Indrajit Ray

Navigation

News

Call for Papers (Security Conferences)

Links

 

Publications



Books
  1. Indrajit Ray and Sujeet Shenoi editors, "Advances in Digital Forensics," Springer, Boston, 2008.
  2. Sabrina De Capitani di Vimercati, Indrakshi Ray and Indrajit Ray editors, "Data and Applications Security XVII: Status and Prospects", Kluwer Academic Publishers, July 2004.


Refereed Journal Articles
  1. Sean Thorpe and Indrajit Ray, "Detecting Temporal Inconsistency in Virtual Machine Activity Timelines," Journal of Information Assurance and Security, Vol. 7(1), 2012.
  2. Rinku Dewri, Nayot Poolsappasit, Indrajit Ray and Darrell Whitley, "Optimal Security Hardening on Attack Tree Models of Networks: A Cost Benefit Analysis," International Journal of Information Security, Vol. 11(3), 2012.
  3. Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley, "Utility Driven Optimization of Real Time Data Broadcast Schedules," Applied Soft Computing, Vol. 12(7), 2012.
  4. Nayot Poolsappasit, Rinku Dewri, and Indrajit Ray, "Dynamic Security Risk Management Using Bayesian Attack Graphs," IEEE Transactions on Dependable and Secure Computing, Vol. 9(1), 2012.
  5. Sean Thorpe and Indrajit Ray, "File Timestamps for Digital Cloud Investigations," Journal of Information Assurance and Security, Vol. 6(6), 2011.
  6. Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley, "Exploring Privacy versus Data Quality Tradeoffs in Anonymization Techniques using Multi-objective Optimization," Journal of Computer Security, Vol. 19(5), 2011.
  7. Sean Thorpe, Indrajit Ray, Indrakshi Ray, and Tyrone Grandison, "A Formal Temporal Log Data Model for the Global Synchronized Virtual Machine Environment," Journal of Information Assurance and Security, Vol. 6(5), 2011.
  8. Sean Thorpe, Indrajit Ray, Indrakshi Ray, Tyrone Grandison, and Abbie Barbir, "Global Virtual Machine Attribute Access Control Policy for Auditing Federated Digital Identities within a Compute Cloud," Journal of Information Assurance and Security. (To Appear).
  9. Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray and Sudip Chakraborty, "Trust-Based Security Level Evaluation using Bayesian Belief Networks," Transactions on Computational Sciences X, Special Issue on Security in Computing, LNCS 6340, 2010
  10. Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley, "Real Time Stochastic Scheduling in Broadcast Systems with Decentralized Data Storage," Real-Time Systems. (To Appear)
  11. Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley, "k-Anonymization in the Presence of Publisher Preferences," IEEE Transactions on Knowledge and Data Engineering. (To Appear)
  12. Indrakshi Ray, Indrajit Ray and Sudip Chakraborty, "An Interoperable Context-Sensitive Model of Trust", Journal of Intelligent Information Systems, vol 32(1) 2009.
  13. Sudip Chakraborty and Indrajit Ray, "p-Trust: A New Model of Trust to Allow Finer Control over Privacy in Peer-to-Peer Framework," Journal of Computers, vol 2(2), April 2007.
  14. Indrajit Ray and Nayot Poolsappasit, "Using Mobile Ad Hoc Networks to Acquire Digital Evidence from Remote Autonomous Agents," International Journal of Security and Networks. (To Appear).
  15. Omar Alhazmi, Yashwant Malaiya and Indrajit Ray, "Measuring, Analyzing and Predicting Security Vulnerabilities in Software Systems," Computers and Security vol 26 (2007).
  16. Andrew Burt, Michael Darschewski, Indrajit Ray, Ramakrishna Thurimella and Hailin Wu, "Origins: An Approach to Trace Fast Spreading Worms to Their Roots", International Journal of Security and Networks. (To Appear).
  17. Junxing Zhang and Indrajit Ray, "Towards Secure Multi-sited Transactional Revision Control System", Computer Standards and Interfaces. vol 29(3), March 2007.
  18. Indrajit Ray and Junxing Zhang, "Towards a New Standard for Allowing Consistency in Revision Control Systems", Computer Standards and Interfaces, vol 29(3), March 2007.
