Search the dblp DataBase
Steven A. Demurjian :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Steven A. Demurjian , David K. Hsiao , Jai Menon A Multi-Backend Database System for Performance Gains, Capacity Growth and Hardware Upgrade. [Citation Graph (6, 7)][DBLP ] ICDE, 1986, pp:542-554 [Conf ] Steven A. Demurjian , David K. Hsiao Towards a Better Understanding of Data Models Through the Multilingual Database System. [Citation Graph (5, 0)][DBLP ] IEEE Trans. Software Eng., 1988, v:14, n:7, pp:946-958 [Journal ] Steven A. Demurjian , David K. Hsiao The Multi-Lingual Database System. [Citation Graph (4, 13)][DBLP ] ICDE, 1987, pp:44-51 [Conf ] Steven A. Demurjian , David K. Hsiao , Douglas S. Kerr , Paula Strawser , Robert J. Watson , Jai Menon , Robert C. Tekampe , Joel Trimble Performance Evaluation of a Database System in Multiple Backend Configurations. [Citation Graph (3, 0)][DBLP ] IWDM, 1985, pp:91-111 [Conf ] Steven A. Demurjian , David K. Hsiao Benchmarking Database Systems in Multiple Systems in Multiple Backend Configurations. [Citation Graph (3, 0)][DBLP ] IEEE Database Eng. Bull., 1985, v:8, n:1, pp:29-39 [Journal ] M.-Y. Hu , Steven A. Demurjian , T. C. Ting User-Role Based Security Profiles for an Object-Oriented Design Model. [Citation Graph (2, 0)][DBLP ] DBSec, 1992, pp:333-348 [Conf ] Steven A. Demurjian , David K. Hsiao , Roger G. Marshall The Architectural Requirements and Integration Analyses of a Database Server for Office Automation. [Citation Graph (1, 0)][DBLP ] ACM Annual Conference - The range of computing: mid-80's perspective, 1985, pp:121-131 [Conf ] Joan Peckham , Fred J. Maryanski , Steven A. Demurjian Towards the Correctness and Consistency of Update Semantics in Semantic Database Schema. [Citation Graph (1, 24)][DBLP ] IEEE Trans. Knowl. Data Eng., 1996, v:8, n:3, pp:503-507 [Journal ] Steven A. Demurjian , David K. Hsiao , Douglas S. Kerr , Robert C. Tekampe , Robert J. Watson Performance Measurement Methodologies for Database Systems. [Citation Graph (0, 0)][DBLP ] ACM Annual Conference - The range of computing: mid-80's perspective, 1985, pp:16-28 [Conf ] Heidi J. C. Ellis , Steven A. Demurjian Object-Oriented Design and Analyses for Advanced Application Development: Progress Towards a New Frontier. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer Science, 1993, pp:332-337 [Conf ] Heidi J. C. Ellis , Steven A. Demurjian , Fred J. Maryanski , George McA. Beshers , Joan Peckham Extending the Behavioral Capabilities of the Object-Oriented Paradigm with an Active Model of Propagation. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer Science, 1990, pp:319-325 [Conf ] Anlan Song , Steven A. Demurjian , David L. Kleinman Transaction Management and Object-Oriented Modeling in a Distributed Dynamic Decision Making Environment. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer Science, 1994, pp:189-195 [Conf ] Greg Nichols , Steven A. Demurjian Object-Oriented Database design for the Ozone Software Development Environment. [Citation Graph (0, 0)][DBLP ] BNCOD, 1990, pp:159-178 [Conf ] Thuong Doan , Steven A. Demurjian , T. C. Ting , Andreas Ketterl MAC and UML for secure software design. [Citation Graph (0, 0)][DBLP ] FMSE, 2004, pp:75-85 [Conf ] Thuong Doan , Steven A. Demurjian , Charles E. Phillips , T. C. Ting RBAC/MAC Security Analysis and Design for UML. [Citation Graph (0, 0)][DBLP ] DBSec, 2004, pp:189-203 [Conf ] Steven A. Demurjian , T. C. Ting , J. Balthazar , H. Ren , Charles E. Phillips , Paul Barr Role-Based Security in a Distributed Resource Environment. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:259-270 [Conf ] Steven A. Demurjian , T. A. Daggett , T. C. Ting , M.