2009 | ||
---|---|---|
58 | Solomon Berhe, Steven A. Demurjian, Thomas Agresta: Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC. DBSec 2009: 283-290 | |
57 | Steven A. Demurjian, R. Saripalle, Solomon Berhe: An Integrated Ontology Framework for Health Information Exchange. SEKE 2009: 575-580 | |
56 | Steven A. Demurjian: Granular Computing, Information Models for. Encyclopedia of Complexity and Systems Science 2009: 4305-4313 | |
2008 | ||
55 | Jaime A. Pavlich-Mariscal, Steven A. Demurjian, Laurent D. Michel: A Framework of Composable Access Control Definition, Enforcement and Assurance. SCCC 2008: 13-22 | |
2005 | ||
54 | Jaime A. Pavlich-Mariscal, Thuong Doan, Laurent Michel, Steven A. Demurjian, T. C. Ting: Role Slices: A Notation for RBAC Permission Assignment and Enforcement. DBSec 2005: 40-53 | |
53 | Jaime A. Pavlich-Mariscal, Laurent Michel, Steven A. Demurjian: A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming. MoDELS 2005: 537-552 | |
52 | Jaime A. Pavlich-Mariscal, Steven A. Demurjian, Laurent D. Michel: A Framework for Composable Security Definition, Assurance, and Enforcement. MoDELS Satellite Events 2005: 353-354 | |
51 | Thuong Doan, Laurent D. Michel, Steven A. Demurjian, T. C. Ting: Stateful Design for Secure Information Systems. WOSIS 2005: 277-286 | |
2004 | ||
50 | Thuong Doan, Steven A. Demurjian, Charles E. Phillips, T. C. Ting: RBAC/MAC Security Analysis and Design for UML. DBSec 2004: 189-203 | |
49 | Thuong Doan, Steven A. Demurjian, T. C. Ting, Andreas Ketterl: MAC and UML for secure software design. FMSE 2004: 75-85 | |
2003 | ||
48 | Charles E. Phillips, Steven A. Demurjian, T. C. Ting: Safety and Liveness for an RBAC/MAC Security Model. DBSec 2003: 316-329 | |
47 | Patricia J. Pia, Steven A. Demurjian: Guided Generation of Use-Case-Based Software Requirements. IASSE 2003: 178-182 | |
46 | Charles E. Phillips, Steven A. Demurjian, T. C. Ting: Security Assurance for an RBAC/MAC Security Model. IAW 2003: 260-267 | |
2002 | ||
45 | M. Liebrand, Heidi J. C. Ellis, Charles E. Phillips, Steven A. Demurjian, T. C. Ting: Role Delegation for a Resource-Based Security Model. DBSec 2002: 37-48 | |
44 | Rodrigo E. Caballero, Steven A. Demurjian: Towards the Formalization of a Reusability Framework for Refactoring. ICSR 2002: 293-308 | |
43 | Charles E. Phillips, T. C. Ting, Steven A. Demurjian: Information sharing and security in dynamic coalitions. SACMAT 2002: 87-96 | |
2001 | ||
42 | M. Cecilia Bastarrica, Rodrigo E. Caballero, Steven A. Demurjian, Alexander A. Shvartsman: Two Optimization Techniques for Component-Based Systems Deployment. SEKE 2001: 153-162 | |
41 | Margaretha W. Price, Donald M. Needham, Steven A. Demurjian: Producing reusable object-oriented components: a domain-and-organization-specific perspective. SSR 2001: 41-50 | |
2000 | ||
40 | Steven A. Demurjian, T. C. Ting, J. Balthazar, H. Ren, Charles E. Phillips, Paul Barr: Role-Based Security in a Distributed Resource Environment. DBSec 2000: 259-270 | |
39 | M. Cecilia Bastarrica, Steven A. Demurjian, Alexander A. Shvartsman: Comprehensive Specification of Distributed Systems Using I5 and IOA. SCCC 2000: 74-82 | |
1999 | ||
38 | Steven A. Demurjian, Y. He, T. C. Ting, M. Saba: Software Agents for Role Based Security. DBSec 1999: 79-93 | |
