Indrajit Ray

Navigation

News

Call for Papers (Security Conferences)

Links

 

Publications



Books
  1. Florian Kerschbaum, Cristina Nita-Rotaru, Indrajit Ray, CCSW 2015: The 7th ACM Cloud Computing Security Workshop. ACM Conference on Computer and Communications Security 2015: 1703-1704
  2. Indrajit Ray, Ninghui Li, Christopher Kruegel:Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-6, 2015. ACM 2015, ISBN 978-1-4503-3832-5
  3. Javier Lopez, Indrajit Ray, Bruno Crispo,  Risks and Security of Internet and Systems,  - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers, LNCS 8924, Springer 2015
  4. Indrajit Ray and Sujeet Shenoi editors,  Advances in Digital Forensics,  Springer, Boston, 2008.
  5. Sabrina De Capitani di Vimercati, Indrakshi Ray and Indrajit Ray editors,  Data and Applications Security XVII: Status and Prospects , Kluwer Academic Publishers, July 2004.


Refereed Journal Articles
  1. Mikhail Strizhov and Indrajit Ray,  Secure Multi-keyword Similarity Search over Encrypted Data Outsourced to the Cloud,  Computers and Security. (Submitted)
  2. Tarik Moataz, Indrajit Ray, Indrakshi Ray, Abdullatif Shikfa, Frederic Cuppens and Nora Cuppens-Boulahia,  Substring Search Over Encrypted Data,  Journal of Computer Security. (Submitted).
  3. Awad A. Younis, Yashwant Malaiya and Indrajit Ray,  Assessing Vulnerability Exploitability Risk Using Software Properties,  Software Quality Journal, (Accepted for publication).
  4. Indrajit Ray, Kirill Belyaev, Mikhail Strizhov, Dieudonne Mulamba and Mariappan Rajaram,  Secure Logging as a Service – Delegating Log Management to the Cloud,  IEEE Systems Journal, Vol. 7(2) 2013.
  5. Sean Thorpe and Indrajit Ray,  Detecting Temporal Inconsistency in Virtual Machine Activity Timelines,  Journal of Information Assurance and Security, Vol. 7(1), 2012.
  6. Rinku Dewri, Nayot Poolsappasit, Indrajit Ray and Darrell Whitley,  Optimal Security Hardening on Attack Tree Models of Networks: A Cost Benefit Analysis,  International Journal of Information Security, Vol. 11(3), 2012.
  7. Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley,  Utility Driven Optimization of Real Time Data Broadcast Schedules,  Applied Soft Computing, Vol. 12(7), 2012.
  8. Nayot Poolsappasit, Rinku Dewri, and Indrajit Ray,  Dynamic Security Risk Management Using Bayesian Attack Graphs,  IEEE Transactions on Dependable and Secure Computing, Vol. 9(1), 2012.
  9. Sean Thorpe and Indrajit Ray,  File Timestamps for Digital Cloud Investigations,  Journal of Information Assurance and Security, Vol. 6(6), 2011.
  10. Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley,  Exploring Privacy versus Data Quality Tradeoffs in Anonymization Techniques using Multi-objective Optimization,  Journal of Computer Security, Vol. 19(5), 2011.
  11. Sean Thorpe, Indrajit Ray, Indrakshi Ray, and Tyrone Grandison,  A Formal Temporal Log Data Model for the Global Synchronized Virtual Machine Environment,  Journal of Information Assurance and Security, Vol. 6(5), 2011.
  12. Sean Thorpe, Indrajit Ray, Indrakshi Ray, Tyrone Grandison, and Abbie Barbir,  A Global Virtual Machine Attribute Access Control Policy for Auditing Federated Digital Identities within a Compute Cloud,  Journal of Information Assurance and Security, Vol. 6(4), 2011.
  13. Sean Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir.  The Virtual Machine Log Auditor . Information Assurance and Security Letters (IASL) Journal, Vol. 2, 2011.
  14. Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray and Sudip Chakraborty,  Trust-Based Security Level Evaluation using Bayesian Belief Networks,  Transactions on Computational Sciences X, Special Issue on Security in Computing, LNCS 6340, 2010
  15. Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley,  k-Anonymization in the Presence of Publisher Preferences,  IEEE Transactions on Knowledge and Data Engineering, Vol. 23(11), 2011.
  16. Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley,  Real Time Stochastic Scheduling in Broadcast Systems with Decentralized Data Storage,  Real-Time Systems, Vol. 45(3), 2010.