  19. Indrajit Ray and Hongjun Zhang, "Experiences in Developing a Secure and Optimistic Fair-exchange E-Commerce Protocol using Common Off-the-shelf Components", Journal of Electronic Commerce Research and Application (To appear)
  20. Indrajit Ray, Eunjong Kim and Dan Massey, "A Framework to Facilitate Forensic Investigation for Falsely Advertised BGP Routes," Journal of Information Systems Security, vol 3(2), 2007.
  21. Indrajit Ray, Indrakshi Ray and Narasimhamurthi Natarajan, "An Anonymous and Failure Resilient Fair-Exchange E-Commerce Protocol", Decision Support Systems, Vol. 39(3), April 2005.  
  22. Indrajit Ray and Sonja Tideman, "A Secure TCP Connection Migration Protocol to Enable the Survivability of Client-Server Applications Under Malicious Attack", Journal of Network and Systems Management, Vol. 12(2), June 2004.
  23. Indrajit Ray, Luigi Mancini, Sushil Jajodia and Elisa Bertino, "ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems", IEEE Transactions on Knowledge and Data Engineering, Vol. 12(6) November/December 2000, pp 880-899. 
  24. Luigi Mancini, Indrajit Ray, Sushil Jajodia and Elisa Bertino, "Flexible Transaction Dependencies in Database Systems", Distributed and Parallel Databases, An International Journal, Vol. 8(4) October 2000, pp 399-446. 
  25. Elisa Bertino, Sushil Jajodia, Luigi Mancini and Indrajit Ray "Advanced Transaction Processing in Multilevel Secure File Stores", IEEE Transactions on Knowledge and Data Engineering, Vol. 10(1) January/February 1998, pp 120-135.


Refereed Chapters in Books
  1. Indrajit Ray, Indrakshi Ray and Sudip Chakraborty, "A Context-Aware Model of Trust for Facilitating Secure Ad Hoc Collaborations", Zheng Yan editor, Trust Modeling and Management in Digital Environments: From Social Concept to System Development, IGI Global, January 2010
  2. Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley "Multi-Objective Evolutionary Optimization in Statistical Disclosure Control", Advances in Artificial Intelligence for Privacy Protection and Security, Imperial College Press, 2008.
  3. Indrajit Ray, "Electronic Payment Systems," Hossein Bidgolli, editor, Handbook of Information Security, Wiley Publishers, 2005
  4. Luigi Mancini, Indrajit Ray, Sushil Jajodia and Elisa Bertino, "Flexible Commit Protocols for Advanced Transaction Processing", Sushil Jajodia and Larry Kerschberg editors, Advanced Transaction Models and Architectures, Kluwer Academic Publishers, 1997, pp 91-124.


Refereed Proceedings
  1. Zinta Byrne, Janet Weidert, Josh Liff, M. Horvath, C. Smith, Adele Howe and Indrajit Ray, "Perceptions of Internet Threats: Behavioral Intent to Click Again," Proceedings of the 2012 Society for Industrial and Organizational Psychology Conference, April 2012.
  2. Sean Thorpe, Indrajit Ray, Tyrone Grandison, and Abbie Barbir, "Cloud Digital Investigations based on a Virtual Machine Computer History Model," Proceedings of the 6th International Symposium on Digital Forensics and Information Security, Vancouver, Canada, June 26-28, 2012.
  3. Adele Howe, Indrajit Ray, Zinta Byrne, Mark Roberts and Malgorzata Urbanska, ''The Psychology of Security for the Home Computer User,'' Proceedings of the IEEE Symposium on Security and Privacy, San Francisco, CA, May 20-23, 2012.
  4. Mark Roberts, Adele Howe, Indrajit Ray, Malgorzata Urbanska, Zinta Byrne and Janet Weidert, ''Personalized Vulnerability Analysis through Automated Planning,'' International Joint Conference on Artificial Intelligence, Workshop on Intelligent Security, Barcelona, Spain, July 18, 2011.
