dblp.uni-trier.dewww.uni-trier.de

Steven A. Demurjian

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
55EEJaime A. Pavlich-Mariscal, Steven A. Demurjian, Laurent D. Michel: A Framework of Composable Access Control Definition, Enforcement and Assurance. SCCC 2008: 13-22
2005
54EEJaime A. Pavlich-Mariscal, Thuong Doan, Laurent Michel, Steven A. Demurjian, T. C. Ting: Role Slices: A Notation for RBAC Permission Assignment and Enforcement. DBSec 2005: 40-53
53EEJaime A. Pavlich-Mariscal, Laurent Michel, Steven A. Demurjian: A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming. MoDELS 2005: 537-552
52EEJaime A. Pavlich-Mariscal, Steven A. Demurjian, Laurent D. Michel: A Framework for Composable Security Definition, Assurance, and Enforcement. MoDELS Satellite Events 2005: 353-354
51 Thuong Doan, Laurent D. Michel, Steven A. Demurjian, T. C. Ting: Stateful Design for Secure Information Systems. WOSIS 2005: 277-286
2004
50 Thuong Doan, Steven A. Demurjian, Charles E. Phillips, T. C. Ting: RBAC/MAC Security Analysis and Design for UML. DBSec 2004: 189-203
49EEThuong Doan, Steven A. Demurjian, T. C. Ting, Andreas Ketterl: MAC and UML for secure software design. FMSE 2004: 75-85
2003
48 Charles E. Phillips, Steven A. Demurjian, T. C. Ting: Safety and Liveness for an RBAC/MAC Security Model. DBSec 2003: 316-329
47 Patricia J. Pia, Steven A. Demurjian: Guided Generation of Use-Case-Based Software Requirements. IASSE 2003: 178-182
46 Charles E. Phillips, Steven A. Demurjian, T. C. Ting: Security Assurance for an RBAC/MAC Security Model. IAW 2003: 260-267
2002
45 M. Liebrand, Heidi J. C. Ellis, Charles E. Phillips, Steven A. Demurjian, T. C. Ting: Role Delegation for a Resource-Based Security Model. DBSec 2002: 37-48
44EERodrigo E. Caballero, Steven A. Demurjian: Towards the Formalization of a Reusability Framework for Refactoring. ICSR 2002: 293-308
43EECharles E. Phillips, T. C. Ting, Steven A. Demurjian: Information sharing and security in dynamic coalitions. SACMAT 2002: 87-96
2001
42 M. Cecilia Bastarrica, Rodrigo E. Caballero, Steven A. Demurjian, Alexander A. Shvartsman: Two Optimization Techniques for Component-Based Systems Deployment. SEKE 2001: 153-162
41EEMargaretha W. Price, Donald M. Needham, Steven A. Demurjian: Producing reusable object-oriented components: a domain-and-organization-specific perspective. SSR 2001: 41-50
2000
40 Steven A. Demurjian, T. C. Ting, J. Balthazar, H. Ren, Charles E. Phillips, Paul Barr: Role-Based Security in a Distributed Resource Environment. DBSec 2000: 259-270
39EEM. Cecilia Bastarrica, Steven A. Demurjian, Alexander A. Shvartsman: Comprehensive Specification of Distributed Systems Using I5 and IOA. SCCC 2000: 74-82
1999
38 Steven A. Demurjian, Y. He, T. C. Ting, M. Saba: Software Agents for Role Based Security. DBSec 1999: 79-93
37 M. Cecilia Bastarrica, Steven A. Demurjian, Alexander A. Shvartsman: A Framework for Architectural Specification of Distributed Object Systems. OPODIS 1999: 127-148
36EEDonald M. Needham, Steven A. Demurjian, Thomas J. Peters: Towards a distributed object-oriented propagation model using Ada95. SIGAda 1999: 203-210
1998
35 Debra L. Smarkusky, Steven A. Demurjian, M. Cecilia Bastarrica, T. C. Ting: Role Based Security and Java. DBSec 1998: 205-219
34 M. Cecilia Bastarrica, Alexander A. Shvartsman, Steven A. Demurjian: A Binary Integer Programming Model for Optimal Object Distribution. OPODIS 1998: 211-226
33EEM. Cecilia Bastarrica, Steven A. Demurjian, Alexander A. Shvartsman: Software Architectural Specification for Optimal Object Distribution. SCCC 1998: 25-31