  17. Indrakshi Ray, Indrajit Ray and Sudip Chakraborty,  An Interoperable Context Sensitive Model of Trust,  Journal of Intelligent Information Systems, Vol. 32(1), February 2009.
  18. Indrajit Ray and Nayot Poolsappasit,  Using Mobile Ad Hoc Networks to Acquire Digital Evidence from Remote Autonomous Agents,  International Journal of Security and Networks, Vol. 3(2), 2008.
  19. Andrew Burt, Mike Darschewski, Indrajit Ray, Ramakrishna Thurimella and Hailin Wu,  Origins: An Approach to Trace Fast Spreading Worms to Their Roots,  International Journal of Security and Networks, Vol. 3(1), 2008.
  20. Indrajit Ray and Hongjun Zhang,  Experiences in Developing a Secure and Optimistic Fair-exchange E-Commerce Protocol using Common Off-the-shelf Components , Journal of Electronic Commerce Research and Application, Vol. 7(3), Autumn 2008.
  21. Sudip Chakraborty and Indrajit Ray,  p-Trust: A New Model of Trust to Allow Finer Control over Privacy in Peer-to-Peer Environments,  Journal of Computers, Vol. 2(2), 2007.
  22. Omar Alhazmi, Yashwant Malaiya and Indrajit Ray,  Measuring, Analyzing and Predicting Security Vulnerabilities in Software Systems,  Computers & Security, Vol. 26, 2007.
  23. Junxing Zhang and Indrajit Ray,  Towards Secure Multi-sited Transactional Revision Control System , Computer Standards and Interfaces, Vol. 29(3), 2007.
  24. Indrajit Ray and Junxing Zhang,  Towards a New Standard for Allowing Consistency in Revision Control Systems , Computer Standards and Interfaces, Vol. 29(3), 2007.
  25. Indrajit Ray, Eunjong Kim and Dan Massey,  A Framework to Facilitate Forensic Investigation for Falsely Advertised BGP Routes,  Journal of Information Systems Security, Vol. 3(2), 2007
  26. Indrajit Ray, Indrakshi Ray and Narasimhamurthi Natarajan,  An Anonymous and Failure Resilient Fair-Exchange E-Commerce Protocol , Decision Support Systems, Vol. 39(3), April 2005. 
  27. Indrajit Ray and Sonja Tideman,  A Secure TCP Connection Migration Protocol to Enable the Survivability of Client-Server Applications Under Malicious Attack , Journal of Network and Systems Management, Vol. 12(2), June 2004.
  28. Indrajit Ray and Indrakshi Ray,  Fair Exchange in E-Commerce,  ACM SIGEcomm Exchange, Vol. 3(2), 2002.
  29. Indrajit Ray, Luigi Mancini, Sushil Jajodia and Elisa Bertino,  ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems , IEEE Transactions on Knowledge and Data Engineering, Vol. 12(6) November/December 2000.
  30. Luigi Mancini, Indrajit Ray, Sushil Jajodia and Elisa Bertino,  Flexible Transaction Dependencies in Database Systems , Distributed and Parallel Databases, An International Journal, Vol. 8(4) October 2000.
  31. Elisa Bertino, Sushil Jajodia, Luigi Mancini and Indrajit Ray  Advanced Transaction Processing in Multilevel Secure File Stores , IEEE Transactions on Knowledge and Data Engineering, Vol. 10(1) January/February 1998.


Refereed Chapters in Books
  1. Indrajit Ray and Indrakshi Ray,  Trust-Based Access Control for Secure Cloud Computing,  in Keesook Han, Baek-Young Choi and Sejun Song editors, High Performance Cloud Auditing and Applications, Springer.
  2. Siv Hilde Houmb, Indrajit Ray and Indrakshi Ray,  SecInvest – Balancing Security Needs with Financial and Business Constraints,  Dependability and Computer Engineering: Concepts for Software-Intensive Systems, IGI Global.
  3. Indrajit Ray, Indrakshi Ray and Sudip Chakraborty,  A Context-Aware Model of Trust for Facilitating Secure Ad Hoc Collaborations,  in Zheng Yan, editor, Trust Modeling and Management in Digital Environments: from Social Concept to System Development, IGI Global, January 2010.
  4. Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley,  Multi-Objective Evolutionary Optimization in Statistical Disclosure Control,  in Advances in Artificial Intelligence for Privacy Protection and Security, Imperial College Press, 2009.
