The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Steven A. Demurjian: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Steven A. Demurjian, David K. Hsiao, Jai Menon
    A Multi-Backend Database System for Performance Gains, Capacity Growth and Hardware Upgrade. [Citation Graph (6, 7)][DBLP]
    ICDE, 1986, pp:542-554 [Conf]
  2. Steven A. Demurjian, David K. Hsiao
    Towards a Better Understanding of Data Models Through the Multilingual Database System. [Citation Graph (5, 0)][DBLP]
    IEEE Trans. Software Eng., 1988, v:14, n:7, pp:946-958 [Journal]
  3. Steven A. Demurjian, David K. Hsiao
    The Multi-Lingual Database System. [Citation Graph (4, 13)][DBLP]
    ICDE, 1987, pp:44-51 [Conf]
  4. Steven A. Demurjian, David K. Hsiao, Douglas S. Kerr, Paula Strawser, Robert J. Watson, Jai Menon, Robert C. Tekampe, Joel Trimble
    Performance Evaluation of a Database System in Multiple Backend Configurations. [Citation Graph (3, 0)][DBLP]
    IWDM, 1985, pp:91-111 [Conf]
  5. Steven A. Demurjian, David K. Hsiao
    Benchmarking Database Systems in Multiple Systems in Multiple Backend Configurations. [Citation Graph (3, 0)][DBLP]
    IEEE Database Eng. Bull., 1985, v:8, n:1, pp:29-39 [Journal]
  6. M.-Y. Hu, Steven A. Demurjian, T. C. Ting
    User-Role Based Security Profiles for an Object-Oriented Design Model. [Citation Graph (2, 0)][DBLP]
    DBSec, 1992, pp:333-348 [Conf]
  7. Steven A. Demurjian, David K. Hsiao, Roger G. Marshall
    The Architectural Requirements and Integration Analyses of a Database Server for Office Automation. [Citation Graph (1, 0)][DBLP]
    ACM Annual Conference - The range of computing: mid-80's perspective, 1985, pp:121-131 [Conf]
  8. Joan Peckham, Fred J. Maryanski, Steven A. Demurjian
    Towards the Correctness and Consistency of Update Semantics in Semantic Database Schema. [Citation Graph (1, 24)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1996, v:8, n:3, pp:503-507 [Journal]
  9. Steven A. Demurjian, David K. Hsiao, Douglas S. Kerr, Robert C. Tekampe, Robert J. Watson
    Performance Measurement Methodologies for Database Systems. [Citation Graph (0, 0)][DBLP]
    ACM Annual Conference - The range of computing: mid-80's perspective, 1985, pp:16-28 [Conf]
  10. Heidi J. C. Ellis, Steven A. Demurjian
    Object-Oriented Design and Analyses for Advanced Application Development: Progress Towards a New Frontier. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1993, pp:332-337 [Conf]
  11. Heidi J. C. Ellis, Steven A. Demurjian, Fred J. Maryanski, George McA. Beshers, Joan Peckham
    Extending the Behavioral Capabilities of the Object-Oriented Paradigm with an Active Model of Propagation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1990, pp:319-325 [Conf]
  12. Anlan Song, Steven A. Demurjian, David L. Kleinman
    Transaction Management and Object-Oriented Modeling in a Distributed Dynamic Decision Making Environment. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1994, pp:189-195 [Conf]
  13. Greg Nichols, Steven A. Demurjian
    Object-Oriented Database design for the Ozone Software Development Environment. [Citation Graph (0, 0)][DBLP]
    BNCOD, 1990, pp:159-178 [Conf]
  14. Thuong Doan, Steven A. Demurjian, T. C. Ting, Andreas Ketterl
    MAC and UML for secure software design. [Citation Graph (0, 0)][DBLP]
    FMSE, 2004, pp:75-85 [Conf]
  15. Thuong Doan, Steven A. Demurjian, Charles E. Phillips, T. C. Ting
    RBAC/MAC Security Analysis and Design for UML. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:189-203 [Conf]
  16. Steven A. Demurjian, T. C. Ting, J. Balthazar, H. Ren, Charles E. Phillips, Paul Barr
    Role-Based Security in a Distributed Resource Environment. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:259-270 [Conf]
  17. Steven A. Demurjian, T. A. Daggett, T. C. Ting, M.-Y. Hu
    URBS Enforcement Mechanisms for Object-Oriented Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:79-94 [Conf]
