2009 |
42 | | Frederick Harris,
Gordon Lee,
Stuart Rubin,
T. C. Ting,
Billy Gaston,
Gongzhu Hu:
Impact of Computing on the World Economy: A Position Paper.
CATA 2009: 271-277 |
2006 |
41 | EE | T. C. Ting,
Peter P. Chen,
Leah Y. Wong:
Architecture for Active Conceptual Modeling of Learning.
Active Conceptual Modeling of Learning 2006: 7-16 |
2005 |
40 | EE | Jaime A. Pavlich-Mariscal,
Thuong Doan,
Laurent Michel,
Steven A. Demurjian,
T. C. Ting:
Role Slices: A Notation for RBAC Permission Assignment and Enforcement.
DBSec 2005: 40-53 |
39 | | Thuong Doan,
Laurent D. Michel,
Steven A. Demurjian,
T. C. Ting:
Stateful Design for Secure Information Systems.
WOSIS 2005: 277-286 |
2004 |
38 | | Thuong Doan,
Steven A. Demurjian,
Charles E. Phillips,
T. C. Ting:
RBAC/MAC Security Analysis and Design for UML.
DBSec 2004: 189-203 |
37 | EE | Thuong Doan,
Steven A. Demurjian,
T. C. Ting,
Andreas Ketterl:
MAC and UML for secure software design.
FMSE 2004: 75-85 |
2003 |
36 | | Charles E. Phillips,
Steven A. Demurjian,
T. C. Ting:
Safety and Liveness for an RBAC/MAC Security Model.
DBSec 2003: 316-329 |
35 | | Charles E. Phillips,
Steven A. Demurjian,
T. C. Ting:
Security Assurance for an RBAC/MAC Security Model.
IAW 2003: 260-267 |
2002 |
34 | | M. Liebrand,
Heidi J. C. Ellis,
Charles E. Phillips,
Steven A. Demurjian,
T. C. Ting:
Role Delegation for a Resource-Based Security Model.
DBSec 2002: 37-48 |
33 | EE | Charles E. Phillips,
T. C. Ting,
Steven A. Demurjian:
Information sharing and security in dynamic coalitions.
SACMAT 2002: 87-96 |
2000 |
32 | | Steven A. Demurjian,
T. C. Ting,
J. Balthazar,
H. Ren,
Charles E. Phillips,
Paul Barr:
Role-Based Security in a Distributed Resource Environment.
DBSec 2000: 259-270 |
1999 |
31 | EE | T. C. Ting:
Privacy and Confidentiality in Healthcare Delivery Information System.
CBMS 1999: 2- |
30 | | T. C. Ting,
Ming-Yuh Huang,
D. Shayne Pitcock,
Chris Clifton,
Tsau Young Lin:
Panel on Intrusion Detection.
DBSec 1999: 227-234 |
29 | | Steven A. Demurjian,
Y. He,
T. C. Ting,
M. Saba:
Software Agents for Role Based Security.
DBSec 1999: 79-93 |
1998 |
28 | | M. Jin,
T. C. Ting:
An Object-oriented database framework for supporting product evolution.
Computers and Their Applications 1998: 169-172 |
27 | | Debra L. Smarkusky,
Steven A. Demurjian,
M. Cecilia Bastarrica,
T. C. Ting:
Role Based Security and Java.
DBSec 1998: 205-219 |
1997 |
26 | | Steven A. Demurjian,
T. C. Ting,
John A. Reisner:
Software Architectural Alternatives for User Role-Based Security Policies.
DBSec 1997: 247-261 |
25 | | Steven A. Demurjian,
T. C. Ting:
Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications.
Journal of Computer Security 5(4): 341-382 (1997) |
1996 |
24 | | Steven A. Demurjian,
T. C. Ting,
Margaretha W. Price,
M.-Y. Hu:
Extensible and Reusable Role-Based Object-Oriented Security.
DBSec 1996: 288-307 |
23 | EE | Bhavani M. Thuraisingham,
T. C. Ting:
Guest Editors' Introduction to the Special Issue on Secure Database Systems Technology.
IEEE Trans. Knowl. Data Eng. 8(1): 1-2 (1996) |
1995 |
22 | EE | Steven A. Demurjian,
T. C. Ting,
M.-Y. Hu:
Role-based access control for object-oriented/C++ systems.