  5. Indrajit Ray,  Electronic Payment Systems,  Hossein Bidgoli, editor, Handbook of Technology Management, Wiley Publishers, 2009.
  6. Indrajit Ray,  Electronic Payment Systems,  Hossein Bidgoli, editor, Handbook of Computer Networks, Wiley Publishers, 2007.
  7. Indrajit Ray,  Electronic Payment Systems,  Hossein Bidgoli, editor, Handbook of Information Security, Wiley Publishers, 2005.
  8. Luigi Mancini, Indrajit Ray, Sushil Jajodia and Elisa Bertino,  Flexible Commit Protocols for Advanced Transaction Processing , Sushil Jajodia and Larry Kerschberg editors, Advanced Transaction Models and Architectures, Kluwer Academic Publishers, 1997.


Refereed Proceedings

  1. Ibrahim Lazrig, Tarik Moataz, Indrajit Ray, Indrakshi Ray, Toan Ong, Michael Kahn, Frederic Cuppens and Nora Cuppens-Boulahia,  Privacy Preserving Record Matching Using Automated Semi-trusted Broker,  Proceedings of the 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Fairfax, VA July 2015.
  2. Mikhail Strizhov and Indrajit Ray,  Substring Position Search Over Encrypted Data Using Tree-based Index,  Proceedings of the IEEE International Conference on Cloud Engineering, Tempe, Arizona, March 2015.
  3. Sachini Weerawardhana, Subhojeet Mukherjee, Indrajit Ray and Adele Howe,  Automated Extraction of Vulnerability Information for Home Computer Security,  Proceedings of the 7th International Symposium on Foundations and Practice of Security, Montreal, Canada, November 2014.
  4. Mark Roberts, Adele Howe and Indrajit Ray,  Evaluating Diversity in Classical Planning,  Proceedings of the 24th International Conference on Automated Planning and Scheduling, Portsmouth, USA, June 2014.
  5. Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora Cuppens-Boulahia, Frederic Cuppens, and Indrajit Ray and Indrakshi Ray,  Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds,  Proceedings of the 28th Annual IFIP 11.3 Working Conference on Data and Privacy, Vienna, Austria, July 2014.
  6. Tarik Moataz, Nora Cuppens-Boulahia, Frederic Cuppens, Indrajit Ray and Indrakshi Ray,  ELITE: zEro Links Identity managemenT system,  Proceedings of the 28th Annual IFIP 11.3 Working Conference on Data and Privacy, Vienna, Austria, July 2014.
  7. Mikhail Strizhov and Indrajit Ray,  Multi-keyword Similarity Search Over Encrypted Cloud Data,  Proceedings of the 29th IFIP International Information Security and Privacy Conference, Marrakech, Morocco, June 2014.
  8. Awad Younis, Yashwant Malaiya and Indrajit Ray,  Using Attack Surface Entry Points and Reachability Analysis to Assess the Risk of Software Vulnerability Exploitability,  Proceedings of the 15th IEEE Symposium on High Assurance Systems Engineering, Miami, FL, January 2014.
  9. Kirill Belyaev, Indrakshi Ray, Indrajit Ray and Gary Luckasen,  Personal Health Record Storage on Privacy Preserving Green Clouds,  Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, October 2013.
  10. Indrajit Ray, Dieudonne Mulamba, Indrakshi Ray and Keesook J. an,  A Model for Trust Based Access Control and Delegation in Mobile Clouds,  Proceedings of the 27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, New Brunswick, NJ, July 2013.
  11. Mahantesh Halappanavar, Sutanay Choudhury, Emilie Hogan, Peter Hui, John Johnson, Indrajit Ray and Lawrence Holder,  Towards a Network-of-Networks Framework for Cyber Security,  Proceedings of the IEEE Intelligence and Security Informatics Conference, Seattle, WA, June 2013.
  12. Sean Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir and Robert France,  Hypervisor Event Logs as a Source of Virtual Machine Evidence for Forensic Cloud Investigation,  Proceedings of the  27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, New Brunswick, NJ, July 2013
  13. Malgorzata Urbanska, Mark Roberts, Indrajit Ray, Adele Howe and Zinta Byrne,  Accepting the Inevitable: Factoring the User into Home Computer Security,  Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy, San Antonio, TX, February 2013.
  14. Sean Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir.  Cloud Log Forensics Metadata Analysis , Proceedings of the 36th IEEE International Conference on Computer Software and Applications, Izmir, Turkey 16-20 July 2012.
