2008 |
55 | EE | Jaime A. Pavlich-Mariscal,
Steven A. Demurjian,
Laurent D. Michel:
A Framework of Composable Access Control Definition, Enforcement and Assurance.
SCCC 2008: 13-22 |
2005 |
54 | EE | Jaime A. Pavlich-Mariscal,
Thuong Doan,
Laurent Michel,
Steven A. Demurjian,
T. C. Ting:
Role Slices: A Notation for RBAC Permission Assignment and Enforcement.
DBSec 2005: 40-53 |
53 | EE | Jaime A. Pavlich-Mariscal,
Laurent Michel,
Steven A. Demurjian:
A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming.
MoDELS 2005: 537-552 |
52 | EE | Jaime A. Pavlich-Mariscal,
Steven A. Demurjian,
Laurent D. Michel:
A Framework for Composable Security Definition, Assurance, and Enforcement.
MoDELS Satellite Events 2005: 353-354 |
51 | | Thuong Doan,
Laurent D. Michel,
Steven A. Demurjian,
T. C. Ting:
Stateful Design for Secure Information Systems.
WOSIS 2005: 277-286 |
2004 |
50 | | Thuong Doan,
Steven A. Demurjian,
Charles E. Phillips,
T. C. Ting:
RBAC/MAC Security Analysis and Design for UML.
DBSec 2004: 189-203 |
49 | EE | Thuong Doan,
Steven A. Demurjian,
T. C. Ting,
Andreas Ketterl:
MAC and UML for secure software design.
FMSE 2004: 75-85 |
2003 |
48 | | Charles E. Phillips,
Steven A. Demurjian,
T. C. Ting:
Safety and Liveness for an RBAC/MAC Security Model.
DBSec 2003: 316-329 |
47 | | Patricia J. Pia,
Steven A. Demurjian:
Guided Generation of Use-Case-Based Software Requirements.
IASSE 2003: 178-182 |
46 | | Charles E. Phillips,
Steven A. Demurjian,
T. C. Ting:
Security Assurance for an RBAC/MAC Security Model.
IAW 2003: 260-267 |
2002 |
45 | | M. Liebrand,
Heidi J. C. Ellis,
Charles E. Phillips,
Steven A. Demurjian,
T. C. Ting:
Role Delegation for a Resource-Based Security Model.
DBSec 2002: 37-48 |
44 | EE | Rodrigo E. Caballero,
Steven A. Demurjian:
Towards the Formalization of a Reusability Framework for Refactoring.
ICSR 2002: 293-308 |
43 | EE | Charles E. Phillips,
T. C. Ting,
Steven A. Demurjian:
Information sharing and security in dynamic coalitions.
SACMAT 2002: 87-96 |
2001 |
42 | | M. Cecilia Bastarrica,
Rodrigo E. Caballero,
Steven A. Demurjian,
Alexander A. Shvartsman:
Two Optimization Techniques for Component-Based Systems Deployment.
SEKE 2001: 153-162 |
41 | EE | Margaretha W. Price,
Donald M. Needham,
Steven A. Demurjian:
Producing reusable object-oriented components: a domain-and-organization-specific perspective.
SSR 2001: 41-50 |
2000 |
40 | | Steven A. Demurjian,
T. C. Ting,
J. Balthazar,
H. Ren,
Charles E. Phillips,
Paul Barr:
Role-Based Security in a Distributed Resource Environment.
DBSec 2000: 259-270 |
39 | EE | M. Cecilia Bastarrica,
Steven A. Demurjian,
Alexander A. Shvartsman:
Comprehensive Specification of Distributed Systems Using I5 and IOA.
SCCC 2000: 74-82 |
1999 |
38 | | Steven A. Demurjian,
Y. He,
T. C. Ting,
M. Saba:
Software Agents for Role Based Security.
DBSec 1999: 79-93 |
37 | | M. Cecilia Bastarrica,
Steven A. Demurjian,
Alexander A. Shvartsman:
A Framework for Architectural Specification of Distributed Object Systems.
OPODIS 1999: 127-148 |
36 | EE | Donald M. Needham,
Steven A. Demurjian,
Thomas J. Peters:
Towards a distributed object-oriented propagation model using Ada95.
