Search the dblp DataBase
Indrakshi Ray :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Paul Ammann , Sushil Jajodia , Indrakshi Ray Applying Formal Methods to Semantic-Based Decomposition of Transactions. [Citation Graph (3, 22)][DBLP ] ACM Trans. Database Syst., 1997, v:22, n:2, pp:215-254 [Journal ] Paul Ammann , Sushil Jajodia , Indrakshi Ray Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions. [Citation Graph (1, 17)][DBLP ] VLDB, 1995, pp:218-227 [Conf ] Indrakshi Ray , Indrajit Ray Detecting Termination of Active Database Rules Using Symbolic Model Checking. [Citation Graph (0, 0)][DBLP ] ADBIS, 2001, pp:266-279 [Conf ] Nitin Prabhu , Vijay Kumar , Indrakshi Ray , Gi-Chul Yang Concurrency Control in Mobile Database Systems. [Citation Graph (0, 0)][DBLP ] AINA (2), 2004, pp:83-86 [Conf ] Shuxin Yin , Indrakshi Ray Relational Database Operations Modeling with UML. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:927-932 [Conf ] Indrakshi Ray Multilevel Secure Rules and Its Impact on the Design of Active Database Systems. [Citation Graph (0, 0)][DBLP ] BNCOD, 2003, pp:226-244 [Conf ] Indrakshi Ray , Ross M. McConnell , Monte Lunacek , Vijay Kumar Reducing Damage Assessment Latency in Survivable Databases. [Citation Graph (0, 0)][DBLP ] BNCOD, 2004, pp:106-111 [Conf ] Sushil Jajodia , Indrakshi Ray , Paul Ammann Implementing Semantic-Based Decomposition of Transactions. [Citation Graph (0, 0)][DBLP ] CAiSE, 1997, pp:75-88 [Conf ] Geri Georg , Siv Hilde Houmb , Indrakshi Ray Aspect-Oriented Risk Driven Development of Secure Applications. [Citation Graph (0, 0)][DBLP ] DBSec, 2006, pp:282-296 [Conf ] Indrajit Ray , Indrakshi Ray Anonymous and Secure Multicast Subscription. [Citation Graph (0, 0)][DBLP ] DBSec, 2002, pp:313-327 [Conf ] Indrajit Ray , Indrakshi Ray , Natarajan Narasimhamurthy A Fair-exchange E-commerce Protocol with Automated Dispute Resolution. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:27-38 [Conf ] Indrakshi Ray , Tai Xin Implementing Real-Time Update of Access Control Policies. [Citation Graph (0, 0)][DBLP ] DBSec, 2004, pp:65-80 [Conf ] Tai Xin , Yajie Zhu , Indrakshi Ray Reliable Scheduling of Advanced Transactions. [Citation Graph (0, 0)][DBLP ] DBSec, 2005, pp:124-138 [Conf ] Indrakshi Ray , Tai Xin Concurrent and Real-Time Update of Access Control Policies. [Citation Graph (0, 0)][DBLP ] DEXA, 2003, pp:330-339 [Conf ] Indrakshi Ray , Tai Xin , Yajie Zhu Ensuring Task Dependencies During Workflow Recovery. [Citation Graph (0, 0)][DBLP ] DEXA, 2004, pp:24-33 [Conf ] Tai Xin , Indrakshi Ray , Parvathi Chundi , Sopak Chaichana On the Completion of Workflows. [Citation Graph (0, 0)][DBLP ] DEXA, 2006, pp:582-591 [Conf ] Yajie Zhu , Tai Xin , Indrakshi Ray Recovering from Malicious Attacks in Workflow Systems. [Citation Graph (0, 0)][DBLP ] DEXA, 2005, pp:14-23 [Conf ] Indrakshi Ray , Indrajit Ray An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution. [Citation Graph (0, 0)][DBLP ] EC-Web, 2000, pp:84-93 [Conf ] Dae-Kyoo Kim , Indrakshi Ray , Robert B. France , Na Li Modeling Role-Based Access Control Using Parameterized UML Models. [Citation Graph (0, 0)][DBLP ] FASE, 2004, pp:180-193 [Conf ] Monte Lunacek , Darrell Whitley , Indrakshi Ray A crossover operator for the k- anonymity problem. [Citation Graph (0, 0)][DBLP ] GECCO, 2006, pp:1713-1720 [Conf ] Anna Cinzia Squicciarini , Abhilasha Bhargav-Spantzel , Elisa Bertino , Elena Ferrari , Indrakshi Ray Trust Negotiations with Customizable Anonymity. [Citation Graph (0, 0)][DBLP ] IAT Workshops, 2006, pp:69-72 [Conf ] Indrakshi Ray , Marianna Muller Using Schemas to Simplify Access Control for XML Documents. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2004, pp:363-368 [Conf ] Manachai Toahchoodee , Indrakshi Ray Validation of Policy Integration Using Alloy. