Research By Topic

Access Control Specification, Composition, and Analysis
Aspect-Oriented Software Design
Event Processing and Data Streams
Internet Protocols
Privacy and Anonymity
Real-Time Data Broadcasting
Real-Time Access Control Policy Updates
Semantics-Based Transaction Processing
Spatio-Temporal Access Control Models
Trust Models and Their Applications
UML Model Analysis
Workflows and Advanced Transaction Models
Miscellaneous Publications

    Aspect-Oriented Software Design

    • Geri Georg, Kyriakos Anastasakis, Behzad Bordbar, Siv Hilde Houmb, Indrakshi Ray and Manachai Toahchoodee, "Verification and Trade-off Analysis of Security Properties in UML System Models", IEEE Transactions on Software Engineering - Special Issue on Evaluation and Improvement of Software Dependability, 36(3), May-June 2010.
    • Siv Hilde Houmb, Geri Georg, Dorina C. Petriu, Behzad Bordbar, Indrakshi Ray, Kyriakos Anastasakis and Robert France, "Balancing Security and Performance Properties During System Architectural Design", To appear in Software Engineering for Secure Systems: Industrial and Research Perspectives, IGI Publishing.
    • Geri Georg, Indrakshi Ray, Kyriakos Anastasakis, Behzad Bordbar, Manachai Toahchoodee and Siv Hilde Houmb,"An Aspect-Oriented Methodology for Designing Secure Applications", Information and Software Technology -- Special Issue on Model Based Development for Secure Information Systems, 51(5), May 2009.
    • Geri Georg, Siv Hilde Houmb and Indrakshi Ray, "Aspect-Oriented Risk-Driven Development of Secure Applications", Proceedings of the 20th IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec), Sophia Antipolis, France, July 2006. (Acceptance ratio 22/56)
    • Dan Matheson, Indrakshi Ray, Indrajit Ray, and Siv Hilde Houmb, "Building Security Requirement Patterns for Increased Effectiveness Early in the Development Process", Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS), Paris, France, August 2005. (Acceptance ratio 16/40)
    • Robert France, Indrakshi Ray, Geri Georg and Sudipto Ghosh, "Aspect-oriented Approach to Early Design Modelling", IEE Proceedings - Software, Special Issue on Early Aspects: Aspect-Oriented Requirements Engineering and Architecture Design, 151(4), August 2004, pages 173-185.
    • Robert B. France, Sudipto Ghosh, Indrakshi Ray, James M. Bieman, Geri Georg and Roger T. Alexander, "Evaluating Competing Dependability Concern Realizations in an Aspect-Oriented Modeling Framework (Fast Abstract)", Supplementary Proceedings of the International Symposium on Software Reliability Engineering, Denver, U.S.A., November 2003. (Acceptance ratio 40/51)
    • Geri Georg, Robert B. France and Indrakshi Ray, "Creating Security Mechanism Aspect Models from Abstract Security Aspect Models", Proceedings of the Workshop on Critical Systems Development with UML , San Francisco, CA, October 2003.
    • Geri Georg, Robert B. France and Indrakshi Ray, "Composing Aspect Models", Proceedings of the Workshop on Aspect Oriented Modeling with UML, San Francisco, CA, October 2003.
    • Robert France, Geri Georg and Indrakshi Ray, "Supporting Multi-Dimensional Separation of Concerns", Proceedings of the Workshop on Aspect-Oriented Modeling with UML, Boston, MA, March 2003.
    • Geri Georg, Indrakshi Ray and Robert France, "Using Aspects to Design a Secure System", Proceedings of the 8th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), Greenbelt, MD, December 2002. (Winner of Best Paper Award) (Acceptance ratio 23/49)
    • Geri Georg, Robert France and Indrakshi Ray, "Designing High Integrity Systems using Aspects", Proceedings of the 5th Annual IFIP WG 11.5 Working Conference on Integrity and Internal Control in Information Systems (IICIS), Bonn, Germany, November 2002. (Acceptance rate 50%)
    • Geri Georg, Robert France and Indrakshi Ray, "An Aspect-Based Approach to Modeling Security Concerns", Proceedings of the Workshop on Critical Systems Development with UML, Dresden, Germany, September 2002.
    Back to Top of Publications

    Miscellaneous Publications

    • Indrakshi Ray, "Secure Transaction Processing", To appear in Encyclopedia of Database Systems, Tamer Ozsu and Ling Liu editors, Springer.
    • Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley, "Security Provisioning in Pervasive Environments Using Multi-objective Optimization", Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS), Malaga, Spain, October 2008. (Acceptance ratio 37/168)
    • Jinyoo Kim, Yashwant Malaiya and Indrakshi Ray, "Vulnerability Discovery in Multi-Version Software Systems", Proceedings of the 10th IEEE High Assurance Systems Engineering Symposium (HASE), Dallas, Texas, November 2007. (Acceptance ratio 33/100)
    • Eunjee Song, Shuxin Yin, and Indrakshi Ray, "Using UML to Model Relational Database Operations", Computer Standards and Interfaces, 29(3), March 2007.
    • Shuxin Yin and Indrakshi Ray, "Relational Database Operations Modeling with UML", Proceedings of the IEEE 19th International Conference on Advanced Information Networking and Applications (AINA), Taipei, Taiwan, March 2005. (Acceptance rate 33%)
    • Indrakshi Ray and Mariana Muller, "Using Schemas to Simplify Access Control for XML Documents", Proceedings of the International Conference on Distributed Computing and Internet Technology (ICDCIT) (Short Paper), Bhubaneswar, India, December 2004. (Acceptance rate 51/211)
    • Nitin Prabhu, Vijay Kumar and Indrakshi Ray, "Periodic Scheduling in On-demand Broadcast Systems", Proceedings of the 3rd International Conference on Information Systems Technology and its Applications (ISTA), Salt Lake City, Utah, July 2004. (Acceptance ratio 15/43)
    • Indrakshi Ray, Ross M. McConnell, Monte Lunacek and Vijay Kumar, "Reducing Damage Assessment Latency in Survivable Databases", Proceedings of the 21st British National Conference on Databases (BNCOD), Edinburgh, Scotland, July 2004. (Acceptance ratio 18/70)
    • Nitin Prabhu, Vijay Kumar, Indrakshi Ray and G-Chul Yang,"Concurrency Control in Mobile Database Systems", Proceedings of the 18th International Conference on Advanced Networking and Applications (AINA), Volume 2, pages 83-86, Fukuoka, Japan, March 2004.
    • Indrakshi Ray, Indrajit Ray and Natarajan Narasimhamurthi "A Cryptographic Solution to Implement Access Control in a Hierarchy and More" , Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT), Monterey, CA, June 2002. (Acceptance ratio 17/53)
    • Indrajit Ray, Bruce Maxim, Kiumi Akingbehin, Indrakshi Ray and Qiang Zhu "Design of a Center for Research in Information System Security", Proceedings of the 18th Annual AoM/IAoM International Conference, San Antonio, TX, August 2000, pages 131-136.
    • Indrakshi Ray and Paul Ammann "Using the B-Toolkit to Ensure Safety in SCR Specifications", Proceedings of the Annual Conference on Computer Assurance, Gaithersburg, MD, June 1997, pages 1-12.
    Back to Top of Publications

  Acknowledgement

I would like to thank my sponsors for supporting my research. My research is supported by Air Force Office of Scientific Research, Air Force Research Laboratory, National Science Foundation, National Institute of Health, United States Department of Agriculture and Federal Aviation Administration.