| Refereed Journal Articles |
- Sean Thorpe and Indrajit Ray, "Detecting Temporal
Inconsistency in Virtual Machine Activity
Timelines," Journal of Information Assurance and
Security, Vol. 7(1), 2012.
- Rinku Dewri, Nayot Poolsappasit, Indrajit Ray and
Darrell Whitley, "Optimal Security Hardening on
Attack Tree Models of Networks: A Cost Benefit
Analysis," International Journal of Information
Security, Vol. 11(3), 2012.
- Rinku Dewri, Indrakshi Ray, Indrajit Ray and
Darrell Whitley, "Utility Driven Optimization of
Real Time Data Broadcast Schedules," Applied Soft
Computing, Vol. 12(7), 2012.
- Nayot Poolsappasit, Rinku Dewri, and Indrajit Ray,
"Dynamic Security Risk Management Using Bayesian
Attack Graphs," IEEE Transactions on Dependable and
Secure Computing, Vol. 9(1), 2012.
- Sean Thorpe and Indrajit Ray, "File Timestamps for
Digital Cloud Investigations," Journal of
Information Assurance and Security, Vol. 6(6), 2011.
- Rinku Dewri, Indrajit Ray, Indrakshi Ray and
Darrell Whitley, "Exploring Privacy versus Data
Quality Tradeoffs in Anonymization Techniques using
Multi-objective Optimization," Journal of Computer
Security, Vol. 19(5), 2011.
- Sean Thorpe, Indrajit Ray, Indrakshi Ray, and
Tyrone Grandison, "A Formal Temporal Log Data Model
for the Global Synchronized Virtual Machine
Environment," Journal of Information Assurance and
Security, Vol. 6(5), 2011.
- Sean Thorpe, Indrajit Ray, Indrakshi Ray, Tyrone
Grandison, and Abbie Barbir, "Global Virtual Machine
Attribute Access Control Policy for Auditing
Federated Digital Identities within a Compute
Cloud," Journal of Information Assurance and
Security. (To Appear).
- Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray and
Sudip Chakraborty, "Trust-Based Security Level
Evaluation using Bayesian Belief Networks,"
Transactions on Computational Sciences X, Special
Issue on Security in Computing, LNCS 6340, 2010
- Rinku Dewri, Indrakshi Ray, Indrajit Ray and
Darrell Whitley, "Real Time Stochastic Scheduling in
Broadcast Systems with Decentralized Data Storage,"
Real-Time Systems. (To Appear)
- Rinku Dewri, Indrajit Ray, Indrakshi Ray and
Darrell Whitley, "k-Anonymization in the Presence of
Publisher Preferences," IEEE Transactions on
Knowledge and Data Engineering. (To Appear)
- Indrakshi Ray, Indrajit Ray and Sudip Chakraborty,
"An Interoperable Context-Sensitive Model of Trust",
Journal of Intelligent Information Systems, vol
32(1) 2009.
- Sudip Chakraborty and Indrajit Ray, "p-Trust: A
New Model of Trust to Allow Finer Control over
Privacy in Peer-to-Peer Framework," Journal of
Computers, vol 2(2), April 2007.
- Indrajit Ray and Nayot Poolsappasit, "Using Mobile
Ad Hoc Networks to Acquire Digital Evidence from
Remote Autonomous Agents," International Journal of
Security and Networks. (To Appear).
- Omar Alhazmi, Yashwant Malaiya and Indrajit Ray,
"Measuring, Analyzing and Predicting Security
Vulnerabilities in Software Systems," Computers and
Security vol 26 (2007).
- Andrew Burt, Michael Darschewski, Indrajit Ray,
Ramakrishna Thurimella and Hailin Wu, "Origins: An
Approach to Trace Fast Spreading Worms to Their
Roots", International Journal of Security and
Networks. (To Appear).
- Junxing Zhang and Indrajit Ray, "Towards Secure
Multi-sited Transactional Revision Control System",
Computer Standards and Interfaces. vol 29(3), March
2007.
- Indrajit Ray and Junxing Zhang, "Towards a New
Standard for Allowing Consistency in Revision
Control Systems", Computer Standards and Interfaces,
vol 29(3), March 2007.
- Indrajit Ray and Hongjun Zhang, "Experiences in
Developing a Secure and Optimistic Fair-exchange
E-Commerce Protocol using Common Off-the-shelf
Components", Journal of Electronic Commerce Research
and Application (To appear)
- Indrajit Ray, Eunjong Kim and Dan Massey, "A
Framework to Facilitate Forensic Investigation for
Falsely Advertised BGP Routes," Journal of
Information Systems Security, vol 3(2), 2007.
