2021 Papers

  • H. Homayouni, I. Ray, S. Ghosh, S. Gondalia, M. Kahn. “Anomaly Detection in COVID-19 Time-Series Data”, SN Computer Science 2.4 (2021): 1-17 | Link
  • Kyle Haefner and Indrakshi Ray, “Trust and Verify: A Complexity-Based IoT Behavioral Enforcement Method”, 5th International Symposium on Cyber Security Cryptology and Machine Learning (CSCML), July 2021
  • Brandt Reutimann and Indrakshi Ray, “Simulating and Detecting Measurement Attacks in SCADA Testbeds”, IFIP WG 11.3 International Conference on Critical Infrastructure Protection, Virtual Conference, March 2021.
  • Vishwajeet Bhosale, Lorenzo De Carli, and Indrakshi Ray, “Detection of Anomalous User Activity for Home IoT Devices” (Short Paper), Virtual Conference, International Conference on Internet of Things, Big Data, and Security, Virtual Conference, April 2021.
  • Bruhadeshwar Bezawada, Indrakshi Ray, and Indrajit Ray, “Behavioral Fingerprinting of Internet-of-Things Devices”, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 11(1), 2021.
  • Haynes, Katherine, Hossein Shirazi, and Indrakshi Ray. “Lightweight URL-based phishing detection using natural language processing transformers for mobile devices.”

2020 Papers

  • Vaddi, Pavan Kumar, Michael C. Pietrykowski, Diptendu Kar, Xiaoxu Diao, Yunfei Zhao, Timothy Mabry, Indrajit Ray, and Carol Smidts. “Dynamic bayesian networks based abnormal event classifier for nuclear power plants in case of cyber security threats.” Progress in Nuclear Energy 128 (2020): 103479.
  • Dolan, Andy, Indrakshi Ray, and Suryadipta Majumdar. “Proactively Extracting IoT
    Device Capabilities: An Application to Smart Homes.”  In IFIP Annual Conference on Data and Applications Security and Privacy , pp. 42-63. Springer, Cham, 2020.
  • Johnston, Drew, Jarret Flack, Indrakshi Ray, and Francisco R. Ortega. “Towards a Virtual Reality Home IoT Network Visualizer.”  arXiv preprint arXiv:2001.06579  (2020).
  • Kar, Diptendu Mohan, Indrajit Ray, Jenna Gallegos, Jean Peccoud, and Indrakshi Ray. “Synthesizing DNA molecules with identity-based digital signatures to prevent malicious tampering and enabling source attribution.”  Journal of Computer Security  Preprint (2020): 1-31.
  • Shirazi, H., Landon Zweigle and I. Ray. “A Machine-learning based Unbiased Phishing Detection Approach.”  17th International Joint Conference on e-Business and Telecommunications – SECRYPT , April 2020 | Paper
  • H. Shirazi, S. R. Muramudalige, I. Ray, and A. P. Jayasumana, “Improved Phishing Detection Algorithms using Adversarial Autoencoder Synthesized Data.”  45th Conference on Local Computer Networks (LCN2020), [Best paper finalist], | Paper | Presentation

2019 Papers

  • Bezawada, Bruhadeshwar, Indrakshi Ray, and Indrajit Ray. “Behavioral fingerprinting of Internet‐of‐Things devices.” Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery (2019): e1337.
  • Shirazi, Hossein, Bruhadeshwar Bezawada, Indrakshi Ray, and Charles Anderson. “Adversarial sampling attacks against phishing detection.”  In IFIP Annual Conference on Data and Applications Security and Privacy , pp. 83-101. Springer, Cham, 2019.
  • Ray, Indrakshi, Ramadan Abdunabi, and Rejina Basnet. “Access Control for Internet of Things Applications.”  In Proceedings of the 5th on Cyber-Physical System Security Workshop , pp. 35-36. 2019.
  • Homayouni, Hajar, Sudipto Ghosh, and Indrakshi Ray. “ADQuaTe: An Automated Data Quality Test Approach for Constraint Discovery and Fault Detection.”  In 2019 IEEE 20th International Conference on Information Reuse and Integration for Data Science (IRI) , pp. 61-68. IEEE, 2019.
  • Gallegos, Jenna E., Diptendu M. Kar, Indrakshi Ray, Indrajit Ray, and Jean Peccoud. “Securing the exchange of synthetic genetic constructs using digital signatures.”  bioRxiv  (2019): 750927.
  • Homayouni, Hajar, Sudipto Ghosh, and Indrakshi Ray. “Data Warehouse Testing.”  In Advances in Computers , vol. 112, pp. 223-273. Elsevier, 2019.
  • Kar, Diptendu M., and Indrajit Ray. “Systematization of Knowledge and Implementation: Short Identity-Based Signatures.” arXiv preprint arXiv:1908.05366 (2019).
  • Bezawada, Bruhadeshwar, Indrajit Ray, and Kushagra Tiwary. “AGBuilder: An AI Tool for Automated Attack Graph Building, Analysis, and Refinement.”  In IFIP Annual Conference on Data and Applications Security and Privacy , pp. 23-42. Springer, Cham, 2019.
  • Kar, Diptendu Mohan, and Indrajit Ray. “That’s My DNA: Detecting Malicious Tampering of Synthesized DNA.”  In IFIP Annual Conference on Data and Applications Security and Privacy , pp. 61-80. Springer, Cham, 2019.
  • Ray, Indrajit, and Steven J. Goeringer. “Systems and methods for distributed trust model and framework.”  U.S. Patent Application 16/206,546, filed May 30, 2019.
  • Chen, Pin-Yu, Sutanay Choudhury, Luke Rodriguez, Alfred O. Hero, and Indrajit Ray. “Toward Cyber-Resiliency Metrics for Action Recommendations Against Lateral Movement Attacks.”  In Industrial Control Systems Security and Resiliency , pp. 71-92. Springer, Cham, 2019.
  • Mukherjee, Subhojeet, Jeffrey C. Van Etten, Namburi Rani Samyukta, Jacob Walker, Indrakshi Ray, and Indrajit Ray. “TruckSTM: Runtime Realization of Operational State Transitions for Medium and Heavy Duty Vehicles.”  ACM Transactions on Cyber-Physical Systems  4, no. 1 (2019): 1-25.
  • Shirazi, Hossein, Indrakshi Ray, and Charles Anderson. “Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles.”  In International Symposium on Foundations and Practice of Security , pp. 39-55. Springer, Cham, 2019.
  • Homayouni, Hajar, Sudipto Ghosh, Indrakshi Ray, and Michael G. Kahn. “An Interactive Data Quality Test Approach for Constraint Discovery and Fault Detection.”  In 2019 IEEE International Conference on Big Data (Big Data) , pp. 200-205. IEEE, 2019.
  • Haefner, Kyle, and Indrakshi Ray. “ComplexIoT: Behavior-Based Trust For IoT Networks.”  In 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) , pp. 56-65. IEEE, 2019.
  • Ray, Indrajit, D. M. Kar, Jordan Peterson and Steve Goeringer. “Device Identity and Trust in IoT-sphere Forsaking Cryptography.”  2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC)  (2019): 204-213.
  • Shetty, Sachin, Indrajit Ray, N. Çelik, Michael Mesham, N. Bastian and Q. Zhu. “Simulation for Cyber Risk Management – Where are we, and Where do we Want to Go?”  2019 Winter Simulation Conference (WSC)  (2019): 726-737.
  • Chen, Pin-Yu, Sutanay Choudhury, Luke Rodriguez, Alfred Hero, and Indrajit Ray. “Enterprise Cyber Resiliency Against Lateral Movement: A Graph Theoretic Approach.”  arXiv preprint arXiv:1905.01002  (2019).

