| 2009 |
| 42 | | Frederick Harris,
Gordon Lee,
Stuart Rubin,
T. C. Ting,
Billy Gaston,
Gongzhu Hu:
Impact of Computing on the World Economy: A Position Paper.
CATA 2009: 271-277 |
| 2006 |
| 41 | EE | T. C. Ting,
Peter P. Chen,
Leah Y. Wong:
Architecture for Active Conceptual Modeling of Learning.
Active Conceptual Modeling of Learning 2006: 7-16 |
| 2005 |
| 40 | EE | Jaime A. Pavlich-Mariscal,
Thuong Doan,
Laurent Michel,
Steven A. Demurjian,
T. C. Ting:
Role Slices: A Notation for RBAC Permission Assignment and Enforcement.
DBSec 2005: 40-53 |
| 39 | | Thuong Doan,
Laurent D. Michel,
Steven A. Demurjian,
T. C. Ting:
Stateful Design for Secure Information Systems.
WOSIS 2005: 277-286 |
| 2004 |
| 38 | | Thuong Doan,
Steven A. Demurjian,
Charles E. Phillips,
T. C. Ting:
RBAC/MAC Security Analysis and Design for UML.
DBSec 2004: 189-203 |
| 37 | EE | Thuong Doan,
Steven A. Demurjian,
T. C. Ting,
Andreas Ketterl:
MAC and UML for secure software design.
FMSE 2004: 75-85 |
| 2003 |
| 36 | | Charles E. Phillips,
Steven A. Demurjian,
T. C. Ting:
Safety and Liveness for an RBAC/MAC Security Model.
DBSec 2003: 316-329 |
| 35 | | Charles E. Phillips,
Steven A. Demurjian,
T. C. Ting:
Security Assurance for an RBAC/MAC Security Model.
IAW 2003: 260-267 |
| 2002 |
| 34 | | M. Liebrand,
Heidi J. C. Ellis,
Charles E. Phillips,
Steven A. Demurjian,
T. C. Ting:
Role Delegation for a Resource-Based Security Model.
DBSec 2002: 37-48 |
| 33 | EE | Charles E. Phillips,
T. C. Ting,
Steven A. Demurjian:
Information sharing and security in dynamic coalitions.
SACMAT 2002: 87-96 |
| 2000 |
| 32 | | Steven A. Demurjian,
T. C. Ting,
J. Balthazar,
H. Ren,
Charles E. Phillips,
Paul Barr:
Role-Based Security in a Distributed Resource Environment.
DBSec 2000: 259-270 |
| 1999 |
| 31 | EE | T. C. Ting:
Privacy and Confidentiality in Healthcare Delivery Information System.
CBMS 1999: 2- |
| 30 | | T. C. Ting,
Ming-Yuh Huang,
D. Shayne Pitcock,
Chris Clifton,
Tsau Young Lin:
Panel on Intrusion Detection.
DBSec 1999: 227-234 |
| 29 | | Steven A. Demurjian,
Y. He,
T. C. Ting,
M. Saba:
Software Agents for Role Based Security.
DBSec 1999: 79-93 |
| 1998 |
| 28 | | M. Jin,
T. C. Ting:
An Object-oriented database framework for supporting product evolution.
Computers and Their Applications 1998: 169-172 |
| 27 | | Debra L. Smarkusky,
Steven A. Demurjian,
M. Cecilia Bastarrica,
T. C. Ting:
Role Based Security and Java.
DBSec 1998: 205-219 |
| 1997 |
| 26 | | Steven A. Demurjian,
T. C. Ting,
John A. Reisner:
Software Architectural Alternatives for User Role-Based Security Policies.
DBSec 1997: 247-261 |
| 25 | | Steven A. Demurjian,
T. C. Ting:
Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications.
Journal of Computer Security 5(4): 341-382 (1997) |
| 1996 |
| 24 | | Steven A. Demurjian,
T. C. Ting,
Margaretha W. Price,
M.-Y. Hu:
Extensible and Reusable Role-Based Object-Oriented Security.
DBSec 1996: 288-307 |
| 23 | EE | Bhavani M. Thuraisingham,
T. C. Ting:
Guest Editors' Introduction to the Special Issue on Secure Database Systems Technology.
IEEE Trans. Knowl. Data Eng. 8(1): 1-2 (1996) |
| 1995 |
| 22 | EE | Steven A. Demurjian,
T. C. Ting,
M.-Y. Hu:
Role-based access control for object-oriented/C++ systems.