  5. Sean Thorpe, Abbie Barbir, Indrakshi Ray, Tyronne Grandison, Indrajit Ray and Robert France, "Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment,'' 3rd ICST International Conference on Digital Forensics and Cyber Crime, Dublin, Ireland, October 26-28, 2011. (Short Paper).
  6. Sean Thorpe, Indrajit Ray and Tyronne Grandison, "Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques,'' 4th International Conference on Computational Intelligence in Security for Information Systems, Torremolinos, Malaga, Spain, June 810, 2011, LNCS 6694.
  7. Sean Thorpe, Indrajit Ray and Tyronne Grandison, "Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit Logs,'' 4th International Conference on Computational Intelligence in Security for Information Systems, Torremolinos, Malaga, Spain, June 8-10, 2011.
  8. Sean Thorpe, Indrajit Ray and Tyronne Grandison, "Enabling Security Uniformly Across Cloud Systems,'' 6th International Conference on Architectural Support for Programming Languages and Operating Systems. Workshop on Runtime Environments/Systems, Layering and Virtualized Environments, Newport Beach, CA, March 13-15 2011.
  9. Tristan Allard, Nicolas Anciaux, Luc Bouganim, Yanli Guo, Lionel Le Folgoc, Benjamin Nguyen, Philippe Pucheral, Indrajit Ray, Indrakshi Ray and Shaoyi Yin, "Secure Personal Data Servers: a Vision Paper,'' 36th International Conference on Very Large Data Bases, VLDB 2010, Singapore, September 1317, 2010.
  10. Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley "On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS'', 6th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2010, Singapore, September 7-9, 2010.
  11. Siv Hilde Houmb, Sudip Chakraborty, Indrakshi Ray and Indrajit Ray, "Using Trust-Based Information Aggregation for Predicting Security Level of Systems,'' 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec 2010, Rome, Italy, June 21-23, 2010.
  12. Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley "On the Identification of Property Based Generalizations in Microdata Anonymization'', 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec 2010, Rome, Italy, June 21-23, 2010.
  13. Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley "Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services'', 11th International Conference on Mobile Data Management, MDM 2010, Kansas City, Missouri, USA, May 23-26, 2010.
  14. Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley, "POkA: Identifying Pareto-Optimal k-Anonymous Nodes in a Domain Hierarchy Lattice,'' Proceedings of the 18th ACM Conference on Information and Knowledge Management, Hong Kong, China, November 2009.
  15. Indrakshi Ray and Indrajit Ray, "Access Control Challenges for Cyber-Physical Systems,'' Proceedings of the 1st NSF Workshop on Cyber-Physical Systems, Newark, NJ, July 2009.
  16. Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi Ray and Indrajit Ray, "A Trust-Based Access Control Model for Pervasive Computing Applications,'' Proceedings of the 23rd Annual IFIP TC-11 WG 11.3 Working Conference on Data and Applications Security, Montreal, Canada, July 2009.
  17. Rinku Dewri, Darrell Whitley, Indrajit Ray and Indrakshi Ray, "A Multi-Objective Approach to Data Sharing with Privacy Constraints and Preference Based Objectives,'' Proceedings of the Genetic and Evolutionary Computation Conference, Montreal, Canada, July 2009.
  18. Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley, "On the Comparison of Microdata Disclosure Control Algorithms,'' Proceedings of the 12th International Conference on Extending Database Technology, St. Petersburg, Russia, April 2009.
  19. H.M.N Dilum Bandara, Anura Jayasumana and Indrajit Ray, "Key Pre-Distribution Based Secure Backbone Design in Wireless Sensor Networks,'' Proceedings of the 3rd IEEE International Workshop on Practical Issues in Building Sensor Network Applications, October 2008, Montreal, Canada.
  20. Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley, "Security Provisioning in Pervasive Environments Using Multi-objective Optimization,'' Proceedings of the 13th European Symposium on Research in Computer Security, October 2008, Malaga, Spain.
  21. Rinku Dewri, Darrell Whitley, Indrajit Ray and Indrakshi Ray, "Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy,'' Proceedings of the 10th International Conference on Parallel Problem Solving From Nature, September 2008, Dortmund, Germany.
  22. Sudip Chakraborty and Indrajit Ray, "Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data,'' Proceedings of the 23rd IFIP TC-11 International Information Security Conference, September 2008, Milan, Italy.