2018 Papers

  • Samarati, Pierangela, Indrajit Ray, and Indrakshi Ray, eds. From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday.  Vol. 11170. Springer, 2018.
  • Pagadala, Vignesh, and Indrakshi Ray. “Achieving Mobile-Health Privacy Using Attribute-Based Access Control.”  In International Symposium on Foundations and Practice of Security , pp. 301-316. Springer, Cham, 2018.
  • Bezawada, Bruhadeshwar, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, and Indrajit Ray. “Behavioral fingerprinting of iot devices.”  In Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security , pp. 41-50. 2018.
  • Mulamba, Dieudonne, Athith Amarnath, Bruhadeshwar Bezawada, and Indrajit Ray. “A Secure Hash Commitment Approach for Moving Target Defense of Security-critical Services.”  In Proceedings of the 5th ACM Workshop on Moving Target Defense , pp. 59-68. 2018.
  • Khalid, Majdi, Indrakshi Ray, and Hamidreza Chitsaz. “Scalable Nonlinear AUC Maximization Methods.”  In Joint European Conference on Machine Learning and Knowledge Discovery in Databases , pp. 292-307. Springer, Cham, 2018.
  • Belyaev, Kirill, and Indrakshi Ray. “Towards Service Orchestration in XML Filtering Overlays.”  In European Conference on Advances in Databases and Information Systems , pp. 12-19. Springer, Cham, 2018.
  • Belyaev, Kirill, and Indrakshi Ray. “Component-oriented access control—Application servers meet tuple spaces for the masses.”  Future Generation Computer Systems  86 (2018): 726-739.
  • Mulamba, Dieudonne, Indrajit Ray, and Indrakshi Ray. “On sybil classification in Online social networks using only structural features.”  In 2018 16th Annual Conference on Privacy, Security and Trust (PST) , pp. 1-10. IEEE, 2018.
  • Lazrig, Ibrahim, Toan C. Ong, Indrajit Ray, Indrakshi Ray, Xiaoqian Jiang, and Jaideep Vaidya. “Privacy preserving probabilistic record linkage without trusted third party.”  In 2018 16th Annual Conference on Privacy, Security and Trust (PST) , pp. 1-10. IEEE, 2018.
  • Ong, Toan, Ibrahim Lazrig, Indrajit Ray, Indrakshi Ray, and Michael Kahn. “Scalable Secure Privacy-Preserving Record Linkage (PPRL) Methods Using Cloud-based Infrastructure.”  International Journal of Population Data Science  3, no. 4 (2018).
  • Homayouni, Hajar, Sudipto Ghosh, and Indrakshi Ray. “An Approach for Testing the Extract-Transform-Load Process in Data Warehouse Systems.”  In Proceedings of the 22nd International Database Engineering & Applications Symposium , pp. 236-245. 2018.
  • Shirazi, Hossein, Bruhadeshwar Bezawada, and Indrakshi Ray. “” Kn0w Thy Doma1n Name” Unbiased Phishing Detection Using Domain Name Based Features.”  In Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies , pp. 69-75. 2018.
  • Bezawada, Bruhadeshawr, Sandeep Kulkarni, Indrajit Ray, Indrakshi Ray, and Rui Li. “Independent Key Distribution Protocols for Broadcast Authentication.”  In Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies , pp. 27-38. 2018.
  • Basnet, Rejina, Subhojeet Mukherjee, Vignesh M. Pagadala, and Indrakshi Ray. “An efficient implementation of next generation access control for the mobile health cloud.”  In 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC) , pp. 131-138. IEEE, 2018.
  • Choudhury, Sutanay, Kushbu Agarwal, Pin-Yu Chen, and Indrajit Ray. “System and methods for automated detection, reasoning and recommendations for resilient cyber systems.”  U.S. Patent Application 15/730,028, filed April 12, 2018.
  • Bezawada, Bruhadeshwar, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, and Indrajit Ray. “Iotsense: Behavioral fingerprinting of iot devices.”  arXiv preprint arXiv:1804.03852  (2018).
  • Bezawada, Bruhadeshwar, Kyle Haefner, and Indrakshi Ray. “Securing home IoT environments with attribute-based access control.”  In Proceedings of the Third ACM Workshop on Attribute-Based Access Control , pp. 43-53. 2018.
  • Belyaev, Kirill, Wuliang Sun, Indrakshi Ray, and Indrajit Ray. “On the design and analysis of protocols for personal health record storage on personal data server devices.”  Future Generation Computer Systems  80 (2018): 467-482.
  • Bezawada, Bruhadeshwar, and Indrakshi Ray. “Attribute-Based Encryption: Applications and Future Directions.”  In From Database to Cyber Security , pp. 353-374. Springer, Cham, 2018.
  • Shirazi, Hossein, Kyle Haefner, and Indrakshi Ray. “Improving Auto-Detection of Phishing Websites using Fresh-Phish Framework.”  International Journal of Multimedia Data Engineering and Management (IJMDEM)  9, no. 1 (2018): 51-64.
  • Moataz, Tarik, Indrajit Ray, Indrakshi Ray, Abdullatif Shikfa, Frédéric Cuppens, and Nora Cuppens. “Substring search over encrypted data.”  Journal of Computer Security  26, no. 1 (2018): 1-30.
  • Pagadala, Vignesh, and Indrakshi Ray. “Achieving Mobile-Health Privacy Using Attribute-Based Access Control.”  In International Symposium on Foundations and Practice of Security , pp. 301-316. Springer, Cham, 2018.
  • Khalid, Majdi, Indrakshi Ray, and Hamidreza Chitsaz. “Scalable Nonlinear AUC Maximization Methods.”  In Joint European Conference on Machine Learning and Knowledge Discovery in Databases , pp. 292-307. Springer, Cham, 2018.
  • Belyaev, Kirill, and Indrakshi Ray. “Towards Service Orchestration in XML Filtering Overlays.”  In European Conference on Advances in Databases and Information Systems , pp. 12-19. Springer, Cham, 2018.
  • Belyaev, Kirill, and Indrakshi Ray. “Component-oriented access control—Application servers meet tuple spaces for the masses.”  Future Generation Computer Systems  86 (2018): 726-739.
  • Kar, Diptendu Mohan, Indrajit Ray, Jenna Gallegos, and Jean Peccoud. “Digital signatures to ensure the authenticity and integrity of synthetic DNA Molecules.”  In Proceedings of the New Security Paradigms Workshop , pp. 110-122. 2018.

