Search the dblp DataBase
Indrajit Ray :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Indrajit Ray , Elisa Bertino , Sushil Jajodia , Luigi V. Mancini An Advanced Commit Protocol for MLS Distributed Database Systems. [Citation Graph (1, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1996, pp:119-128 [Conf ] Sushil Jajodia , Luigi V. Mancini , Indrajit Ray Secure Locking Protocols for Multilevel Database Management Systems. [Citation Graph (1, 0)][DBLP ] DBSec, 1996, pp:177-194 [Conf ] Elisa Bertino , Sushil Jajodia , Luigi V. Mancini , Indrajit Ray Advanced Transaction Processing in Multilevel Secure File Stores. [Citation Graph (1, 6)][DBLP ] IEEE Trans. Knowl. Data Eng., 1998, v:10, n:1, pp:120-135 [Journal ] Indrakshi Ray , Indrajit Ray Detecting Termination of Active Database Rules Using Symbolic Model Checking. [Citation Graph (0, 0)][DBLP ] ADBIS, 2001, pp:266-279 [Conf ] Omar H. Alhazmi , Yashwant K. Malaiya , Indrajit Ray Security Vulnerabilities in Software Systems: A Quantitative Perspective. [Citation Graph (0, 0)][DBLP ] DBSec, 2005, pp:281-294 [Conf ] Sushil Jajodia , Ravi Mukkamala , Indrajit Ray A Two-tier Coarse Indexing Scheme for MLS Database Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:199-218 [Conf ] Indrajit Ray , Sudip Chakraborty A Framework for Flexible Access Control in Digital Library Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 2006, pp:252-266 [Conf ] Indrajit Ray , Tomas Hajek Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation. [Citation Graph (0, 0)][DBLP ] DBSec, 2004, pp:295-309 [Conf ] Indrajit Ray , Indrakshi Ray Anonymous and Secure Multicast Subscription. [Citation Graph (0, 0)][DBLP ] DBSec, 2002, pp:313-327 [Conf ] Indrajit Ray , Indrakshi Ray , Natarajan Narasimhamurthy A Fair-exchange E-commerce Protocol with Automated Dispute Resolution. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:27-38 [Conf ] Indrajit Ray , Mike Geisterfer Towards a Privacy Preserving e-Commerce Protocol. [Citation Graph (0, 0)][DBLP ] EC-Web, 2004, pp:154-163 [Conf ] Indrajit Ray , Eunjong Kim , Ross M. McConnell , Daniel Massey Reliably, Securely and Efficiently Distributing Electronic Content Using Multicasting. [Citation Graph (0, 0)][DBLP ] EC-Web, 2005, pp:327-336 [Conf ] Indrakshi Ray , Indrajit Ray An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution. [Citation Graph (0, 0)][DBLP ] EC-Web, 2000, pp:84-93 [Conf ] Luigi V. Mancini , Indrajit Ray Secure Concurrency Control in MLS Databases with Two Versions of Data. [Citation Graph (0, 0)][DBLP ] ESORICS, 1996, pp:304-323 [Conf ] Indrajit Ray , Sudip Chakraborty A Vector Model of Trust for Developing Trustworthy Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:260-275 [Conf ] Indrajit Ray , Nayot Poolsapassit Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. [Citation Graph (0, 0)][DBLP ] ESORICS, 2005, pp:231-246 [Conf ] Indrajit Ray System Security Track Chair's Message. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:333- [Conf ] Vamsi Kambhampati , Indrajit Ray , Eunjong Kim A Secure Checkpointing Protocol for Survivable Server Design. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2004, pp:430-440 [Conf ] Indrajit Ray , Sudip Chakraborty , Indrakshi Ray VTrust: A Trust Management System Based on a Vector Model of Trust. [Citation Graph (0, 0)][DBLP ] ICISS, 2005, pp:91-105 [Conf ] Eunjong Kim , Daniel Massey , Indrajit Ray Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:165-176 [Conf ] Indrakshi Ray , Indrajit Ray An Anomymous Fair Exchange E-commerce Protocol. [Citation Graph (0, 0)][DBLP ] IPDPS, 2001, pp:172- [Conf ] Indrakshi Ray , Indrajit Ray Using Compatible Keys for Secure Multicasting in E-Commerce. [Citation Graph (0, 0)][DBLP ] IPDPS, 2002, pp:- [Conf ] Siv Hilde Houmb , Indrakshi Ray , Indrajit Ray Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:135-149 [Conf ] Indrakshi Ray , Indrajit Ray , Natu Narasimhamurthi A cryptographic solution to implement access control in a hierarchy and more. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:65-73 [Conf ] Sudip Chakraborty , Indrajit Ray TrustBAC: integrating trust relationships into the RBAC model for access control in open systems. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:49-58 [Conf ] Indrajit Ray , Eunjong Kim Collective Signature for Efficient Authentication of XML Documents. [Citation Graph (0, 0)][DBLP ] SEC, 2004, pp:411-424 [Conf ] Indrakshi Ray , Indrajit Ray Failure Analysis of an E-Commerce Protocol Using Model Checking. [Citation Graph (0, 0)][DBLP ] WECWIS, 2000, pp:176-183 [Conf ] Luigi V. Mancini , Indrajit Ray , Sushil Jajodia , Elisa Bertino Flexible Transaction Dependencies in Database Systems. [Citation Graph (0, 0)][DBLP ] Distributed and Parallel Databases, 2000, v:8, n:4, pp:399-446 [Journal ] Indrajit Ray , Indrakshi Ray , Narasimhamurthi Natarajan An anonymous and failure resilient fair-exchange e-commerce protocol. [Citation Graph (0, 0)][DBLP ] Decision Support Systems, 2005, v:39, n:3, pp:267-292 [Journal ] Indrajit Ray , Sonja Tideman A Secure TCP Connection Migration Protocol to Enable the Survivability of Client-Server Applications under Malicious Attack. [Citation Graph (0, 0)][DBLP ] J. Network Syst. Manage., 2004, v:12, n:3, pp:- [Journal ] Indrajit Ray , Luigi V. Mancini , Sushil Jajodia , Elisa Bertino ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2000, v:12, n:6, pp:880-899 [Journal ] Sudip Chakraborty , Nayot Poolsappasit , Indrajit Ray Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP ] DBSec, 2007, pp:77-92 [Conf ] Optimal security hardening using multi-objective optimization on attack tree models of networks. [Citation Graph (, )][DBLP ] POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice. [Citation Graph (, )][DBLP ] A Trust-Based Access Control Model for Pervasive Computing Applications. [Citation Graph (, )][DBLP ] Using Trust-Based Information Aggregation for Predicting Security Level of Systems. [Citation Graph (, )][DBLP ] An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems. [Citation Graph (, )][DBLP ] On the Identification of Property Based Generalizations in Microdata Anonymization. [Citation Graph (, )][DBLP ] Optimizing on-demand data broadcast scheduling in pervasive environments. [Citation Graph (, )][DBLP ] On the comparison of microdata disclosure control algorithms. [Citation Graph (, )][DBLP ] Security Provisioning in Pervasive Environments Using Multi-objective Optimization. [Citation Graph (, )][DBLP ] Evolution strategy based optimization of on-demand dependent data broadcast scheduling. [Citation Graph (, )][DBLP ] A multi-objective approach to data sharing with privacy constraints and preference based objectives. [Citation Graph (, )][DBLP ] On the Optimal Selection of k in the k-Anonymity Problem. [Citation Graph (, )][DBLP ] Remote Upload of Evidence over Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP ] Investigating Computer Attacks Using Attack Trees. [Citation Graph (, )][DBLP ] Key pre-distribution based secure backbone formation in wireless sensor networks. [Citation Graph (, )][DBLP ] Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services. [Citation Graph (, )][DBLP ] Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy. [Citation Graph (, )][DBLP ] Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data. [Citation Graph (, )][DBLP ] Measuring, analyzing and predicting security vulnerabilities in software systems. [Citation Graph (, )][DBLP ] Experiences in developing a fair-exchange e-commerce protocol using common off-the-shelf components. [Citation Graph (, )][DBLP ] Search in 0.021secs, Finished in 0.024secs