Research
Publications in Reverse Chronological Order
- Ramadan Abdunabi, Mustafa Al-Lail, Indrakshi Ray, and Robert
France, "Specification and validation of a Generalized
Spatio-Temporal Role-Based Access Control Model", IEEE Systems
Journal (To appear)
- Raman Adaikkalavan, Xing Xie and Indrakshi Ray, "Multilevel Secure Data Stream Processing:
Architecture and Implementation", Journal of Computer
Security (To appear)
- Indrakshi Ray, Sanjay K. Madria, and Mark Linderman, "Query Plan Execution in a Heterogeneous Stream
Management System for Situational Awareness", Proceedings
of the 5th International Wlorkshop on Dependable Network
Computing and Mobile Systems (DNCMS), Irvine, CA, October
2012.
- Rinku Dewri, Indrakshi Ray, Indrajit Ray, and Darrell Whitley,
"Utility Driven Optimization of Real Time
Data Broadcast Schedules", Applied Soft Computing,
12(7), July 2012.
- Lijun Yu, Robert B. France, Indrakshi Ray, and Wuliang Sun, "Systematic Scenario-Based Analysis of UML
Design Class Models", Proceedings of the 13th IEEE
International Conference on Engineering of Complex Computer
Systems (ICECCS), Paris, France, July 2012. (Acceptance rate
29%)
- Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley, "k-Anonymization in the Presence of Publisher
Preferences", IEEE Transactions on Knowledge and Data
Engineering, 23(11), November 2011.
- Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley, "Exploring Privacy vs. Data Quality Trade-offs in
Anonymization Techniques using Multi-Objective Optimizations",
Journal of Computer Security, 19(5), 2011.
- Wuliang Sun, Robert France and Indrakshi Ray, "Supporting Iterative Development of Robust
Operation Contracts in UML Requirements Models" Proceedings
of the 13th IEEE International High Assurance Systems Engineering
Symposium (HASE), Boca Raton, FL, November 2011.
- Raman Adaikkalavan, Indrakshi Ray, and Xing Xie, "Multilevel Secure Data Stream Processing"
Proceedings of the 25th Annual IFIP WG 11.3 Confernce on Data
and Applications Security and Privacy (DBSEC), Richmond,
Virginia, July 2011. (Acceptance ratio for full papers 14/37)
- Wuliang Sun, Robert France and Indrakshi Ray, "Rigorous Analysis of UML Access Control
Policy Models" Proceedings of the IEEE International
Symposium on Policies for Distributed Systems and Networks
(POLICY), Pisa, Italy, June 2011. (Acceptance rate 16%)
- Parvathi Chundi, Tai Xin and Indrakshi Ray "When
Does a Workflow Complete?", Computer Standards and
Interfaces, 33(1), March 2011.
- Manachai Toahchoodee and Indrakshi Ray,
"On the Formalization and Analysis of a Spatio-Temporal
Role-Based Access Control Model", Journal of Computer
Security, Volume 19, Number 3, 2011.
- Tristan Allard, Nicolas Anciaux, Luc Bougamin, Yanli Guo,
Lionel Le Folgoc, Benjamin Nguyen, Philippe Pucheral, Indrajit
Ray, Indrakshi Ray and Shaoyi Yin, "Secure
Personal Data Servers: A Vision Paper", Proceedings of the
36th International Conference on Very Large Data Bases (VLDB),
Singapore, September 2010.
- Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley, "On the Formation of Historically
k-Anonymous Anonymity Sets in a Continuous LBS", Proceedings
of the 6th International Conference on Security and Privacy in
Communication Networks (SecureComm), Singapore, September
2010. (Acceptance ratio 28/112)
- Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley, "Real-Time Stochastic Scheduling in Broadcast
Systems with Decentralized Data Storage", Real-Time
Systems, Volume 45, Number 3, August 2010.
- Siv Hilde Houmb, Sudip Chakraborty, Indrakshi Ray and Indrajit
Ray, "Using Trust-Based Information
Aggregation for Predicting Security Level of Systems", Proceedings
of the 24th Annual IFIP WG 11.3 Working Conference on Data and
Applications Security (DBSec), Rome, Italy, June 2010.
- Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley, "On the Identification of Property Based
Generalizations in Microdata Anonymization", Proceedings
of the 24th Annual IFIP WG 11.3 Working Conference on Data and
Applications Security (DBSec), Rome, Italy, June 2010.
(Acceptance ratio 18/61)
- Geri Georg, Kyriakos Anastasakis, Behzad Bordbar, Siv Hilde
Houmb, Indrakshi Ray and Manachai Toahchoodee, "Verification and
Trade-off Analysis of Security Properties in UML System Models", IEEE
Transactions on Software Engineering - Special Issue on
Evaluation and Improvement of Software Dependability, Volume
36, Number 3, May-June 2010.
- Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley, "Query m-Invariance: Preventing Query Disclosures
in Continuous Location-Based Services", Proceedings of the
11th International Conference on Mobile Data Management (MDM),
Kansas City, Missouri, May 2010. (Acceptance ratio 16/63)
- Kyriakos Anastasakis, Behzad Bordbar, Geri Georg and Indrakshi
Ray, "On Challenges of Model Transformation
from UML to Alloy"i, Software and Systems Modeling,
Volume 9, Number 1, January 2010.
- Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray, Sudip
Chakraborty, "Trust-Based Security Level
Evaluation Using Bayesian Belief Networks", Transactions
on Computational Science, Volume 10, 2010.
- Indrajit Ray, Indrakshi Ray and Sudip Chakraborty, "A
Context-Aware Model of Trust for Facilitating Secure Ad Hoc
Collaborations", Zheng Yan editor, Trust Modeling and
Management in Digital Environments: From Social Concept to System
Development, IGI Global.
- Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley,
"Multi-objective Evolutionary Optimization in Statistical
Disclosure Control", Agusti Solanas and Antoni Martinez-Balleste
editors, Advances in Artificial Intelligence for Privacy
Protection and Security, Imperial College Press.
- Indrakshi Ray, "Secure Transaction Processing", Encyclopedia
of Database Systems, Tamer Ozsu and Ling Liu editors,
Springer.
- Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley, "POkA: Identifying Pareto-Optimal k-Anonymous
Nodes in a Domain Hierarchy Lattice", Proceedings of the
18th ACM Conference on Information and Knowledge Management
(CIKM), Hong Kong, China, November 2009. (Acceptance ratio
123/847)
- Manachai Toahchoodee, Xing Xie and Indrakshi Ray, "Towards Trustworthy Delegation in Role-Based
Access Control Models", Proceedings of the 12th
Information Security Conference, Pisa, Italy, September 2009.
(Acceptance ratio 29/105)
- Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi Ray and
Indrajit Ray,"A Trust-Based Access Control
Model for Pervasive Computing Systems" (Short Paper), Proceedings
of the 23rd Annual IFIP WG 11.3 Working Conference on Data and
Applications Security (DBSec), Montreal, Canada, July 2009.
(Acceptance ratio 23/41)
- Rinku Dewri, Darrell Whitley, Indrajit Ray and Indrakshi Ray, "A Multi-Objective Approach to Data Sharing
with Privacy Constraints",Proceedings of the Genetic and
Evolutionary Computation Conference (GECCO), Montreal,
Canada, July 2009. (Acceptance ratio 220/531)
- Lijun Yu, Robert France, Indrakshi Ray and Sudipto Ghosh, "A Rigorous Approach to Uncovering Security
Violations in UML Designs",Proceedings of the 14th
International Conference on Engineering of Complex Computer
Systems (ICECCS), Potsdam, Germany, June 2009. (Acceptance
ratio 19/65)
- Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anastasakis, Geri
Georg and Behzad Bordbar, "Ensuring
Spatio-Temporal Access Control for Real-World Applications",Proceedings
of the 14th ACM Symposium on Access Control Models and
Technologies (SACMAT), Stresa, Italy, June 2009. (Acceptance
ratio 24/75)
- Geri Georg, Indrakshi Ray, Kyriakos Anastasakis, Behzad
Bordbar, Manachai Toahchoodee and Siv Hilde Houmb,"An Aspect-Oriented Methodology for Designing
Secure Applications", Information and Software Technology
-- Special Issue on Model Based Development for Secure
Information Systems, Volume 51, Number 5, May 2009.
- Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley, "On the Comparison of Microdata Disclosure
Control Algorithms", Proceedings of the 12th International
Conference on Extending Database Technology (EDBT),
Saint-Petersburg, Russia, March 2009. (Acceptance ratio 92/283)
- Nayot Poolsappasit and Indrakshi Ray, "Towards
Achieving Personalized Privacy for Location-Based Services",
Transactions on Data Privacy, Volume 2, Number 1, 2009.
- Indrakshi Ray, Indrajit Ray and Sudip Chakraborty, "An Interoperable Context-Sensitive Model of
Trust", Journal of Intelligent Information Systems,
Volume 32, Number 1, February 2009.
- Nayot Poolsappasit and Indrakshi Ray,
"Towards a Scalable Model for Location Privacy", Proceedings
of International Workshop on Security and Privacy in GIS and LBS
(SPRINGL), Irvine, California, November 2008. (Invited Paper)
- Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley, "Security Provisioning in Pervasive
Environments Using Multi-objective Optimization",Proceedings
of the 13th European Symposium on Research in Computer Security
(ESORICS), Malaga, Spain, October 2008. (Acceptance ratio
37/168)
- Lijun Yu, Robert France and Indrakshi Ray, "Scenario-based Static Analysis of UML
Behavioral Properties", Proceedings of the ACM/IEEE 11th
International Conference on Model Driven Engineering Languages
and Systems (MoDELS), Toulouse, France, September 2008.
(Acceptance ratio 58/274)
- Rinku Dewri, Darrell Whitley, Indrajit Ray and Indrakshi Ray, "Optimizing Real-Time Ordered-Data Broadcasts in
Pervasive Environments using Evolution Strategy", Proceedings
of the 10th International Conference on Parallel Problem Solving
From Nature (PPSN), Dortmund, Germany, September 2008.
- Indrakshi Ray and Wei Huang,"Increasing
Expressiveness of Events using Parameter Contexts", Proceedings
of the 12th East-European Conferences on Advances in Databases
and Information Systems (ADBIS), Pori, Finland, September
2008. (Acceptance ratio 21/63)
- Manachai Toahchoodee and Indrakshi Ray, "A Spatio-Temporal Access Control Model
Supporting Delegation for Pervasive Computing Applications",
Proceedings of the 5th International Conference on Trust,
Privacy, and Security in Digital Business (TrustBus), Turin,
Italy, September 2008. (Acceptance ratio 18/34)
- Manachai Toahchoodee and Indrakshi Ray, "On
the Formal Analysis of a Spatio-Temporal Role-Based Access
Control Model", Proceedings of the 22nd Annual IFIP WG
11.3 Working Conference on Data and Applications Security (DBSec),
London, U.K, July 2008. (Acceptance ratio 22/56)
- Rinku Dewri, Darrell Whitley, Indrakshi Ray and Indrajit Ray,
"Evolution Strategy Based Optimization of On-Demand Dependent Data
Broadcast Scheduling", Proceedings of the Genetic and
Evolutionary Computation Conference (GECCO), Atlanta,
Georgia, July 2008. (Poster Paper) (Acceptance ratio for
Real-World Applications Track 34/75)
- Rinku Dewri, Indrajit Ray, Indrakshi Ray and Darrell Whitley, "On the Optimal Selection of k in the
k-anonymity Problem", Proceedings of the 24th
International Conference on Data Engineering (ICDE), Cancun,
Mexico, April 2008.
- Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley, "Optimizing On-Demand Data Broadcast Scheduling
in Pervasive Environments", Proceedings of the 11th
International Conference on Extending Database Technology (EDBT),
Nantes, France, March 2008.
