Search the dblp DataBase
T. C. Ting :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
M.-Y. Hu , Steven A. Demurjian , T. C. Ting User-Role Based Security Profiles for an Object-Oriented Design Model. [Citation Graph (2, 0)][DBLP ] DBSec, 1992, pp:333-348 [Conf ] T. C. Ting Some Propositions of the Entity-Relationship Model. [Citation Graph (1, 0)][DBLP ] ER, 1979, pp:541-542 [Conf ] T. C. Ting , Lee A. Becker , Z. Q. Tan U2 RS: an upgradable universal relation system. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer Science, 1988, pp:188-196 [Conf ] T. C. Ting Privacy and Confidentiality in Healthcare Delivery Information System. [Citation Graph (0, 0)][DBLP ] CBMS, 1999, pp:2-0 [Conf ] Thuong Doan , Steven A. Demurjian , T. C. Ting , Andreas Ketterl MAC and UML for secure software design. [Citation Graph (0, 0)][DBLP ] FMSE, 2004, pp:75-85 [Conf ] Thuong Doan , Steven A. Demurjian , Charles E. Phillips , T. C. Ting RBAC/MAC Security Analysis and Design for UML. [Citation Graph (0, 0)][DBLP ] DBSec, 2004, pp:189-203 [Conf ] Steven A. Demurjian , T. C. Ting , J. Balthazar , H. Ren , Charles E. Phillips , Paul Barr Role-Based Security in a Distributed Resource Environment. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:259-270 [Conf ] Steven A. Demurjian , T. A. Daggett , T. C. Ting , M.-Y. Hu URBS Enforcement Mechanisms for Object-Oriented Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 1995, pp:79-94 [Conf ] Steven A. Demurjian , T. C. Ting , Margaretha W. Price , M.-Y. Hu Extensible and Reusable Role-Based Object-Oriented Security. [Citation Graph (0, 0)][DBLP ] DBSec, 1996, pp:288-307 [Conf ] Steven A. Demurjian , T. C. Ting , John A. Reisner Software Architectural Alternatives for User Role-Based Security Policies. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:247-261 [Conf ] M. Liebrand , Heidi J. C. Ellis , Charles E. Phillips , Steven A. Demurjian , T. C. Ting Role Delegation for a Resource-Based Security Model. [Citation Graph (0, 0)][DBLP ] DBSec, 2002, pp:37-48 [Conf ] Jaime A. Pavlich-Mariscal , Thuong Doan , Laurent Michel , Steven A. Demurjian , T. C. Ting Role Slices: A Notation for RBAC Permission Assignment and Enforcement. [Citation Graph (0, 0)][DBLP ] DBSec, 2005, pp:40-53 [Conf ] M.-Y. Hu , Steven A. Demurjian , T. C. Ting Unifying Structural and Security Modeling and Analyses in the ADAM Object-Oriented Design Environment. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:77-94 [Conf ] Ion Tim Ieong , T. C. Ting An Analysis of Database Security with Queries for High Order Statistical Information. [Citation Graph (0, 0)][DBLP ] DBSec, 1988, pp:207-223 [Conf ] Charles E. Phillips , Steven A. Demurjian , T. C. Ting Safety and Liveness for an RBAC/MAC Security Model. [Citation Graph (0, 0)][DBLP ] DBSec, 2003, pp:316-329 [Conf ] Debra L. Smarkusky , Steven A. Demurjian , M. Cecilia Bastarrica , T. C. Ting Role Based Security and Java. [Citation Graph (0, 0)][DBLP ] DBSec, 1998, pp:205-219 [Conf ] Steven A. Demurjian , Y. He , T. C. Ting , M. Saba Software Agents for Role Based Security. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:79-93 [Conf ] Roshan K. Thomas , Elisa Bertino , Pierangela Samarati , Hans Hermann Brüggemann , Bret Hartman , Ravi S. Sandhu , T. C. Ting Panel Discussion: Role-Based Access Control and Next-Generation Security Models. [Citation Graph (0, 0)][DBLP ] DBSec, 1995, pp:289-298 [Conf ] T. C. Ting A User-Role Based Data Security Approach. [Citation Graph (0, 0)][DBLP ] DBSec, 1987, pp:187-208 [Conf ] T. C. Ting Application Information Security Semantics: A Case of Mental Health Delivery. [Citation Graph (0, 0)][DBLP ] DBSec, 1989, pp:1-12 [Conf ] T. C. Ting How Secure is Secure: Some Thoughts on Security Metrics. [Citation Graph (0, 0)][DBLP ] DBSec, 1995, pp:3-7 [Conf ] T. C. Ting , Steven A. Demurjian , M.