- Indrajit Ray, Indrakshi Ray and Narasimhamurthi
Natarajan, "An Anonymous and Failure Resilient
Fair-Exchange E-Commerce Protocol", Decision Support
Systems, Vol. 39(3), April 2005.
- Indrajit Ray and Sonja Tideman, "A Secure TCP
Connection Migration Protocol to Enable the
Survivability of Client-Server Applications Under
Malicious Attack", Journal of Network and Systems
Management, Vol. 12(2), June 2004.
- Indrajit Ray, Luigi Mancini, Sushil Jajodia and
Elisa Bertino, "ASEP: A Secure and Flexible Commit
Protocol for MLS Distributed Database Systems", IEEE
Transactions on Knowledge and Data Engineering, Vol.
12(6) November/December 2000, pp 880-899.
- Luigi Mancini, Indrajit Ray, Sushil Jajodia and
Elisa Bertino, "Flexible Transaction Dependencies in
Database Systems", Distributed and Parallel
Databases, An International Journal, Vol. 8(4)
October 2000, pp 399-446.
- Elisa Bertino, Sushil Jajodia, Luigi Mancini and
Indrajit Ray "Advanced Transaction Processing in
Multilevel Secure File Stores", IEEE Transactions on
Knowledge and Data Engineering, Vol. 10(1)
January/February 1998, pp 120-135.
|
| Refereed Proceedings |
- Zinta Byrne, Janet Weidert, Josh Liff,
M. Horvath, C. Smith, Adele Howe and Indrajit Ray,
"Perceptions of Internet Threats: Behavioral
Intent to Click Again," Proceedings of the 2012
Society for Industrial and Organizational
Psychology Conference, April 2012.
- Sean Thorpe, Indrajit Ray, Tyrone
Grandison, and Abbie Barbir, "Cloud Digital
Investigations based on a Virtual Machine Computer
History Model," Proceedings of the 6th
International Symposium on Digital Forensics and
Information Security, Vancouver, Canada, June
26-28, 2012.
- Adele Howe, Indrajit Ray, Zinta Byrne,
Mark Roberts and Malgorzata Urbanska, ''The
Psychology of Security for the Home Computer
User,'' Proceedings of the IEEE Symposium on
Security and Privacy, San Francisco, CA, May
20-23, 2012.
- Mark Roberts, Adele Howe, Indrajit
Ray, Malgorzata Urbanska, Zinta Byrne and Janet
Weidert, ''Personalized Vulnerability Analysis
through Automated Planning,'' International Joint
Conference on Artificial Intelligence, Workshop on
Intelligent Security, Barcelona, Spain, July 18,
2011.
- Sean Thorpe, Abbie Barbir, Indrakshi
Ray, Tyronne Grandison, Indrajit Ray and Robert
France, "Formal Parameterization of Log
Synchronization Events within a Distributed
Forensic Compute Cloud Database Environment,'' 3rd
ICST International Conference on Digital Forensics
and Cyber Crime, Dublin, Ireland, October 26-28,
2011. (Short Paper).
- Sean Thorpe, Indrajit Ray and Tyronne
Grandison, "Enforcing Data Quality Rules for a
Synchronized VM Log Audit Environment Using
Transformation Mapping Techniques,'' 4th
International Conference on Computational
Intelligence in Security for Information Systems,
Torremolinos, Malaga, Spain, June 810, 2011, LNCS
6694.
- Sean Thorpe, Indrajit Ray and Tyronne
Grandison, "Use of Schema Associative Mapping for
Synchronization of the Virtual Machine Audit
Logs,'' 4th International Conference on
Computational Intelligence in Security for
Information Systems, Torremolinos, Malaga, Spain,
June 8-10, 2011.
- Sean Thorpe, Indrajit Ray and Tyronne
Grandison, "Enabling Security Uniformly Across
Cloud Systems,'' 6th International Conference on
Architectural Support for Programming Languages
and Operating Systems. Workshop on Runtime
Environments/Systems, Layering and Virtualized
Environments, Newport Beach, CA, March 13-15 2011.
- Tristan Allard, Nicolas Anciaux, Luc
Bouganim, Yanli Guo, Lionel Le Folgoc, Benjamin
Nguyen, Philippe Pucheral, Indrajit Ray, Indrakshi
Ray and Shaoyi Yin, "Secure Personal Data Servers:
a Vision Paper,'' 36th International Conference on
Very Large Data Bases, VLDB 2010, Singapore,
September 1317, 2010.
