Search - IFIP Open Digital Library Access content directly

Filter your results

21 results
Structure: Internal structure identifier : 97463
Image document

On the Identification of Property Based Generalizations in Microdata Anonymization

Rinku Dewri , Indrajit Ray , Indrakshi Ray , Darrell Whitley
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.81-96, ⟨10.1007/978-3-642-13739-6_6⟩
Conference papers hal-01056667v1
Image document

Multi-keyword Similarity Search over Encrypted Cloud Data

Mikhail Strizhov , Indrajit Ray
29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.52-65, ⟨10.1007/978-3-642-55415-5_5⟩
Conference papers hal-01370353v1
Image document

Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations

Sean Thorpe , Indrajit Ray , Tyrone Grandison , Abbie Barbir , Robert France
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.97-112, ⟨10.1007/978-3-642-39256-6_7⟩
Conference papers hal-01490726v1
Image document

That’s My DNA: Detecting Malicious Tampering of Synthesized DNA

Diptendu Mohan Kar , Indrajit Ray
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.61-80, ⟨10.1007/978-3-030-22479-0_4⟩
Conference papers hal-02384604v1
Image document

Adversarial Sampling Attacks Against Phishing Detection

Hossein Shirazi , Bruhadeshwar Bezawada , Indrakshi Ray , Charles Anderson
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.83-101, ⟨10.1007/978-3-030-22479-0_5⟩
Conference papers hal-02384598v1
Image document

Evaluating CVSS Base Score Using Vulnerability Rewards Programs

Awad Younis , Yashwant K. Malaiya , Indrajit Ray
31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.62-75, ⟨10.1007/978-3-319-33630-5_5⟩
Conference papers hal-01369542v1
Image document

SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks

Dieudonné Mulamba , Indrajit Ray , Indrakshi Ray
31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.179-193, ⟨10.1007/978-3-319-33630-5_13⟩
Conference papers hal-01369552v1
Image document

A Distributed Mechanism to Protect Against DDoS Attacks

Negar Mosharraf , Anura P. Jayasumana , Indrakshi Ray
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.529-540, ⟨10.1007/978-3-319-61176-1_29⟩
Conference papers hal-01684374v1
Image document

A Model for Trust-Based Access Control and Delegation in Mobile Clouds

Indrajit Ray , Dieudonne Mulamba , Indrakshi Ray , Keesook J. Han
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.242-257, ⟨10.1007/978-3-642-39256-6_16⟩
Conference papers hal-01490708v1
Image document

Privacy Preserving Record Matching Using Automated Semi-trusted Broker

Ibrahim Lazrig , Tarik Moataz , Indrajit Ray , Indrakshi Ray , Toan Ong , et al.
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.103-118, ⟨10.1007/978-3-319-20810-7_7⟩
Conference papers hal-01745819v1
Image document

Proactively Extracting IoT Device Capabilities: An Application to Smart Homes

Andy Dolan , Indrakshi Ray , Suryadipta Majumdar
34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.42-63, ⟨10.1007/978-3-030-49669-2_3⟩
Conference papers hal-03243641v1
Image document

Intelligent Inventory Control: Is Bootstrapping Worth Implementing?

Tatpong Katanyukul , Edwin Chong , William S. Duff
7th International Conference on Intelligent Information Processing (IIP), Oct 2012, Guilin, China. pp.58-67, ⟨10.1007/978-3-642-32891-6_10⟩
Conference papers hal-01524959v1
Image document

AGBuilder: An AI Tool for Automated Attack Graph Building, Analysis, and Refinement

Bruhadeshwar Bezawada , Indrajit Ray , Kushagra Tiwary
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.23-42, ⟨10.1007/978-3-030-22479-0_2⟩
Conference papers hal-02384601v1
Image document

Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes

Ibrahim Lazrig , Toan Ong , Indrajit Ray , Indrakshi Ray , Michael Kahn
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.61-76, ⟨10.1007/978-3-319-41483-6_5⟩
Conference papers hal-01633680v1
Image document

Continuous Engineering Through ALM-PLM Integration

Purnima Rao , Kandhasami Palaniappan
17th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2020, Rapperswil, Switzerland. pp.798-811, ⟨10.1007/978-3-030-62807-9_62⟩
Conference papers hal-03753135v1
Image document

Multilevel Secure Data Stream Processing

Raman Adaikkalavan , Indrakshi Ray , Xing Xie
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.122-137, ⟨10.1007/978-3-642-22348-8_11⟩
Conference papers hal-01586572v1
Image document

Using Trust-Based Information Aggregation for Predicting Security Level of Systems

Siv Hilde Houmb , Sudip Chakraborty , Indrakshi Ray , Indrajit Ray
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.241-256, ⟨10.1007/978-3-642-13739-6_16⟩
Conference papers hal-01056685v1
Image document

ELITE: zEro Links Identity managemenT systEm

Tarik Moataz , Nora Cuppens-Bouhlahia , Frédéric Cuppens , Indrajit Ray , Indrakshi Ray
DBSec 2014 : 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Jul 2014, Vienne, Austria. pp.195-210, ⟨10.1007/978-3-662-43936-4_13⟩
Conference papers hal-01159837v1
Image document

Stream Processing with Secure Information Flow Constraints

Indrakshi Ray , Raman Adaikkalavan , Xing Xie , Rose Gamble
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.311-329, ⟨10.1007/978-3-319-20810-7_22⟩
Conference papers hal-01745816v1
Image document

Resilient Reference Monitor for Distributed Access Control via Moving Target Defense

Dieudonné Mulamba , Indrajit Ray
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.20-40, ⟨10.1007/978-3-319-61176-1_2⟩
Conference papers hal-01684353v1
Image document

Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds

Tarik Moataz , Benjamin Justus , Indrakshi Ray , Nora Cuppens-Bouhlahia , Frédéric Cuppens , et al.
DBSec 2014 : the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Jul 2014, Vienne, Austria. pp.66-81, ⟨10.1007/978-3-662-43936-4_5⟩
Conference papers hal-01159841v1