  23. Rinku Dewri, Darrell Whitley, Indrakshi Ray and Indrajit Ray, "Evolution Strategy Based Optimization of On-Demand Dependent Data Broadcast Scheduling'', Proceedings of the 2008 Genetic and Evolutionary Computation Conference, July 2008, Atlanta, GA.
  24. Indrajit Ray, Nayot Poolsappasit and Rinku Dewri, "An Opinion Model for Evaluating Malicious Activities in Pervasive Environments,'' Proceedings of the 22nd IFIP TC-11 WG 11.3 Working Conference on Data and Applications Security, July 2008, London, UK.
  25. Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrel Whitley, "On the Optimal Selection of k in the k-Anonymity Problem,'' Proceedings of the 22nd IEEE International Conference on Data Engineering, April 2008, Cancun, Mexico.
  26. Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley, "Optimizing On-Demand Data Broadcast Scheduling in Pervasive Environments,'' Proceedings of the 11th International Conference on Extending Database Technology, March 2008, Nantes, France.
  27. Rinku Dewri, Nayot Poolsappasit, Indrajit Ray and Darrell Whitley, "Optimal Security Hardening Using Multi-Objective Optimization on Attack Tree Models of Networks,'' Proceedings of the 14th ACM Conference on Computer and Communications Security, October-November 2007, Alexandria, VA.
  28. Sudip Chakraborty, Nayot Poolsappasit and Indrajit Ray, "Reliable Delivery of Event Triggered Obligation Policies from Sensors to Actuators in Pervasive Computing Environments,'' Proceedings of the 21st IFIP TC-11 WG 11.3 Working Conference on Data and Applications Security, July 2007, Redondo Beach, CA.
  29. Nayot Poolsappasit and Indrajit Ray, "Enhancing Internet Domain Name System Availability by Building Rings of Cooperation Among Cache Resolvers,'' Proceedings of the 8th Annual IEEE SMC Information Assurance Workshop, June 2007, USMA, West Point, NY.
  30. Nayot Poolsappasit and Indrajit Ray, "A Systematic Approach for Investigating Computer Attacks Using Attack Trees,'' Proceedings of the 3rd IFIP TC-11 WG 11.9 Working Conference on Digital Forensics, January 2007, Orlando, FL.
  31. Shuxin Yin, Indrakshi Ray and Indrajit Ray, "A Trust Model for Pervasive Computing Environments,'' Proceedings of the Workshop on Trusted Collaboration, Atlanta, GA, November 2006.
  32. Indrajit Ray and Sudip Chakraborty, "A Framework for Flexible Access Control in Digital Library Systems,'' Proceedings of the 20th IFIP TC-11 WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July-August 2006.
  33. Sudip Chakraborty and Indrajit Ray, "Allowing Finer Control Over Privacy Using Trust as a Benchmark,'' Proceedings of the 7th IEEE Information Assurance Workshop, West Point, NY, June 2006.
  34. Sudip Chakraborty and Indrajit Ray, "TrustBAC -Integrating Trust Relationships into the RBAC Model for Access Control in Open Systems,'' Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, Lake Tahoe, CA, June 2006.
  35. Indrajit Ray, "Remote Upload of Digital Evidence over Mobile Ad-hoc Networks,'' Proceedings of the 2nd IFIP TC-11 WG 11.9 Working Conference on Digital Forensics, Orlando, Florida, January 29 – February 1, 2006.
  36. Siv Hilde Houmb, Indrakshi Ray and Indrajit Ray, "Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation,'' Proceedings of the 4th International Conference on Trust Management, Pisa, Tuscany, Italy, May 2006
  37. Indrajit Ray, Sudip Chakraborty and Indrakshi Ray, "VTrust: A Trust Management System Based on a Vector Model of Trust'', Proceedings of the 1st International Conference on Information Systems Security, Kolkata, India, December 2005.
  38. Indrajit Ray and Nayot Poolsappasit, "Using Attack Trees to Identify Malicious Attacks from Authorized Insiders,'' Proceedings of the 10th European Symposium on Research in Computer Security, Milan, Italy, September 2005. (Acceptance ratio 26/158)
  39. Dan Matheson, Indrakshi Ray, Indrajit Ray and Siv Hilde Houmb, "Building Security Requirement Patterns for Increased Effectiveness Early in the Development Process,'' Proceedings of the Symposium on Requirements Engineering for Information Security, Paris, France, August 2005.