- Jinyoo Kim, Yashwant Malaiya and Indrakshi Ray, "Vulnerability Discovery in Multi-Version
Software Systems", Proceedings of the 10th IEEE High
Assurance Systems Engineering Symposium (HASE), Dallas,
Texas, November 2007. (Acceptance ratio 33/100)
- Eunjee Song, Robert France, Indrakshi Ray, and Hanil Kim, "Checking Policy Enforcement in an Access
Control Aspect Model", Proceedings of the International
Conference on Convergence Technology and Information Convergence,
Anaheim, California, November 2007.
- Kyriakos Anastasakis, Behzad Bordbar, Geri Georg and Indrakshi
Ray, "UML2Alloy: A Challenging Model
Transformation", Proceedings of the ACM/IEEE 10th
International Conference on Model Driven Engineering Languages
and Systems (MoDELS), Nashville, Tennessee, October 2007.
(Acceptance rate 28%)
- Tai Xin and Indrakshi Ray, "A
Lattice-Based Approach for Updating Access Control Policies in
Real-time", Information Systems, Volume 32, Number 5,
July 2007.
- Lijun Yu, Robert B. France, Indrakshi Ray, and Kevin Lano, "A Light-Weight Static Approach to Analyzing
UML Behavioral Properties", Proceedings of the 12th IEEE
International Conference on Engineering of Complex Computer
Systems (ICECCS), Auckland, New Zealand, July 2007.
(Acceptance ratio 20/70)
- Indrakshi Ray and Manachai Toahchoodee, "A
Spatio-Temporal Role-Based Access Control Model", Proceedings
of the 21st Annual IFIP WG 11.3 Working Conference on Data and
Applications Security (DBSec), Redondo Beach, California,
July 2007. (Acceptance ratio 18/44)
- Eunjee Song, Shuxin Yin, and Indrakshi Ray, "Using
UML to Model Relational Database Operations", Computer
Standards and Interfaces, Volume 29 Number 3, March 2007.
- Indrakshi Ray, Mahendra Kumar, and Lijun Yu, "LRBAC: A Location-Aware Role-Based Access
Control Model", Proceedings of the 2nd International
Conference on Information Systems Security (ICISS), Kolkata,
India, December 2006. (Acceptance ratio 20/79)
- Tai Xin, Indrakshi Ray, Parvathi Chundi and Sopak Chaichana, "On the Completion of Workflows", Proceedings
of the 17th International Conference on Database and Expert
Systems Applications (DEXA), Krakow, Poland, September 2006.
(Acceptance ratio 90/388)
- Indrakshi Ray and Tai Xin, "Analysis of
Dependencies for Advanced Transactions", Distributed and
Parallel Databases, Volume 20, Number 1, July 2006.
- Geri Georg, Siv Hilde Houmb and Indrakshi Ray, "Aspect-Oriented Risk-Driven Development of
Secure Applications", Proceedings of the 20th IFIP WG 11.3
Working Conference on Data and Applications Security (DBSec),
Sophia Antipolis, France, July 2006. (Acceptance ratio 22/56)
- Monte Lunacek, Darrell Whitley and Indrakshi Ray, "A Crossover Operator for the K-Anonymity
Problem", Proceedings of the Genetic and Evolutionary
Computation Conference (GECCO), Seattle, Washington, July
2006.
- Siv Hilde Houmb, Indrakshi Ray and Indrajit Ray, "Estimating the Relative Trustworthiness of
Information Sources in Security Solution Evaluation", Proceedings
of the 4th International Conference on Trust Management (iTrust),
Pisa, Italy, May 2006. (Acceptance ratio 30/88)
- Anna C. Squicciarini, Elisa Bertino, Elena Ferrari and
Indrakshi Ray, "Achieving Privacy with an
Ontology-Based Approach in Trust Negotiations", IEEE
Transactions on Dependable and Secure Computing, Volume 3,
Number 1, January-March 2006.
- Indrakshi Ray and Mahendra Kumar, "Towards
a Location-Based Mandatory Access Control Model", Computers
& Security, Volume 25, Number 1, February 2006.