32EEJohn A. Reisner, Zeenat Lainwala, Thomas J. Peters, Steven A. Demurjian: Implementing a Culling and Self-Intersection Algorithm for Stereolithography Files in Ada 95. SIGAda 1998: 104-113
1997
31 Steven A. Demurjian, T. C. Ting, John A. Reisner: Software Architectural Alternatives for User Role-Based Security Policies. DBSec 1997: 247-261
30 Margaretha W. Price, Steven A. Demurjian: Analyzing and Measuring Reusability in Object-Oriented Designs. OOPSLA 1997: 22-33
29EEMargaretha W. Price, Steven A. Demurjian, Donald M. Needham: A Reusability Measurement Framework and Tool for Ada 95. TRI-Ada 1997: 125-132
28EEDonald M. Needham, Steven A. Demurjian, Thomas J. Peters: An Ada95 Basis for Propagation Modeling. TRI-Ada 1997: 263-272
27 Steven A. Demurjian: Traditional Software Design. The Computer Science and Engineering Handbook 1997: 2323-2351
26 Steven A. Demurjian, T. C. Ting: Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications. Journal of Computer Security 5(4): 341-382 (1997)
1996
25 David L. Spooner, Steven A. Demurjian, John E. Dobson: Database Security IX: Status and Prospects, Proceedings of the Ninth Annual IFIP WG11 Working Conference on Database Security, Rensselaerville, New York, USA, 13-16 August 1995 Chapman & Hall 1996
24 Steven A. Demurjian, T. C. Ting, Margaretha W. Price, M.-Y. Hu: Extensible and Reusable Role-Based Object-Oriented Security. DBSec 1996: 288-307
23EEDonald M. Needham, Steven A. Demurjian, Karim El Guemhioui, Thomas J. Peters, P. Zamani, M. McMahon, Heidi J. C. Ellis: ADAM: A Language-Independent, Object-Oriented, Design Environment for Modeling Inheritance and Relationship Variants in Ada 95, C++, and Eiffel. TRI-Ada 1996: 99-113
22EEJoan Peckham, Fred J. Maryanski, Steven A. Demurjian: Towards the Correctness and Consistency of Update Semantics in Semantic Database Schema. IEEE Trans. Knowl. Data Eng. 8(3): 503-507 (1996)
1995
21EESteven A. Demurjian, T. C. Ting, M.-Y. Hu: Role-based access control for object-oriented/C++ systems. ACM Workshop on Role-Based Access Control 1995
20 Steven A. Demurjian, T. A. Daggett, T. C. Ting, M.-Y. Hu: URBS Enforcement Mechanisms for Object-Oriented Systems. DBSec 1995: 79-94
1994
19EEAnlan Song, Steven A. Demurjian, David L. Kleinman: Transaction Management and Object-Oriented Modeling in a Distributed Dynamic Decision Making Environment. ACM Conference on Computer Science 1994: 189-195
18 M.-Y. Hu, Steven A. Demurjian, T. C. Ting: Unifying Structural and Security Modeling and Analyses in the ADAM Object-Oriented Design Environment. DBSec 1994: 77-94
17EEKarim El Guemhioui, Steven A. Demurjian, Thomas J. Peters, Heidi J. C. Ellis: Profiling in an Object-Oriented Design Environment That Supports Ada 9X and Ada 83 Code Generation. TRI-Ada 1994: 180-190
1993
16EEHeidi J. C. Ellis, Steven A. Demurjian: Object-Oriented Design and Analyses for Advanced Application Development: Progress Towards a New Frontier. ACM Conference on Computer Science 1993: 332-337
15 Steven A. Demurjian, T. C. Ting: The Factors that Influence Apropos Security Approaches for the Object-Oriented Paradigm. Security for Object-Oriented Systems 1993: 151-165
14EEKarim El Guemhioui, Steven A. Demurjian, Thomas J. Peters: Object-Oriented Design and Automatic Ada Code Generation in the Education of Software Engineers. TRI-Ada 1993: 126-136
1992
13 M.-Y. Hu, Steven A. Demurjian, T. C. Ting: User-Role Based Security Profiles for an Object-Oriented Design Model. DBSec 1992: 333-348
1991
12 T. C. Ting, Steven A. Demurjian, M.-Y. Hu: Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model. DBSec 1991: 275-296
