The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

T. C. Ting: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. M.-Y. Hu, Steven A. Demurjian, T. C. Ting
    User-Role Based Security Profiles for an Object-Oriented Design Model. [Citation Graph (2, 0)][DBLP]
    DBSec, 1992, pp:333-348 [Conf]
  2. T. C. Ting
    Some Propositions of the Entity-Relationship Model. [Citation Graph (1, 0)][DBLP]
    ER, 1979, pp:541-542 [Conf]
  3. T. C. Ting, Lee A. Becker, Z. Q. Tan
    U2RS: an upgradable universal relation system. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1988, pp:188-196 [Conf]
  4. T. C. Ting
    Privacy and Confidentiality in Healthcare Delivery Information System. [Citation Graph (0, 0)][DBLP]
    CBMS, 1999, pp:2-0 [Conf]
  5. Thuong Doan, Steven A. Demurjian, T. C. Ting, Andreas Ketterl
    MAC and UML for secure software design. [Citation Graph (0, 0)][DBLP]
    FMSE, 2004, pp:75-85 [Conf]
  6. Thuong Doan, Steven A. Demurjian, Charles E. Phillips, T. C. Ting
    RBAC/MAC Security Analysis and Design for UML. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:189-203 [Conf]
  7. Steven A. Demurjian, T. C. Ting, J. Balthazar, H. Ren, Charles E. Phillips, Paul Barr
    Role-Based Security in a Distributed Resource Environment. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:259-270 [Conf]
  8. Steven A. Demurjian, T. A. Daggett, T. C. Ting, M.-Y. Hu
    URBS Enforcement Mechanisms for Object-Oriented Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:79-94 [Conf]
  9. Steven A. Demurjian, T. C. Ting, Margaretha W. Price, M.-Y. Hu
    Extensible and Reusable Role-Based Object-Oriented Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:288-307 [Conf]
  10. Steven A. Demurjian, T. C. Ting, John A. Reisner
    Software Architectural Alternatives for User Role-Based Security Policies. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:247-261 [Conf]
  11. M. Liebrand, Heidi J. C. Ellis, Charles E. Phillips, Steven A. Demurjian, T. C. Ting
    Role Delegation for a Resource-Based Security Model. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:37-48 [Conf]
  12. Jaime A. Pavlich-Mariscal, Thuong Doan, Laurent Michel, Steven A. Demurjian, T. C. Ting
    Role Slices: A Notation for RBAC Permission Assignment and Enforcement. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:40-53 [Conf]
  13. M.-Y. Hu, Steven A. Demurjian, T. C. Ting
    Unifying Structural and Security Modeling and Analyses in the ADAM Object-Oriented Design Environment. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:77-94 [Conf]
  14. Ion Tim Ieong, T. C. Ting
    An Analysis of Database Security with Queries for High Order Statistical Information. [Citation Graph (0, 0)][DBLP]
    DBSec, 1988, pp:207-223 [Conf]
  15. Charles E. Phillips, Steven A. Demurjian, T. C. Ting
    Safety and Liveness for an RBAC/MAC Security Model. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:316-329 [Conf]
  16. Debra L. Smarkusky, Steven A. Demurjian, M. Cecilia Bastarrica, T. C. Ting
    Role Based Security and Java. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:205-219 [Conf]
  17. Steven A. Demurjian, Y. He, T. C. Ting, M. Saba
    Software Agents for Role Based Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:79-93 [Conf]
  18. Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting
    Panel Discussion: Role-Based Access Control and Next-Generation Security Models. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:289-298 [Conf]
  19. T. C. Ting
    A User-Role Based Data Security Approach. [Citation Graph (0, 0)][DBLP]
    DBSec, 1987, pp:187-208 [Conf]
  20. T. C. Ting
    Application Information Security Semantics: A Case of Mental Health Delivery. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:1-12 [Conf]
  21. T. C. Ting
    How Secure is Secure: Some Thoughts on Security Metrics. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:3-7 [Conf]
  22. T. C. Ting, Steven A. Demurjian, M.-Y. Hu
    Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model. [Citation Graph (0, 0)][DBLP]
    DBSec, 1991, pp:275-296 [Conf]
  23. T. C. Ting, Ming-Yuh Huang, D. Shayne Pitcock, Chris Clifton, Tsau Young Lin
    Panel on Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:227-234 [Conf]
  24. Dong-Guk Shin, Rohit Gupta, T. C. Ting
    Achieving Interoperability between Heterogeneous Object-Oriented Genomic Databases. [Citation Graph (0, 0)][DBLP]
    HICSS (5), 1994, pp:77-86 [Conf]
  25. Charles E. Phillips, Steven A. Demurjian, T. C. Ting
    Security Assurance for an RBAC/MAC Security Model. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:260-267 [Conf]
  26. Steven A. Demurjian, T. C. Ting
    The Factors that Influence Apropos Security Approaches for the Object-Oriented Paradigm. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:151-165 [Conf]
  27. T. C. Ting
    Modeling Security Requirements for Applications (Panel). [Citation Graph (0, 0)][DBLP]
    OOPSLA, 1993, pp:305- [Conf]
  28. Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting
    Security for Object-Oriented Systems: An Editorial Overview. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:1-7 [Conf]
  29. Steven A. Demurjian, T. C. Ting, M.-Y. Hu
    Role-based access control for object-oriented/C++ systems. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  30. Bin Li, T. C. Ting
    An Event-State Approach to Handling Temporal Queries in an Extended Relational Database System. [Citation Graph (0, 0)][DBLP]
    RIDE-TQP, 1992, pp:218-219 [Conf]
  31. Charles E. Phillips, T. C. Ting, Steven A. Demurjian
    Information sharing and security in dynamic coalitions. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:87-96 [Conf]
  32. Thuong Doan, Laurent D. Michel, Steven A. Demurjian, T. C. Ting
    Stateful Design for Secure Information Systems. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:277-286 [Conf]
  33. T. C. Ting, Y. W. Wang
    Multiway Replacement Selection Sort with Dynamic Reservoir. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1977, v:20, n:4, pp:298-301 [Journal]
  34. Steven A. Demurjian, T. C. Ting
    Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1997, v:5, n:4, pp:341-382 [Journal]
  35. Shail Arora, Mamdouh Ibrahim, Bhavani M. Thuraisingham, T. C. Ting
    Object-oriented technology for health care and medical information systems. [Citation Graph (0, 0)][DBLP]
    OOPS Messenger, 1994, v:5, n:4, pp:122-126 [Journal]
  36. Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting
    Security for object-oriented systems. [Citation Graph (0, 0)][DBLP]
    OOPS Messenger, 1994, v:5, n:2, pp:77-78 [Journal]
  37. Bhavani M. Thuraisingham, T. C. Ting, Peter J. Sell, Ravi S. Sandhu, Thomas F. Keefe
    Integrating security technology and object-oriented technology (panel). [Citation Graph (0, 0)][DBLP]
    OOPS Messenger, 1994, v:5, n:2, pp:59-61 [Journal]
  38. Bhavani M. Thuraisingham, T. C. Ting
    Guest Editors' Introduction to the Special Issue on Secure Database Systems Technology. [Citation Graph (0, 1)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1996, v:8, n:1, pp:1-2 [Journal]
  39. M. Jin, T. C. Ting
    An Object-oriented database framework for supporting product evolution. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 1998, pp:169-172 [Conf]

  40. Impact of Computing on the World Economy: A Position Paper. [Citation Graph (, )][DBLP]


  41. Architecture for Active Conceptual Modeling of Learning. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.458secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002