37 | M. Cecilia Bastarrica, Steven A. Demurjian, Alexander A. Shvartsman: A Framework for Architectural Specification of Distributed Object Systems. OPODIS 1999: 127-148 | |
36 | Donald M. Needham, Steven A. Demurjian, Thomas J. Peters: Towards a distributed object-oriented propagation model using Ada95. SIGAda 1999: 203-210 | |
1998 | ||
35 | Debra L. Smarkusky, Steven A. Demurjian, M. Cecilia Bastarrica, T. C. Ting: Role Based Security and Java. DBSec 1998: 205-219 | |
34 | M. Cecilia Bastarrica, Alexander A. Shvartsman, Steven A. Demurjian: A Binary Integer Programming Model for Optimal Object Distribution. OPODIS 1998: 211-226 | |
33 | M. Cecilia Bastarrica, Steven A. Demurjian, Alexander A. Shvartsman: Software Architectural Specification for Optimal Object Distribution. SCCC 1998: 25-31 | |
32 | John A. Reisner, Zeenat Lainwala, Thomas J. Peters, Steven A. Demurjian: Implementing a Culling and Self-Intersection Algorithm for Stereolithography Files in Ada 95. SIGAda 1998: 104-113 | |
1997 | ||
31 | Steven A. Demurjian, T. C. Ting, John A. Reisner: Software Architectural Alternatives for User Role-Based Security Policies. DBSec 1997: 247-261 | |
30 | Margaretha W. Price, Steven A. Demurjian: Analyzing and Measuring Reusability in Object-Oriented Designs. OOPSLA 1997: 22-33 | |
29 | Margaretha W. Price, Steven A. Demurjian, Donald M. Needham: A Reusability Measurement Framework and Tool for Ada 95. TRI-Ada 1997: 125-132 | |
28 | Donald M. Needham, Steven A. Demurjian, Thomas J. Peters: An Ada95 Basis for Propagation Modeling. TRI-Ada 1997: 263-272 | |
27 | Steven A. Demurjian: Traditional Software Design. The Computer Science and Engineering Handbook 1997: 2323-2351 | |
26 | Steven A. Demurjian, T. C. Ting: Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications. Journal of Computer Security 5(4): 341-382 (1997) | |
1996 | ||
25 | David L. Spooner, Steven A. Demurjian, John E. Dobson: Database Security IX: Status and Prospects, Proceedings of the Ninth Annual IFIP WG11 Working Conference on Database Security, Rensselaerville, New York, USA, 13-16 August 1995 Chapman & Hall 1996 | |
24 | Steven A. Demurjian, T. C. Ting, Margaretha W. Price, M.-Y. Hu: Extensible and Reusable Role-Based Object-Oriented Security. DBSec 1996: 288-307 | |
23 | Donald M. Needham, Steven A. Demurjian, Karim El Guemhioui, Thomas J. Peters, P. Zamani, M. McMahon, Heidi J. C. Ellis: ADAM: A Language-Independent, Object-Oriented, Design Environment for Modeling Inheritance and Relationship Variants in Ada 95, C++, and Eiffel. TRI-Ada 1996: 99-113 | |
22 | Joan Peckham, Fred J. Maryanski, Steven A. Demurjian: Towards the Correctness and Consistency of Update Semantics in Semantic Database Schema. IEEE Trans. Knowl. Data Eng. 8(3): 503-507 (1996) | |
1995 | ||
21 | Steven A. Demurjian, T. C. Ting, M.-Y. Hu: Role-based access control for object-oriented/C++ systems. ACM Workshop on Role-Based Access Control 1995 | |
20 | Steven A. Demurjian, T. A. Daggett, T. C. Ting, M.-Y. Hu: URBS Enforcement Mechanisms for Object-Oriented Systems. DBSec 1995: 79-94 | |
1994 | ||
19 | Anlan Song, Steven A. Demurjian, David L. Kleinman: Transaction Management and Object-Oriented Modeling in a Distributed Dynamic Decision Making Environment. ACM Conference on Computer Science 1994: 189-195 | |