  18. Steven A. Demurjian, T. C. Ting, Margaretha W. Price, M.-Y. Hu
    Extensible and Reusable Role-Based Object-Oriented Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:288-307 [Conf]
  19. Steven A. Demurjian, T. C. Ting, John A. Reisner
    Software Architectural Alternatives for User Role-Based Security Policies. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:247-261 [Conf]
  20. M. Liebrand, Heidi J. C. Ellis, Charles E. Phillips, Steven A. Demurjian, T. C. Ting
    Role Delegation for a Resource-Based Security Model. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:37-48 [Conf]
  21. Jaime A. Pavlich-Mariscal, Thuong Doan, Laurent Michel, Steven A. Demurjian, T. C. Ting
    Role Slices: A Notation for RBAC Permission Assignment and Enforcement. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:40-53 [Conf]
  22. M.-Y. Hu, Steven A. Demurjian, T. C. Ting
    Unifying Structural and Security Modeling and Analyses in the ADAM Object-Oriented Design Environment. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:77-94 [Conf]
  23. Charles E. Phillips, Steven A. Demurjian, T. C. Ting
    Safety and Liveness for an RBAC/MAC Security Model. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:316-329 [Conf]
  24. Debra L. Smarkusky, Steven A. Demurjian, M. Cecilia Bastarrica, T. C. Ting
    Role Based Security and Java. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:205-219 [Conf]
  25. Steven A. Demurjian, Y. He, T. C. Ting, M. Saba
    Software Agents for Role Based Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:79-93 [Conf]
  26. T. C. Ting, Steven A. Demurjian, M.-Y. Hu
    Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model. [Citation Graph (0, 0)][DBLP]
    DBSec, 1991, pp:275-296 [Conf]
  27. Patricia J. Pia, Steven A. Demurjian
    Guided Generation of Use-Case-Based Software Requirements. [Citation Graph (0, 0)][DBLP]
    IASSE, 2003, pp:178-182 [Conf]
  28. Charles E. Phillips, Steven A. Demurjian, T. C. Ting
    Security Assurance for an RBAC/MAC Security Model. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:260-267 [Conf]
  29. Joan Peckham, Fred J. Maryanski, George McA. Beshers, H. Chapman, Steven A. Demurjian
    Constraint based analysis of database update propagation. [Citation Graph (0, 0)][DBLP]
    ICIS, 1989, pp:9-18 [Conf]
  30. Rodrigo E. Caballero, Steven A. Demurjian
    Towards the Formalization of a Reusability Framework for Refactoring. [Citation Graph (0, 0)][DBLP]
    ICSR, 2002, pp:293-308 [Conf]
  31. Steven A. Demurjian, T. C. Ting
    The Factors that Influence Apropos Security Approaches for the Object-Oriented Paradigm. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:151-165 [Conf]
  32. Margaretha W. Price, Steven A. Demurjian
    Analyzing and Measuring Reusability in Object-Oriented Designs. [Citation Graph (0, 0)][DBLP]
    OOPSLA, 1997, pp:22-33 [Conf]
  33. M. Cecilia Bastarrica, Steven A. Demurjian, Alexander A. Shvartsman
    A Framework for Architectural Specification of Distributed Object Systems. [Citation Graph (0, 0)][DBLP]
    OPODIS, 1999, pp:127-148 [Conf]
  34. M. Cecilia Bastarrica, Alexander A. Shvartsman, Steven A. Demurjian
    A Binary Integer Programming Model for Optimal Object Distribution. [Citation Graph (0, 0)][DBLP]
    OPODIS, 1998, pp:211-226 [Conf]
  35. Steven A. Demurjian, T. C. Ting, M.-Y. Hu
    Role-based access control for object-oriented/C++ systems. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  36. Charles E. Phillips, T. C. Ting, Steven A. Demurjian
    Information sharing and security in dynamic coalitions. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:87-96 [Conf]
  37. M. Cecilia Bastarrica, Steven A. Demurjian, Alexander A. Shvartsman
    Comprehensive Specification of Distributed Systems Using I5 and IOA. [Citation Graph (0, 0)][DBLP]
    SCCC, 2000, pp:74-82 [Conf]