  15. Sean Thorpe, Indrajit Ray, Tyrone Grandison, and Abbie Barbir,  Cloud Digital Investigations based on a Virtual Machine Computer History Model,  Proceedings of the 6th International Symposium on Digital Forensics and Information Security, Vancouver, Canada, June 26-28, 2012.
  16. Sean Thorpe, Tyrone Grandison, and Indrajit Ray,  Cloud Computing Log Evidence Forensic Examination Analysis,  Proceedings of the 2nd Cybercrime Security, and Digital Forensics Conference, London, UK, May 2012.
  17. Zinta Byrne, Janet Weidert, Josh Liff, M. Horvath, C. Smith, Adele Howe and Indrajit Ray,  Perceptions of Internet Threats: Behavioral Intent to Click Again,  Proceedings of the 2012 Society for Industrial and Organizational Psychology Conference, April 2012.
  18. Sean Thorpe, Indrajit Ray, Tyrone Grandison, and Abbie Barbir,  Cloud Digital Investigations based on a Virtual Machine Computer History Model,  Proceedings of the 6th International Symposium on Digital Forensics and Information Security, Vancouver, Canada, June 26-28, 2012.
  19. Adele Howe, Indrajit Ray, Zinta Byrne, Mark Roberts and Malgorzata Urbanska, ''The Psychology of Security for the Home Computer User,'' Proceedings of the IEEE Symposium on Security and Privacy, San Francisco, CA, May 20-23, 2012.
  20. Mark Roberts, Adele Howe, Indrajit Ray, Malgorzata Urbanska, Zinta Byrne and Janet Weidert, ''Personalized Vulnerability Analysis through Automated Planning,'' International Joint Conference on Artificial Intelligence, Workshop on Intelligent Security, Barcelona, Spain, July 18, 2011.
  21. Sean Thorpe, Abbie Barbir, Indrakshi Ray, Tyronne Grandison, Indrajit Ray and Robert France,  Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment,'' 3rd ICST International Conference on Digital Forensics and Cyber Crime, Dublin, Ireland, October 26-28, 2011. (Short Paper).
  22. Sean Thorpe, Indrajit Ray and Tyronne Grandison,  Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques,'' 4th International Conference on Computational Intelligence in Security for Information Systems, Torremolinos, Malaga, Spain, June 810, 2011, LNCS 6694.
  23. Sean Thorpe, Indrajit Ray and Tyronne Grandison,  Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit Logs,'' 4th International Conference on Computational Intelligence in Security for Information Systems, Torremolinos, Malaga, Spain, June 8-10, 2011.
  24. Sean Thorpe, Indrajit Ray and Tyronne Grandison,  Enabling Security Uniformly Across Cloud Systems,'' 6th International Conference on Architectural Support for Programming Languages and Operating Systems. Workshop on Runtime Environments/Systems, Layering and Virtualized Environments, Newport Beach, CA, March 13-15 2011.
  25. Tristan Allard, Nicolas Anciaux, Luc Bouganim, Yanli Guo, Lionel Le Folgoc, Benjamin Nguyen, Philippe Pucheral, Indrajit Ray, Indrakshi Ray and Shaoyi Yin,  Secure Personal Data Servers: a Vision Paper,'' 36th International Conference on Very Large Data Bases, VLDB 2010, Singapore, September 1317, 2010.
  26. Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley  On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS'', 6th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2010, Singapore, September 7-9, 2010.
  27. Siv Hilde Houmb, Sudip Chakraborty, Indrakshi Ray and Indrajit Ray,  Using Trust-Based Information Aggregation for Predicting Security Level of Systems,'' 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec 2010, Rome, Italy, June 21-23, 2010.
  28. Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley  On the Identification of Property Based Generalizations in Microdata Anonymization'', 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec 2010, Rome, Italy, June 21-23, 2010.
  29. Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley  Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services'', 11th International Conference on Mobile Data Management, MDM 2010, Kansas City, Missouri, USA, May 23-26, 2010.
  30. Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley,  POkA: Identifying Pareto-Optimal k-Anonymous Nodes in a Domain Hierarchy Lattice,'' Proceedings of the 18th ACM Conference on Information and Knowledge Management, Hong Kong, China, November 2009.
  31. Indrakshi Ray and Indrajit Ray,  Access Control Challenges for Cyber-Physical Systems,'' Proceedings of the 1st NSF Workshop on Cyber-Physical Systems, Newark, NJ, July 2009.
