关注
Steven Demurjian
Steven Demurjian
Computer Science & Engineering, University of Connecticut
在 uconn.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Information sharing and security in dynamic coalitions
CE Phillips Jr, TC Ting, SA Demurjian
Proceedings of the seventh ACM symposium on Access control models and …, 2002
1462002
Requirements, capabilities, and functionalities of user-role based security for an object-oriented design model
TC Ting, SA Demurjian, MY Hu
Results of the IFIP WG 11.3 Workshop on Database Security V: Status and …, 1991
1001991
MAC and UML for secure software design
T Doan, S Demurjian, TC Ting, A Ketterl
Proceedings of the 2004 ACM workshop on Formal Methods in Security …, 2004
762004
A Binary Integer Programming Model for Optimal Object Distribution.
MC Bastarrica, AA Shvartsman, SA Demurjian
OPODIS, 211-226, 1998
531998
Enhancing UML to model custom security aspects
J Pavlich-Mariscal, L Michel, S Demurjian
Proceedings of the 11th International Workshop on Aspect-Oriented Modeling …, 2007
482007
A multi-backend database system for performance gains, capacity growth and hardware upgrade
SA Demurjian, DK Hsiao, J Menon
1986 IEEE Second International Conference on Data Engineering, 542-554, 1986
431986
A security framework for XML schemas and documents for healthcare
A De la Rosa Algarin, SA Demurjian, S Berhe, JA Pavlich-Mariscal
2012 IEEE International Conference on Bioinformatics and Biomedicine …, 2012
382012
Towards information assurance in dynamic coalitions
C Phillips, S Demurjian, TC Ting
IEEE IAW, USMA, 2002
362002
Towards a better understanding of data models through the multilingual database system
SA Demurjian, DK Hsiao
IEEE transactions on software engineering 14 (7), 946-958, 1988
361988
User-role based security in the ADAM object-oriented design and analyses environment
MY Hu, SA Demurjian, TC Ting
Database Security VIII: Status and Prospects. North-Holland, 1995
351995
The multi-lingual database system
SA Demurjian, DK Hsiao
1987 IEEE Third International Conference on Data Engineering, 44-51, 1987
351987
A framework of composable access control features: Preserving separation of access control concerns from models to code
JA Pavlich-Mariscal, SA Demurjian, LD Michel
Computers & Security 29 (3), 350-379, 2010
332010
User-role based security profile for an object-oriented design model
MY Hu, SA Demurjian, TC Ting
Results of the Sixth Working Conference of IFIP Working Group 11.3 on …, 1993
331993
New directions in database-systems research and development
SA Demurjian, DK Hsiao
Monterey, California. Naval Postgraduate School, 1985
281985
Towards a definitive paradigm for security in object-oriented systems and applications
SA Demurjian Sr, TC Ting
Journal of Computer Security 5 (4), 341-382, 1997
261997
Software Engineering: Effective Teaching and Learning Approaches and Practices: Effective Teaching and Learning Approaches and Practices
HJC Ellis, SA Demurjian, JF Naveda
IGI Global, 2008
242008
Role slices: A notation for rbac permission assignment and enforcement
JA Pavlich-Mariscal, T Doan, L Michel, SA Demurjian, TC Ting
Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working …, 2005
232005
Performance evaluation of a database system in multiple backend configurations
SA Demurjian, DK Hsiao, DS Kerr, J Menon, PR Strawser, RC Tekampe, ...
Database Machines: Fourth International Workshop Grand Bahama Island, March …, 1985
231985
A formal enforcement framework for role-based access control using aspect-oriented programming
J Pavlich-Mariscal, L Michel, S Demurjian
Model Driven Engineering Languages and Systems: 8th International Conference …, 2005
222005
A framework for security assurance of access control enforcement code
JA Pavlich-Mariscal, SA Demurjian, LD Michel
Computers & Security 29 (7), 770-784, 2010
202010
系统目前无法执行此操作,请稍后再试。
文章 1–20