ACM Workshop on Role-Based Access Control 1995 |
| 21 | | Roshan K. Thomas,
Elisa Bertino,
Pierangela Samarati,
Hans Hermann Brüggemann,
Bret Hartman,
Ravi S. Sandhu,
T. C. Ting:
Panel Discussion: Role-Based Access Control and Next-Generation Security Models.
DBSec 1995: 289-298 |
| 20 | | T. C. Ting:
How Secure is Secure: Some Thoughts on Security Metrics.
DBSec 1995: 3-7 |
| 19 | | Steven A. Demurjian,
T. A. Daggett,
T. C. Ting,
M.-Y. Hu:
URBS Enforcement Mechanisms for Object-Oriented Systems.
DBSec 1995: 79-94 |
| 1994 |
| 18 | | Bhavani M. Thuraisingham,
Ravi S. Sandhu,
T. C. Ting:
Security for Object-Oriented Systems, Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993
Springer 1994 |
| 17 | | M.-Y. Hu,
Steven A. Demurjian,
T. C. Ting:
Unifying Structural and Security Modeling and Analyses in the ADAM Object-Oriented Design Environment.
DBSec 1994: 77-94 |
| 16 | | Dong-Guk Shin,
Rohit Gupta,
T. C. Ting:
Achieving Interoperability between Heterogeneous Object-Oriented Genomic Databases.
HICSS (5) 1994: 77-86 |
| 15 | | Bhavani M. Thuraisingham,
T. C. Ting,
Peter J. Sell,
Ravi S. Sandhu,
Thomas F. Keefe:
Integrating security technology and object-oriented technology (panel).
OOPS Messenger 5(2): 59-61 (1994) |
| 14 | | Bhavani M. Thuraisingham,
Ravi S. Sandhu,
T. C. Ting:
Security for object-oriented systems.
OOPS Messenger 5(2): 77-78 (1994) |
| 13 | | Shail Arora,
Mamdouh Ibrahim,
Bhavani M. Thuraisingham,
T. C. Ting:
Object-oriented technology for health care and medical information systems.
OOPS Messenger 5(4): 122-126 (1994) |
| 1993 |
| 12 | | T. C. Ting:
Modeling Security Requirements for Applications (Panel).
OOPSLA 1993: 305 |
| 11 | | Bhavani M. Thuraisingham,
Ravi S. Sandhu,
T. C. Ting:
Security for Object-Oriented Systems: An Editorial Overview.
Security for Object-Oriented Systems 1993: 1-7 |
| 10 | | Steven A. Demurjian,
T. C. Ting:
The Factors that Influence Apropos Security Approaches for the Object-Oriented Paradigm.
Security for Object-Oriented Systems 1993: 151-165 |
| 1992 |
| 9 | | M.-Y. Hu,
Steven A. Demurjian,
T. C. Ting:
User-Role Based Security Profiles for an Object-Oriented Design Model.
DBSec 1992: 333-348 |
| 8 | | Bin Li,
T. C. Ting:
An Event-State Approach to Handling Temporal Queries in an Extended Relational Database System.
RIDE-TQP 1992: 218-219 |
| 1991 |
| 7 | | T. C. Ting,
Steven A. Demurjian,
M.-Y. Hu:
Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model.
DBSec 1991: 275-296 |
| 1989 |
| 6 | | T. C. Ting:
Application Information Security Semantics: A Case of Mental Health Delivery.
DBSec 1989: 1-12 |
| 1988 |
| 5 | EE | T. C. Ting,
Lee A. Becker,
Z. Q. Tan:
U2RS: an upgradable universal relation system.
ACM Conference on Computer Science 1988: 188-196 |
| 4 | | Ion Tim Ieong,
T. C. Ting:
An Analysis of Database Security with Queries for High Order Statistical Information.
DBSec 1988: 207-223 |
| 1987 |
| 3 | | T. C. Ting:
A User-Role Based Data Security Approach.
DBSec 1987: 187-208 |
| 1979 |
| 2 | EE | T. C. Ting:
Some Propositions of the Entity-Relationship Model.
ER 1979: 541-542 |
| 1977 |
| 1 | | T. C. Ting,
Y. W. Wang:
Multiway Replacement Selection Sort with Dynamic Reservoir.
Comput. J. 20(4): 298-301 (1977) |