  40. Indrajit Ray, Eunjong Kim, Ross McConnell and Dan Massey, "Reliably, Securely and Efficiently Distributing Electronic Content Using Multicasting,'' Proceedings of the 6th International Conference on Electronic Commerce and Web Technologies, Copenhagen, Denmark, August 2005. (Acceptance ratio 39/113)
  41. Omar Alhazmi, Yashwant Malaiya and Indrajit Ray, "Security Vulnerabilities in Software Systems: A Quantitative Perspective,'' Proceedings of the 19th IFIP TC-11 WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, August 2005.
  42. Eunjong Kim, Dan Massey and Indrajit Ray, "Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback,'' Proceedings of the 1st IFIP TC-11 WG 11.9 Working Conference on Digital Forensics, Orlando, FL, February 2005.
  43. Vamsi Kambhampati, Indrajit Ray and Eunjong Kim, "A Secure Checkpointing Protocol for Survivable Server Design'', in R.K. Ghosh and H. Mohanty editors, Proceedings of the 1st International Conference on Distributed Computing and Internet Technology, December 22-24, 2004, Bhubaneshwar, India, LNCS 3347, Springer. (Acceptance ratio 25%)
  44. Indrajit Ray and Sudip Chakraborty, "A Vector Model of Trust for Developing Trustworthy Systems'', in . Samarati et al. editors, Computer Security-ESORICS 2004, Proceedings of the 9th European Symposium on Research in Computer Security, September 13-15, 2004, Sophia Antipolis, France. LNCS 3193, Springer. (Acceptance ratio 27/159.)
  45. Indrajit Ray and Eunjong Kim, "Collective Signature for Efficient Authentication of XML Documents'', in Y. Deswarte et al. editors, Security and Protection in Information Processing Systems, Proceedings of the 19th IFIP TC 11 International Information Security Conference, August 22-25, 2004, Toulouse, France, Kluwer Academic Publisher. (Acceptance ratio, 35/159).
  46. Indrajit Ray and Mike Geisterfer, "Towards a Privacy Preserving E-Commerce Protocol'', Proceedings of the 5th International Conference on Electronic Commerce and Web Technologies, Zaragosa, Spain, Aug-Sep, 2004. (Acceptance ratio 24%).
  47. Indrajit Ray and Tomas Hajek, "Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation'', in C. Farkas and P. Samarati editors, Research Directions in data and Applications Security XVIII, Proceedings of the 18th IFIP TC-11 WG 11.3 Working Conference on Data and Applications Security, July 25-28, 2004, Sitges, Spain. Kluwer Academic Publishers.
  48. Indrajit Ray and Sonja Tideman, "Secure TCP Connection Migration for Survivability'', Proceedings of the IEEE/IEE International Conference on Networking, Guadeloupe, French Caribbean, March 1-4, 2004.
  49. Jung Min Park, Indrajit Ray, Edwin Chong and Howard Siegel, "A Certified E-mail Protocol Suitable for Mobile Environment'', Proceedings of IEEE GLOBECOM 2003 Communications Security Symposium, San Francisco, CA, December 1-5, 2003
  50. Indrajit Ray and Junxing Zhang, "A Secure Multi-Sited Version Control System'', Proceedings of the 6th IFIP TC 11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems, Lausanne, Switzerland, November 13-14, 2003.
  51. Jung Min Park, Edwin Chong, Howard Siegel and Indrajit Ray, "Constructing Fair-Exchange Protocols for E-commerce Via Distributed Computation of RSA Signatures'', Proceedings of 22nd ACM Symposium on Principles of Distributed Computing, Boston, MA, July 13-16, 2003.
  52. Indrajit Ray and Indrakshi Ray, "Anonymous and Secure Multicast Subscription'', in Ehud Gudes and Sujeet Shenoi, editors, Research Directions in Data and Applications Security, Proceedings of the 16th IFIP WG 11.3 Working Conference on Data and Applications Security, Cambridge, U.K, July 2002, Kluwer Academic Publishers, 2003.
