UML2Alloy: A challenging model transformation K Anastasakis, B Bordbar, G Georg, I Ray Model Driven Engineering Languages and Systems: 10th International …, 2007 | 386 | 2007 |
Aspect-oriented approach to early design modelling R France, I Ray, G Georg, S Ghosh IEE Proceedings-Software 151 (4), 173-185, 2004 | 331 | 2004 |
Behavioral fingerprinting of iot devices B Bezawada, M Bachani, J Peterson, H Shirazi, I Ray, I Ray Proceedings of the 2018 workshop on attacks and solutions in hardware …, 2018 | 273 | 2018 |
On challenges of model transformation from UML to Alloy K Anastasakis, B Bordbar, G Georg, I Ray Software & Systems Modeling 9, 69-86, 2010 | 267 | 2010 |
A generic digital forensic investigation framework for internet of things (iot) VR Kebande, I Ray 2016 IEEE 4th International Conference on Future Internet of Things and …, 2016 | 213 | 2016 |
A spatio-temporal role-based access control model I Ray, M Toahchoodee IFIP Annual Conference on Data and Applications Security and Privacy, 211-226, 2007 | 209 | 2007 |
LRBAC: A location-aware role-based access control model I Ray, M Kumar, L Yu Information Systems Security: Second International Conference, ICISS 2006 …, 2006 | 189 | 2006 |
Using UML to visualize role-based access control constraints I Ray, N Li, R France, DK Kim Proceedings of the ninth ACM symposium on Access control models and …, 2004 | 159 | 2004 |
Using aspects to design a secure system G Georg, I Ray, R France Eighth IEEE International Conference on Engineering of Complex Computer …, 2002 | 143 | 2002 |
An aspect-based approach to modeling access control concerns I Ray, R France, N Li, G Georg Information and Software Technology 46 (9), 575-587, 2004 | 133 | 2004 |
Fair exchange in e-commerce I Ray, I Ray ACM SIGecom Exchanges 3 (2), 9-17, 2002 | 122 | 2002 |
Towards a location-based mandatory access control model I Ray, M Kumar Computers & Security 25 (1), 36-44, 2006 | 115 | 2006 |
An anonymous electronic voting protocol for voting over the internet I Ray, I Ray, N Narasimhamurthi Proceedings Third International Workshop on Advanced Issues of E-Commerce …, 2001 | 112 | 2001 |
An anonymous and failure resilient fair-exchange e-commerce protocol I Ray, I Ray, N Natarajan Decision Support Systems 39 (3), 267-292, 2005 | 111 | 2005 |
A cryptographic solution to implement access control in a hierarchy and more I Ray, I Ray, N Narasimhamurthi Proceedings of the seventh ACM symposium on Access control models and …, 2002 | 111 | 2002 |
Secure logging as a service—delegating log management to the cloud I Ray, K Belyaev, M Strizhov, D Mulamba, M Rajaram IEEE systems journal 7 (2), 323-334, 2013 | 109 | 2013 |
"Kn0w Thy Doma1n Name" Unbiased Phishing Detection Using Domain Name Based Features H Shirazi, B Bezawada, I Ray Proceedings of the 23nd ACM on symposium on access control models and …, 2018 | 104 | 2018 |
An aspect-oriented methodology for designing secure applications G Georg, I Ray, K Anastasakis, B Bordbar, M Toahchoodee, SH Houmb Information and Software Technology 51 (5), 846-864, 2009 | 104 | 2009 |
Secure personal data servers: a vision paper T Allard, N Anciaux, L Bouganim, Y Guo, L Le Folgoc, B Nguyen, ... The VLDB Journal 3 (1-2), 25-35, 2010 | 101 | 2010 |
Vulnerability discovery in multi-version software systems J Kim, YK Malaiya, I Ray 10th IEEE High Assurance Systems Engineering Symposium (HASE'07), 141-148, 2007 | 98 | 2007 |