dblp.uni-trier.dewww.uni-trier.de

T. C. Ting Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
42 Frederick Harris, Gordon Lee, Stuart Rubin, T. C. Ting, Billy Gaston, Gongzhu Hu: Impact of Computing on the World Economy: A Position Paper. CATA 2009: 271-277
2006
41EET. C. Ting, Peter P. Chen, Leah Y. Wong: Architecture for Active Conceptual Modeling of Learning. Active Conceptual Modeling of Learning 2006: 7-16
2005
40EEJaime A. Pavlich-Mariscal, Thuong Doan, Laurent Michel, Steven A. Demurjian, T. C. Ting: Role Slices: A Notation for RBAC Permission Assignment and Enforcement. DBSec 2005: 40-53
39 Thuong Doan, Laurent D. Michel, Steven A. Demurjian, T. C. Ting: Stateful Design for Secure Information Systems. WOSIS 2005: 277-286
2004
38 Thuong Doan, Steven A. Demurjian, Charles E. Phillips, T. C. Ting: RBAC/MAC Security Analysis and Design for UML. DBSec 2004: 189-203
37EEThuong Doan, Steven A. Demurjian, T. C. Ting, Andreas Ketterl: MAC and UML for secure software design. FMSE 2004: 75-85
2003
36 Charles E. Phillips, Steven A. Demurjian, T. C. Ting: Safety and Liveness for an RBAC/MAC Security Model. DBSec 2003: 316-329
35 Charles E. Phillips, Steven A. Demurjian, T. C. Ting: Security Assurance for an RBAC/MAC Security Model. IAW 2003: 260-267
2002
34 M. Liebrand, Heidi J. C. Ellis, Charles E. Phillips, Steven A. Demurjian, T. C. Ting: Role Delegation for a Resource-Based Security Model. DBSec 2002: 37-48
33EECharles E. Phillips, T. C. Ting, Steven A. Demurjian: Information sharing and security in dynamic coalitions. SACMAT 2002: 87-96
2000
32 Steven A. Demurjian, T. C. Ting, J. Balthazar, H. Ren, Charles E. Phillips, Paul Barr: Role-Based Security in a Distributed Resource Environment. DBSec 2000: 259-270
1999
31EET. C. Ting: Privacy and Confidentiality in Healthcare Delivery Information System. CBMS 1999: 2-
30 T. C. Ting, Ming-Yuh Huang, D. Shayne Pitcock, Chris Clifton, Tsau Young Lin: Panel on Intrusion Detection. DBSec 1999: 227-234
29 Steven A. Demurjian, Y. He, T. C. Ting, M. Saba: Software Agents for Role Based Security. DBSec 1999: 79-93
1998
28 M. Jin, T. C. Ting: An Object-oriented database framework for supporting product evolution. Computers and Their Applications 1998: 169-172
27 Debra L. Smarkusky, Steven A. Demurjian, M. Cecilia Bastarrica, T. C. Ting: Role Based Security and Java. DBSec 1998: 205-219
1997
26 Steven A. Demurjian, T. C. Ting, John A. Reisner: Software Architectural Alternatives for User Role-Based Security Policies. DBSec 1997: 247-261
25 Steven A. Demurjian, T. C. Ting: Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications. Journal of Computer Security 5(4): 341-382 (1997)
1996
24 Steven A. Demurjian, T. C. Ting, Margaretha W. Price, M.-Y. Hu: Extensible and Reusable Role-Based Object-Oriented Security. DBSec 1996: 288-307
23EEBhavani M. Thuraisingham, T. C. Ting: Guest Editors' Introduction to the Special Issue on Secure Database Systems Technology. IEEE Trans. Knowl. Data Eng. 8(1): 1-2 (1996)
1995
22EESteven A. Demurjian, T. C. Ting, M.-Y. Hu: Role-based access control for object-oriented/C++ systems. ACM Workshop on Role-Based Access Control 1995
21 Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting: Panel Discussion: Role-Based Access Control and Next-Generation Security Models. DBSec 1995: 289-298
20 T. C. Ting: How Secure is Secure: Some Thoughts on Security Metrics. DBSec 1995: 3-7
19 Steven A. Demurjian, T. A. Daggett, T. C. Ting, M.-Y. Hu: URBS Enforcement Mechanisms for Object-Oriented Systems. DBSec 1995: 79-94
1994
18 Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting: Security for Object-Oriented Systems, Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993 Springer 1994
17 M.-Y. Hu, Steven A. Demurjian, T. C. Ting: Unifying Structural and Security Modeling and Analyses in the ADAM Object-Oriented Design Environment. DBSec 1994: 77-94
16 Dong-Guk Shin, Rohit Gupta, T. C. Ting: Achieving Interoperability between Heterogeneous Object-Oriented Genomic Databases. HICSS (5) 1994: 77-86
15 Bhavani M. Thuraisingham, T. C. Ting, Peter J. Sell, Ravi S. Sandhu, Thomas F. Keefe: Integrating security technology and object-oriented technology (panel). OOPS Messenger 5(2): 59-61 (1994)
14 Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting: Security for object-oriented systems. OOPS Messenger 5(2): 77-78 (1994)
13 Shail Arora, Mamdouh Ibrahim, Bhavani M. Thuraisingham, T. C. Ting: Object-oriented technology for health care and medical information systems. OOPS Messenger 5(4): 122-126 (1994)
1993
12 T. C. Ting: Modeling Security Requirements for Applications (Panel). OOPSLA 1993: 305
11 Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting: Security for Object-Oriented Systems: An Editorial Overview. Security for Object-Oriented Systems 1993: 1-7
10 Steven A. Demurjian, T. C. Ting: The Factors that Influence Apropos Security Approaches for the Object-Oriented Paradigm. Security for Object-Oriented Systems 1993: 151-165
1992
9 M.-Y. Hu, Steven A. Demurjian, T. C. Ting: User-Role Based Security Profiles for an Object-Oriented Design Model. DBSec 1992: 333-348
8 Bin Li, T. C. Ting: An Event-State Approach to Handling Temporal Queries in an Extended Relational Database System. RIDE-TQP 1992: 218-219
1991
7 T. C. Ting, Steven A. Demurjian, M.-Y. Hu: Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model. DBSec 1991: 275-296
1989
6 T. C. Ting: Application Information Security Semantics: A Case of Mental Health Delivery. DBSec 1989: 1-12
1988
5EET. C. Ting, Lee A. Becker, Z. Q. Tan: U2RS: an upgradable universal relation system. ACM Conference on Computer Science 1988: 188-196
4 Ion Tim Ieong, T. C. Ting: An Analysis of Database Security with Queries for High Order Statistical Information. DBSec 1988: 207-223
1987
3 T. C. Ting: A User-Role Based Data Security Approach. DBSec 1987: 187-208
1979
2EET. C. Ting: Some Propositions of the Entity-Relationship Model. ER 1979: 541-542
1977
1 T. C. Ting, Y. W. Wang: Multiway Replacement Selection Sort with Dynamic Reservoir. Comput. J. 20(4): 298-301 (1977)

