflicts of Dependencies in Advanced Transaction Models. [Citation Graph (0, 0)][DBLP]
    IDEAS, 2005, pp:17-26 [Conf]
  29. Indrakshi Ray, Indrajit Ray
    An Anomymous Fair Exchange E-commerce Protocol. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2001, pp:172- [Conf]
  30. Indrakshi Ray, Indrajit Ray
    Using Compatible Keys for Secure Multicasting in E-Commerce. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2002, pp:- [Conf]
  31. Nitin Prabhu, Vijay Kumar, Indrakshi Ray
    Periodic Scheduling in On-Demand Broadcast System. [Citation Graph (0, 0)][DBLP]
    ISTA, 2004, pp:107-121 [Conf]
  32. Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray
    Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:135-149 [Conf]
  33. Indrakshi Ray, Elisa Bertino, Anna Cinzia Squicciarini, Elena Ferrari
    Anonymity Preserving Techniques in Trust Negotiations. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:93-109 [Conf]
  34. Indrakshi Ray, Indrajit Ray, Natu Narasimhamurthi
    A cryptographic solution to implement access control in a hierarchy and more. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:65-73 [Conf]
  35. Indrakshi Ray, Na Li, Robert B. France, Dae-Kyoo Kim
    Using uml to visualize role-based access control constraints. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:115-124 [Conf]
  36. Eunjee Song, Raghu Reddy, Robert B. France, Indrakshi Ray, Geri Georg, Roger Alexander
    Verifiable composition of access control and application features. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:120-129 [Conf]
  37. Paul Ammann, Sushil Jajodia, Indrakshi Ray
    Ensuring Atomicity of Multilevel Transactions. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:74-84 [Conf]
  38. Geri Georg, Robert B. France, Indrakshi Ray
    Designing High Integrity Systems Using Aspects. [Citation Graph (0, 0)][DBLP]
    IICIS, 2002, pp:37-57 [Conf]
  39. Indrakshi Ray, Indrajit Ray
    Failure Analysis of an E-Commerce Protocol Using Model Checking. [Citation Graph (0, 0)][DBLP]
    WECWIS, 2000, pp:176-183 [Conf]
  40. Indrakshi Ray, Mahendra Kumar
    Towards a location-based mandatory access control model. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:1, pp:36-44 [Journal]
  41. Indrakshi Ray
    Real-time update of access control policies. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2004, v:49, n:3, pp:287-309 [Journal]
  42. Indrakshi Ray, Tai Xin
    Analysis of dependencies in advanced transaction models. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 2006, v:20, n:1, pp:5-27 [Journal]
  43. Indrajit Ray, Indrakshi Ray, Narasimhamurthi Natarajan
    An anonymous and failure resilient fair-exchange e-commerce protocol. [Citation Graph (0, 0)][DBLP]
    Decision Support Systems, 2005, v:39, n:3, pp:267-292 [Journal]
  44. Robert B. France, Indrakshi Ray, Geri Georg, Sudipto Ghosh
    Aspect-oriented approach to early design modelling. [Citation Graph (0, 0)][DBLP]
    IEE Proceedings - Software, 2004, v:151, n:4, pp:173-186 [Journal]
  45. Indrakshi Ray, Robert B. France, Na Li, Geri Georg
    An aspect-based approach to modeling access control concerns. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2004, v:46, n:9, pp:575-587 [Journal]
  46. Tai Xin, Indrakshi Ray
    A lattice-based approach for updating access control policies in real-time. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 2007, v:32, n:5, pp:755-772 [Journal]
  47. Indrakshi Ray, Paul Ammann, Sushil Jajodia
    Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2000, v:129, n:1-4, pp:155-195 [Journal]
  48. Indrakshi Ray, Paul Ammann, Sushil Jajodia
    A Semantic-Based Transaction Processing Model for Multilevel Transactions. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1998, v:6, n:3, pp:181-217 [Journal]
  49. Vijayalakshmi Atluri, Indrakshi Ray
    Editors' message for the special issue on security. [Citation Graph (0, 0)][DBLP]
    Int. J. on Digital Libraries, 2004, v:4, n:3, pp:137-138 [Journal]
  50. Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Indrakshi Ray
    Achieving Privacy in Trust Negotiations with an Ontology-Based Approach. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:1, pp:13-30 [Journal]
  51. Indrakshi Ray
    Applying Semantic Knowledge to Real-Time Update of Access Control Policies. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2005, v:17, n:6, pp:844-858 [Journal]
  52. Indrakshi Ray
    Applying Semantic Knowledge to Real-Time Update of Access Control Policies - Appendices. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2005, v:17, n:6, pp:- [Journal]
  53. Indrakshi Ray, Manachai Toahchoodee
    A Spatio-temporal Role-Based Access Control Model. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:211-226 [Conf]
  54. Lijun Yu, Robert B. France, Indrakshi Ray, Kevin Lano
    A light-weight static approach to analyzing UML behavioral properties. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2007, pp:56-63 [Conf]
  55. Indrakshi Ray, C. J. Michael Geisterfer
    A method for early correspondence discovery using instance data. [Citation Graph (0, 0)][DBLP]
    ICEIS (1), 2007, pp:258-263 [Conf]
  56. Kyriakos Anastasakis, Behzad Bordbar, Geri Georg, Indrakshi Ray
    UML2Alloy: A Challenging Model Transformation. [Citation Graph (0, 0)][DBLP]
    MoDELS, 2007, pp:436-450 [Conf]

  57. Increasing Expressiveness of Composite Events Using Parameter Contexts. [Citation Graph (, )][DBLP]


  58. POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice. [Citation Graph (, )][DBLP]


  59. A Trust-Based Access Control Model for Pervasive Computing Applications. [Citation Graph (, )][DBLP]


  60. Using Trust-Based Information Aggregation for Predicting Security Level of Systems. [Citation Graph (, )][DBLP]


  61. On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model. [Citation Graph (, )][DBLP]


  62. On the Identification of Property Based Generalizations in Microdata Anonymization. [Citation Graph (, )][DBLP]


  63. Optimizing on-demand data broadcast scheduling in pervasive environments. [Citation Graph (, )][DBLP]


  64. On the comparison of microdata disclosure control algorithms. [Citation Graph (, )][DBLP]


  65. Security Provisioning in Pervasive Environments Using Multi-objective Optimization. [Citation Graph (, )][DBLP]


  66. Evolution strategy based optimization of on-demand dependent data broadcast scheduling. [Citation Graph (, )][DBLP]


  67. A multi-objective approach to data sharing with privacy constraints and preference based objectives. [Citation Graph (, )][DBLP]


  68. Towards a scalable model for location privacy. [Citation Graph (, )][DBLP]


  69. Vulnerability Discovery in Multi-Version Software Systems. [Citation Graph (, )][DBLP]


  70. On the Optimal Selection of k in the k-Anonymity Problem. [Citation Graph (, )][DBLP]


  71. A Rigorous Approach to Uncovering Security Policy Violations in UML Designs. [Citation Graph (, )][DBLP]


  72. Towards Trustworthy Delegation in Role-Based Access Control Model. [Citation Graph (, )][DBLP]


  73. Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services. [Citation Graph (, )][DBLP]


  74. Scenario-Based Static Analysis of UML Class Models. [Citation Graph (, )][DBLP]


  75. Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy. [Citation Graph (, )][DBLP]


  76. Ensuring spatio-temporal access control for real-world applications. [Citation Graph (, )][DBLP]


  77. A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002