☰

Indrakshi Ray

Affiliations: 
Colorado State University, Fort Collins, CO 
Area:
Computer Science
Google:
"Indrakshi Ray"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Gallegos JE, Kar DM, Ray I, et al. (2020) Securing the Exchange of Synthetic Genetic Constructs Using Digital Signatures. Acs Synthetic Biology
Mukherjee S, Etten JCV, Samyukta NR, et al. (2019) TruckSTM: Runtime Realization of Operational State Transitions for Medium and Heavy Duty Vehicles Acm Transactions On Cyber-Physical Systems. 4: 1-25
Ong T, Lazrig I, Ray I, et al. (2018) Scalable Secure Privacy-Preserving Record Linkage (PPRL) Methods Using Cloud-based Infrastructure International Journal For Population Data Science. 3
Belyaev K, Sun W, Ray I, et al. (2018) On the design and analysis of protocols for Personal Health Record storage on Personal Data Server devices Future Generation Computer Systems. 80: 467-482
Belyaev K, Ray I. (2017) Component-oriented access control—Application servers meet tuple spaces for the masses Future Generation Computer Systems. 86: 726-739
Belyaev K, Ray I. (2017) On the formalization, design, and implementation of component-oriented access control in lightweight virtualized server environments Computers & Security. 71: 15-35
Ray I, Ong TC, Kahn MG. (2016) Applying attribute based access control for privacy preserving health data disclosure 3rd Ieee Embs International Conference On Biomedical and Health Informatics, Bhi 2016. 1-4
Mulamba D, Ray I. (2016) SybilRadar: A graph-structure based framework for Sybil detection in on-line social networks Ifip Advances in Information and Communication Technology. 471: 179-193
Sun W, Combemale B, France RB, et al. (2015) Using slicing to improve the performance of model invariant checking Journal of Object Technology. 14: 1-28
Su J, Wang X, Shi W, et al. (2015) Security, trust, and resilience of distributed networks and systems Security and Communication Networks. 8: 1829-1830
See more...