2017 Papers

  • Kirill Belyaev, Indrakshi Ray: On the formalization, design, and implementation of component-oriented access control in lightweight virtualized server environments. Computers & Security 71: 15-35 (2017)
  • Subhojeet Mukherjee, Jacob Walker, Indrajit Ray, Indrakshi Ray POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles. In the 24th ACM SIGSAC Conference on Computer and Communications Security, CCS ’17, Dallas, Texas, USA, ACM, 2017.
  • Diptendu Mohan Kar, Ibrahim Lazrig, Indrajit Ray, Indrakshi Ray POSTER: PriReMat: A Distributed Tool for Privacy Preserving Record Linking in Healthcare In the 24th ACM SIGSAC Conference on Computer and Communications Security, CCS ’17, Dallas, Texas, USA, ACM, 2017.
  • Subhojeet Mukherjee, Jacob Walker, Indrakshi Ray, Jeremy Daily: A Precedence Graph-Based Approach to Detect Message Injection Attacks in J1939 Based Networks. In the 15th International Conference on Privacy, Security and Trust, PST ’17, Calgary, Canada, IEEE, 2017.
  • Dieudonne Mulamba, Indrajit Ray: Resilient Reference Monitor for Distributed Access Control via Moving Target Defense. DBSec 2017: 20-40
  • Subhojeet Mukherjee, Indrakshi Ray, Indrajit Ray, Hossein Shirazi, Toan Ong, Michael G. Kahn: Attribute Based Access Control for Healthcare Resources. ABAC@CODASPY 2017: 29-40
  • Hossein Shirazi, Kyle Haefner, Indrakshi Ray: Fresh-Phish: A Framework for Auto-Detection of Phishing Websites. IRI 2017: 137-143
  • Majdi Khalid, Indrakshi Ray, Hamidreza Chitsaz: AUC Maximization with K-hyperplane. CoRR abs/1710.00760 (2017)

2016 Papers

  • Jeremy Daily, Rose Gamble, Stephen Moffitt, Connor Raines, Paul Harris, Jannah Miran, Indrakshi Ray, Subhojeet Mukherjee, Hossein Shirazi, James Johnson, “Towards a Cyber Assurance Testbed for Heavy Vehicle Electronic Controls,” SAE Int. J. Commer. Veh. 9(2):339-349, 2016, doi:10.4271/2016-01-8142.
  • Subhojeet Mukherjee, Hossein Shirazi, Indrakshi Ray, Jeremy Daily and Rose Gamble. “Demonstrating Practical Denial-of-Service Attacks in Embedded Networks of Commercial Vehicles” , ICISS-2016 , MNIT Jaipur, India, Dec 16-20
  • Zinta S. Byrne, Kyla J. Dvorak, Janet M. Peters, Indrajit Ray, Adele E. Howe, and Diana Sanchez. From the user’s perspective: Perceptions of risk relative to benefit associated with using the internet. Computers in Human Behavior, 59:456-468, 2016.
  • Awad A. Younis, Yashwant K. Malaiya, and Indrajit Ray. Assessing vulnerability exploitability risk using software properties. Software Quality Journal, 24(1):159-202, 2016.
  • Indrakshi Ray, Toan C. Ong, Indrajit Ray, and Michael G. Kahn. Applying attribute based access control for privacy preserving health data disclosure. in 2016 IEEE-EMBS International Conference on Biomedical and Health informatics, BHI 2016, Las Vegas, NV, USA, February 24-27,2016, pages 1-4.
  • Awad A. Younis, Yashwant K. Malaiya, Charles Anderson, and Indrajit Ray. To fear or not to fear that is the question: Code characteristics of a vulnerable function with an existing exploit. in Bertino et al. , pages 97-104.
  • Awad A. Younis, Yashwant K. Malaiya, and Indrajit Ray. Evaluating CVSS base score using vulnerability rewards programs. in Hoepman and Katzenbeisser , pages 62-75.
  • Dieudonne Mulamba, Indrajit Ray, and Indrakshi Ray. Sybilradar: A graph-structure based framework for sybil detection in online social networks. in Hoepman and Katzenbeisser , pages 179-193.
  • 2016 IEEE-EMBS International Conference on Biomedical and Health informatics, BHI 2016, Las Vegas, NV, USA, February 24-27, 2016. IEEE, 2016.
  • Elisa Bertino, Ravi Sandhu, and Alexander Pretschner, editors. Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016. ACM, 2016.
  • Jaap-Henk Hoepman and Stefan Katzenbeisser, editors. ICT Systems Security and Privacy Protection – 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 – June 1, 2016, Proceedings, volume 471 of IFIP Advances in Information and Communication Technology. Springer, 2016.
  • Luke Rodriguez, Darren Curtis, Sutanay Choudhury, Kiri Oler, Peter Nordquist, Pin-Yu Chen, and Indrajit Ray. DEMO: Action recommendation for cyber resilience. in Ray et al. pages 1620-1622.
  • Florian Kerschbaum, Cristina Nita-Rotaru, and Indrajit Ray. CCSW 2015: The 7th ACM cloud computing security workshop. in Ray et al., pages 1703-1704.
  • Ibrahim Lazrig, Tarik Moataz, Indrajit Ray, Indrakshi Ray, Toan Ong, Michael G. Kahn, Frederic Cuppens, and Nora Cuppens-Boulahia. Privacy preserving record matching using automated semi-trusted broker. in Samarati, pages 103-118.
  • Ibrahim Lazrig, Toan Ong, Indrajit Ray, Indrakshi Ray and Michael Kahn, “Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes”, Proceedings of the 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Trento, Italy, July 2016.
  • Belyaev Kirill, Wuliang Sun, Indrakshi Ray, and Indrajit Ray. “On the Design and Analysis of Protocols for Personal Health Record Storage on Personal Data Server Devices”, Future Generation Computer Systems Journal, 2016.
  • Mikhail Strizhov and Indrajit Ray, “Secure Multi-keyword Similarity Search over Encrypted Cloud,” Accepted in Transactions on Data Privacy, 2016.
  • Mikhail Strizhov, Zachary Osman and Indrajit Ray, “Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup,” Future Internet 2016.