- Rinku Dewri, Indrajit Ray, Indrakshi
Ray and Darrell Whitley "On the Formation of
Historically k-Anonymous Anonymity Sets in a
Continuous LBS'', 6th International ICST
Conference on Security and Privacy in
Communication Networks, SecureComm 2010,
Singapore, September 7-9, 2010.
- Siv Hilde Houmb, Sudip Chakraborty,
Indrakshi Ray and Indrajit Ray, "Using Trust-Based
Information Aggregation for Predicting Security
Level of Systems,'' 24th Annual IFIP WG 11.3
Working Conference on Data and Applications
Security, DBSec 2010, Rome, Italy, June 21-23,
2010.
- Rinku Dewri, Indrajit Ray, Indrakshi
Ray and Darrell Whitley "On the Identification of
Property Based Generalizations in Microdata
Anonymization'', 24th Annual IFIP WG 11.3 Working
Conference on Data and Applications Security,
DBSec 2010, Rome, Italy, June 21-23, 2010.
- Rinku Dewri, Indrakshi Ray, Indrajit
Ray and Darrell Whitley "Query m-Invariance:
Preventing Query Disclosures in Continuous
Location-Based Services'', 11th International
Conference on Mobile Data Management, MDM 2010,
Kansas City, Missouri, USA, May 23-26, 2010.
- Rinku Dewri, Indrajit Ray, Indrakshi
Ray and Darrell Whitley, "POkA: Identifying
Pareto-Optimal k-Anonymous Nodes in a Domain
Hierarchy Lattice,'' Proceedings of the 18th ACM
Conference on Information and Knowledge
Management, Hong Kong, China, November 2009.
- Indrakshi Ray and Indrajit Ray,
"Access Control Challenges for Cyber-Physical
Systems,'' Proceedings of the 1st NSF Workshop on
Cyber-Physical Systems, Newark, NJ, July 2009.
- Manachai Toahchoodee, Ramadan
Abdunabi, Indrakshi Ray and Indrajit Ray, "A
Trust-Based Access Control Model for Pervasive
Computing Applications,'' Proceedings of the 23rd
Annual IFIP TC-11 WG 11.3 Working Conference on
Data and Applications Security, Montreal, Canada,
July 2009.
- Rinku Dewri, Darrell Whitley, Indrajit
Ray and Indrakshi Ray, "A Multi-Objective Approach
to Data Sharing with Privacy Constraints and
Preference Based Objectives,'' Proceedings of the
Genetic and Evolutionary Computation Conference,
Montreal, Canada, July 2009.
- Rinku Dewri, Indrajit Ray, Indrakshi
Ray and Darrell Whitley, "On the Comparison of
Microdata Disclosure Control Algorithms,''
Proceedings of the 12th International Conference
on Extending Database Technology, St. Petersburg,
Russia, April 2009.
- H.M.N Dilum Bandara, Anura Jayasumana
and Indrajit Ray, "Key Pre-Distribution Based
Secure Backbone Design in Wireless Sensor
Networks,'' Proceedings of the 3rd IEEE
International Workshop on Practical Issues in
Building Sensor Network Applications, October
2008, Montreal, Canada.
- Rinku Dewri, Indrakshi Ray, Indrajit
Ray and Darrell Whitley, "Security Provisioning in
Pervasive Environments Using Multi-objective
Optimization,'' Proceedings of the 13th European
Symposium on Research in Computer Security,
October 2008, Malaga, Spain.
- Rinku Dewri, Darrell Whitley, Indrajit
Ray and Indrakshi Ray, "Optimizing Real-Time
Ordered-Data Broadcasts in Pervasive Environments
Using Evolution Strategy,'' Proceedings of the
10th International Conference on Parallel Problem
Solving From Nature, September 2008, Dortmund,
Germany.
- Sudip Chakraborty and Indrajit Ray,
"Facilitating Privacy Related Decisions in
Different Privacy Contexts on the Internet by
Evaluating Trust in Recipients of Private Data,''
Proceedings of the 23rd IFIP TC-11 International
Information Security Conference, September 2008,
Milan, Italy.
- Rinku Dewri, Darrell Whitley,
Indrakshi Ray and Indrajit Ray, "Evolution
Strategy Based Optimization of On-Demand Dependent
Data Broadcast Scheduling'', Proceedings of the
2008 Genetic and Evolutionary Computation
Conference, July 2008, Atlanta, GA.
