Indrajit Ray

Navigation

News

Call for Papers (Security Conferences)

Links

 

Professional Activities


Leadership Role in Professional Societies
  1. Founding member and first Chair of the IFIP TC-11 WG 11.9 on Digital Forensics


Membership in Professional Societies
  1. Member, ACM
  2. Member, ACM Special Interest Group on Security, Audit and Control (SIGSAC)
  3. Senior Member, IEEE
  4. Senior Member, IEEE Computing Society
  5. Member, IFIP TC-11 WG 11.3 on Data and Applications Security

Leadership Role in Professional Conference
  1. General Chair, 22nd ACM Conference on Computer and Communications Security, Denver, Colorado, October 2015
  2. Program Vice Chair, 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, November 2011
  3. Program Vice Chair, 7th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Vancouver, Canada, August 2009
  4. Program Co-Chair, 4th Annual IFIP TC-11, WG 11.9 Conference on Digital Forensics, Kyoto, Japan, January 2008
  5. General Chair, 17th IFIP TC-11 WG 11.3 Working Conference on Data and Applications Security, Estes Park, CO, August 2003
  6. Track Chair, Security Track, 2nd International Conference on Distributed Computing and Internet Technology, Bhubaneswar, India, December 2005
  7. Tutorial Chair, 2nd International Conference on Information Systems Security, Kolkata, India, December 2006
  8. Proceedings Chair, 17th IEEE International Conference on Application-Specific Systems, Architectures and Processors, Steamboat Springs, CO, September 2006
  9. Publicity Chair, 14th IEEE International Symposium on Software Reliability Engineering, Denver, CO, November 2003


Membership in Conference Program Committees
  1. 22nd IFIP International Information Security Conference, Johannesburg, South Africa, May 2007
  2. 8th International Conference on Information and Communications Security, Raleigh, NC, December 2006
  3. 2nd International Conference on Information Systems Security, Kolkata, India, December 2006
  4. 10th International Database Engineering and Applications Symposium, Delhi, India, December 2006
  5. 2nd Knowledge Management Workshop, New York, USA, September 2006
  6. 3rd International Conference on Autonomic and Trusted Computing, Wuhan and Three Gorges, China, September 2006
  7. 4th International Workshop on Formal Aspects in Security and Trust, Hamilton, Canada, August 2006
  8. International Conference on Security and Cryptography, Setubal, Portugal, August 2006
  9. Fifth Annual Information Security South Africa Conference, Johannesburg, South Africa, July 2006
  10. 20th IFIP TC-11 WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July-August 2006
  11. 7th IEEE Information Assurance Workshop, West Point, NY, June 2006
  12. 21st IFIP International Information Security Conference, Karlstad, Sweden, May 2006
  13. 4th International Workshop on Security in Information Systems, Paphos, Cyprus, May 2006
  14. 20th IEEE International Conference on Advanced Information Networking and Applications, Vienna, Austria, April 2006
  15. 1st International Conference on Information Systems Security, Kolkata, India, December 2005
  16. 1st International Workshop on Information Assurance in Distributed Systems, Nanjing, China, November 2005
  17. 3rd International Conference on Formal Aspects of Security and Trust, Newcastle, UK, July 2005
  18. 4th International Workshop on Security in Information Systems, Paphos, Cyprus, May 2005
  19. 20th IFIP International Information Security Conference, Chiba, Japan, May 2005
  20. 19th IFIP TC-11 WG 11.3 Working Conference on Data and Applications Security, Connecticut, USA, August 2005
  21. 1st International Conference on Distributed Computing and Internet Technology, Bhubaneshwar, India, December 2004
  22. 1st Workshop on Secure Knowledge Management, SUNY Buffalo, NY, September 2004
  23. 7th Workshop on Mobility on Databases and Distributed Systems, Zaragosa, Spain, September 2004
  24. 19th IFIP International Information Security Conference, Toulouse, August 2004
  25. 18th IFIP TC-11 WG 11.3 Working Conference on Data and Applications Security, Sitges, Spain, July 2004
  26. 3rd International Multiconference in Computer Science and Engineering, Las Vegas, June 2003


Proposal Reviewing Activities
  1. Panelist, National Science Foundation, 2000, 2002, 2003, 2004
  2. University of California Microelectronics Innovation and Computer Research Opportunities Program, 2006


Journal Reviewing Activities
  1. ACM Transactions on Information and Systems Security
  2. ACM Transactions on Internet Computing
  3. Communications of the ACM
  4. Computer Standards and Interfaces
  5. Distributed and Parallel Databases
  6. IEE Proceedings on Information Security
  7. IEEE Internet 
  8. IEEE Multimedia
  9. IEEE Transactions on Dependable and Secure Computing
  10. IEEE Transactions on Knowledge and Data Engineering
  11. IEEE Transactions on Computers
  12. Information Sciences
  13. Journal of Digital Library
  14. Journal of Computer Security
  15. Knowledge Engineering Review
  16. OMEGA - The International Journal of Management Science
  17. VLDB Journal
  18. The Computer Journal