2015 Papers

  • Subhojeet Mukherjee, Sachini S. Weerawardhana, Chancey Dunn, Indrajit Ray, and Adele E. Howe. POSTER: psychorithm: A framework for studying how human traits affect user response to security situations. in Ray et al., pages 1662-1664.
  • Mikhail Strizhov and Indrajit Ray. Substring position search over encrypted cloud data using tree-based index. in 2015 IEEE International Conference on Cloud Engineering, iC2E 2015, Tempe, AZ, USA, March 9-13, 2015, pages 165-174.3
  • Sutanay Choudhury, Luke Rodriguez, Darren Curtis, Kiri Oler, Peter Nordquist, Pin-Yu Chen, and Indrajit Ray. Action recommendation for cyber resilience. in Al-Shaer et al., pages 3-8. Indrajit Ray, Ninghui Li, and Christopher Kruegel, editors. Proceedings of the 22nd ACM SiGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-6, 2015. ACM, 2015.
  • Indrajit Ray, Xiaofeng Wang, Kui Ren, Christos Dimitrakakis, Aikaterini Mitrokotsa, and Arunesh Sinha, editors. Proceedings of the 8th ACM Workshop on Artificial intelligence and Security, AISec 2015, Denver, Colorado, USA, October 16, 2015. ACM, 2015.
  • Indrajit Ray, Xiaofeng Wang, Kui Ren, Florian Kerschbaum, and Cristina Nita-Rotaru, editors. Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, CCSW 2015, Denver, Colorado, USA, October 16, 2015. ACM, 2015.
  • Indrajit Ray, Roshan K. Thomas, and Alvaro A. CArdenas, editors. Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or Privacy, CPS-SPC 2015, Denver, Colorado, USA, October 16, 2015. ACM, 2015.
  • Indrajit Ray, Xiaofeng Wang, and Kui Ren, editors. Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015. ACM, 2015.
  • Indrajit Ray, Tomas Sander, and Moti Yung, editors. Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, WiSCS 2015, Denver, Colorado, USA, October 12, 2015. ACM, 2015.
  • Indrajit Ray, Nicholas Hopper, and Rob Jansen, editors. Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, WPES 2015, Denver, Colorado, USA, October 12, 2015. ACM, 2015.
  • Mikhail Strizhov and Indrajit Ray. Multi-keyword similarity search over encrypted cloud data. IACR Cryptology ePrint Archive, 2015:137, 2015.
  • Pierangela Samarati, editor. Data and Applications Security and Privacy XXiX – 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings, volume 9149 of Lecture Notes in Computer Science. Springer, 2015.
  • Ehab Al-Shaer, Christopher S. Oehmen, and Mohammad Ashiqur Rahman, editors. Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig 2015, Denver, Colorado, USA, October 12, 2015. ACM, 2015.4

2014 Papers

  • Javier Lopez, Indrajit Ray, and Bruno Crispo, editors. Risks and Security of Internet and Systems – 9th International Conference, CRiSiS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers, volume 8924 of Lecture Notes in Computer Science. Springer, 2015.
  • Herve Moulin, Indrajit Ray, and Sonali Sen Gupta. Improving Nash by coarse correlation. J. Economic Theory, 150:852-865, 2014.
  • Mark Roberts, Adele E. Howe, and Indrajit Ray. Evaluating diversity in classical planning. in Chien et al.
  • Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora Cuppens-Boulahia, Frederic Cuppens, and Indrajit Ray. Privacy-preserving multiple keyword search on outsourced data in the clouds. in Atluri and Pernul, pages 66-81.
  • Tarik Moataz, Nora Cuppens-Boulahia, Frederic Cuppens, Indrajit Ray, and Indrakshi Ray. ELiTE: zero links identity management system. in Atluri and Pernul, pages 195-210.
  • Sachini S. Weerawardhana, Subhojeet Mukherjee, Indrajit Ray, and Adele E. Howe. Automated extraction of vulnerability information for home computer security. in Cuppens et al. , pages 356-366.
  • Awad A. Younis, Yashwant K. Malaiya, and Indrajit Ray. Using attack surface entry points and reachability analysis to assess the risk of software vulnerability exploitability. in 15th International IEEE Symposium on High-Assurance Systems Engineering, HASE 2014, Miami Beach, FL, USA, January 9-11, 2014 , pages 1-8.
  • Mikhail Strizhov and Indrajit Ray. Multi-keyword similarity search over encrypted cloud data. in Cuppens-Boulahia et al., pages 52-65.
  • Steve A. Chien, Minh Binh Do, Alan Fern, and Wheeler Ruml, editors. Proceedings of the Twenty-Fourth International Conference on Automated Planning and Scheduling, ICAPS 2014, Portsmouth, New Hampshire, USA, June 21-26, 2014. AAAi, 2014.
  • Vijay Atluri and Gunther Pernul, editors. Data and Applications Security and Privacy XXVII – 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings, volume 8566 of Lecture Notes in Computer Science. Springer, 2014.
  • Frederic Cuppens, Joaquin Garcia-Alfaro, A. Nur Zincir-Heywood, and Philip W. L. Fong, editors. Foundations and Practice of Security – 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers, volume 8930 of Lecture Notes in Computer Science. Springer, 2015.
  • Nora Cuppens-Boulahia, Frederic Cuppens, Sushil Jajodia, Anas Abou El Kalam, and Thierry Sans, editors. ICT Systems Security and Privacy Protection – 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings, volume 428 of IFIP Advances in Information and Communication Technology. Springer, 2014.

2013 Papers

  • Indrajit Ray and Sonali Sen Gupta. Coarse correlated equilibria in linear duopoly games. int. J. Game Theory, 42(2):541-562, 2013.
  • Indrajit Ray, Kirill Belyaev, Mikhail Strizhov, Dieudonne Mulamba, and Mariappan Rajaram. Secure logging as a service – delegating log management to the cloud. IEEE Systems Journal, 7(2):323-334, 2013.
  • Malgorzata Urbanska, Mark Roberts, Indrajit Ray, Adele E. Howe, and Zinta S. Byrne. Accepting the inevitable: factoring the user into home computer security. in Bertino et al. , pages 325-332.
  • Kirill Belyaev, Indrakshi Ray, Indrajit Ray, and Gary Luckasen. Personal health record storage on privacy preserving green clouds. in Bertino et al., pages 448-457.
  • Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir, and Robert B. France. Hypervisor event logs as a source of consistent virtual machine evidence for forensic cloud investigations. in Wang and Shafiq, pages 97-112.
  • Indrajit Ray, Dieudonne Mulamba, Indrakshi Ray, and Keesook J. Han. A model for trust-based access control and delegation in mobile clouds. in Wang and Shafiq, pages 242-257.
  • Mahantesh Halappanavar, Sutanay Choudhury, Emilie Hogan, Peter Hui, John R. Johnson, Indrajit Ray, and Lawrence B. Holder. Towards a network-of-networks framework for cyber security. in Glass et al., pages 106-108.
  • Sean S. E. Thorpe, Tyrone Grandison, Arnett Campbell, Janet Williams, Khalilah Burrell, and Indrajit Ray. Towards a forensic-based service oriented architecture framework for auditing of cloud logs. in IEEE Ninth World Congress on Services, SERVICES 2013, Santa Clara, CA, USA, June 28 – July 3, 2013, pages 75-83.
  • Mahantesh Halappanavar, Sutanay Choudhury, Emilie Hogan, Peter Hui, John R. Johnson, Indrajit Ray, and Lawrence B. Holder. Towards a networks-of-networks framework for cyber security. CoRR, abs/1304.6761, 2013. 6
  • Elisa Bertino, Ravi S. Sandhu, Lujo Bauer, and Jaehong Park, editors. Third ACM Conference on Data and Application Security and Privacy, CODASPY’13, San Antonio, TX, USA, February 18-20, 2013. ACM, 2013.
  • Elisa Bertino, Dimitrios Georgakopoulos, Mudhakar Srivatsa, Surya Nepal, and Alessandro Vinciarelli, editors. 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Work sharing, Austin, TX, USA, October 20-23, 2013. ICST / IEEE, 2013.
  • Lingyu Wang and Basit Shafiq, editors. Data and Applications Security and Privacy XXVI – 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings, volume 7964 of Lecture Notes in Computer Science. Springer, 2013.
  • Kristin Glass, Richard Colbaugh, Antonio Sanfilippo, Anne Kao, Michael Gabbay, Courtney Corley, Jiexun Li, Latifur Khan, Adam Wynne, Lisa Coote, Wenji Mao, Daniel Zeng, and Ahmad Yaghoobi, editors. 2013 IEEE International Conference on Intelligence and Security informatics, Seattle, WA, USA, June 4-7, 2013. IEEE, 2013.
  • IEEE Ninth World Congress on Services, SERViCES 2013, Santa Clara, CA, USA, June 28 – July 3, 2013. IEEE Computer Society, 2013.