Coauthor Index

1Shail Arora [13]
2J. Balthazar [32]
3Paul Barr [32]
4M. Cecilia Bastarrica [27]
5Lee A. Becker [5]
6Elisa Bertino [21]
7Hans Hermann Brüggemann [21]
8Peter P. Chen [41]
9Chris Clifton (Christopher W. Clifton) [30]
10T. A. Daggett [19]
11Steven A. Demurjian [7] [9] [10] [17] [19] [22] [24] [25] [26] [27] [29] [32] [33] [34] [35] [36] [37] [38] [39] [40]
12Thuong Doan [37] [38] [39] [40]
13Heidi J. C. Ellis [34]
14Billy Gaston [42]
15Rohit Gupta [16]
16Frederick Harris [42]
17Bret Hartman [21]
18Y. He [29]
19Gongzhu Hu [42]
20M.-Y. Hu [7] [9] [17] [19] [22] [24]
21Ming-Yuh Huang [30]
22Mamdouh Ibrahim [13]
23Ion Tim Ieong [4]
24M. Jin [28]
25Thomas F. Keefe [15]
26Andreas Ketterl [37]
27Gordon Lee [42]
28Bin Li [8]
29M. Liebrand [34]
30Tsau Young Lin [30]
31Laurent D. Michel (Laurent Michel) [39] [40]
32Jaime A. Pavlich-Mariscal [40]
33Charles E. Phillips [32] [33] [34] [35] [36] [38]
34D. Shayne Pitcock [30]
35Margaretha W. Price [24]
36John A. Reisner [26]
37H. Ren [32]
38Stuart Rubin [42]
39M. Saba [29]
40Pierangela Samarati [21]
41Ravi S. Sandhu [11] [14] [15] [18] [21]
42Peter J. Sell [15]
43Dong-Guk Shin [16]
44Debra L. Smarkusky [27]
45Z. Q. Tan [5]
46Roshan K. Thomas [21]
47Bhavani M. Thuraisingham [11] [13] [14] [15] [18] [23]
48Y. W. Wang [1]
49Leah Y. Wong [41]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)