Indrakshi Ray
Title
Cited by
Cited by
Year
UML2Alloy: A challenging model transformation
K Anastasakis, B Bordbar, G Georg, I Ray
International Conference on Model Driven Engineering Languages and Systems …, 2007
3482007
Aspect-oriented approach to early design modelling
R France, I Ray, G Georg, S Ghosh
IEE Proceedings-Software 151 (4), 173-185, 2004
3012004
On challenges of model transformation from UML to Alloy
K Anastasakis, B Bordbar, G Georg, I Ray
Software & Systems Modeling 9 (1), 69, 2010
2322010
A spatio-temporal role-based access control model
I Ray, M Toahchoodee
IFIP Annual Conference on Data and Applications Security and Privacy, 211-226, 2007
1822007
LRBAC: a location-aware role-based access control model
I Ray, M Kumar, L Yu
International Conference on Information Systems Security, 147-161, 2006
1632006
Using UML to visualize role-based access control constraints
I Ray, N Li, R France, DK Kim
Proceedings of the ninth ACM symposium on Access control models and …, 2004
1472004
Online robust image alignment via iterative convex optimization
Y Wu, B Shen, H Ling
2012 IEEE Conference on Computer Vision and Pattern Recognition, 1808-1814, 2012
1372012
Using aspects to design a secure system
G Georg, I Ray, R France
Eighth IEEE International Conference on Engineering of Complex Computer …, 2002
1302002
An aspect-based approach to modeling access control concerns
I Ray, R France, N Li, G Georg
Information and Software Technology 46 (9), 575-587, 2004
1222004
Fair exchange in e-commerce
I Ray, I Ray
ACM SIGecom Exchanges 3 (2), 9-17, 2002
1072002
An anonymous electronic voting protocol for voting over the internet
I Ray, I Ray, N Narasimhamurthi
Proceedings Third International Workshop on Advanced Issues of E-Commerce …, 2001
1012001
An anonymous and failure resilient fair-exchange e-commerce protocol
I Ray, I Ray, N Natarajan
Decision Support Systems 39 (3), 267-292, 2005
972005
A cryptographic solution to implement access control in a hierarchy and more
I Ray, I Ray, N Narasimhamurthi
Proceedings of the seventh ACM symposium on Access control models and …, 2002
972002
Towards a location-based mandatory access control model
I Ray, M Kumar
Computers & Security 25 (1), 36-44, 2006
962006
An aspect-oriented methodology for designing secure applications
G Georg, I Ray, K Anastasakis, B Bordbar, M Toahchoodee, SH Houmb
Information and Software Technology 51 (5), 846-864, 2009
932009
Optimal security hardening on attack tree models of networks: a cost-benefit analysis
R Dewri, I Ray, N Poolsappasit, D Whitley
International Journal of Information Security 11 (3), 167-188, 2012
862012
An optimistic fair exchange e-commerce protocol with automated dispute resolution
I Ray, I Ray
International Conference on Electronic Commerce and Web Technologies, 84-93, 2000
842000
Secure personal data servers: a vision paper
T Allard, N Anciaux, L Bouganim, Y Guo, L Le Folgoc, B Nguyen, ...
822010
An interoperable context sensitive model of trust
I Ray, I Ray, S Chakraborty
Journal of Intelligent Information Systems 32 (1), 75-104, 2009
792009
Vulnerability discovery in multi-version software systems
J Kim, YK Malaiya, I Ray
10th IEEE High Assurance Systems Engineering Symposium (HASE'07), 141-148, 2007
742007
The system can't perform the operation now. Try again later.
Articles 1–20