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:420-431 [Conf ] Geri Georg , Indrakshi Ray , Robert B. France Using Aspects to Design a Secure System. [Citation Graph (0, 0)][DBLP ] ICECCS, 2002, pp:117-0 [Conf ] Indrajit Ray , Sudip Chakraborty , Indrakshi Ray VTrust: A Trust Management System Based on a Vector Model of Trust. [Citation Graph (0, 0)][DBLP ] ICISS, 2005, pp:91-105 [Conf ] Indrakshi Ray , Wei Huang Event Detection in Multilevel Secure Active Databases. [Citation Graph (0, 0)][DBLP ] ICISS, 2005, pp:177-190 [Conf ] Indrakshi Ray , Mahendra Kumar , Lijun Yu LRBAC: A Location-Aware Role-Based Access Control Model. [Citation Graph (0, 0)][DBLP ] ICISS, 2006, pp:147-161 [Conf ] Tai Xin , Indrakshi Ray Detection for Conflicts of Dependencies in Advanced Transaction Models. [Citation Graph (0, 0)][DBLP ] IDEAS, 2005, pp:17-26 [Conf ] Indrakshi Ray , Indrajit Ray An Anomymous Fair Exchange E-commerce Protocol. [Citation Graph (0, 0)][DBLP ] IPDPS, 2001, pp:172- [Conf ] Indrakshi Ray , Indrajit Ray Using Compatible Keys for Secure Multicasting in E-Commerce. [Citation Graph (0, 0)][DBLP ] IPDPS, 2002, pp:- [Conf ] Nitin Prabhu , Vijay Kumar , Indrakshi Ray Periodic Scheduling in On-Demand Broadcast System. [Citation Graph (0, 0)][DBLP ] ISTA, 2004, pp:107-121 [Conf ] Siv Hilde Houmb , Indrakshi Ray , Indrajit Ray Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:135-149 [Conf ] Indrakshi Ray , Elisa Bertino , Anna Cinzia Squicciarini , Elena Ferrari Anonymity Preserving Techniques in Trust Negotiations. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2005, pp:93-109 [Conf ] Indrakshi Ray , Indrajit Ray , Natu Narasimhamurthi A cryptographic solution to implement access control in a hierarchy and more. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:65-73 [Conf ] Indrakshi Ray , Na Li , Robert B. France , Dae-Kyoo Kim Using uml to visualize role-based access control constraints. [Citation Graph (0, 0)][DBLP ] SACMAT, 2004, pp:115-124 [Conf ] Eunjee Song , Raghu Reddy , Robert B. France , Indrakshi Ray , Geri Georg , Roger Alexander Verifiable composition of access control and application features. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:120-129 [Conf ] Paul Ammann , Sushil Jajodia , Indrakshi Ray Ensuring Atomicity of Multilevel Transactions. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1996, pp:74-84 [Conf ] Geri Georg , Robert B. France , Indrakshi Ray Designing High Integrity Systems Using Aspects. [Citation Graph (0, 0)][DBLP ] IICIS, 2002, pp:37-57 [Conf ] Indrakshi Ray , Indrajit Ray Failure Analysis of an E-Commerce Protocol Using Model Checking. [Citation Graph (0, 0)][DBLP ] WECWIS, 2000, pp:176-183 [Conf ] Indrakshi Ray , Mahendra Kumar Towards a location-based mandatory access control model. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:1, pp:36-44 [Journal ] Indrakshi Ray Real-time update of access control policies. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2004, v:49, n:3, pp:287-309 [Journal ] Indrakshi Ray , Tai Xin Analysis of dependencies in advanced transaction models. [Citation Graph (0, 0)][DBLP ] Distributed and Parallel Databases, 2006, v:20, n:1, pp:5-27 [Journal ] Indrajit Ray , Indrakshi Ray , Narasimhamurthi Natarajan An anonymous and failure resilient fair-exchange e-commerce protocol. [Citation Graph (0, 0)][DBLP ] Decision Support Systems, 2005, v:39, n:3, pp:267-292 [Journal ] Robert B. France , Indrakshi Ray , Geri Georg , Sudipto Ghosh Aspect-oriented approach to early design modelling. [Citation Graph (0, 0)][DBLP ] IEE Proceedings - Software, 2004, v:151, n:4, pp:173-186 [Journal ] Indrakshi Ray , Robert B. France , Na Li , Geri Georg An aspect-based approach to modeling access control concerns. [Citation Graph (0, 0)][DBLP ] Information & Software Technology, 2004, v:46, n:9, pp:575-587 [Journal ] Tai Xin , Indrakshi Ray A lattice-based approach for updating access control policies in real-time. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 2007, v:32, n:5, pp:755-772 [Journal ] Indrakshi Ray , Paul Ammann , Sushil Jajodia Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2000, v:129, n:1-4, pp:155-195 [Journal ] Indrakshi Ray , Paul Ammann , Sushil Jajodia A Semantic-Based Transaction Processing Model for Multilevel Transactions. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1998, v:6, n:3, pp:181-217 [Journal ] Vijayalakshmi Atluri , Indrakshi Ray Editors' message for the special issue on security. [Citation Graph (0, 0)][DBLP ] Int. J. on Digital Libraries, 2004, v:4, n:3, pp:137-138 [Journal ] Anna Cinzia Squicciarini , Elisa Bertino , Elena Ferrari , Indrakshi Ray Achieving Privacy in Trust Negotiations with an Ontology-Based Approach. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:1, pp:13-30 [Journal ] Indrakshi Ray Applying Semantic Knowledge to Real-Time Update of Access Control Policies. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2005, v:17, n:6, pp:844-858 [Journal ] Indrakshi Ray Applying Semantic Knowledge to Real-Time Update of Access Control Policies - Appendices. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2005, v:17, n:6, pp:- [Journal ] Indrakshi Ray , Manachai Toahchoodee A Spatio-temporal Role-Based Access Control Model. [Citation Graph (0, 0)][DBLP ] DBSec, 2007, pp:211-226 [Conf ] Lijun Yu , Robert B. France , Indrakshi Ray , Kevin Lano A light-weight static approach to analyzing UML behavioral properties. [Citation Graph (0, 0)][DBLP ] ICECCS, 2007, pp:56-63 [Conf ] Indrakshi Ray , C. J. Michael Geisterfer A method for early correspondence discovery using instance data. [Citation Graph (0, 0)][DBLP ] ICEIS (1), 2007, pp:258-263 [Conf ] Kyriakos Anastasakis , Behzad Bordbar , Geri Georg , Indrakshi Ray UML2Alloy: A Challenging Model Transformation. [Citation Graph (0, 0)][DBLP ] MoDELS, 2007, pp:436-450 [Conf ] Increasing Expressiveness of Composite Events Using Parameter Contexts. [Citation Graph (, )][DBLP ] POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice. [Citation Graph (, )][DBLP ] A Trust-Based Access Control Model for Pervasive Computing Applications. [Citation Graph (, )][DBLP ] Using Trust-Based Information Aggregation for Predicting Security Level of Systems. [Citation Graph (, )][DBLP ] On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model. [Citation Graph (, )][DBLP ] On the Identification of Property Based Generalizations in Microdata Anonymization. [Citation Graph (, )][DBLP ] Optimizing on-demand data broadcast scheduling in pervasive environments. [Citation Graph (, )][DBLP ] On the comparison of microdata disclosure control algorithms. [Citation Graph (, )][DBLP ] Security Provisioning in Pervasive Environments Using Multi-objective Optimization. [Citation Graph (, )][DBLP ] Evolution strategy based optimization of on-demand dependent data broadcast scheduling. [Citation Graph (, )][DBLP ] A multi-objective approach to data sharing with privacy constraints and preference based objectives. [Citation Graph (, )][DBLP ] Towards a scalable model for location privacy. [Citation Graph (, )][DBLP ] Vulnerability Discovery in Multi-Version Software Systems. [Citation Graph (, )][DBLP ] On the Optimal Selection of k in the k-Anonymity Problem. [Citation Graph (, )][DBLP ] A Rigorous Approach to Uncovering Security Policy Violations in UML Designs. [Citation Graph (, )][DBLP ] Towards Trustworthy Delegation in Role-Based Access Control Model. [Citation Graph (, )][DBLP ] Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services. [Citation Graph (, )][DBLP ] Scenario-Based Static Analysis of UML Class Models. [Citation Graph (, )][DBLP ] Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy. [Citation Graph (, )][DBLP ] Ensuring spatio-temporal access control for real-world applications. [Citation Graph (, )][DBLP ] A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications. [Citation Graph (, )][DBLP ] Search in 0.049secs, Finished in 0.053secs