18 | M.-Y. Hu, Steven A. Demurjian, T. C. Ting: Unifying Structural and Security Modeling and Analyses in the ADAM Object-Oriented Design Environment. DBSec 1994: 77-94 | |
17 | Karim El Guemhioui, Steven A. Demurjian, Thomas J. Peters, Heidi J. C. Ellis: Profiling in an Object-Oriented Design Environment That Supports Ada 9X and Ada 83 Code Generation. TRI-Ada 1994: 180-190 | |
1993 | ||
16 | Heidi J. C. Ellis, Steven A. Demurjian: Object-Oriented Design and Analyses for Advanced Application Development: Progress Towards a New Frontier. ACM Conference on Computer Science 1993: 332-337 | |
15 | Steven A. Demurjian, T. C. Ting: The Factors that Influence Apropos Security Approaches for the Object-Oriented Paradigm. Security for Object-Oriented Systems 1993: 151-165 | |
14 | Karim El Guemhioui, Steven A. Demurjian, Thomas J. Peters: Object-Oriented Design and Automatic Ada Code Generation in the Education of Software Engineers. TRI-Ada 1993: 126-136 | |
1992 | ||
13 | M.-Y. Hu, Steven A. Demurjian, T. C. Ting: User-Role Based Security Profiles for an Object-Oriented Design Model. DBSec 1992: 333-348 | |
1991 | ||
12 | T. C. Ting, Steven A. Demurjian, M.-Y. Hu: Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model. DBSec 1991: 275-296 | |
1990 | ||
11 | Heidi J. C. Ellis, Steven A. Demurjian, Fred J. Maryanski, George McA. Beshers, Joan Peckham: Extending the Behavioral Capabilities of the Object-Oriented Paradigm with an Active Model of Propagation. ACM Conference on Computer Science 1990: 319-325 | |
10 | Greg Nichols, Steven A. Demurjian: Object-Oriented Database design for the Ozone Software Development Environment. BNCOD 1990: 159-178 | |
1989 | ||
9 | Joan Peckham, Fred J. Maryanski, George McA. Beshers, H. Chapman, Steven A. Demurjian: Constraint based analysis of database update propagation. ICIS 1989: 9-18 | |
1988 | ||
8 | Steven A. Demurjian, David K. Hsiao: Towards a Better Understanding of Data Models Through the Multilingual Database System. IEEE Trans. Software Eng. 14(7): 946-958 (1988) | |
1987 | ||
7 | Steven A. Demurjian, David K. Hsiao: The Multi-Lingual Database System. ICDE 1987: 44-51 | |
1986 | ||
6 | Steven A. Demurjian, David K. Hsiao, Jai Menon: A Multi-Backend Database System for Performance Gains, Capacity Growth and Hardware Upgrade. ICDE 1986: 542-554 | |
5 | Steven A. Demurjian, David K. Hsiao, Paula Strawser: Design Analysis and Performance Evaluation Methodologies for Database Computers. Advances in Computers 25: 101-214 (1986) | |
1985 | ||
4 | Steven A. Demurjian, David K. Hsiao, Roger G. Marshall: The Architectural Requirements and Integration Analyses of a Database Server for Office Automation. ACM Annual Conference - The range of computing: mid-80's perspective 1985: 121-131 | |
3 | Steven A. Demurjian, David K. Hsiao, Douglas S. Kerr, Robert C. Tekampe, Robert J. Watson: Performance Measurement Methodologies for Database Systems. ACM Annual Conference - The range of computing: mid-80's perspective 1985: 16-28 | |
2 | Steven A. Demurjian, David K. Hsiao, Douglas S. Kerr, Paula Strawser, Robert J. Watson, Jai Menon, Robert C. Tekampe, Joel Trimble: Performance Evaluation of a Database System in Multiple Backend Configurations. IWDM 1985: 91-111 | |
1 | Steven A. Demurjian, David K. Hsiao: Benchmarking Database Systems in Multiple Systems in Multiple Backend Configurations. IEEE Database Eng. Bull. 8(1): 29-39 (1985) |