Publications
Policy and Trust Models
- Sudip Chakraborty and Indrajit Ray,
"p-Trust: A New Model of Trust to Allow Finer Control over Privacy in
Peer-to-Peer Framework", Journal of Computers (JCP), 2(2), April 2007.
- Indrakshi Ray and Manachai Toahchoodee,
"A Spatio-Temporal Role-Based Access Control Model",
Proceedings of
the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications
Security (DBSec), Redondo Beach, CA, July 2007.
- Manachai Toahchoodee and Indrakshi Ray,
"On the
Formal Analysis of a Spatio-Temporal Role-Based Access Control Model"
Proceedings of
the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications
Security (DBSec), London, U.K., July 2008.
- Indrakshi Ray and Manachai Toahchoodee,
"A Spatio-Temporal Access Control Model Supporting Delegation for
Pervasive Computing Applications"
Proceedings of the 5th International Conference on Trust, Privacy, and
Security in Digital Business (TrustBus), Turin, Italy, September 2008.
- Indrajit Ray and Sudip Chakraborty,
"Facilitating Privacy Related Decisions in Different Privacy Contexts on
the Internet By Evaluating Trust in Recipients of Private Data"
Proceedings of the 23rd International Information Security Conference (SEC),
Milan, Italy, September 2008.
- Nayot Poolsappasit and Indrakshi Ray,
"Towards a Scalable Model for Location Privacy"
Proceedings of International Workshop on Security and Privacy in GIS and LBS (SPRINGL),
Irvine, CA, November 2008.
- Nayot Poolsappasit and Indrakshi Ray,
"Towards Achieving Personalized Privacy for Location-Based Services"
Transactions on Data Privacy (TDP), 2(1), 2009.
- Indrakshi Ray, Indrajit Ray and Sudip Chakraborty,
"An Interoperable Context-Sensitive Model of Trust",
Journal of Intelligent Information Systems (JIIS), 32(1), February 2009.
- Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anastasakis,
Geri Georg and Behzad Bordbar,
Ensuring Spatio-Temporal Access Control for Real-World Applications,
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT), Stresa, Italy, June 2009.
- Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi Ray,
and Indrajit Ray,
A Trust-Based Access Control Model for Pervasive Computing Systems,
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data
and Applications Security (DBSec), Montreal, Canada, July 2009.
- Manachai Toahchoodee, Xing Xie and Indrakshi Ray,
Towards Trustworthy Delegation in Role-Based Access Control Models,
Proceedings of the 12th Information Security Conference (ISC), Pisa, Italy,
September 2009.
- Manachai Toahchoodee and Indrakshi Ray,
"Using Alloy to Analyze a Spatio-Temporal Access Control Model Supporting Delega
tion", IET Information Security, 3(3), September 2009.
- Indrajit Ray, Indrakshi Ray and Sudip Chakraborty,
"A Context-Aware Model of Trust for Facilitating Secure Ad Hoc Collaborations",
Zheng Yan editor, Published in Trust Modeling and Management in Digital
Environments: From Social Concept to System Development, editor
Zheng Yan, IGI Global, January 2010.
-
Siv Hilde Houmb, Sudip Chakraborty, Indrakshi Ray and Indrajit Ray,
"Using Trust-Based Information Aggregation for Predicting Security
Level of Systems", Proceedings of the 24th Annual IFIP WG 11.3 Working
Conference on Data and Applications Security (DBSec), Rome, Italy, June 2010
.
- Manachai Toahchoodee and Indrakshi Ray,
"On the Formalization and Analysis of a Spatio-Temporal Role-Based Access
Control Model", To appear in Journal of Computer Security (JCS).
Data Management
- Sudip Chakraborty, Nayot Poolsappasit and Indrajit Ray,
"Reliable Delivery of Event Data from Sensors to Actuators
in Pervasive Computing Environments",
Proceedings of
the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications
Security (DBSec), Redondo Beach, CA, July 2007.
- Rinku Dewri, Nayot Poolsappasit, Indrajit Ray and
Darrell Whitley,
"Optimal Security Hardening Using Multi-objective Optimization on
Attack Tree Model of Networks",
Proceedings of the 14th ACM Conference on Computer and Communications
Security (CCS), Alexandria, Virginia, October 2007.
- Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley,
"Optimizing On-Demand Data Broadcast Scheduling in Pervasive Computing
Environments", Proceedings of the 11th International Conference on
Extending Database Technology (EDBT), Nantes, France, March 2008.
- Rinku Dewri, Indrajit Ray, Indrakshi Ray and
Darrell Whitley,
"On the Optimal Selection of K in the K-Anonymity Problem",
Proceedings of the 24th IEEE International Conference on
Data Engineering (ICDE), Cancun, Mexico, April 2008.
- Indrajit Ray, Nayot Polsappasit and Rinku Dewri,
"An Opinion Model for Evaluating Malicious Activities in Pervasive
Computing Systems", Proceedings of the 22nd Annual IFIP WG 11.3 Working
Conference on Data and Applications Security (DBSec), London, U.K., July 2008.