- Indrajit Ray, Nayot Poolsappasit and
Rinku Dewri, "An Opinion Model for Evaluating
Malicious Activities in Pervasive Environments,''
Proceedings of the 22nd IFIP TC-11 WG 11.3 Working
Conference on Data and Applications Security, July
2008, London, UK.
- Rinku Dewri, Indrajit Ray, Indrakshi
Ray and Darrel Whitley, "On the Optimal Selection
of k in the k-Anonymity Problem,'' Proceedings of
the 22nd IEEE International Conference on Data
Engineering, April 2008, Cancun, Mexico.
- Rinku Dewri, Indrakshi Ray, Indrajit
Ray and Darrell Whitley, "Optimizing On-Demand
Data Broadcast Scheduling in Pervasive
Environments,'' Proceedings of the 11th
International Conference on Extending Database
Technology, March 2008, Nantes, France.
- Rinku Dewri, Nayot Poolsappasit,
Indrajit Ray and Darrell Whitley, "Optimal
Security Hardening Using Multi-Objective
Optimization on Attack Tree Models of Networks,''
Proceedings of the 14th ACM Conference on Computer
and Communications Security, October-November
2007, Alexandria, VA.
- Sudip Chakraborty, Nayot Poolsappasit
and Indrajit Ray, "Reliable Delivery of Event
Triggered Obligation Policies from Sensors to
Actuators in Pervasive Computing Environments,''
Proceedings of the 21st IFIP TC-11 WG 11.3 Working
Conference on Data and Applications Security, July
2007, Redondo Beach, CA.
- Nayot Poolsappasit and Indrajit Ray,
"Enhancing Internet Domain Name System
Availability by Building Rings of Cooperation
Among Cache Resolvers,'' Proceedings of the 8th
Annual IEEE SMC Information Assurance Workshop,
June 2007, USMA, West Point, NY.
- Nayot Poolsappasit and Indrajit Ray,
"A Systematic Approach for Investigating Computer
Attacks Using Attack Trees,'' Proceedings of the
3rd IFIP TC-11 WG 11.9 Working Conference on
Digital Forensics, January 2007, Orlando, FL.
- Shuxin Yin, Indrakshi Ray and Indrajit
Ray, "A Trust Model for Pervasive Computing
Environments,'' Proceedings of the Workshop on
Trusted Collaboration, Atlanta, GA, November 2006.
- Indrajit Ray and Sudip Chakraborty, "A
Framework for Flexible Access Control in Digital
Library Systems,'' Proceedings of the 20th IFIP
TC-11 WG 11.3 Working Conference on Data and
Applications Security, Sophia Antipolis, France,
July-August 2006.
- Sudip Chakraborty and Indrajit Ray,
"Allowing Finer Control Over Privacy Using Trust
as a Benchmark,'' Proceedings of the 7th IEEE
Information Assurance Workshop, West Point, NY,
June 2006.
- Sudip Chakraborty and Indrajit Ray,
"TrustBAC -Integrating Trust Relationships into
the RBAC Model for Access Control in Open
Systems,'' Proceedings of the 11th ACM Symposium
on Access Control Models and Technologies, Lake
Tahoe, CA, June 2006.
- Indrajit Ray, "Remote Upload of
Digital Evidence over Mobile Ad-hoc Networks,''
Proceedings of the 2nd IFIP TC-11 WG 11.9 Working
Conference on Digital Forensics, Orlando, Florida,
January 29 – February 1, 2006.
- Siv Hilde Houmb, Indrakshi Ray and
Indrajit Ray, "Estimating the Relative
Trustworthiness of Information Sources in Security
Solution Evaluation,'' Proceedings of the 4th
International Conference on Trust Management,
Pisa, Tuscany, Italy, May 2006
- Indrajit Ray, Sudip Chakraborty and
Indrakshi Ray, "VTrust: A Trust Management System
Based on a Vector Model of Trust'', Proceedings of
the 1st International Conference on Information
Systems Security, Kolkata, India, December 2005.
- Indrajit Ray and Nayot Poolsappasit,
"Using Attack Trees to Identify Malicious Attacks
from Authorized Insiders,'' Proceedings of the
10th European Symposium on Research in Computer
Security, Milan, Italy, September 2005.