2012 Papers

  • Rinku Dewri, Indrakshi Ray, Indrajit Ray, and Darrell Whitley. Utility driven optimization of real time data broadcast schedules. Appl. Soft Comput., 12(7):1832-1846, 2012.
  • Rinku Dewri, Indrajit Ray, Nayot Poolsappasit, and Darrell Whitley. Optimal security hardening on attack tree models of networks: a cost-benefit analysis. int. J. Inf. Sec., 11(3):167-188, 2012.
  • Nayot Poolsappasit, Rinku Dewri, and Indrajit Ray. Dynamic security risk management using bayesian attack graphs. IEEE Trans. Dependable Sec. Comput., 9(1):61-74, 2012.
  • Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison, and Abbie Barbir. Cloud log forensics metadata analysis. in Bai et al., pages 194-199.
  • Sean S. E. Thorpe, Tyrone Grandison, Indrajit Ray, and Abbie Barbir. Towards enabling behavioral trust among participating cloud forensic data center agencies. in Jonker and Petkovic, pages 156-161.
  • Adele E. Howe, Indrajit Ray, Mark Roberts, Malgorzata Urbanska, and Zinta S. Byrne. The psychology of security for the home computer user. in IEEE Symposium on Security and Privacy, SP 2012, 21-23 May 2012, San Francisco, California, USA, pages 209-223.
  • Xiaoying Bai, Fevzi Belli, Elisa Bertino, Carl K. Chang, Atilla Elci, Cristina Cerschi Seceleanu, Haihua Xie, and Mohammad Zulkernine, editors. 36th Annual IEEE Computer Software and Applications Conference Workshops, COMPSAC 2012, Izmir, Turkey, July 16-20, 2012. IEEE Computer Society, 2012.
  • Willem Jonker and Milan Petkovic, editors. Secure Data Management – 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceedings, volume 7482 of Lecture Notes in Computer Science. Springer, 2012.
  • IEEE Symposium on Security and Privacy, SP 2012, 21-23 May 2012, San Francisco, California, USA. IEEE Computer Society, 2012.

