The SCEAS System
Navigation Menu

Search the dblp DataBase


Indrajit Ray: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Indrajit Ray, Elisa Bertino, Sushil Jajodia, Luigi V. Mancini
    An Advanced Commit Protocol for MLS Distributed Database Systems. [Citation Graph (1, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:119-128 [Conf]
  2. Sushil Jajodia, Luigi V. Mancini, Indrajit Ray
    Secure Locking Protocols for Multilevel Database Management Systems. [Citation Graph (1, 0)][DBLP]
    DBSec, 1996, pp:177-194 [Conf]
  3. Elisa Bertino, Sushil Jajodia, Luigi V. Mancini, Indrajit Ray
    Advanced Transaction Processing in Multilevel Secure File Stores. [Citation Graph (1, 6)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1998, v:10, n:1, pp:120-135 [Journal]
  4. Indrakshi Ray, Indrajit Ray
    Detecting Termination of Active Database Rules Using Symbolic Model Checking. [Citation Graph (0, 0)][DBLP]
    ADBIS, 2001, pp:266-279 [Conf]
  5. Omar H. Alhazmi, Yashwant K. Malaiya, Indrajit Ray
    Security Vulnerabilities in Software Systems: A Quantitative Perspective. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:281-294 [Conf]
  6. Sushil Jajodia, Ravi Mukkamala, Indrajit Ray
    A Two-tier Coarse Indexing Scheme for MLS Database Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:199-218 [Conf]
  7. Indrajit Ray, Sudip Chakraborty
    A Framework for Flexible Access Control in Digital Library Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:252-266 [Conf]
  8. Indrajit Ray, Tomas Hajek
    Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:295-309 [Conf]
  9. Indrajit Ray, Indrakshi Ray
    Anonymous and Secure Multicast Subscription. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:313-327 [Conf]
  10. Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthy
    A Fair-exchange E-commerce Protocol with Automated Dispute Resolution. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:27-38 [Conf]
  11. Indrajit Ray, Mike Geisterfer
    Towards a Privacy Preserving e-Commerce Protocol. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2004, pp:154-163 [Conf]
  12. Indrajit Ray, Eunjong Kim, Ross M. McConnell, Daniel Massey
    Reliably, Securely and Efficiently Distributing Electronic Content Using Multicasting. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2005, pp:327-336 [Conf]
  13. Indrakshi Ray, Indrajit Ray
    An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2000, pp:84-93 [Conf]
  14. Luigi V. Mancini, Indrajit Ray
    Secure Concurrency Control in MLS Databases with Two Versions of Data. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:304-323 [Conf]
  15. Indrajit Ray, Sudip Chakraborty
    A Vector Model of Trust for Developing Trustworthy Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:260-275 [Conf]
  16. Indrajit Ray, Nayot Poolsapassit
    Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:231-246 [Conf]
  17. Indrajit Ray
    System Security Track Chair's Message. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:333- [Conf]
  18. Vamsi Kambhampati, Indrajit Ray, Eunjong Kim
    A Secure Checkpointing Protocol for Survivable Server Design. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:430-440 [Conf]
  19. Indrajit Ray, Sudip Chakraborty, Indrakshi Ray
    VTrust: A Trust Management System Based on a Vector Model of Trust. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:91-105 [Conf]
  20. Eunjong Kim, Daniel Massey, Indrajit Ray
    Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:165-176 [Conf]
  21. Indrakshi Ray, Indrajit Ray
    An Anomymous Fair Exchange E-commerce Protocol. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2001, pp:172- [Conf]
  22. Indrakshi Ray, Indrajit Ray
    Using Compatible Keys for Secure Multicasting in E-Commerce. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2002, pp:- [Conf]
  23. Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray
    Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:135-149 [Conf]
  24. Indrakshi Ray, Indrajit Ray, Natu Narasimhamurthi
    A cryptographic solution to implement access control in a hierarchy and more. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:65-73 [Conf]
  25. Sudip Chakraborty, Indrajit Ray
    TrustBAC: integrating trust relationships into the RBAC model for access control in open systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:49-58 [Conf]
  26. Indrajit Ray, Eunjong Kim
    Collective Signature for Efficient Authentication of XML Documents. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:411-424 [Conf]
  27. Indrakshi Ray, Indrajit Ray
    Failure Analysis of an E-Commerce Protocol Using Model Checking. [Citation Graph (0, 0)][DBLP]
    WECWIS, 2000, pp:176-183 [Conf]
  28. Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino
    Flexible Transaction Dependencies in Database Systems. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 2000, v:8, n:4, pp:399-446 [Journal]
  29. Indrajit Ray, Indrakshi Ray, Narasimhamurthi Natarajan
    An anonymous and failure resilient fair-exchange e-commerce protocol. [Citation Graph (0, 0)][DBLP]
    Decision Support Systems, 2005, v:39, n:3, pp:267-292 [Journal]
  30. Indrajit Ray, Sonja Tideman
    A Secure TCP Connection Migration Protocol to Enable the Survivability of Client-Server Applications under Malicious Attack. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2004, v:12, n:3, pp:- [Journal]
  31. Indrajit Ray, Luigi V. Mancini, Sushil Jajodia, Elisa Bertino
    ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2000, v:12, n:6, pp:880-899 [Journal]
  32. Sudip Chakraborty, Nayot Poolsappasit, Indrajit Ray
    Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:77-92 [Conf]

  33. Optimal security hardening using multi-objective optimization on attack tree models of networks. [Citation Graph (, )][DBLP]

  34. POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice. [Citation Graph (, )][DBLP]

  35. A Trust-Based Access Control Model for Pervasive Computing Applications. [Citation Graph (, )][DBLP]

  36. Using Trust-Based Information Aggregation for Predicting Security Level of Systems. [Citation Graph (, )][DBLP]

  37. An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems. [Citation Graph (, )][DBLP]

  38. On the Identification of Property Based Generalizations in Microdata Anonymization. [Citation Graph (, )][DBLP]

  39. Optimizing on-demand data broadcast scheduling in pervasive environments. [Citation Graph (, )][DBLP]

  40. On the comparison of microdata disclosure control algorithms. [Citation Graph (, )][DBLP]

  41. Security Provisioning in Pervasive Environments Using Multi-objective Optimization. [Citation Graph (, )][DBLP]

  42. Evolution strategy based optimization of on-demand dependent data broadcast scheduling. [Citation Graph (, )][DBLP]

  43. A multi-objective approach to data sharing with privacy constraints and preference based objectives. [Citation Graph (, )][DBLP]

  44. On the Optimal Selection of k in the k-Anonymity Problem. [Citation Graph (, )][DBLP]

  45. Remote Upload of Evidence over Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

  46. Investigating Computer Attacks Using Attack Trees. [Citation Graph (, )][DBLP]

  47. Key pre-distribution based secure backbone formation in wireless sensor networks. [Citation Graph (, )][DBLP]

  48. Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services. [Citation Graph (, )][DBLP]

  49. Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy. [Citation Graph (, )][DBLP]

  50. Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data. [Citation Graph (, )][DBLP]

  51. Measuring, analyzing and predicting security vulnerabilities in software systems. [Citation Graph (, )][DBLP]

  52. Experiences in developing a fair-exchange e-commerce protocol using common off-the-shelf components. [Citation Graph (, )][DBLP]

Search in 0.021secs, Finished in 0.024secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002