  53. Indrakshi Ray, Indrajit Ray and Natarajan Narasimhamurthi, "A Cryptographic Solution to Implement Access Control in a Hierarchy and More'', Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, Monterey, CA, June 2002.
  54. Indrakshi Ray and Indrajit Ray, "Using Compatible Keys for Secure Multicasting in E-Commerce'', Proceedings of the 2nd International Workshop on Internet Computing and E-Commerce, Fort Lauderdale, FL, April 2002.
  55. Indrakshi Ray and Indrajit Ray, "An Anonymous Fair-Exchange E-Commerce Protocol'', Proceedings of the 2nd International Workshop on Internet Computing and E-Commerce, San Francisco, CA, April 2001.
  56. Indrakshi Ray and Indrajit Ray, "Detecting termination of Active Database Rules Using Symbolic Model Checking'', Proceedings of the 5th East-European Conference on Advances in Databases and Information Systems, Vilnius, Lithuania, September 2001. Published as Lecture Notes in Computer Science, Vol. 2151, 2001, editors in A. Caplinskas and J. Eder, Springer-Verlag.
  57. Indrajit Ray, Indrakshi Ray and Natarajan Narasimhamurthi "An Anonymous Electronic Voting Protocol for Voting over the Internet'', Proceedings of the 3rd International Workshop on Advanced Issues of E-Commerce and Web-based Information Systems, San Jose, CA, June 2001.
  58. Indrakshi Ray and Indrajit Ray, "An Optimistic Fair-exchange E-commerce Protocol with Automated Dispute Resolution'', Proceedings of the 1st International Conference on Electronic Commerce and Web Technologies, Greenwich, UK, September 2000. Published as Lecture Notes in Computer Science, Vol. 1875, Springer-Verlag.
  59. Indrajit Ray, Indrakshi Ray and Natarajan Narasimhamurthi, "A Fair Exchange E-Commerce Protocol with Automated Dispute Resolution'', in B. Thuraisingham et al editors, Database Security XIV: Status and Prospects, Chapman & Hall, 2001, Proceedings of the 14th IFIP WG 11.3 Working Conference on Database Security, Schoorl, The Netherlands, August 2000.
  60. Indrajit Ray, Bruce Maxim, Kiumi Akingbehin, Indrakshi Ray and Qiang Zhu, "Design of a Center for Research in Information Systems Security'', Proceedings of the 18th Annual AoM/IAoM International Conference, San Antonio, TX, August 2000.
  61. Indrakshi Ray and Indrajit Ray, "Failure Analysis of an E-commerce Protocol Using Model Checking'', Proceedings of the 2nd International Workshop on Advanced Issues of E-Commerce and Web-based Information Systems, Milpitas, CA, June 2000.
  62. Sushil Jajodia, Ravi Mukkamala and Indrajit Ray, "A Two-Tier Coarse Indexing Scheme for MLS Database Systems'', in T. Y. Lin and Shelly Qian editors, Database Security XI: Status and Prospects, Proceedings of the 11th IFIP WG 11.3 Working Conference on Database Security, Lake Tahoe, CA, 1997 Chapman & Hall, 1998.
  63. Sushil Jajodia, Luigi Mancini and Indrajit Ray "A Secure Locking Protocol for Multilevel Database Management Systems'', in P. Samarati and R. Sandhu editors, Database Security X: Status and Prospects, Proceedings of the 10th IFIP WG 11.3 Working Conference on Database Security, Como Italy., 1996, Chapman & Hall, 1997.
  64. Luigi Mancini and Indrajit Ray "Secure Transaction Processing in MLS Databases with Two Version of Data'', in E. Bertino et al. editors, Lecture Notes in Computer Science, Vol. 1146, 1996, Springer-Verlag, Proceedings of the 2nd European Symposium On Research In Computer Security, Rome, Italy, September 1996.
  65. Indrajit Ray, Elisa Bertino, Sushil Jajodia and Luigi Mancini "An Advanced Commit Protocol for MLS Distributed Database Systems'', Proceedings of the ACM Conference on Computer and Communications Security, New Delhi, India, March 1996