2011 and Earlier Papers

  • Rinku Dewri, Indrajit Ray, Indrakshi Ray, and Darrell Whitley. Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization. Journal of Computer Security, 19(5):935- 974, 2011.
  • Rinku Dewri, Indrajit Ray, Indrakshi Ray, and Darrell Whitley. k-anonymization in the presence of publisher preferences. IEEE Trans. Knowl. Data Eng., 23(11):1678-1690, 2011.
  • Sean S. E. Thorpe, Indrajit Ray, and Tyrone Grandison. Use of schema associative mapping for synchronization of the virtual machine audit logs. in Herrero and Corchado, pages 259-264.
  • Sean S. E. Thorpe, Indrajit Ray, and Tyrone Grandison. Enforcing data quality rules for a synchronized VM log audit environment using transformation mapping techniques. in Herrero and Corchado, pages 265-271.
  • Sean S. E. Thorpe, Indrakshi Ray, Indrajit Ray, Tyrone Grandison, Abbie Barbir, and Robert B. France. Formal parameterization of log synchronization events within a distributed forensic compute cloud database environment. in Gladyshev and Rogers, pages 156-171.
  • Alvaro Herrero and Emilio Corchado, editors. Computational intelligence in Security for information Systems – 4th International Conference, CiSiS 2011, Held at iWANN 2011, Torremolinos-Malaga, Spain, June 8-10, 2011. Proceedings, volume 6694 of Lecture Notes in Computer Science. Springer, 2011.
  • Pavel Gladyshev and Marcus K. Rogers, editors. Digital Forensics and Cyber Crime – Third International ICST Conference, iCDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers, volume 88 of Lecture Notes of the institute for Computer Sciences, Social informatics and Telecommunications Engineering. Springer, 2012. 8
  • Silvia B. Uchoa, Indrajit Ray, Julio F. Davalos, and Josealdo Tonholo. Comparative studies of chloride permeability, conductivity and salt-ponding tests of concrete containing different admixtures. iJMiC, 7(2):160-170, 2009.
  • Indrakshi Ray, Indrajit Ray, and Sudip Chakraborty. An interoperable context sensitive model of trust. J. intell. inf. Syst., 32(1):75-104, 2009.
  • Rinku Dewri, Indrajit Ray, Indrakshi Ray, and Darrell Whitley. Poka: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice. in Cheung et al., pages 1037-1046.
  • Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi Ray, and Indrajit Ray. A trust-based access control model for pervasive computing applications. in Gudes and Vaidya , pages 307-314.
  • Rinku Dewri, Indrajit Ray, Indrakshi Ray, and Darrell Whitley. On the comparison of microdata disclosure control algorithms. in Kersten et al., pages 240-251.
  • Rinku Dewri, Darrell Whitley, Indrajit Ray, and Indrakshi Ray. A multi-objective approach to data sharing with privacy constraints and preference based objectives. in Rothlauf, pages 1499-1506.
  • Indrajit Ray and Hongjun Zhang. Experiences in developing a fair-exchange e-commerce protocol using common off-the-shelf components. Electronic Commerce Research and Applications, 7(2):247-259, 2008.
  • Andrew Burt, Michael Darschewski, Indrajit Ray, Ramakrishna Thurimella, and Hailin Wu. Origins: an approach to trace fast spreading worms to their roots. IJSN, 3(1):36-46, 2008.
  • Indrajit Ray and Nayot Poolsappasit. Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents. IJSN, 3(2): 80-94, 2008.
  • Indrajit Ray, Nayot Poolsappasit, and Rinku Dewri. An opinion model for evaluating malicious activities in pervasive computing systems. in Atluri, pages 297-312.
  • Rinku Dewri, Indrakshi Ray, Indrajit Ray, and Darrell Whitley. Optimizing on-demand data broadcast scheduling in pervasive environments. in Kemper et al., pages 559-569.
  • Rinku Dewri, Indrakshi Ray, Indrajit Ray, and Darrell Whitley. Security provisioning in pervasive environments using multi-objective optimization. in Jajodia and Lopez, pages 349-363.
  • Rinku Dewri, Darrell Whitley, Indrakshi Ray, and Indrajit Ray. Evolution strategy based optimization of on-demand dependent data broadcast scheduling. in Ryan and Keijzer, pages 1699-1700.
  • Rinku Dewri, Indrajit Ray, Indrakshi Ray, and Darrell Whitley. On the optimal selection of k in the k-anonymity problem. in Alonso et al., pages 1364-1366.
  • H. M. N. Dilum Bandara, Anura P. Jayasumana, and Indrajit Ray. Key pre-distribution based secure backbone formation in wireless sensor networks. in LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings, pages 786-793.
  • Rinku Dewri, Darrell Whitley, Indrajit Ray, and Indrakshi Ray. Optimizing real-time ordered-data broadcasts in pervasive environments using evolution strategy. in Rudolph et al., pages 991-1000.
  • Indrajit Ray and Sudip Chakraborty. Facilitating privacy related decisions in different privacy contexts on the internet by evaluating trust in recipients of private data. in Jajodia et al., pages 605-620.
  • Indrajit Ray and Sujeet Shenoi, editors. Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008, volume 285 of IFIP. Springer, 2008.11
  • Vijay Atluri, editor. Data and Applications Security XXi, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings, volume 5094 of Lecture Notes in Computer Science. Springer, 2008.
  • Alfons Kemper, Patrick Valduriez, Noureddine Mouaddib, Jens Teubner, Mokrane Bouzeghoub, Volker Markl, Laurent Amsaleg, and Ioana Manolescu, editors. EDBT 2008, 11th International Conference on Extending Database Technology, Nantes, France, March 25-29, 2008, Proceedings, volume 261 of ACM International Conference Proceeding Series. ACM, 2008.
  • Sushil Jajodia and Javier Lopez, editors. Computer Security – ESORICS 2008, 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008. Proceedings, volume 5283 of Lecture Notes in Computer Science. Springer, 2008.
  • Conor Ryan and Maarten Keijzer, editors. Genetic and Evolutionary Computation Conference, GECCO 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008. ACM, 2008.
  • Gustavo Alonso, Jose A. Blakeley, and Arbee L. P. Chen, editors. Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7-12, 2008, Cancun, Mexico. IEEE Computer Society, 2008.
  • LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings. IEEE Computer Society, 2008.
  • Gunter Rudolph, Thomas Jansen, Simon M. Lucas, Carlo Poloni, and Nicola Beume, editors. Parallel Problem Solving from Nature – PPSN X, 10th International Conference Dortmund, Germany, September 13-17, 2008, Proceedings, volume 5199 of Lecture Notes in Computer Science. Springer, 2008.
  • Sushil Jajodia, Pierangela Samarati, and Stelvio Cimato, editors. Proceedings of The IFIP TC-11 23rd International information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milan, Italy, volume 278 of IFIP. Springer, 2008.
  • Omar H. Alhazmi, Yashwant K. Malaiya, and Indrajit Ray. Measuring, analyzing and predicting security vulnerabilities in software systems. Computers & Security, 26(3):219-228, 2007.
  • Indrajit Ray and Junxing Zhang. Towards a new standard for allowing concurrency and ensuring consistency in revision control systems. Computer Standards & interfaces, 29(3):355-364, 2007.12
  • Junxing Zhang and Indrajit Ray. Towards secure multi-sited transactional revision control systems. Computer Standards & interfaces, 29(3):365- 375, 2007.
  • Sudip Chakraborty and Indrajit Ray. p-trust: A new model of trust to allow finer control over privacy in peer-to-peer framework. JCP, 2(2):13- 24, 2007.
  • Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, and Darrell Whitley. Optimal security hardening using multi-objective optimization on attack tree models of networks. in Ning et al., pages 204-213.