SIGAda 1999: 203-210 |
1998 |
35 | | Debra L. Smarkusky,
Steven A. Demurjian,
M. Cecilia Bastarrica,
T. C. Ting:
Role Based Security and Java.
DBSec 1998: 205-219 |
34 | | M. Cecilia Bastarrica,
Alexander A. Shvartsman,
Steven A. Demurjian:
A Binary Integer Programming Model for Optimal Object Distribution.
OPODIS 1998: 211-226 |
33 | EE | M. Cecilia Bastarrica,
Steven A. Demurjian,
Alexander A. Shvartsman:
Software Architectural Specification for Optimal Object Distribution.
SCCC 1998: 25-31 |
32 | EE | John A. Reisner,
Zeenat Lainwala,
Thomas J. Peters,
Steven A. Demurjian:
Implementing a Culling and Self-Intersection Algorithm for Stereolithography Files in Ada 95.
SIGAda 1998: 104-113 |
1997 |
31 | | Steven A. Demurjian,
T. C. Ting,
John A. Reisner:
Software Architectural Alternatives for User Role-Based Security Policies.
DBSec 1997: 247-261 |
30 | | Margaretha W. Price,
Steven A. Demurjian:
Analyzing and Measuring Reusability in Object-Oriented Designs.
OOPSLA 1997: 22-33 |
29 | EE | Margaretha W. Price,
Steven A. Demurjian,
Donald M. Needham:
A Reusability Measurement Framework and Tool for Ada 95.
TRI-Ada 1997: 125-132 |
28 | EE | Donald M. Needham,
Steven A. Demurjian,
Thomas J. Peters:
An Ada95 Basis for Propagation Modeling.
TRI-Ada 1997: 263-272 |
27 | | Steven A. Demurjian:
Traditional Software Design.
The Computer Science and Engineering Handbook 1997: 2323-2351 |
26 | | Steven A. Demurjian,
T. C. Ting:
Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications.
Journal of Computer Security 5(4): 341-382 (1997) |
1996 |
25 | | David L. Spooner,
Steven A. Demurjian,
John E. Dobson:
Database Security IX: Status and Prospects, Proceedings of the Ninth Annual IFIP WG11 Working Conference on Database Security, Rensselaerville, New York, USA, 13-16 August 1995
Chapman & Hall 1996 |
24 | | Steven A. Demurjian,
T. C. Ting,
Margaretha W. Price,
M.-Y. Hu:
Extensible and Reusable Role-Based Object-Oriented Security.
DBSec 1996: 288-307 |
23 | EE | Donald M. Needham,
Steven A. Demurjian,
Karim El Guemhioui,
Thomas J. Peters,
P. Zamani,
M. McMahon,
Heidi J. C. Ellis:
ADAM: A Language-Independent, Object-Oriented, Design Environment for Modeling Inheritance and Relationship Variants in Ada 95, C++, and Eiffel.
TRI-Ada 1996: 99-113 |
22 | EE | Joan Peckham,
Fred J. Maryanski,
Steven A. Demurjian:
Towards the Correctness and Consistency of Update Semantics in Semantic Database Schema.
IEEE Trans. Knowl. Data Eng. 8(3): 503-507 (1996) |
1995 |
21 | EE | Steven A. Demurjian,
T. C. Ting,
M.-Y. Hu:
Role-based access control for object-oriented/C++ systems.
ACM Workshop on Role-Based Access Control 1995 |
20 | | Steven A. Demurjian,
T. A. Daggett,
T. C. Ting,
M.-Y. Hu:
URBS Enforcement Mechanisms for Object-Oriented Systems.
DBSec 1995: 79-94 |
1994 |
19 | EE | Anlan Song,
Steven A. Demurjian,
David L. Kleinman:
Transaction Management and Object-Oriented Modeling in a Distributed Dynamic Decision Making Environment.
ACM Conference on Computer Science 1994: 189-195 |
18 | | M.-Y. Hu,
Steven A. Demurjian,
T. C. Ting:
Unifying Structural and Security Modeling and Analyses in the ADAM Object-Oriented Design Environment.
