Indrakshi Ray
Affiliations: | Colorado State University, Fort Collins, CO |
Area:
Computer ScienceGoogle:
"Indrakshi Ray"Children
Sign in to add traineeTai Xin | grad student | 2006 | Colorado State |
Nayot Poolsappasit | grad student | 2010 | Colorado State |
Manachai Toahchoodee | grad student | 2010 | Colorado State |
Ramadan Abdunabi | grad student | 2013 | Colorado State |
Xing Xie | grad student | 2013 | Colorado State |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Ray I, Ong TC, Kahn MG. (2016) Applying attribute based access control for privacy preserving health data disclosure 3rd Ieee Embs International Conference On Biomedical and Health Informatics, Bhi 2016. 1-4 |
Mulamba D, Ray I. (2016) SybilRadar: A graph-structure based framework for Sybil detection in on-line social networks Ifip Advances in Information and Communication Technology. 471: 179-193 |
Belyaev K, Ray I. (2015) Towards efficient dissemination and filtering of XML data streams Proceedings - 15th Ieee International Conference On Computer and Information Technology, Cit 2015, 14th Ieee International Conference On Ubiquitous Computing and Communications, Iucc 2015, 13th Ieee International Conference On Dependable, Autonomic and Secure Computing, Dasc 2015 and 13th Ieee International Conference On Pervasive Intelligence and Computing, Picom 2015. 1870-1877 |
Ray I. (2014) Trust-based access control for secure cloud computing High Performance Cloud Auditing and Applications. 2147483647: 189-213 |
Belyaev K, Ray I, Luckasen G. (2013) Personal health record storage on privacy preserving green clouds Proceedings of the 9th Ieee International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2013. 448-457 |
Ray I, Mulamba D, Han KJ. (2013) A model for trust-based access control and delegation in mobile clouds Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7964: 242-257 |
Dewri R, Ray I, Whitley D. (2012) Utility driven optimization of real time data broadcast schedules Applied Soft Computing Journal. 12: 1832-1846 |
Ray I. (2012) Electronic Payment Systems Handbook of Computer Networks. 3: 869-888 |
Houmb SH, Ray I. (2011) SecInvest: Balancing security needs with financial and business constraints Dependability and Computer Engineering: Concepts For Software-Intensive Systems. 306-328 |
Dewri R, Ray I, Whitley D. (2011) Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization Journal of Computer Security. 19: 935-974 |