  32. Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi Ray and Indrajit Ray,  A Trust-Based Access Control Model for Pervasive Computing Applications,'' Proceedings of the 23rd Annual IFIP TC-11 WG 11.3 Working Conference on Data and Applications Security, Montreal, Canada, July 2009.
  33. Rinku Dewri, Darrell Whitley, Indrajit Ray and Indrakshi Ray,  A Multi-Objective Approach to Data Sharing with Privacy Constraints and Preference Based Objectives,'' Proceedings of the Genetic and Evolutionary Computation Conference, Montreal, Canada, July 2009.
  34. Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley,  On the Comparison of Microdata Disclosure Control Algorithms,'' Proceedings of the 12th International Conference on Extending Database Technology, St. Petersburg, Russia, April 2009.
  35. H.M.N Dilum Bandara, Anura Jayasumana and Indrajit Ray,  Key Pre-Distribution Based Secure Backbone Design in Wireless Sensor Networks,'' Proceedings of the 3rd IEEE International Workshop on Practical Issues in Building Sensor Network Applications, October 2008, Montreal, Canada.
  36. Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley,  Security Provisioning in Pervasive Environments Using Multi-objective Optimization,'' Proceedings of the 13th European Symposium on Research in Computer Security, October 2008, Malaga, Spain.
  37. Rinku Dewri, Darrell Whitley, Indrajit Ray and Indrakshi Ray,  Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy,'' Proceedings of the 10th International Conference on Parallel Problem Solving From Nature, September 2008, Dortmund, Germany.
  38. Sudip Chakraborty and Indrajit Ray,  Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data,'' Proceedings of the 23rd IFIP TC-11 International Information Security Conference, September 2008, Milan, Italy.
  39. Rinku Dewri, Darrell Whitley, Indrakshi Ray and Indrajit Ray,  Evolution Strategy Based Optimization of On-Demand Dependent Data Broadcast Scheduling'', Proceedings of the 2008 Genetic and Evolutionary Computation Conference, July 2008, Atlanta, GA.
  40. Indrajit Ray, Nayot Poolsappasit and Rinku Dewri,  An Opinion Model for Evaluating Malicious Activities in Pervasive Environments,'' Proceedings of the 22nd IFIP TC-11 WG 11.3 Working Conference on Data and Applications Security, July 2008, London, UK.
  41. Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrel Whitley,  On the Optimal Selection of k in the k-Anonymity Problem,'' Proceedings of the 22nd IEEE International Conference on Data Engineering, April 2008, Cancun, Mexico.
  42. Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley,  Optimizing On-Demand Data Broadcast Scheduling in Pervasive Environments,'' Proceedings of the 11th International Conference on Extending Database Technology, March 2008, Nantes, France.
  43. Rinku Dewri, Nayot Poolsappasit, Indrajit Ray and Darrell Whitley,  Optimal Security Hardening Using Multi-Objective Optimization on Attack Tree Models of Networks,'' Proceedings of the 14th ACM Conference on Computer and Communications Security, October-November 2007, Alexandria, VA.
  44. Sudip Chakraborty, Nayot Poolsappasit and Indrajit Ray,  Reliable Delivery of Event Triggered Obligation Policies from Sensors to Actuators in Pervasive Computing Environments,'' Proceedings of the 21st IFIP TC-11 WG 11.3 Working Conference on Data and Applications Security, July 2007, Redondo Beach, CA.
  45. Nayot Poolsappasit and Indrajit Ray,  Enhancing Internet Domain Name System Availability by Building Rings of Cooperation Among Cache Resolvers,'' Proceedings of the 8th Annual IEEE SMC Information Assurance Workshop, June 2007, USMA, West Point, NY.
  46. Nayot Poolsappasit and Indrajit Ray,  A Systematic Approach for Investigating Computer Attacks Using Attack Trees,'' Proceedings of the 3rd IFIP TC-11 WG 11.9 Working Conference on Digital Forensics, January 2007, Orlando, FL.
  47. Shuxin Yin, Indrakshi Ray and Indrajit Ray,  A Trust Model for Pervasive Computing Environments,'' Proceedings of the Workshop on Trusted Collaboration, Atlanta, GA, November 2006.
  48. Indrajit Ray and Sudip Chakraborty,  A Framework for Flexible Access Control in Digital Library Systems,'' Proceedings of the 20th IFIP TC-11 WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July-August 2006.
  49. Sudip Chakraborty and Indrajit Ray,  Allowing Finer Control Over Privacy Using Trust as a Benchmark,'' Proceedings of the 7th IEEE Information Assurance Workshop, West Point, NY, June 2006.