DBSec 1994: 77-94 |
17 | EE | Karim El Guemhioui,
Steven A. Demurjian,
Thomas J. Peters,
Heidi J. C. Ellis:
Profiling in an Object-Oriented Design Environment That Supports Ada 9X and Ada 83 Code Generation.
TRI-Ada 1994: 180-190 |
1993 |
16 | EE | Heidi J. C. Ellis,
Steven A. Demurjian:
Object-Oriented Design and Analyses for Advanced Application Development: Progress Towards a New Frontier.
ACM Conference on Computer Science 1993: 332-337 |
15 | | Steven A. Demurjian,
T. C. Ting:
The Factors that Influence Apropos Security Approaches for the Object-Oriented Paradigm.
Security for Object-Oriented Systems 1993: 151-165 |
14 | EE | Karim El Guemhioui,
Steven A. Demurjian,
Thomas J. Peters:
Object-Oriented Design and Automatic Ada Code Generation in the Education of Software Engineers.
TRI-Ada 1993: 126-136 |
1992 |
13 | | M.-Y. Hu,
Steven A. Demurjian,
T. C. Ting:
User-Role Based Security Profiles for an Object-Oriented Design Model.
DBSec 1992: 333-348 |
1991 |
12 | | T. C. Ting,
Steven A. Demurjian,
M.-Y. Hu:
Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model.
DBSec 1991: 275-296 |
1990 |
11 | EE | Heidi J. C. Ellis,
Steven A. Demurjian,
Fred J. Maryanski,
George McA. Beshers,
Joan Peckham:
Extending the Behavioral Capabilities of the Object-Oriented Paradigm with an Active Model of Propagation.
ACM Conference on Computer Science 1990: 319-325 |
10 | | Greg Nichols,
Steven A. Demurjian:
Object-Oriented Database design for the Ozone Software Development Environment.
BNCOD 1990: 159-178 |
1989 |
9 | EE | Joan Peckham,
Fred J. Maryanski,
George McA. Beshers,
H. Chapman,
Steven A. Demurjian:
Constraint based analysis of database update propagation.
ICIS 1989: 9-18 |
1988 |
8 | EE | Steven A. Demurjian,
David K. Hsiao:
Towards a Better Understanding of Data Models Through the Multilingual Database System.
IEEE Trans. Software Eng. 14(7): 946-958 (1988) |
1987 |
7 | EE | Steven A. Demurjian,
David K. Hsiao:
The Multi-Lingual Database System.
ICDE 1987: 44-51 |
1986 |
6 | EE | Steven A. Demurjian,
David K. Hsiao,
Jai Menon:
A Multi-Backend Database System for Performance Gains, Capacity Growth and Hardware Upgrade.
ICDE 1986: 542-554 |
5 | | Steven A. Demurjian,
David K. Hsiao,
Paula Strawser:
Design Analysis and Performance Evaluation Methodologies for Database Computers.
Advances in Computers 25: 101-214 (1986) |
1985 |
4 | | Steven A. Demurjian,
David K. Hsiao,
Roger G. Marshall:
The Architectural Requirements and Integration Analyses of a Database Server for Office Automation.
ACM Annual Conference - The range of computing: mid-80's perspective 1985: 121-131 |
3 | | Steven A. Demurjian,
David K. Hsiao,
Douglas S. Kerr,
Robert C. Tekampe,
Robert J. Watson:
Performance Measurement Methodologies for Database Systems.
ACM Annual Conference - The range of computing: mid-80's perspective 1985: 16-28 |
2 | | Steven A. Demurjian,
David K. Hsiao,
Douglas S. Kerr,
Paula Strawser,
Robert J. Watson,
Jai Menon,
Robert C. Tekampe,
Joel Trimble:
Performance Evaluation of a Database System in Multiple Backend Configurations.
IWDM 1985: 91-111 |
1 | EE | Steven A. Demurjian,
David K. Hsiao:
Benchmarking Database Systems in Multiple Systems in Multiple Backend Configurations.
IEEE Database Eng. Bull. 8(1): 29-39 (1985) |