- Rinku Dewri, Darrell Whitley, Indrajit Ray and Indrakshi Ray,
"Optimizing Real-Time Ordered Data Broadcasts in Pervasive Environments using
Evolution Strategy",
Proceedings of the 10th International Conference on
Parallel Problem Solving From Nature (PPSN), Dortmund, Germany, September 2008.
- Indrakshi Ray and Wei Huang,
"Increasing Expressiveness of Composite Events Using Parameter Contexts",
Proceedings of the 12th East-European Conference on Advances in Databases and
Information Systems (ADBIS), Pori, Finland, September 2008.
- Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley,
"Security Provisioning in Pervasive Environments using Multi-objective
Optimization",
Proceedings of the 13th European Symposium on Research in
Computer Security (ESORICS), Malaga, Spain, October 2008.
- Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley,
"On the Comparison of Microdata Disclosure Control Algorithms",
Proceedings of the 12th International Conference on Extending Database Technology (EDBT),
Saint-Petersburg, Russia, March 2009.
- Rinku Dewri, Darrell Whitley, Indrajit Ray and Indrakshi Ray,
"A Multi-Objective Approach to Data Sharing with Privacy Constraints",
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO),
Montreal, Canada, July 2009.
-
Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley,
"Multi-objective Evolutionary Optimization in Statistical Disclosure Control",
Agusti Solanas and Antoni Martinez-Balleste editors,
Advances in Artificial Intelligence for Privacy Protection and Security,
Imperial College Press, August 2009.
- Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley,
"POkA: Identifying Pareto-Optimal k-Anonymous Nodes in a Do
main
Hierarchy Lattice",
Proceedings of the 18th ACM Conference on Information
and Knowledge Management (CIKM) , Hong Kong, China, November 2009.
- Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley,
"Query m-Invariance: Preventing Query Disclosures in Continu
ous Location-Based
Services", Proceedings of the 11th International Conference on Mobile Dat
a
Management (MDM), Kansas City, Missouri, May 2010.
-
Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley,
"On the Identification of Property Based Generalizations in
Microdata Anonymization", Proceedings of the 24th Annual IFIP WG 11.3
Working Conference on Data and Applications Security (DBSec), Rome, Italy,
June 2010.
-
Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley,
"On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous
LBS", Proceedings of the 6th International Conference on Security and
Privacy in Communication Networks (SecureComm), Singapore, September 2010.
-
Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley,
"k-Anonymization in the Presence of Publisher Preferences",
To appear in IEEE Transactions on Knowledge and Data Engineering (TKDE).
Designing Secure Pervasive Computing Applications
- Lijun Yu, Robert B. France, Indrakshi Ray and Kevin Lano,
"A
Light-Weight
Static Approach to Analyzing UML Behavioral Properties",
Proceedings of the 12th International Conference on Engineering of Complex
Computer Systems (ICECCS), Auckland, New Zealand, July 2007.
- Kyriakos Anastasakis, Behzad Bordbar, Geri Georg, and
Indrakshi Ray, "UML2Alloy: A Challenging Model Transformation",
Proceedings of the
ACM/IEEE 10th International Conference on Model Driven Engineering Languages
and Systems (MoDELS), Nashville, Tennessee, October 2007.
- Eunjee Song, Robert France, Indrakshi Ray and Hanil Kim,
"Checking Policy Enforcement in an Access Control Model",
Proceedings of the
International Conference on Convergence Technology and Information Convergence
(ICCIT),
Anaheim, California, November 2007.
-
Lijun Yu, Robert France and Indrakshi Ray,
"Scenario-based Static Analysis of UML Behavioral Properties",
Proceedings of the ACM/IEEE 11th International Conference on Model Driven Engineering Languages and
Systems (MoDELS), Toulouse, France, September 2008.
- Geri Georg, Indrakshi Ray, Kyriakos Anastasakis, Behzad Bordbar, Manachai Toahchoodee and
Siv Hilde Houmb,
"An Aspect-Oriented Methodology for Designing Secure Applications",
Information and Software Technology -- Special Issue on Model Based
Development for Secure Information Systems, 51(5), May 2009.
- Lijun Yu, Robert France, Indrakshi Ray and Sudipto Ghosh,
"A Rigorous Approach to Uncovering Security Violations in UML Designs",
Proceedings of the 14th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), Potsdam, Germany, June 2009.
- Kyriakos Anastasakis, Behzad Bordbar, Geri Georg and Indrakshi Ray,
"On Challenges of Model Transformation from UML to Alloy",
Software and Systems Modeling (SoSyM) , 9(1), January 2010.
- Geri Georg, Kyriakos Anastasakis, Behzad Bordbar, Siv Hilde Houmb,
Indrakshi Ray and Manachai Toahchoodee,
"Verification and Trade-off Analysis of Security Properties in UML System Models
", IEEE Transactions on Software Engineering - Special Issue on
Evaluation and Improvement of Software Dependability (TSE), 36(3), May-June 2010.
- Siv Hilde Houmb, Geri Georg, Dorina C. Petriu, Behzad Bordbar,
Indrakshi Ray, Kyriakos Anastasakis and Robert France,
"Balancing Security and Performance Properties During System Architectural
Design" To appear in Software Engineering for Secure Systems: Industrial
and Research Perspectives.