- Manachai Toahchoodee and Indrakshi Ray, "Validation
of Policy Integration using Alloy", Proceedings of the 2nd
International Conference on Distributed Computing and Internet
Technology (ICDCIT), Bhubaneswar, India, December 2005.
(Acceptance ratio for long papers 45/426)
- Indrakshi Ray and Wei Huang, "Event
Detection in Multilevel Secure Active Databases", Proceedings
of the 1st International Conference on Information Systems
Security (ICISS), Kolkata, India, December 2005. (Acceptance
ratio 20/72)
- Indrajit Ray, Sudip Chakraborty, and Indrakshi Ray, "VTrust: A Trust Management System Based on a
Vector Model of Trust" , Proceedings of the 1st
International Conference on Information Systems Security
(ICISS), Kolkata, India, December 2005. (Acceptance ratio
20/72)
- Indrakshi Ray and Lijun Yu, "Short
Paper: Towards a Location-Aware Role-Based Access Control
Model", Proceedings of the 1st IEEE Conference on
Security and Privacy for Emerging Areas in Commmunication
Networks (SecureComm), Athens, Greece, September 2005.
(Acceptance ratio 52/164)
- Dan Matheson, Indrakshi Ray, Indrajit Ray, and Siv Hilde
Houmb, "Building Security Requirement
Patterns for Increased Effectiveness Early in the Development
Process", Proceedings of the Symposium on Requirements
Engineering for Information Security (SREIS), Paris,
France, August 2005. (Acceptance ratio 16/40)
- Yajie Zhu, Tai Xin, and Indrakshi Ray, "Recovering
from Malicious Attacks in Workflow Systems", Proceedings
of the 16th International Conference on Database and Expert
Systems (DEXA), Copenhagen, Denmark, August 2005. slides (Acceptance ratio 92/390)
- Tai Xin, Yajie Zhu, and Indrakshi Ray, "Reliable
Scheduling of Advanced Transactions", Proceedings of
the 19th IFIP WG 11.3 Working Conference on Data and
Applications Security (DBSec), Storrs, Connecticut, August
2005. (Acceptance ratio 24/44)
- Tai Xin and Indrakshi Ray, "Detecting
Dependency Conflicts in Advanced Transaction Models", Proceedings
of the 9th International Database Applications and Engineering
Symposium (IDEAS), Montreal, Canada, July 2005.
(Acceptance ratio for full papers 30/144)
- Indrakshi Ray, "Applying Semantic
Knowledge to Real-Time Update of Access Control Policies",
IEEE Transactions on Knowledge and Data Engineering,
Volume 17, Number 6, June 2005, pages 844--858.
- Eunjee Song, Raghu Reddy, Robert France, Indrakshi Ray, Geri
Georg and Roger Alexander, "Verifiable
Composition of Access Control and Application Features", Proceedings
of the 10th ACM Symposium on Access Control Methodologies and
Technologies (SACMAT), Stockholm, Sweden, June 2005.
(Acceptance ratio 19/90)
- Indrajit Ray, Indrakshi Ray and Narasimhamurthi Natarajan, "An Anonymous and Failure Resilient
Fair-Exchange E-Commerce Protocol Using Off-line Third
Parties", Decision Support Systems, Volume 39,
Number 5, May 2005, pages 267--292.
- Indrakshi Ray, Elisa Bertino, Anna C. Squicciarini, and Elena
Ferrari, "Anonymity Preserving Techniques
in Trust Negotiations", Workshop on Privacy Enhancing
Technologies (PET), Dubrovnik, Croatia, May 2005.
(Acceptance ratio 18/74)
- Shuxin Yin and Indrakshi Ray, "Relational
Database Operations Modeling with UML", Proceedings of
the IEEE 19th International Conference on Advanced Information
Networking and Applications (AINA), Taipei, Taiwan, March
2005. (Acceptance rate 33%)
- Indrakshi Ray and Mariana Muller, "Using
Schemas to Simplify Access Control for XML Documents", Proceedings
of the International Conference on Distributed Computing and
Internet Technology (Short Paper) (ICDCIT), Bhubaneswar,
India, December 2004. (Acceptance rate 51/211)
- Robert France, Indrakshi Ray, Geri Georg and Sudipto Ghosh, "Aspect-oriented Approach to Early Design
Modelling", IEE Proceedings - Software, Special Issue
on Early Aspects: Aspect-Oriented Requirements Engineering and
Architecture Design, Volume 151, Number 4, August 2004,
pages 173-185.