-Y. Hu Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model. [Citation Graph (0, 0)][DBLP ] DBSec, 1991, pp:275-296 [Conf ] T. C. Ting , Ming-Yuh Huang , D. Shayne Pitcock , Chris Clifton , Tsau Young Lin Panel on Intrusion Detection. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:227-234 [Conf ] Dong-Guk Shin , Rohit Gupta , T. C. Ting Achieving Interoperability between Heterogeneous Object-Oriented Genomic Databases. [Citation Graph (0, 0)][DBLP ] HICSS (5), 1994, pp:77-86 [Conf ] Charles E. Phillips , Steven A. Demurjian , T. C. Ting Security Assurance for an RBAC/MAC Security Model. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:260-267 [Conf ] Steven A. Demurjian , T. C. Ting The Factors that Influence Apropos Security Approaches for the Object-Oriented Paradigm. [Citation Graph (0, 0)][DBLP ] Security for Object-Oriented Systems, 1993, pp:151-165 [Conf ] T. C. Ting Modeling Security Requirements for Applications (Panel). [Citation Graph (0, 0)][DBLP ] OOPSLA, 1993, pp:305- [Conf ] Bhavani M. Thuraisingham , Ravi S. Sandhu , T. C. Ting Security for Object-Oriented Systems: An Editorial Overview. [Citation Graph (0, 0)][DBLP ] Security for Object-Oriented Systems, 1993, pp:1-7 [Conf ] Steven A. Demurjian , T. C. Ting , M.-Y. Hu Role-based access control for object-oriented/C++ systems. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf ] Bin Li , T. C. Ting An Event-State Approach to Handling Temporal Queries in an Extended Relational Database System. [Citation Graph (0, 0)][DBLP ] RIDE-TQP, 1992, pp:218-219 [Conf ] Charles E. Phillips , T. C. Ting , Steven A. Demurjian Information sharing and security in dynamic coalitions. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:87-96 [Conf ] Thuong Doan , Laurent D. Michel , Steven A. Demurjian , T. C. Ting Stateful Design for Secure Information Systems. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:277-286 [Conf ] T. C. Ting , Y. W. Wang Multiway Replacement Selection Sort with Dynamic Reservoir. [Citation Graph (0, 0)][DBLP ] Comput. J., 1977, v:20, n:4, pp:298-301 [Journal ] Steven A. Demurjian , T. C. Ting Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1997, v:5, n:4, pp:341-382 [Journal ] Shail Arora , Mamdouh Ibrahim , Bhavani M. Thuraisingham , T. C. Ting Object-oriented technology for health care and medical information systems. [Citation Graph (0, 0)][DBLP ] OOPS Messenger, 1994, v:5, n:4, pp:122-126 [Journal ] Bhavani M. Thuraisingham , Ravi S. Sandhu , T. C. Ting Security for object-oriented systems. [Citation Graph (0, 0)][DBLP ] OOPS Messenger, 1994, v:5, n:2, pp:77-78 [Journal ] Bhavani M. Thuraisingham , T. C. Ting , Peter J. Sell , Ravi S. Sandhu , Thomas F. Keefe Integrating security technology and object-oriented technology (panel). [Citation Graph (0, 0)][DBLP ] OOPS Messenger, 1994, v:5, n:2, pp:59-61 [Journal ] Bhavani M. Thuraisingham , T. C. Ting Guest Editors' Introduction to the Special Issue on Secure Database Systems Technology. [Citation Graph (0, 1)][DBLP ] IEEE Trans. Knowl. Data Eng., 1996, v:8, n:1, pp:1-2 [Journal ] M. Jin , T. C. Ting An Object-oriented database framework for supporting product evolution. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 1998, pp:169-172 [Conf ] Impact of Computing on the World Economy: A Position Paper. [Citation Graph (, )][DBLP ] Architecture for Active Conceptual Modeling of Learning. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.458secs