(Acceptance ratio 26/158)
- Dan Matheson, Indrakshi Ray, Indrajit
Ray and Siv Hilde Houmb, "Building Security
Requirement Patterns for Increased Effectiveness
Early in the Development Process,'' Proceedings of
the Symposium on Requirements Engineering for
Information Security, Paris, France, August 2005.
- Indrajit Ray, Eunjong Kim, Ross
McConnell and Dan Massey, "Reliably, Securely and
Efficiently Distributing Electronic Content Using
Multicasting,'' Proceedings of the 6th
International Conference on Electronic Commerce
and Web Technologies, Copenhagen, Denmark, August
2005. (Acceptance ratio 39/113)
- Omar Alhazmi, Yashwant Malaiya and
Indrajit Ray, "Security Vulnerabilities in
Software Systems: A Quantitative Perspective,''
Proceedings of the 19th IFIP TC-11 WG 11.3 Working
Conference on Data and Applications Security,
Storrs, CT, August 2005.
- Eunjong Kim, Dan Massey and Indrajit
Ray, "Global Internet Routing Forensics:
Validation of BGP Paths Using ICMP Traceback,''
Proceedings of the 1st IFIP TC-11 WG 11.9 Working
Conference on Digital Forensics, Orlando, FL,
February 2005.
- Vamsi Kambhampati, Indrajit Ray and
Eunjong Kim, "A Secure Checkpointing Protocol for
Survivable Server Design'', in R.K. Ghosh and H.
Mohanty editors, Proceedings of the 1st
International Conference on Distributed Computing
and Internet Technology, December 22-24, 2004,
Bhubaneshwar, India, LNCS 3347, Springer.
(Acceptance ratio 25%)
- Indrajit Ray and Sudip Chakraborty, "A
Vector Model of Trust for Developing Trustworthy
Systems'', in . Samarati et al. editors, Computer
Security-ESORICS 2004, Proceedings of the 9th
European Symposium on Research in Computer
Security, September 13-15, 2004, Sophia Antipolis,
France. LNCS 3193, Springer. (Acceptance ratio
27/159.)
- Indrajit Ray and Eunjong Kim,
"Collective Signature for Efficient Authentication
of XML Documents'', in Y. Deswarte et al. editors,
Security and Protection in Information Processing
Systems, Proceedings of the 19th IFIP TC 11
International Information Security Conference,
August 22-25, 2004, Toulouse, France, Kluwer
Academic Publisher. (Acceptance ratio, 35/159).
- Indrajit Ray and Mike Geisterfer,
"Towards a Privacy Preserving E-Commerce
Protocol'', Proceedings of the 5th International
Conference on Electronic Commerce and Web
Technologies, Zaragosa, Spain, Aug-Sep, 2004.
(Acceptance ratio 24%).
- Indrajit Ray and Tomas Hajek,
"Securely Distributing Centralized Multimedia
Content Utilizing Peer-to-Peer Cooperation'', in
C. Farkas and P. Samarati editors, Research
Directions in data and Applications Security
XVIII, Proceedings of the 18th IFIP TC-11 WG 11.3
Working Conference on Data and Applications
Security, July 25-28, 2004, Sitges, Spain. Kluwer
Academic Publishers.
- Indrajit Ray and Sonja Tideman,
"Secure TCP Connection Migration for
Survivability'', Proceedings of the IEEE/IEE
International Conference on Networking,
Guadeloupe, French Caribbean, March 1-4, 2004.
- Jung Min Park, Indrajit Ray, Edwin
Chong and Howard Siegel, "A Certified E-mail
Protocol Suitable for Mobile Environment'',
Proceedings of IEEE GLOBECOM 2003 Communications
Security Symposium, San Francisco, CA, December
1-5, 2003
- Indrajit Ray and Junxing Zhang, "A
Secure Multi-Sited Version Control System'',
Proceedings of the 6th IFIP TC 11 WG 11.5 Working
Conference on Integrity and Internal Control in
Information Systems, Lausanne, Switzerland,
November 13-14, 2003.
- Jung Min Park, Edwin Chong, Howard
Siegel and Indrajit Ray, "Constructing
Fair-Exchange Protocols for E-commerce Via
Distributed Computation of RSA Signatures'',
Proceedings of 22nd ACM Symposium on Principles of
Distributed Computing, Boston, MA, July 13-16,
2003.
- Indrajit Ray and Indrakshi Ray,
"Anonymous and Secure Multicast Subscription'', in
Ehud Gudes and Sujeet Shenoi, editors, Research
Directions in Data and Applications Security,
Proceedings of the 16th IFIP WG 11.3 Working
Conference on Data and Applications Security,
Cambridge, U.K, July 2002, Kluwer Academic
Publishers, 2003.