  38. M. Cecilia Bastarrica, Steven A. Demurjian, Alexander A. Shvartsman
    Software Architectural Specification for Optimal Object Distribution. [Citation Graph (0, 0)][DBLP]
    SCCC, 1998, pp:25-31 [Conf]
  39. M. Cecilia Bastarrica, Rodrigo E. Caballero, Steven A. Demurjian, Alexander A. Shvartsman
    Two Optimization Techniques for Component-Based Systems Deployment. [Citation Graph (0, 0)][DBLP]
    SEKE, 2001, pp:153-162 [Conf]
  40. Karim El Guemhioui, Steven A. Demurjian, Thomas J. Peters
    Object-Oriented Design and Automatic Ada Code Generation in the Education of Software Engineers. [Citation Graph (0, 0)][DBLP]
    TRI-Ada, 1993, pp:126-136 [Conf]
  41. Karim El Guemhioui, Steven A. Demurjian, Thomas J. Peters, Heidi J. C. Ellis
    Profiling in an Object-Oriented Design Environment That Supports Ada 9X and Ada 83 Code Generation. [Citation Graph (0, 0)][DBLP]
    TRI-Ada, 1994, pp:180-190 [Conf]
  42. Donald M. Needham, Steven A. Demurjian, Thomas J. Peters
    An Ada95 Basis for Propagation Modeling. [Citation Graph (0, 0)][DBLP]
    TRI-Ada, 1997, pp:263-272 [Conf]
  43. Donald M. Needham, Steven A. Demurjian, Karim El Guemhioui, Thomas J. Peters, P. Zamani, M. McMahon, Heidi J. C. Ellis
    ADAM: A Language-Independent, Object-Oriented, Design Environment for Modeling Inheritance and Relationship Variants in Ada 95, C++, and Eiffel. [Citation Graph (0, 0)][DBLP]
    TRI-Ada, 1996, pp:99-113 [Conf]
  44. Donald M. Needham, Steven A. Demurjian, Thomas J. Peters
    Towards a distributed object-oriented propagation model using Ada95. [Citation Graph (0, 0)][DBLP]
    SIGAda, 1999, pp:203-210 [Conf]
  45. Margaretha W. Price, Steven A. Demurjian, Donald M. Needham
    A Reusability Measurement Framework and Tool for Ada 95. [Citation Graph (0, 0)][DBLP]
    TRI-Ada, 1997, pp:125-132 [Conf]
  46. John A. Reisner, Zeenat Lainwala, Thomas J. Peters, Steven A. Demurjian
    Implementing a Culling and Self-Intersection Algorithm for Stereolithography Files in Ada 95. [Citation Graph (0, 0)][DBLP]
    SIGAda, 1998, pp:104-113 [Conf]
  47. Thuong Doan, Laurent D. Michel, Steven A. Demurjian, T. C. Ting
    Stateful Design for Secure Information Systems. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:277-286 [Conf]
  48. Margaretha W. Price, Donald M. Needham, Steven A. Demurjian
    Producing reusable object-oriented components: a domain-and-organization-specific perspective. [Citation Graph (0, 0)][DBLP]
    SSR, 2001, pp:41-50 [Conf]
  49. Jaime A. Pavlich-Mariscal, Steven A. Demurjian, Laurent D. Michel
    A Framework for Composable Security Definition, Assurance, and Enforcement. [Citation Graph (0, 0)][DBLP]
    MoDELS Satellite Events, 2005, pp:353-354 [Conf]
  50. Jaime A. Pavlich-Mariscal, Laurent Michel, Steven A. Demurjian
    A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming. [Citation Graph (0, 0)][DBLP]
    MoDELS, 2005, pp:537-552 [Conf]
  51. Steven A. Demurjian, David K. Hsiao, Paula Strawser
    Design Analysis and Performance Evaluation Methodologies for Database Computers. [Citation Graph (0, 0)][DBLP]
    Advances in Computers, 1986, v:25, n:, pp:101-214 [Journal]
  52. Steven A. Demurjian, T. C. Ting
    Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1997, v:5, n:4, pp:341-382 [Journal]

  53. Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC. [Citation Graph (, )][DBLP]


  54. A Framework of Composable Access Control Definition, Enforcement and Assurance. [Citation Graph (, )][DBLP]


  55. An Integrated Ontology Framework for Health Information Exchange. [Citation Graph (, )][DBLP]


  56. A framework of composable access control features: Preserving separation of access control concerns from models to code. [Citation Graph (, )][DBLP]


  57. A framework for security assurance of access control enforcement code. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.455secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002