  • Sudip Chakraborty, Nayot Poolsappasit, and Indrajit Ray. Reliable delivery of event data from sensors to actuators in pervasive computing environments. in Barker and Ahn, pages 77-92.
  • Nayot Poolsapassit and Indrajit Ray. Investigating computer attacks using attack trees. in Craiger and Shenoi, pages 331-343.
  • Peng Ning, Sabrina De Capitani di Vimercati, and Paul F. Syverson, editors. Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007. ACM, 2007.
  • Steve Barker and Gail-Joon Ahn, editors. Data and Applications Security XXi, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings, volume 4602 of Lecture Notes in Computer Science. Springer, 2007.
  • Philip Craiger and Sujeet Shenoi, editors. Advances in Digital Forensics II – IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, January 28-31, 2007, volume 242 of IFIP. Springer, 2007.
  • Herakles M. Polemarchakis and Indrajit Ray. Sunspots, correlation and competition. Games and Economic Behavior, 56(1):174-184, 2006.
  • Shuxin Yin, Indrakshi Ray, and Indrajit Ray. A trust model for pervasive computing environments. in Blanzieri and Zhang.
  • Indrajit Ray and Sudip Chakraborty. A framework for flexible access control in digital library systems. in Damiani and Liu, pages 252- 266.
  • Indrajit Ray. Remote upload of evidence over mobile ad hoc networks. in Olivier and Shenoi, pages 41-54.
  • Siv Hilde Houmb, Indrakshi Ray, and Indrajit Ray. Estimating the relative trustworthiness of information sources in security solution evaluation. in Stolen et al., pages 135-149. 13
  • Sudip Chakraborty and Indrajit Ray. Trustbac: integrating trust relationships into the RBAC model for access control in open systems. in Ferraiolo and Ray , pages 49-58.
  • Enrico Blanzieri and Tao Zhang, editors. 2nd International ICST Conference on Collaborative Computing: Networking, Applications and Work-sharing, CollaborateCom 2006, Atlanta, GA, USA, November 17-20, 2006. IEEE Computer Society / ICST, 2006.
  • Ernesto Damiani and Peng Liu, editors. Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings, volume 4127 of Lecture Notes in Computer Science. Springer, 2006.
  • Martin S. Olivier and Sujeet Shenoi, editors. Advances in Digital Forensics I – IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29 – February 1, 2006, volume 222 of IFIP Advances in information and Communication Technology. Springer, 2006.
  • Ketil Stolen, William H. Winsborough, Fabio Martinelli, and Fabio Massacci, editors. Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings, volume 3986 of Lecture Notes in Computer Science. Springer, 2006.
  • David F. Ferraiolo and Indrakshi Ray, editors. SACMAT 2006,11th ACM Symposium on Access Control Models and Technologies, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings. ACM, 2006.
  • Indrajit Ray, Indrakshi Ray, and Natarajan Narasimhamurthi. An anonymous and failure resilient fair-exchange e-commerce protocol. Decision Support Systems, 39(3):267-292, 2005.
  • Omar H. Alhazmi, Yashwant K. Malaiya, and Indrajit Ray. Security vulnerabilities in software systems: A quantitative perspective. in Jajodia and Wijesekera , pages 281-294.
  • Indrajit Ray, Eunjong Kim, Ross M. McConnell, and Daniel Massey. Reliably, securely and efficiently distributing electronic content using multicasting. in Bauknecht et al. , pages 327-336.
  • Indrajit Ray and Nayot Poolsapassit. Using attack trees to identify malicious attacks from authorized insiders. in di Vimercati et al. , pages 231-246.
  • Indrajit Ray. System security track chair’s message. in Chakraborty , page 333.14
  • Indrajit Ray, Sudip Chakraborty, and Indrakshi Ray. Vtrust: A trust management system based on a vector model of trust. in Jajodia and Mazumdar , pages 91-105.
  • Eunjong Kim, Daniel Massey, and Indrajit Ray. Global internet routing forensics: Validation of BGP paths using iCMP traceback. in Pollitt and Shenoi , pages 165-176.
  • Sushil Jajodia and Duminda Wijesekera, editors. Data and Applications Security XiX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings, volume 3654 of Lecture Notes in Computer Science. Springer, 2005.
  • Kurt Bauknecht, Birgit Proll, and Hannes Werthner, editors. E-Commerce and Web Technologies: 6th International Conference, EC-Web 2005, Copenhagen, Denmark, August 23-26, 2005, Proceedings, volume 3590 of Lecture Notes in Computer Science. Springer, 2005.
  • Sabrina De Capitani di Vimercati, Paul F. Syverson, and Dieter Gollmann, editors. Computer Security – ESORiCS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, volume 3679 of Lecture Notes in Computer Science. Springer, 2005.
  • Goutam Chakraborty, editor. Distributed Computing and internet Technology, Second International Conference, iCDCiT 2005, Bhubaneswar, india, December 22-24, 2005, Proceedings, volume 3816 of Lecture Notes in Computer Science. Springer, 2005.
  • Sushil Jajodia and Chandan Mazumdar, editors. information Systems Security, First International Conference, iCiSS 2005, Kolkata, india, December 19-21, 2005, Proceedings, volume 3803 of Lecture Notes in Com- puter Science. Springer, 2005.
  • Mark Pollitt and Sujeet Shenoi, editors. Advances in Digital Forensics, IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, 2005, volume 194 of IFIP. Springer, 2006.
  • Indrajit Ray and Sonja Tideman. A secure TCP connection migration protocol to enable the survivability of client-server applications under malicious attack. J. Network Syst. Manage., 12(3):251-276, 2004.
  • Indrajit Ray and Tomas Hajek. Securely distributing centralized multimedia content utilizing peer-to-peer cooperation. in Farkas and Samarati , pages 295-309.
  • Indrajit Ray and Mike Geisterfer. Towards a privacy preserving e- commerce protocol. in Bauknecht et al. , pages 154-163. 15
  • Indrajit Ray and Sudip Chakraborty. A vector model of trust for developing trustworthy systems. in Samarati et al. , pages 260-275.
  • Vamsi Kambhampati, Indrajit Ray, and Eunjong Kim. A secure checkpointing protocol for survivable server design. in Ghosh and Mohanty, pages 430-440.
  • Indrajit Ray and Eunjong Kim. Collective signature for efficient authentication of XML documents. in Deswarte et al. , pages 411-424.
  • Csilla Farkas and Pierangela Samarati, editors. Research Directions in Data and Applications Security XVii, IFIP TC11/WG 11.3 Eighteenth Annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain, volume 144 of IFIP. Kluwer/Springer, 2004.
  • Kurt Bauknecht, Martin Bichler, and Birgit Proll, editors. E-Commerce and Web Technologies, 5th International Conference, EC-Web 2004, Zaragoza, Spain, August 31-September 3, 2004, Proceedings, volume 3182 of Lecture Notes in Computer Science. Springer, 2004.
  • Pierangela Samarati, Peter Y. A. Ryan, Dieter Gollmann, and Refik Molva, editors. Computer Security – ESORiCS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, volume 3193 of Lecture Notes in Computer Science. Springer, 2004.
  • R. K. Ghosh and Hrushikesha Mohanty, editors. Distributed Computing and internet Technology, First International Conference, iCDCiT 2004, Bhubaneswar, india, December 22-24, 2004, Proceedings, volume 3347 of Lecture Notes in Computer Science. Springer, 2004.
  • Yves Deswarte, Frederic Cuppens, Sushil Jajodia, and Lingyu Wang, editors. Security and Protection in information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International information Security Conference, 22-27 August 2004, Toulouse, France, volume 147 of IFIP. Kluwer / Springer, 2004.
  • Sabrina De Capitani di Vimercati, Indrakshi Ray, and Indrajit Ray, editors. Data and Applications Security XVi: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA, volume 142 of IFIP. Kluwer/Springer, 2004.
