Indrakshi Ray
Indrakshi Ray
Professor of Computer Science, Colorado State University
Dirección de correo verificada de - Página principal
Citado por
Citado por
UML2Alloy: A challenging model transformation
K Anastasakis, B Bordbar, G Georg, I Ray
Model Driven Engineering Languages and Systems: 10th International …, 2007
Aspect-oriented approach to early design modelling
R France, I Ray, G Georg, S Ghosh
IEE Proceedings-Software 151 (4), 173-185, 2004
Behavioral fingerprinting of iot devices
B Bezawada, M Bachani, J Peterson, H Shirazi, I Ray, I Ray
Proceedings of the 2018 workshop on attacks and solutions in hardware …, 2018
On challenges of model transformation from UML to Alloy
K Anastasakis, B Bordbar, G Georg, I Ray
Software & Systems Modeling 9, 69-86, 2010
A generic digital forensic investigation framework for internet of things (iot)
VR Kebande, I Ray
2016 IEEE 4th International Conference on Future Internet of Things and …, 2016
A spatio-temporal role-based access control model
I Ray, M Toahchoodee
IFIP Annual Conference on Data and Applications Security and Privacy, 211-226, 2007
LRBAC: A location-aware role-based access control model
I Ray, M Kumar, L Yu
Information Systems Security: Second International Conference, ICISS 2006 …, 2006
Using UML to visualize role-based access control constraints
I Ray, N Li, R France, DK Kim
Proceedings of the ninth ACM symposium on Access control models and …, 2004
Using aspects to design a secure system
G Georg, I Ray, R France
Eighth IEEE International Conference on Engineering of Complex Computer …, 2002
An aspect-based approach to modeling access control concerns
I Ray, R France, N Li, G Georg
Information and Software Technology 46 (9), 575-587, 2004
Fair exchange in e-commerce
I Ray, I Ray
ACM SIGecom Exchanges 3 (2), 9-17, 2002
Towards a location-based mandatory access control model
I Ray, M Kumar
Computers & Security 25 (1), 36-44, 2006
An anonymous electronic voting protocol for voting over the internet
I Ray, I Ray, N Narasimhamurthi
Proceedings Third International Workshop on Advanced Issues of E-Commerce …, 2001
An anonymous and failure resilient fair-exchange e-commerce protocol
I Ray, I Ray, N Natarajan
Decision Support Systems 39 (3), 267-292, 2005
A cryptographic solution to implement access control in a hierarchy and more
I Ray, I Ray, N Narasimhamurthi
Proceedings of the seventh ACM symposium on Access control models and …, 2002
Secure logging as a service—delegating log management to the cloud
I Ray, K Belyaev, M Strizhov, D Mulamba, M Rajaram
IEEE systems journal 7 (2), 323-334, 2013
"Kn0w Thy Doma1n Name" Unbiased Phishing Detection Using Domain Name Based Features
H Shirazi, B Bezawada, I Ray
Proceedings of the 23nd ACM on symposium on access control models and …, 2018
An aspect-oriented methodology for designing secure applications
G Georg, I Ray, K Anastasakis, B Bordbar, M Toahchoodee, SH Houmb
Information and Software Technology 51 (5), 846-864, 2009
Secure personal data servers: a vision paper
T Allard, N Anciaux, L Bouganim, Y Guo, L Le Folgoc, B Nguyen, ...
The VLDB Journal 3 (1-2), 25-35, 2010
Vulnerability discovery in multi-version software systems
J Kim, YK Malaiya, I Ray
10th IEEE High Assurance Systems Engineering Symposium (HASE'07), 141-148, 2007
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20