Indrakshi Ray
Indrakshi Ray
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
UML2Alloy: A challenging model transformation
K Anastasakis, B Bordbar, G Georg, I Ray
International Conference on Model Driven Engineering Languages and Systems …, 2007
Aspect-oriented approach to early design modelling
R France, I Ray, G Georg, S Ghosh
IEE Proceedings-Software 151 (4), 173-185, 2004
On challenges of model transformation from UML to Alloy
K Anastasakis, B Bordbar, G Georg, I Ray
Software & Systems Modeling 9 (1), 69-86, 2010
A spatio-temporal role-based access control model
I Ray, M Toahchoodee
IFIP Annual Conference on Data and Applications Security and Privacy, 211-226, 2007
LRBAC: A location-aware role-based access control model
I Ray, M Kumar, L Yu
International Conference on Information Systems Security, 147-161, 2006
Using UML to visualize role-based access control constraints
I Ray, N Li, R France, DK Kim
Proceedings of the ninth ACM symposium on Access control models and …, 2004
Online robust image alignment via iterative convex optimization
Y Wu, B Shen, H Ling
2012 IEEE Conference on Computer Vision and Pattern Recognition, 1808-1814, 2012
Using aspects to design a secure system
G Georg, I Ray, R France
Eighth IEEE International Conference on Engineering of Complex Computer …, 2002
An aspect-based approach to modeling access control concerns
I Ray, R France, N Li, G Georg
Information and Software Technology 46 (9), 575-587, 2004
A generic digital forensic investigation framework for internet of things (iot)
VR Kebande, I Ray
2016 IEEE 4th International Conference on Future Internet of Things and …, 2016
Fair exchange in e-commerce
I Ray, I Ray
ACM SIGecom Exchanges 3 (2), 9-17, 2002
A cryptographic solution to implement access control in a hierarchy and more
I Ray, I Ray, N Narasimhamurthi
Proceedings of the seventh ACM symposium on Access control models and …, 2002
An anonymous electronic voting protocol for voting over the internet
I Ray, I Ray, N Narasimhamurthi
Proceedings Third International Workshop on Advanced Issues of E-Commerce …, 2001
An anonymous and failure resilient fair-exchange e-commerce protocol
I Ray, I Ray, N Natarajan
Decision Support Systems 39 (3), 267-292, 2005
Towards a location-based mandatory access control model
I Ray, M Kumar
Computers & Security 25 (1), 36-44, 2006
An aspect-oriented methodology for designing secure applications
G Georg, I Ray, K Anastasakis, B Bordbar, M Toahchoodee, SH Houmb
Information and Software Technology 51 (5), 846-864, 2009
Optimal security hardening on attack tree models of networks: a cost-benefit analysis
R Dewri, I Ray, N Poolsappasit, D Whitley
International Journal of Information Security 11 (3), 167-188, 2012
Secure personal data servers: a vision paper
T Allard, N Anciaux, L Bouganim, Y Guo, L Le Folgoc, B Nguyen, ...
The VLDB Journal 3 (1-2), 25-35, 2010
Vulnerability discovery in multi-version software systems
J Kim, YK Malaiya, I Ray
10th IEEE High Assurance Systems Engineering Symposium (HASE'07), 141-148, 2007
An optimistic fair exchange e-commerce protocol with automated dispute resolution
I Ray, I Ray
International Conference on Electronic Commerce and Web Technologies, 84-93, 2000
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20