Indrakshi Ray

Colorado State University, Fort Collins, CO 
Computer Science
"Indrakshi Ray"
BETA: Related publications


You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Ray I, Ong TC, Kahn MG. (2016) Applying attribute based access control for privacy preserving health data disclosure 3rd Ieee Embs International Conference On Biomedical and Health Informatics, Bhi 2016. 1-4
Mulamba D, Ray I. (2016) SybilRadar: A graph-structure based framework for Sybil detection in on-line social networks Ifip Advances in Information and Communication Technology. 471: 179-193
Belyaev K, Ray I. (2015) Towards efficient dissemination and filtering of XML data streams Proceedings - 15th Ieee International Conference On Computer and Information Technology, Cit 2015, 14th Ieee International Conference On Ubiquitous Computing and Communications, Iucc 2015, 13th Ieee International Conference On Dependable, Autonomic and Secure Computing, Dasc 2015 and 13th Ieee International Conference On Pervasive Intelligence and Computing, Picom 2015. 1870-1877
Ray I. (2014) Trust-based access control for secure cloud computing High Performance Cloud Auditing and Applications. 2147483647: 189-213
Belyaev K, Ray I, Luckasen G. (2013) Personal health record storage on privacy preserving green clouds Proceedings of the 9th Ieee International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2013. 448-457
Ray I, Mulamba D, Han KJ. (2013) A model for trust-based access control and delegation in mobile clouds Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7964: 242-257
Dewri R, Ray I, Whitley D. (2012) Utility driven optimization of real time data broadcast schedules Applied Soft Computing Journal. 12: 1832-1846
Ray I. (2012) Electronic Payment Systems Handbook of Computer Networks. 3: 869-888
Houmb SH, Ray I. (2011) SecInvest: Balancing security needs with financial and business constraints Dependability and Computer Engineering: Concepts For Software-Intensive Systems. 306-328
Dewri R, Ray I, Whitley D. (2011) Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization Journal of Computer Security. 19: 935-974
See more...