  50. Sudip Chakraborty and Indrajit Ray,  TrustBAC -Integrating Trust Relationships into the RBAC Model for Access Control in Open Systems,'' Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, Lake Tahoe, CA, June 2006.
  51. Indrajit Ray,  Remote Upload of Digital Evidence over Mobile Ad-hoc Networks,'' Proceedings of the 2nd IFIP TC-11 WG 11.9 Working Conference on Digital Forensics, Orlando, Florida, January 29 † February 1, 2006.
  52. Siv Hilde Houmb, Indrakshi Ray and Indrajit Ray,  Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation,'' Proceedings of the 4th International Conference on Trust Management, Pisa, Tuscany, Italy, May 2006
  53. Indrajit Ray, Sudip Chakraborty and Indrakshi Ray,  VTrust: A Trust Management System Based on a Vector Model of Trust'', Proceedings of the 1st International Conference on Information Systems Security, Kolkata, India, December 2005.
  54. Indrajit Ray and Nayot Poolsappasit,  Using Attack Trees to Identify Malicious Attacks from Authorized Insiders,'' Proceedings of the 10th European Symposium on Research in Computer Security, Milan, Italy, September 2005. (Acceptance ratio 26/158)
  55. Dan Matheson, Indrakshi Ray, Indrajit Ray and Siv Hilde Houmb,  Building Security Requirement Patterns for Increased Effectiveness Early in the Development Process,'' Proceedings of the Symposium on Requirements Engineering for Information Security, Paris, France, August 2005.
  56. Indrajit Ray, Eunjong Kim, Ross McConnell and Dan Massey,  Reliably, Securely and Efficiently Distributing Electronic Content Using Multicasting,'' Proceedings of the 6th International Conference on Electronic Commerce and Web Technologies, Copenhagen, Denmark, August 2005. (Acceptance ratio 39/113)
  57. Omar Alhazmi, Yashwant Malaiya and Indrajit Ray,  Security Vulnerabilities in Software Systems: A Quantitative Perspective,'' Proceedings of the 19th IFIP TC-11 WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, August 2005.
  58. Eunjong Kim, Dan Massey and Indrajit Ray,  Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback,'' Proceedings of the 1st IFIP TC-11 WG 11.9 Working Conference on Digital Forensics, Orlando, FL, February 2005.
  59. Vamsi Kambhampati, Indrajit Ray and Eunjong Kim,  A Secure Checkpointing Protocol for Survivable Server Design'', in R.K. Ghosh and H. Mohanty editors, Proceedings of the 1st International Conference on Distributed Computing and Internet Technology, December 22-24, 2004, Bhubaneshwar, India, LNCS 3347, Springer. (Acceptance ratio 25%)
  60. Indrajit Ray and Sudip Chakraborty,  A Vector Model of Trust for Developing Trustworthy Systems'', in . Samarati et al. editors, Computer Security-ESORICS 2004, Proceedings of the 9th European Symposium on Research in Computer Security, September 13-15, 2004, Sophia Antipolis, France. LNCS 3193, Springer. (Acceptance ratio 27/159.)
  61. Indrajit Ray and Eunjong Kim,  Collective Signature for Efficient Authentication of XML Documents'', in Y. Deswarte et al. editors, Security and Protection in Information Processing Systems, Proceedings of the 19th IFIP TC 11 International Information Security Conference, August 22-25, 2004, Toulouse, France, Kluwer Academic Publisher. (Acceptance ratio, 35/159).
  62. Indrajit Ray and Mike Geisterfer,  Towards a Privacy Preserving E-Commerce Protocol'', Proceedings of the 5th International Conference on Electronic Commerce and Web Technologies, Zaragosa, Spain, Aug-Sep, 2004. (Acceptance ratio 24%).
  63. Indrajit Ray and Tomas Hajek,  Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation'', in C. Farkas and P. Samarati editors, Research Directions in data and Applications Security XVIII, Proceedings of the 18th IFIP TC-11 WG 11.3 Working Conference on Data and Applications Security, July 25-28, 2004, Sitges, Spain. Kluwer Academic Publishers.
  64. Indrajit Ray and Sonja Tideman,  Secure TCP Connection Migration for Survivability'', Proceedings of the IEEE/IEE International Conference on Networking, Guadeloupe, French Caribbean, March 1-4, 2004.
