2009 | ||
---|---|---|
42 | Frederick Harris, Gordon Lee, Stuart Harvey Rubin, T. C. Ting, Billy Gaston, Gongzhu Hu: Impact of Computing on the World Economy: A Position Paper. CATA 2009: 271-277 | |
2006 | ||
41 | T. C. Ting, Peter P. Chen, Leah Y. Wong: Architecture for Active Conceptual Modeling of Learning. Active Conceptual Modeling of Learning 2006: 7-16 | |
2005 | ||
40 | Jaime A. Pavlich-Mariscal, Thuong Doan, Laurent Michel, Steven A. Demurjian, T. C. Ting: Role Slices: A Notation for RBAC Permission Assignment and Enforcement. DBSec 2005: 40-53 | |
39 | Thuong Doan, Laurent D. Michel, Steven A. Demurjian, T. C. Ting: Stateful Design for Secure Information Systems. WOSIS 2005: 277-286 | |
2004 | ||
38 | Thuong Doan, Steven A. Demurjian, Charles E. Phillips, T. C. Ting: RBAC/MAC Security Analysis and Design for UML. DBSec 2004: 189-203 | |
37 | Thuong Doan, Steven A. Demurjian, T. C. Ting, Andreas Ketterl: MAC and UML for secure software design. FMSE 2004: 75-85 | |
2003 | ||
36 | Charles E. Phillips, Steven A. Demurjian, T. C. Ting: Safety and Liveness for an RBAC/MAC Security Model. DBSec 2003: 316-329 | |
35 | Charles E. Phillips, Steven A. Demurjian, T. C. Ting: Security Assurance for an RBAC/MAC Security Model. IAW 2003: 260-267 | |
2002 | ||
34 | M. Liebrand, Heidi J. C. Ellis, Charles E. Phillips, Steven A. Demurjian, T. C. Ting: Role Delegation for a Resource-Based Security Model. DBSec 2002: 37-48 | |
33 | Charles E. Phillips, T. C. Ting, Steven A. Demurjian: Information sharing and security in dynamic coalitions. SACMAT 2002: 87-96 | |
2000 | ||
32 | Steven A. Demurjian, T. C. Ting, J. Balthazar, H. Ren, Charles E. Phillips, Paul Barr: Role-Based Security in a Distributed Resource Environment. DBSec 2000: 259-270 | |
1999 | ||
31 | T. C. Ting: Privacy and Confidentiality in Healthcare Delivery Information System. CBMS 1999: 2- | |
30 | T. C. Ting, Ming-Yuh Huang, D. Shayne Pitcock, Chris Clifton, Tsau Young Lin: Panel on Intrusion Detection. DBSec 1999: 227-234 | |
29 | Steven A. Demurjian, Y. He, T. C. Ting, M. Saba: Software Agents for Role Based Security. DBSec 1999: 79-93 | |
1998 | ||
28 | M. Jin, T. C. Ting: An Object-oriented database framework for supporting product evolution. Computers and Their Applications 1998: 169-172 | |
27 | Debra L. Smarkusky, Steven A. Demurjian, M. Cecilia Bastarrica, T. C. Ting: Role Based Security and Java. DBSec 1998: 205-219 | |
1997 | ||
26 | Steven A. Demurjian, T. C. Ting, John A. Reisner: Software Architectural Alternatives for User Role-Based Security Policies. DBSec 1997: 247-261 | |
25 | Steven A. Demurjian, T. C. Ting: Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications. Journal of Computer Security 5(4): 341-382 (1997) | |
1996 | ||
24 | Steven A. Demurjian, T. C. Ting, Margaretha W. Price, M.-Y. Hu: Extensible and Reusable Role-Based Object-Oriented Security. DBSec 1996: 288-307 | |
23 | Bhavani M. Thuraisingham, T. C. Ting: Guest Editors' Introduction to the Special Issue on Secure Database Systems Technology. IEEE Trans. Knowl. Data Eng. 8(1): 1-2 (1996) | |
1995 | ||
22 | Steven A. Demurjian, T. C. Ting, M.-Y. Hu: Role-based access control for object-oriented/C++ systems. ACM Workshop on Role-Based Access Control 1995 | |
21 | Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting: Panel Discussion: Role-Based Access Control and Next-Generation Security Models. DBSec 1995: 289-298 | |
20 | T. C. Ting: How Secure is Secure: Some Thoughts on Security Metrics. DBSec 1995: 3-7 | |
19 | Steven A. Demurjian, T. A. Daggett, T. C. Ting, M.-Y. Hu: URBS Enforcement Mechanisms for Object-Oriented Systems. DBSec 1995: 79-94 | |
1994 | ||
18 | Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting: Security for Object-Oriented Systems, Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993 Springer 1994 | |
17 | M.-Y. Hu, Steven A. Demurjian, T. C. Ting: Unifying Structural and Security Modeling and Analyses in the ADAM Object-Oriented Design Environment. DBSec 1994: 77-94 | |
16 | Dong-Guk Shin, Rohit Gupta, T. C. Ting: Achieving Interoperability between Heterogeneous Object-Oriented Genomic Databases. HICSS (5) 1994: 77-86 | |
15 | Bhavani M. Thuraisingham, T. C. Ting, Peter J. Sell, Ravi S. Sandhu, Thomas F. Keefe: Integrating security technology and object-oriented technology (panel). OOPS Messenger 5(2): 59-61 (1994) | |
14 | Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting: Security for object-oriented systems. OOPS Messenger 5(2): 77-78 (1994) | |
13 | Shail Arora, Mamdouh Ibrahim, Bhavani M. Thuraisingham, T. C. Ting: Object-oriented technology for health care and medical information systems. OOPS Messenger 5(4): 122-126 (1994) | |
1993 | ||
12 | T. C. Ting: Modeling Security Requirements for Applications (Panel). OOPSLA 1993: 305 | |
11 | Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting: Security for Object-Oriented Systems: An Editorial Overview. Security for Object-Oriented Systems 1993: 1-7 | |
10 | Steven A. Demurjian, T. C. Ting: The Factors that Influence Apropos Security Approaches for the Object-Oriented Paradigm. Security for Object-Oriented Systems 1993: 151-165 | |
1992 | ||
9 | M.-Y. Hu, Steven A. Demurjian, T. C. Ting: User-Role Based Security Profiles for an Object-Oriented Design Model. DBSec 1992: 333-348 | |
8 | Bin Li, T. C. Ting: An Event-State Approach to Handling Temporal Queries in an Extended Relational Database System. RIDE-TQP 1992: 218-219 | |
1991 | ||
7 | T. C. Ting, Steven A. Demurjian, M.-Y. Hu: Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model. DBSec 1991: 275-296 | |
1989 | ||
6 | T. C. Ting: Application Information Security Semantics: A Case of Mental Health Delivery. DBSec 1989: 1-12 | |
1988 | ||
5 | T. C. Ting, Lee A. Becker, Z. Q. Tan: U2RS: an upgradable universal relation system. ACM Conference on Computer Science 1988: 188-196 | |
4 | Ion Tim Ieong, T. C. Ting: An Analysis of Database Security with Queries for High Order Statistical Information. DBSec 1988: 207-223 | |
1987 | ||
3 | T. C. Ting: A User-Role Based Data Security Approach. DBSec 1987: 187-208 | |
1979 | ||
2 | T. C. Ting: Some Propositions of the Entity-Relationship Model. ER 1979: 541-542 | |
1977 | ||
1 | T. C. Ting, Y. W. Wang: Multiway Replacement Selection Sort with Dynamic Reservoir. Comput. J. 20(4): 298-301 (1977) |