- Indrakshi Ray, Tai Xin and Yajie Zhu,
"Ensuring Task Dependencies During Workflow Recovery", Proceedings
of the Fifteenth International Conference on Database and
Expert Systems (DEXA), Zaragoza, Spain, August 2004, pages
24-33. (Acceptance ratio 92/304)
- Indrakshi Ray, Robert France, Na Li and Geri Georg, "An Aspect-Based Approach to Modeling Access
Control Concerns", Information and Software Technology,
Volume 46, Number 9, July 2004, pages 575-587.
- Indrakshi Ray and Tai Xin, "Implementing
Real-Time Update of Access Control Policies", Proceedings
of the 18th IFIP WG 11.3 Working Conference on Data and
Applications Security (DBSec), Sitges, Spain, July 2004.
(Acceptance ratio 24/45)
- Nitin Prabhu, Vijay Kumar and Indrakshi Ray, "Periodic
Scheduling in On-demand Broadcast Systems", Proceedings of
the 3rd International Conference on Information Systems
Technology and its Applications (ISTA), Salt Lake City,
Utah, July 2004. (Acceptance ratio 15/43)
- Indrakshi Ray, Ross M. McConnell, Monte Lunacek and Vijay
Kumar, "Reducing Damage Assessment
Latency in Survivable Databases", Proceedings of the
21st British National Conference on Databases (BNCOD),
Edinburgh, Scotland, July 2004. (Acceptance ratio 18/70)
- Indrakshi Ray, "Real Time Update of
Access Control Policies", Data and Knowledge
Engineering, Volume 49, Number 3, June 2004, pages 287 -
309.
- Indrakshi Ray, Na Li, Robert France and Dae-Kyoo Kim,"Using UML to Visualize Role-Based Access
Control Constraints", Proceedings of the 9th ACM
Symposium on Access Control Model and Technologies (SACMAT),
Yorktown Heights, NY, June 2004. (Acceptance ratio 18/61)
- Dae-Kyoo Kim, Indrakshi Ray, Robert France and Na li, "Modeling Role-Based Access Control Using
Parameterized UML Models", Proceedings of the 7th
Conference on Fundamental Approaches to Software Engineering
(FASE), Barcelona, Spain, March 2004. (Acceptance rate
23%)
- Nitin Prabhu, Vijay Kumar, Indrakshi Ray and G-Chul Yang,"Concurrency Control in Mobile Database
Systems", Proceedings of the 18th International
Conference on Advanced Networking and Applications (AINA),
Volume 2, pages 83-86, Fukuoka, Japan, March 2004.
- Robert B. France, Sudipto Ghosh, Indrakshi Ray, James M.
Bieman, Geri Georg and Roger T. Alexander, "Evaluating Competing Dependability Concern
Realizations in an Aspect-Oriented Modeling Framework (Fast
Abstract)", Supplementary Proceedings of the
International Symposium on Software Reliability Engineering
(ISSRE), Denver, U.S.A., November 2003. (Acceptance ratio
40/51)
- Indrakshi Ray, Na Li, Dae-Kyoo Kim and Robert France, "Using Parameterized UML to Specify and
Compose Access Control Models", Proceedings of the 6th
IFIP WG 11.5 Conference on Integrity and Control in
Information Systems (IICIS), Lausanne, Switzerland,
November 2003.
- Geri Georg, Robert B. France and Indrakshi Ray, "Creating
Security Mechanism Aspect Models from Abstract Security Aspect
Models", Proceedings of the Workshop on Critical Systems
Development with UML, San Francisco, CA, October 2003.
- Geri Georg, Robert B. France and Indrakshi Ray, "Composing
Aspect Models", Proceedings of the Workshop on Aspect
Oriented Modeling with UML, San Francisco, CA, October
2003.