  65. Jung Min Park, Indrajit Ray, Edwin Chong and Howard Siegel,  A Certified E-mail Protocol Suitable for Mobile Environment'', Proceedings of IEEE GLOBECOM 2003 Communications Security Symposium, San Francisco, CA, December 1-5, 2003
  66. Indrajit Ray and Junxing Zhang,  A Secure Multi-Sited Version Control System'', Proceedings of the 6th IFIP TC 11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems, Lausanne, Switzerland, November 13-14, 2003.
  67. Jung Min Park, Edwin Chong, Howard Siegel and Indrajit Ray,  Constructing Fair-Exchange Protocols for E-commerce Via Distributed Computation of RSA Signatures'', Proceedings of 22nd ACM Symposium on Principles of Distributed Computing, Boston, MA, July 13-16, 2003.
  68. Indrajit Ray and Indrakshi Ray,  Anonymous and Secure Multicast Subscription'', in Ehud Gudes and Sujeet Shenoi, editors, Research Directions in Data and Applications Security, Proceedings of the 16th IFIP WG 11.3 Working Conference on Data and Applications Security, Cambridge, U.K, July 2002, Kluwer Academic Publishers, 2003.
  69. Indrakshi Ray, Indrajit Ray and Natarajan Narasimhamurthi,  A Cryptographic Solution to Implement Access Control in a Hierarchy and More'', Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, Monterey, CA, June 2002.
  70. Indrakshi Ray and Indrajit Ray,  Using Compatible Keys for Secure Multicasting in E-Commerce'', Proceedings of the 2nd International Workshop on Internet Computing and E-Commerce, Fort Lauderdale, FL, April 2002.
  71. Indrakshi Ray and Indrajit Ray,  An Anonymous Fair-Exchange E-Commerce Protocol'', Proceedings of the 2nd International Workshop on Internet Computing and E-Commerce, San Francisco, CA, April 2001.
  72. Indrakshi Ray and Indrajit Ray,  Detecting termination of Active Database Rules Using Symbolic Model Checking'', Proceedings of the 5th East-European Conference on Advances in Databases and Information Systems, Vilnius, Lithuania, September 2001. Published as Lecture Notes in Computer Science, Vol. 2151, 2001, editors in A. Caplinskas and J. Eder, Springer-Verlag.
  73. Indrajit Ray, Indrakshi Ray and Natarajan Narasimhamurthi  An Anonymous Electronic Voting Protocol for Voting over the Internet'', Proceedings of the 3rd International Workshop on Advanced Issues of E-Commerce and Web-based Information Systems, San Jose, CA, June 2001.
  74. Indrakshi Ray and Indrajit Ray,  An Optimistic Fair-exchange E-commerce Protocol with Automated Dispute Resolution'', Proceedings of the 1st International Conference on Electronic Commerce and Web Technologies, Greenwich, UK, September 2000. Published as Lecture Notes in Computer Science, Vol. 1875, Springer-Verlag.
  75. Indrajit Ray, Indrakshi Ray and Natarajan Narasimhamurthi,  A Fair Exchange E-Commerce Protocol with Automated Dispute Resolution'', in B. Thuraisingham et al editors, Database Security XIV: Status and Prospects, Chapman & Hall, 2001, Proceedings of the 14th IFIP WG 11.3 Working Conference on Database Security, Schoorl, The Netherlands, August 2000.
  76. Indrajit Ray, Bruce Maxim, Kiumi Akingbehin, Indrakshi Ray and Qiang Zhu,  Design of a Center for Research in Information Systems Security'', Proceedings of the 18th Annual AoM/IAoM International Conference, San Antonio, TX, August 2000.
  77. Indrakshi Ray and Indrajit Ray,  Failure Analysis of an E-commerce Protocol Using Model Checking'', Proceedings of the 2nd International Workshop on Advanced Issues of E-Commerce and Web-based Information Systems, Milpitas, CA, June 2000.
  78. Sushil Jajodia, Ravi Mukkamala and Indrajit Ray,  A Two-Tier Coarse Indexing Scheme for MLS Database Systems'', in T. Y. Lin and Shelly Qian editors, Database Security XI: Status and Prospects, Proceedings of the 11th IFIP WG 11.3 Working Conference on Database Security, Lake Tahoe, CA, 1997 Chapman & Hall, 1998.
  79. Sushil Jajodia, Luigi Mancini and Indrajit Ray  A Secure Locking Protocol for Multilevel Database Management Systems'', in P. Samarati and R. Sandhu editors, Database Security X: Status and Prospects, Proceedings of the 10th IFIP WG 11.3 Working Conference on Database Security, Como Italy., 1996, Chapman & Hall, 1997.