- Indrakshi Ray, Indrajit Ray and
Natarajan Narasimhamurthi, "A Cryptographic
Solution to Implement Access Control in a
Hierarchy and More'', Proceedings of the 7th ACM
Symposium on Access Control Models and
Technologies, Monterey, CA, June 2002.
- Indrakshi Ray and Indrajit Ray, "Using
Compatible Keys for Secure Multicasting in
E-Commerce'', Proceedings of the 2nd International
Workshop on Internet Computing and E-Commerce,
Fort Lauderdale, FL, April 2002.
- Indrakshi Ray and Indrajit Ray, "An
Anonymous Fair-Exchange E-Commerce Protocol'',
Proceedings of the 2nd International Workshop on
Internet Computing and E-Commerce, San Francisco,
CA, April 2001.
- Indrakshi Ray and Indrajit Ray,
"Detecting termination of Active Database Rules
Using Symbolic Model Checking'', Proceedings of
the 5th East-European Conference on Advances in
Databases and Information Systems, Vilnius,
Lithuania, September 2001. Published as Lecture
Notes in Computer Science, Vol. 2151, 2001,
editors in A. Caplinskas and J. Eder,
Springer-Verlag.
- Indrajit Ray, Indrakshi Ray and
Natarajan Narasimhamurthi "An Anonymous Electronic
Voting Protocol for Voting over the Internet'',
Proceedings of the 3rd International Workshop on
Advanced Issues of E-Commerce and Web-based
Information Systems, San Jose, CA, June 2001.
- Indrakshi Ray and Indrajit Ray, "An
Optimistic Fair-exchange E-commerce Protocol with
Automated Dispute Resolution'', Proceedings of the
1st International Conference on Electronic
Commerce and Web Technologies, Greenwich, UK,
September 2000. Published as Lecture Notes in
Computer Science, Vol. 1875, Springer-Verlag.
- Indrajit Ray, Indrakshi Ray and
Natarajan Narasimhamurthi, "A Fair Exchange
E-Commerce Protocol with Automated Dispute
Resolution'', in B. Thuraisingham et al editors,
Database Security XIV: Status and Prospects,
Chapman & Hall, 2001, Proceedings of the 14th
IFIP WG 11.3 Working Conference on Database
Security, Schoorl, The Netherlands, August 2000.
- Indrajit Ray, Bruce Maxim, Kiumi
Akingbehin, Indrakshi Ray and Qiang Zhu, "Design
of a Center for Research in Information Systems
Security'', Proceedings of the 18th Annual
AoM/IAoM International Conference, San Antonio,
TX, August 2000.
- Indrakshi Ray and Indrajit Ray,
"Failure Analysis of an E-commerce Protocol
Using Model Checking'', Proceedings of the 2nd
International Workshop on Advanced Issues of
E-Commerce and Web-based Information Systems,
Milpitas, CA, June 2000.
- Sushil Jajodia, Ravi Mukkamala and
Indrajit Ray, "A Two-Tier Coarse Indexing Scheme
for MLS Database Systems'', in T. Y. Lin and
Shelly Qian editors, Database Security XI:
Status and Prospects, Proceedings of the 11th
IFIP WG 11.3 Working Conference on Database
Security, Lake Tahoe, CA, 1997 Chapman &
Hall, 1998.
- Sushil Jajodia, Luigi Mancini and
Indrajit Ray "A Secure Locking Protocol for
Multilevel Database Management Systems'', in P.
Samarati and R. Sandhu editors, Database
Security X: Status and Prospects, Proceedings of
the 10th IFIP WG 11.3 Working Conference on
Database Security, Como Italy., 1996, Chapman
& Hall, 1997.
- Luigi Mancini and Indrajit Ray
"Secure Transaction Processing in MLS Databases
with Two Version of Data'', in E. Bertino et al.
editors, Lecture Notes in Computer Science, Vol.
1146, 1996, Springer-Verlag, Proceedings of the
2nd European Symposium On Research In Computer
Security, Rome, Italy, September 1996.
- Indrajit Ray, Elisa Bertino, Sushil
Jajodia and Luigi Mancini "An Advanced Commit
Protocol for MLS Distributed Database Systems'',
Proceedings of the ACM Conference on Computer
and Communications Security, New Delhi, India,
March 1996
|