-Y. Hu URBS Enforcement Mechanisms for Object-Oriented Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 1995, pp:79-94 [Conf ] Steven A. Demurjian , T. C. Ting , Margaretha W. Price , M.-Y. Hu Extensible and Reusable Role-Based Object-Oriented Security. [Citation Graph (0, 0)][DBLP ] DBSec, 1996, pp:288-307 [Conf ] Steven A. Demurjian , T. C. Ting , John A. Reisner Software Architectural Alternatives for User Role-Based Security Policies. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:247-261 [Conf ] M. Liebrand , Heidi J. C. Ellis , Charles E. Phillips , Steven A. Demurjian , T. C. Ting Role Delegation for a Resource-Based Security Model. [Citation Graph (0, 0)][DBLP ] DBSec, 2002, pp:37-48 [Conf ] Jaime A. Pavlich-Mariscal , Thuong Doan , Laurent Michel , Steven A. Demurjian , T. C. Ting Role Slices: A Notation for RBAC Permission Assignment and Enforcement. [Citation Graph (0, 0)][DBLP ] DBSec, 2005, pp:40-53 [Conf ] M.-Y. Hu , Steven A. Demurjian , T. C. Ting Unifying Structural and Security Modeling and Analyses in the ADAM Object-Oriented Design Environment. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:77-94 [Conf ] Charles E. Phillips , Steven A. Demurjian , T. C. Ting Safety and Liveness for an RBAC/MAC Security Model. [Citation Graph (0, 0)][DBLP ] DBSec, 2003, pp:316-329 [Conf ] Debra L. Smarkusky , Steven A. Demurjian , M. Cecilia Bastarrica , T. C. Ting Role Based Security and Java. [Citation Graph (0, 0)][DBLP ] DBSec, 1998, pp:205-219 [Conf ] Steven A. Demurjian , Y. He , T. C. Ting , M. Saba Software Agents for Role Based Security. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:79-93 [Conf ] T. C. Ting , Steven A. Demurjian , M.-Y. Hu Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model. [Citation Graph (0, 0)][DBLP ] DBSec, 1991, pp:275-296 [Conf ] Patricia J. Pia , Steven A. Demurjian Guided Generation of Use-Case-Based Software Requirements. [Citation Graph (0, 0)][DBLP ] IASSE, 2003, pp:178-182 [Conf ] Charles E. Phillips , Steven A. Demurjian , T. C. Ting Security Assurance for an RBAC/MAC Security Model. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:260-267 [Conf ] Joan Peckham , Fred J. Maryanski , George McA. Beshers , H. Chapman , Steven A. Demurjian Constraint based analysis of database update propagation. [Citation Graph (0, 0)][DBLP ] ICIS, 1989, pp:9-18 [Conf ] Rodrigo E. Caballero , Steven A. Demurjian Towards the Formalization of a Reusability Framework for Refactoring. [Citation Graph (0, 0)][DBLP ] ICSR, 2002, pp:293-308 [Conf ] Steven A. Demurjian , T. C. Ting The Factors that Influence Apropos Security Approaches for the Object-Oriented Paradigm. [Citation Graph (0, 0)][DBLP ] Security for Object-Oriented Systems, 1993, pp:151-165 [Conf ] Margaretha W. Price , Steven A. Demurjian Analyzing and Measuring Reusability in Object-Oriented Designs. [Citation Graph (0, 0)][DBLP ] OOPSLA, 1997, pp:22-33 [Conf ] M. Cecilia Bastarrica , Steven A. Demurjian , Alexander A. Shvartsman A Framework for Architectural Specification of Distributed Object Systems. [Citation Graph (0, 0)][DBLP ] OPODIS, 1999, pp:127-148 [Conf ] M. Cecilia Bastarrica , Alexander A. Shvartsman , Steven A. Demurjian A Binary Integer Programming Model for Optimal Object Distribution. [Citation Graph (0, 0)][DBLP ] OPODIS, 1998, pp:211-226 [Conf ] Steven A. Demurjian , T. C. Ting , M.-Y. Hu Role-based access control for object-oriented/C++ systems. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf ] Charles E. Phillips , T. C. Ting , Steven A. Demurjian Information sharing and security in dynamic coalitions. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:87-96 [Conf ] M. Cecilia Bastarrica , Steven A. Demurjian , Alexander A. Shvartsman Comprehensive Specification of Distributed Systems Using I5 and IOA. [Citation Graph (0, 0)][DBLP ] SCCC, 2000, pp:74-82 [Conf ] M. Cecilia Bastarrica , Steven A. Demurjian , Alexander A. Shvartsman Software Architectural Specification for Optimal Object Distribution. [Citation Graph (0, 0)][DBLP ] SCCC, 1998, pp:25-31 [Conf ] M. Cecilia Bastarrica , Rodrigo E. Caballero , Steven A. Demurjian , Alexander A. Shvartsman Two Optimization Techniques for Component-Based Systems Deployment. [Citation Graph (0, 0)][DBLP ] SEKE, 2001, pp:153-162 [Conf ] Karim El Guemhioui , Steven A. Demurjian , Thomas J. Peters Object-Oriented Design and Automatic Ada Code Generation in the Education of Software Engineers. [Citation Graph (0, 0)][DBLP ] TRI-Ada, 1993, pp:126-136 [Conf ] Karim El Guemhioui , Steven A. Demurjian , Thomas J. Peters , Heidi J. C. Ellis Profiling in an Object-Oriented Design Environment That Supports Ada 9X and Ada 83 Code Generation. [Citation Graph (0, 0)][DBLP ] TRI-Ada, 1994, pp:180-190 [Conf ] Donald M. Needham , Steven A. Demurjian , Thomas J. Peters An Ada95 Basis for Propagation Modeling. [Citation Graph (0, 0)][DBLP ] TRI-Ada, 1997, pp:263-272 [Conf ] Donald M. Needham , Steven A. Demurjian , Karim El Guemhioui , Thomas J. Peters , P. Zamani , M. McMahon , Heidi J. C. Ellis ADAM: A Language-Independent, Object-Oriented, Design Environment for Modeling Inheritance and Relationship Variants in Ada 95, C++, and Eiffel. [Citation Graph (0, 0)][DBLP ] TRI-Ada, 1996, pp:99-113 [Conf ] Donald M. Needham , Steven A. Demurjian , Thomas J. Peters Towards a distributed object-oriented propagation model using Ada95. [Citation Graph (0, 0)][DBLP ] SIGAda, 1999, pp:203-210 [Conf ] Margaretha W. Price , Steven A. Demurjian , Donald M. Needham A Reusability Measurement Framework and Tool for Ada 95. [Citation Graph (0, 0)][DBLP ] TRI-Ada, 1997, pp:125-132 [Conf ] John A. Reisner , Zeenat Lainwala , Thomas J. Peters , Steven A. Demurjian Implementing a Culling and Self-Intersection Algorithm for Stereolithography Files in Ada 95. [Citation Graph (0, 0)][DBLP ] SIGAda, 1998, pp:104-113 [Conf ] Thuong Doan , Laurent D. Michel , Steven A. Demurjian , T. C. Ting Stateful Design for Secure Information Systems. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:277-286 [Conf ] Margaretha W. Price , Donald M. Needham , Steven A. Demurjian Producing reusable object-oriented components: a domain-and-organization-specific perspective. [Citation Graph (0, 0)][DBLP ] SSR, 2001, pp:41-50 [Conf ] Jaime A. Pavlich-Mariscal , Steven A. Demurjian , Laurent D. Michel A Framework for Composable Security Definition, Assurance, and Enforcement. [Citation Graph (0, 0)][DBLP ] MoDELS Satellite Events, 2005, pp:353-354 [Conf ] Jaime A. Pavlich-Mariscal , Laurent Michel , Steven A. Demurjian A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming. [Citation Graph (0, 0)][DBLP ] MoDELS, 2005, pp:537-552 [Conf ] Steven A. Demurjian , David K. Hsiao , Paula Strawser Design Analysis and Performance Evaluation Methodologies for Database Computers. [Citation Graph (0, 0)][DBLP ] Advances in Computers, 1986, v:25, n:, pp:101-214 [Journal ] Steven A. Demurjian , T. C. Ting Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1997, v:5, n:4, pp:341-382 [Journal ] Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC. [Citation Graph (, )][DBLP ] A Framework of Composable Access Control Definition, Enforcement and Assurance. [Citation Graph (, )][DBLP ] An Integrated Ontology Framework for Health Information Exchange. [Citation Graph (, )][DBLP ] A framework of composable access control features: Preserving separation of access control concerns from models to code. [Citation Graph (, )][DBLP ] A framework for security assurance of access control enforcement code. [Citation Graph (, )][DBLP ] Search in 0.050secs, Finished in 0.055secs