1990
11EEHeidi J. C. Ellis, Steven A. Demurjian, Fred J. Maryanski, George McA. Beshers, Joan Peckham: Extending the Behavioral Capabilities of the Object-Oriented Paradigm with an Active Model of Propagation. ACM Conference on Computer Science 1990: 319-325
10 Greg Nichols, Steven A. Demurjian: Object-Oriented Database design for the Ozone Software Development Environment. BNCOD 1990: 159-178
1989
9EEJoan Peckham, Fred J. Maryanski, George McA. Beshers, H. Chapman, Steven A. Demurjian: Constraint based analysis of database update propagation. ICIS 1989: 9-18
1988
8EESteven A. Demurjian, David K. Hsiao: Towards a Better Understanding of Data Models Through the Multilingual Database System. IEEE Trans. Software Eng. 14(7): 946-958 (1988)
1987
7EESteven A. Demurjian, David K. Hsiao: The Multi-Lingual Database System. ICDE 1987: 44-51
1986
6EESteven A. Demurjian, David K. Hsiao, Jai Menon: A Multi-Backend Database System for Performance Gains, Capacity Growth and Hardware Upgrade. ICDE 1986: 542-554
5 Steven A. Demurjian, David K. Hsiao, Paula Strawser: Design Analysis and Performance Evaluation Methodologies for Database Computers. Advances in Computers 25: 101-214 (1986)
1985
4 Steven A. Demurjian, David K. Hsiao, Roger G. Marshall: The Architectural Requirements and Integration Analyses of a Database Server for Office Automation. ACM Annual Conference - The range of computing: mid-80's perspective 1985: 121-131
3 Steven A. Demurjian, David K. Hsiao, Douglas S. Kerr, Robert C. Tekampe, Robert J. Watson: Performance Measurement Methodologies for Database Systems. ACM Annual Conference - The range of computing: mid-80's perspective 1985: 16-28
2 Steven A. Demurjian, David K. Hsiao, Douglas S. Kerr, Paula Strawser, Robert J. Watson, Jai Menon, Robert C. Tekampe, Joel Trimble: Performance Evaluation of a Database System in Multiple Backend Configurations. IWDM 1985: 91-111
1EESteven A. Demurjian, David K. Hsiao: Benchmarking Database Systems in Multiple Systems in Multiple Backend Configurations. IEEE Database Eng. Bull. 8(1): 29-39 (1985)

Coauthor Index

1J. Balthazar [40]
2Paul Barr [40]
3M. Cecilia Bastarrica [33] [34] [35] [37] [39] [42]
4George McA. Beshers [9] [11]
5Rodrigo E. Caballero [42] [44]
6H. Chapman [9]
7T. A. Daggett [20]
8Thuong Doan [49] [50] [51] [54]
9John E. Dobson [25]
10Heidi J. C. Ellis [11] [16] [17] [23] [45]
11Karim El Guemhioui [14] [17] [23]
12Y. He [38]
13David K. Hsiao [1] [2] [3] [4] [5] [6] [7] [8]
14M.-Y. Hu [12] [13] [18] [20] [21] [24]
15Douglas S. Kerr [2] [3]
16Andreas Ketterl [49]
17David L. Kleinman [19]
18Zeenat Lainwala [32]
19M. Liebrand [45]
20Roger G. Marshall [4]
21Fred J. Maryanski [9] [11] [22]
22M. McMahon [23]
23Jai Menon [2] [6]
24Laurent D. Michel (Laurent Michel) [51] [52] [53] [54] [55]
25Donald M. Needham [23] [28] [29] [36] [41]
26Greg Nichols [10]
27Jaime A. Pavlich-Mariscal [52] [53] [54] [55]
28Joan Peckham [9] [11] [22]
29Thomas J. Peters [14] [17] [23] [28] [32] [36]
30Charles E. Phillips [40] [43] [45] [46] [48] [50]
31Patricia J. Pia [47]
32Margaretha W. Price [24] [29] [30] [41]
33John A. Reisner [31] [32]
34H. Ren [40]
35M. Saba [38]
36Alexander A. Shvartsman [33] [34] [37] [39] [42]
37Debra L. Smarkusky [35]
38Anlan Song [19]
39David L. Spooner [25]
40Paula Strawser [2] [5]
41Robert C. Tekampe [2] [3]
42T. C. Ting [12] [13] [15] [18] [20] [21] [24] [26] [31] [35] [38] [40] [43] [45] [46] [48] [49] [50] [51] [54]
43Joel Trimble [2]
44Robert J. Watson [2] [3]
45P. Zamani [23]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)