  • Jung-Min Park, Indrajit Ray, Edwin K. P. Chong, and Howard Jay Siegel. A certified e-mail protocol suitable for mobile environments. in Proceedings of the Global Telecommunications Conference, 2003. GLOBECOM ’03, San Francisco, CA, USA, 1-5 December 2003 , pages 1394-1398.
  • Indrajit Ray and Junxing Zhang. A secure multi-sited version control system. in Jajodia and Strous , pages 125-141. 16
  • Proceedings of the Global Telecommunications Conference, 2003. GLOBECOM ’03, San Francisco, CA, USA, 1-5 December 2003. IEEE, 2003.
  • Sushil Jajodia and Leon Strous, editors. integrity and internal Control in information Systems Vi – IFIP TC11/WG11.5 Sixth Working Conference on integrity and internal Control in information Systems (iCiS) 13-14 November 2003, Lausanne, Switzerland, volume 140 of IFIP. Springer, 2004.
  • Indrajit Ray and Indrakshi Ray. Fair exchange in e-commerce. SiGecom Exchanges, 3(2):9-17, 2002.
  • Indrajit Ray and Indrakshi Ray. Anonymous and secure multicast subscription. in Gudes and Shenoi , pages 313-327.
  • Indrakshi Ray and Indrajit Ray. Using compatible keys for secure multicasting in e-commerce. in 16th International Parallel and Distributed Processing Symposium (iPDPS 2002), 15-19 April 2002, Fort Lauderdale, FL, USA, CD-ROM/Abstracts Proceedings .
  • Indrakshi Ray, Indrajit Ray, and Natu Narasimhamurthi. A cryptographic solution to implement access control in a hierarchy and more. in SACMAT, pages 65-73, 2002.
  • Ehud Gudes and Sujeet Shenoi, editors. Research Directions in Data and Applications Security, IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, UK, volume 256 of IFIP Conference Proceedings. Kluwer, 2003.
  • 16th International Parallel and Distributed Processing Symposium (iPDPS 2002), 15-19 April 2002, Fort Lauderdale, FL, USA, CD-ROM/Abstracts Proceedings. IEEE Computer Society, 2002.
  • Indrajit Ray and Lin Zhou. Game theory via revealed preferences. Games and Economic Behavior, 37(2):415-424, 2001.
  • Indrakshi Ray and Indrajit Ray. Detecting termination of active database rules using symbolic model checking. in Caplinskas and Eder , pages 266-279.
  • Indrakshi Ray and Indrajit Ray. An anomymous fair exchange e-commerce protocol. in Proceedings of the 15th International Parallel & Distributed Processing Symposium (iPDPS-01), San Francisco, CA, April 23-27, 2001, page 172.
  • Indrajit Ray, Indrakshi Ray, and Natarajan Narasimhamurthi. An anonymous electronic voting protocol for voting over the internet. in Third International Workshop on Advanced issues of E-Commerce and Web-Based information Systems (WECWiS ’01), San Jose, California, USA, June 21-22, 2001, pages 188-191. 17
  • Albertas Caplinskas and Johann Eder, editors. Advances in Databases and information Systems, 5th East European Conference, ADBiS 2001, Vilnius, Lithuania, September 25-28, 2001, Proceedings, volume 2151 of Lecture Notes in Computer Science. Springer, 2001.
  • Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, and Elisa Bertino. Flexible transaction dependencies in database systems. Distributed and Parallel Databases, 8(4):399-446, 2000.
  • Indrajit Ray. Consistency, dummy and independence of irrelevant strategies for strategic games. Social Choice and Welfare, 17(2):217-222, 2000.
  • Indrajit Ray, Luigi V. Mancini, Sushil Jajodia, and Elisa Bertino. ASEP: A secure and flexible commit protocol for MLS distributed database systems. IEEE Trans. Knowl. Data Eng., 12(6):880-899, 2000.
  • Indrajit Ray, Indrakshi Ray, and Natarajan Narasimhamurthy. A fair- exchange e-commerce protocol with automated dispute resolution. in Thuraisingham et al. , pages 27-38.
  • Indrakshi Ray and Indrajit Ray. An optimistic fair exchange e-commerce protocol with automated dispute resolution. in Bauknecht et al. , pages 84-93.
  • Indrakshi Ray and Indrajit Ray. Failure analysis of an e-commerce protocol using model checking. in Second International Workshop on Advance issues of E-Commerce and Web-Based information Systems (WECWiS 2000), Milpitas, California, USA, June 8-9, 2000 , pages 176-183.
  • Bhavani M. Thuraisingham, Reind P. van de Riet, Klaus R. Dittrich, and Zahir Tari, editors. Data and Application Security, Development and Directions, IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000, volume 201 of IFIP Conference Proceedings. Kluwer, 2001.
  • Kurt Bauknecht, Sanjay Kumar Madria, and Gunther Pernul, editors. Electronic Commerce and Web Technologies, First International Conference, EC-Web 2000, London, UK, September 4-6, 2000, Proceedings, volume 1875 of Lecture Notes in Computer Science. Springer, 2000. 18
  • Second International Workshop on Advance issues of E-Commerce and Web-Based information Systems (WECWiS 2000), Milpitas, California, USA, June 8-9, 2000. IEEE Computer Society, 2000.
  • Elisa Bertino, Sushil Jajodia, Luigi V. Mancini, and Indrajit Ray. Advanced transaction processing in multilevel secure file stores. IEEE Trans. Knowl. Data Eng., 10(1):120-135, 1998.
  • Sushil Jajodia, Ravi Mukkamala, and Indrajit Ray. A two-tier coarse indexing scheme for MLS database systems. in Lin and Qian, pages 199-218.
  • Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, and Elisa Bertino. Flexible commit protocols for advanced transaction processing. in Advanced Transaction Models and Architectures, page 0. 1997.
  • Antoni Olive and Joan Antoni Pastor, editors. Advanced information Systems Engineering, 9th International Conference CAiSE’97, Barcelona, Catalonia, Spain, June 16-20, 1997, Proceedings, volume 1250 of Lecture Notes in Computer Science. Springer, 1997.
  • Tsau Young Lin and Shelly Qian, editors. Database Securty Xi: Status and Prospects, IFIP TC11 WG11.3 Eleventh International Conference on Database Security, 10-13 August 1997, Lake Tahoe, California, USA, volume 113 of IFIP Conference Proceedings. Chapman & Hall, 1998.
  • ibrahim Lazrig, Toan Ong, Indrajit Ray, Indrakshi Ray, and Michael Kahn, editors. Proceedings of the 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Trento, Italy, July 2016.
  • Indrajit Ray, Elisa Bertino, Sushil Jajodia, and Luigi V. Mancini. An advanced commit protocol for MLS distributed database systems. in Gong and Stearn, pages 119-128.
  • 1996 IEEE Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, USA. IEEE Computer Society, 1996.
  • Sushil Jajodia, Luigi V. Mancini, and Indrajit Ray. Secure locking protocols for multilevel database management systems. in Samarati and Sandhu , pages 177-194.
  • Luigi V. Mancini and Indrajit Ray. Secure concurrency control in MLS databases with two versions of data. in Bertino et al. , pages 304-323.
  • Umeshwar Dayal, Peter M. D. Gray, and Shojiro Nishio, editors. VLDB’95, Proceedings of 21th International Conference on Very Large Data Bases, September 11-15, 1995, Zurich, Switzerland. Morgan Kaufmann, 1995. 19
  • Li Gong and Jacques Stearn, editors. CCS ’96, Proceedings of the 3rd ACM Conference on Computer and Communications Security, New Delhi, india, March 14-16, 1996. ACM, 1996.
  • Pierangela Samarati and Ravi S. Sandhu, editors. Database Security Volume X, Status and Prospects, IFIP TC11 / WG11.3 Tenth International Conference on Database Security, 22-24 July 1996, Como, Italy, volume 79 of IFIP Conference Proceedings. Chapman & Hall, 1997.
  • Elisa Bertino, Helmut Kurth, Giancarlo Martella, and Emilio Montolivo, editors. Computer Security – ESORiCS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings, volume 1146 of Lecture Notes in Computer Science. Springer, 1996.