- Indrakshi Ray and Tai Xin, "Concurrent and
Real-Time Update of Access Control Policies", Proceedings
of the 14th International Conference on Database and Expert
Systems (DEXA), Prague, Czech Republic, September 2003.
(Acceptance ratio 91/236)
- Indrakshi Ray, "Multi-level Secure Active Database Rules and
Its Impact on the Design of Active Databases", Proceedings
of the 20th British National Conference on Databases,
Coventry, U.K., July 2003. (Acceptance rate 30%)
- Robert France, Geri Georg and Indrakshi Ray, "Supporting
Multi-Dimensional Separation of Concerns", Proceedings of
the Workshop on Aspect-Oriented Modeling with UML, Boston,
MA, March 2003.
- Geri Georg, Indrakshi Ray and Robert France, "Using Aspects
to Design a Secure System", Proceedings of the 8th IEEE
International Conference on Engineering of Complex Computer
Systems (ICECCS), Greenbelt, MD, December 2002. (Winner of Best Paper Award)
(Acceptance ratio 23/49)
- Geri Georg, Robert France and Indrakshi Ray, "Designing High
Integrity Systems using Aspects", Proceedings of the Fifth
Annual IFIP WG 11.5 Working Conference on Integrity and
Internal Control in Information Systems (IICIS), Bonn,
Germany, November 2002. (Acceptance rate 50%)
- Geri Georg, Robert France and Indrakshi Ray, "An Aspect-Based
Approach to Modeling Security Concerns", Proceedings of the
Workshop on Critical Systems Development with UML,
Dresden, Germany, September 2002.
- Indrajit Ray and Indrakshi Ray "An Anonymous Secure
Multicasting Protocol", Proceedings of the 16th Annual IFIP
WG 11.3 Working Conference on Data and Applications Security
(DBSec), Cambridge, U.K, July 2002.
- Indrajit Ray and Indrakshi Ray, "Fair-Exchange
in E-Commerce", SIGecom Exchanges, Volume 3.2,
Spring 2002, pages 9-17.
- Indrakshi Ray, Indrajit Ray and Natarajan Narasimhamurthi "A Cryptographic Solution to Implement
Access Control in a Hierarchy and More" , Proceedings
of the Seventh ACM Symposium on Access Control Models and
Technologies (SACMAT), Monterey, CA, June 2002.
(Acceptance ratio 17/53)
- Indrakshi Ray and Indrajit Ray "Using
Compatible Keys for Secure Multicasting in E-Commerce" , Proceedings
of the 2nd International Workshop on Internet Computing and
E-Commerce (ICEC), Fort Lauderdale, FL, April 2002.
(Acceptance ratio 16/43)
- Indrakshi Ray and Indrajit Ray "Detecting
Termination of Active Database Rules using Symbolic Model
Checking", Proceedings of the 5th East-European
Conference on Advances in Databases and Information Systems
(ADBIS), Vilnius, Lithuania, September 2001. Published as
Lecture Notes in Computer Science, vol. 2151, 2001, editors A.
Caplinskas and J. Eder, Springer-Verlag, pages 266-289.
(Acceptance ratio 25/74)
- Indrajit Ray, Indrakshi Ray and Natarajan Narasimhamurthi "An Anonymous Electronic Voting Protocol for
Voting over the Internet", Proceedings of the Third
International Workshop on Advanced Issues of E-Commerce and
Web-based Information Systems (WECWIS), San Jose, CA, June
2001.
- Indrakshi Ray and Indrajit Ray "An
Anonymous Fair-Exchange E-Commerce Protocol", Proceedings
of the 1st International Workshop on Internet Computing and
E-Commerce (ICEC), San Francisco, CA, April 2001.
- Indrakshi Ray, Paul Ammann and Sushil Jajodia "Using Semantic Correctness in
Multidatabases to Achieve Local Autonomy,
Distribute Coordination, and Maintain Global Integrity",,
Information Sciences, Volume 129, Numbers 1-4, Nov 2000,
pages 155-195.