ACM Workshop on Role-Based Access Control 1995 |
21 | | Roshan K. Thomas,
Elisa Bertino,
Pierangela Samarati,
Hans Hermann Brüggemann,
Bret Hartman,
Ravi S. Sandhu,
T. C. Ting:
Panel Discussion: Role-Based Access Control and Next-Generation Security Models.
DBSec 1995: 289-298 |
20 | | T. C. Ting:
How Secure is Secure: Some Thoughts on Security Metrics.
DBSec 1995: 3-7 |
19 | | Steven A. Demurjian,
T. A. Daggett,
T. C. Ting,
M.-Y. Hu:
URBS Enforcement Mechanisms for Object-Oriented Systems.
DBSec 1995: 79-94 |
1994 |
18 | | Bhavani M. Thuraisingham,
Ravi S. Sandhu,
T. C. Ting:
Security for Object-Oriented Systems, Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993
Springer 1994 |
17 | | M.-Y. Hu,
Steven A. Demurjian,
T. C. Ting:
Unifying Structural and Security Modeling and Analyses in the ADAM Object-Oriented Design Environment.
DBSec 1994: 77-94 |
16 | | Dong-Guk Shin,
Rohit Gupta,
T. C. Ting:
Achieving Interoperability between Heterogeneous Object-Oriented Genomic Databases.
HICSS (5) 1994: 77-86 |
15 | | Bhavani M. Thuraisingham,
T. C. Ting,
Peter J. Sell,
Ravi S. Sandhu,
Thomas F. Keefe:
Integrating security technology and object-oriented technology (panel).
OOPS Messenger 5(2): 59-61 (1994) |
14 | | Bhavani M. Thuraisingham,
Ravi S. Sandhu,
T. C. Ting:
Security for object-oriented systems.
OOPS Messenger 5(2): 77-78 (1994) |
13 | | Shail Arora,
Mamdouh Ibrahim,
Bhavani M. Thuraisingham,
T. C. Ting:
Object-oriented technology for health care and medical information systems.
OOPS Messenger 5(4): 122-126 (1994) |
1993 |
12 | | T. C. Ting:
Modeling Security Requirements for Applications (Panel).
OOPSLA 1993: 305 |
11 | | Bhavani M. Thuraisingham,
Ravi S. Sandhu,
T. C. Ting:
Security for Object-Oriented Systems: An Editorial Overview.
Security for Object-Oriented Systems 1993: 1-7 |
10 | | Steven A. Demurjian,
T. C. Ting:
The Factors that Influence Apropos Security Approaches for the Object-Oriented Paradigm.
Security for Object-Oriented Systems 1993: 151-165 |
1992 |
9 | | M.-Y. Hu,
Steven A. Demurjian,
T. C. Ting:
User-Role Based Security Profiles for an Object-Oriented Design Model.
DBSec 1992: 333-348 |
8 | | Bin Li,
T. C. Ting:
An Event-State Approach to Handling Temporal Queries in an Extended Relational Database System.
RIDE-TQP 1992: 218-219 |
1991 |
7 | | T. C. Ting,
Steven A. Demurjian,
M.-Y. Hu:
Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model.
DBSec 1991: 275-296 |
1989 |
6 | | T. C. Ting:
Application Information Security Semantics: A Case of Mental Health Delivery.
DBSec 1989: 1-12 |
1988 |
5 | EE | T. C. Ting,
Lee A. Becker,
Z. Q. Tan:
U2RS: an upgradable universal relation system.
ACM Conference on Computer Science 1988: 188-196 |
4 | | Ion Tim Ieong,
T. C. Ting:
An Analysis of Database Security with Queries for High Order Statistical Information.
DBSec 1988: 207-223 |
1987 |
3 | | T. C. Ting:
A User-Role Based Data Security Approach.
DBSec 1987: 187-208 |
1979 |
2 | EE | T. C. Ting:
Some Propositions of the Entity-Relationship Model.
ER 1979: 541-542 |
1977 |
1 | | T. C. Ting,
Y. W. Wang:
Multiway Replacement Selection Sort with Dynamic Reservoir.
Comput. J. 20(4): 298-301 (1977) |