Indrakshi Ray
Title
Cited by
Cited by
Year
UML2Alloy: A challenging model transformation
K Anastasakis, B Bordbar, G Georg, I Ray
International Conference on Model Driven Engineering Languages and Systems …, 2007
3662007
Aspect-oriented approach to early design modelling
R France, I Ray, G Georg, S Ghosh
IEE Proceedings-Software 151 (4), 173-185, 2004
3142004
On challenges of model transformation from UML to Alloy
K Anastasakis, B Bordbar, G Georg, I Ray
Software & Systems Modeling 9 (1), 69-86, 2010
2392010
A spatio-temporal role-based access control model
I Ray, M Toahchoodee
IFIP Annual Conference on Data and Applications Security and Privacy, 211-226, 2007
1912007
LRBAC: A location-aware role-based access control model
I Ray, M Kumar, L Yu
International Conference on Information Systems Security, 147-161, 2006
1752006
Using UML to visualize role-based access control constraints
I Ray, N Li, R France, DK Kim
Proceedings of the ninth ACM symposium on Access control models and …, 2004
1532004
Online robust image alignment via iterative convex optimization
Y Wu, B Shen, H Ling
2012 IEEE Conference on Computer Vision and Pattern Recognition, 1808-1814, 2012
1442012
Using aspects to design a secure system
G Georg, I Ray, R France
Eighth IEEE International Conference on Engineering of Complex Computer …, 2002
1362002
An aspect-based approach to modeling access control concerns
I Ray, R France, N Li, G Georg
Information and Software Technology 46 (9), 575-587, 2004
1262004
Fair exchange in e-commerce
I Ray, I Ray
ACM SIGecom Exchanges 3 (2), 9-17, 2002
1122002
A cryptographic solution to implement access control in a hierarchy and more
I Ray, I Ray, N Narasimhamurthi
Proceedings of the seventh ACM symposium on Access control models and …, 2002
1062002
An anonymous electronic voting protocol for voting over the internet
I Ray, I Ray, N Narasimhamurthi
Proceedings Third International Workshop on Advanced Issues of E-Commerce …, 2001
1052001
Towards a location-based mandatory access control model
I Ray, M Kumar
Computers & Security 25 (1), 36-44, 2006
1022006
An anonymous and failure resilient fair-exchange e-commerce protocol
I Ray, I Ray, N Natarajan
Decision Support Systems 39 (3), 267-292, 2005
992005
An aspect-oriented methodology for designing secure applications
G Georg, I Ray, K Anastasakis, B Bordbar, M Toahchoodee, SH Houmb
Information and Software Technology 51 (5), 846-864, 2009
932009
Optimal security hardening on attack tree models of networks: a cost-benefit analysis
R Dewri, I Ray, N Poolsappasit, D Whitley
International Journal of Information Security 11 (3), 167-188, 2012
892012
Secure personal data servers: a vision paper
T Allard, N Anciaux, L Bouganim, Y Guo, L Le Folgoc, B Nguyen, ...
The VLDB Journal 3 (1-2), 25-35, 2010
892010
A generic digital forensic investigation framework for internet of things (iot)
VR Kebande, I Ray
2016 IEEE 4th International Conference on Future Internet of Things and …, 2016
882016
An optimistic fair exchange e-commerce protocol with automated dispute resolution
I Ray, I Ray
International Conference on Electronic Commerce and Web Technologies, 84-93, 2000
882000
An interoperable context sensitive model of trust
I Ray, I Ray, S Chakraborty
Journal of Intelligent Information Systems 32 (1), 75-104, 2009
802009
The system can't perform the operation now. Try again later.
Articles 1–20