  80. Luigi Mancini and Indrajit Ray  Secure Transaction Processing in MLS Databases with Two Version of Data'', in E. Bertino et al. editors, Lecture Notes in Computer Science, Vol. 1146, 1996, Springer-Verlag, Proceedings of the 2nd European Symposium On Research In Computer Security, Rome, Italy, September 1996.
  81. Indrajit Ray, Elisa Bertino, Sushil Jajodia and Luigi Mancini  An Advanced Commit Protocol for MLS Distributed Database Systems'', Proceedings of the ACM Conference on Computer and Communications Security, New Delhi, India, March 1996
Refereed Workshop Articles
  1. Sutanay Choudhury, Luke Rodriguez, Darren Curtis, Kiri Oler, Peter Nordquist, Pin-Yu Chen and Indrajit Ray,  Action Recommendation for Cyber Resilience,  Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense (in conjunction with 22nd ACM CCS), Denver, CO Oct 12-16, 2015.
  2. Sean Thorpe, Tyrone Grandison, Arnett Campbell, Janet Williams, Khalilah Burrell and Indrajit Ray,  Towards a Forensic-based Service Oriented Architecture Framework for Auditing of Cloud Logs,  IEEE Services Workshop on Security and Privacy Engineering, Santa Clara, CA, June 2013.
  3. Mark Roberts, Adele Howe and Indrajit Ray,  A Tale of t Metrics,  ICAPS Heuristics and Search for Domain Independent Planning Workshop, Rome, Italy, 2013.
  4. Sean Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir.  A Model for Compiling Truthful Forensic Evidence from the Log Cloud Hypervisor databases . Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC), Work in Progress Session, Orlando, December 2012.
  5. Sean Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir.  Log Explanation Audit Templates with Private Data Clouds . Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC), Work in Progress Session, Orlando, December 2012.
  6. Sean Thorpe, Tyrone Grandison, Indrajit Ray, Abbie Barbir.  Towards Enabling Behavioral Trust among Participating Cloud Forensic Data Center Agencies.  Proceedings of the 9th VLDB Workshop on Secure Data Management, Istanbul, Turkey. August 27, 2012.
  7. Mark Roberts, Adele Howe, Indrajit Ray and Malgorzata Urbanska,  Using Planning for a Personalized Security Agent,  CP4PS-12, The AAAI-12 Workshop on Problem Solving using Classical Planners, Toronto, Canada, July 2012.
  8. Sean Thorpe, Indrajit Ray, Tyrone Grandison, and Abbie Barbir,  Cloud Log Forensics Metadata Analysis,  IEEE Computer Forensics and Software Engineering Workshop, July 2012.
  9. Zinta Byrne, et al.,  Start-up Effects in Policy-Capturing: Stabilizing Regression Coefficients After Warm-up,  Poster paper (refereed), 2011 SIOP Conference.
  10. Elisa Bertino, Sushil Jajodia, Luigi Mancini and Indrajit Ray  Multiform Transaction for Workflow Management , NSF Workshop on Workflow and Process Automation in Information Systems, Athens, Georgia, May 1996.
Other
  1. Subhojeet Mukherjee, Sachini Weerawardhana, Chancey Dunn, Indrajit Ray and Adele Howe,  POSTER: PsychoRithm: A Framework for Studying How Human Traits Affect User Response to Security Situations,  Proceedings of the 22nd ACM Conference on Computer and Communications Security, Denver, CO, Oct 12-16, 2015.
  2. Luke Rodriguez, Darren Curtis, Sutanay Choudhury, Kiri Oler, Peter Nordquist, Pin Yu and Indrajit Ray:  DEMO: Action Recommendation for Cyber Resilience,  Proceedings of the 22nd ACM Conference on Computer and Communications Security, Denver, CO Oct 12-16, 2015.
  3. Indrajit Ray,  Access Control for Cloud Environments: Requirements and Challenges,  Air Force Research Laboratory, RIGA Internal Document Prepared as part of the TTCP (The Technical Cooperation Program) Report, July 2012.
  4. Indrajit Ray,  A Survey of Trust Models,  Air Force Research Laboratory, Technical Report, 2002.
  5. Joseph Giordano and Indrajit Ray,  Information Assurance Strategic Plan,  Air Force Research Laboratory, Defensive Information Warfare Group Internal Document, June 2002.