- Indrakshi Ray and Indrajit Ray "An
Optimistic Fair-Exchange E-Commerce Protocol with Automated
Dispute Resolution" , Proceedings of the 1st
International Conference on Electronic Commerce and Web
Technologies (EC-Web), Greenwich, U.K., September 2000.
Published as Lecture Notes in Computer Science, vol. 1875,
2000, Springer-Verlag, pages 84-93. (Acceptance ratio 43/120)
- Indrajit Ray, Indrakshi Ray and Natarajan Narasimhamurthi "A
Fair Exchange E-Commerce Protocol with Automated Dispute
Resolution", Proceedings of the 14th Annual IFIP WG 11.3
Working Conference on Database Security (DBSec), Schoorl,
The Netherlands, August 2000. Also in Data and Applications
Security: Developments and Directions, B. Thuraisingham, R. van
de Riet, K. Dittrich and Z. Tari editors, Kluwer Academic
Publishers, 2001. (Acceptance ratio 23/54)
- Indrakshi Ray and Indrajit Ray "Failure
Analysis of an E-Commerce Protocol using Model Checking",
Proceedings of the 2nd International Workshop on Advanced
Issues of E-Commerce and Web-based Information Systems
(WECWIS), San Jose, CA, June 2000, pages 176-183.
- Indrakshi Ray, Paul Ammann and Sushil Jajodia "A Semantic-Based Model for Multilevel
Transactions", Journal of Computer Security, Volume
6, Number 3, Jan 1998, pages 181-217.
- Paul Ammann, Sushil Jajodia and Indrakshi Ray "Applying Formal Methods to Semantics-Based
Decomposition of Transactions", ACM Transactions on
Database Systems, Volume 22, Number 2, June 1997, pages
215-254.
- Indrakshi Ray and Paul Ammann "Using
the B-Toolkit to Ensure Safety in SCR Specifications", Proceedings
of the Annual Conference on Computer Assurance (COMPASS),
Gaithersburg, MD, June 1997, pages 1-12.
- Sushil Jajodia, Indrakshi Ray and Paul Ammann "Implementing Semantic-Based Decomposition
of Transactions", Proceedings of the Conference
on Advanced Information Systems Engineering (CAiSE),
Barcelona, Catalonia, June 1997. Published as Lecture Notes in
Computer Science, Vol. 1250, 1997, Springer-Verlag, pages
75-88. (Acceptance ratio 30/112)
- Paul Ammann, Sushil Jajodia and Indrakshi Ray "Ensuring Atomicity of Multilevel
Transactions", Proceedings of the IEEE Symposium on
Security and Privacy, Oakland, California, May 1996, pages
74-84. (Acceptance ratio 20/69)
- Paul Ammann, Sushil Jajodia and Indrakshi Ray "Using Formal Methods to Reason About
Semantics-Based Decompositions of Transactions", Proceedings
of the 21st International Conference on Very Large Data
Bases (VLDB), Zurich, Switzerland, September 1995, pages
218-227. (Acceptance ratio 52/297)
Other Publications:
- Paul Ammann, Sushil Jajodia and Indrakshi Ray "Semantics-Based Decomposition of Transactions",
Published in Advanced Transaction Models and Architectures,
editors S. Jajodia and L. Kerschberg, Kluwer Academic Press, 1997,
pages 153-180.
- Indrakshi Ray "Using Formal Methods
in Semantic-Based Decomposition of Transactions", Ph.D.
Dissertation, George Mason University, 1997.
- Indrajit Ray, Bruce Maxim, Kiumi Akingbehin, Indrakshi Ray and
Qiang Zhu "Design of a Center for Research in Information System
Security", Proceedings of the 18th Annual AoM/IAoM International
Conference, San Antonio, TX, August 2000, pages 131-136.
Acknowledgement
I would like to thank my sponsors for supporting my research. My
research is supported by Air Force Office of Scientific Research,
Air Force Research Laboratory, National Science Foundation, National
Institute of Health, United States Department of Agriculture and
Federal Aviation Administration.