Steven A. Demurjian

According to our database1, Steven A. Demurjian authored at least 81 papers between 1985 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
Semantic Reconciliation of Electronic Health Records Using Semantic Web Technologies.
IJITWE, 2017

Attaining Role-Based, Mandatory, and Discretionary Access Control for Services by Intercepting API Calls in Mobile Systems.
Proceedings of the Web Information Systems and Technologies, 2017

An Intercepting API-Based Access Control Approach for Mobile Applications.
Proceedings of the 13th International Conference on Web Information Systems and Technologies, 2017

Integrating Trust Profiles, Trust Negotiation, and Attribute Based Access Control.
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017

Achieving RBAC on RESTful APIs for Mobile Apps Using FHIR.
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017

2016
CartograTree: Enabling landscape genomics for forest trees.
PeerJ PrePrints, 2016

Extending the UML Standards to Model Tree-Structured Data and Their Access Control Requirements.
Proceedings of the Security Standardisation Research - Third International Conference, 2016

2015
HOD2MLC: Hybrid Ontology Design and Development Model with Lifecycle.
IJITWE, 2015

2013
A Software Modeling Approach to Ontology Design via Extensions to ODM and OWL.
Int. J. Semantic Web Inf. Syst., 2013

Generating XACML Enforcement Policies for Role-Based Access Control of XML Documents.
Proceedings of the Web Information Systems and Technologies - 9th International Conference, 2013

Defining and Enforcing XACML Role-based Security Policies within an XML Security Framework.
Proceedings of the WEBIST 2013, 2013

2012
SMARTSync: Towards patient-driven medication reconciliation.
Proceedings of the 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2012

A proposed star schema and extraction process to enhance the collection of contextual & semantic information for clinical research data warehouses.
Proceedings of the 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2012

A security framework for XML schemas and documents for healthcare.
Proceedings of the 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2012

2011
Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

2010
Integrating Access Control into UML for Secure Software Modeling and Analysis.
IJSSE, 2010

A framework for security assurance of access control enforcement code.
Computers & Security, 2010

A framework of composable access control features: Preserving separation of access control concerns from models to code.
Computers & Security, 2010

2009
Granular Computing, Information Models for.
Proceedings of the Encyclopedia of Complexity and Systems Science, 2009

Assessment of candidate information models for granular computing.
IJGCRSIS, 2009

An Integrated Ontology Framework for Health Information Exchange.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009

Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC.
Proceedings of the Data and Applications Security XXIII, 2009

2008
A Framework of Composable Access Control Definition, Enforcement and Assurance.
Proceedings of the XXVII International Conference of the Chilean Computer Science Society (SCCC 2008), 2008

2006
Analysis of Heterogeneous Data in Ultrahigh Dimensions.
Proceedings of the Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006

2005
A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming.
Proceedings of the Model Driven Engineering Languages and Systems, 2005

A Framework for Composable Security Definition, Assurance, and Enforcement.
Proceedings of the Satellite Events at the MoDELS 2005 Conference, 2005

Stateful Design for Secure Information Systems.
Proceedings of the Security in Information Systems, 2005

Role Slices: A Notation for RBAC Permission Assignment and Enforcement.
Proceedings of the Data and Applications Security XIX, 2005

2004
RBAC/MAC Security Analysis and Design for UML.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

MAC and UML for secure software design.
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, 2004

2003
Security Assurance for an RBAC/MAC Security Model.
Proceedings of the IEEE Systems, 2003

Guided Generation of Use-Case-Based Software Requirements.
Proceedings of the 12th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2003

Safety and Liveness for an RBAC/MAC Security Model.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

2002
Information sharing and security in dynamic coalitions.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Towards the Formalization of a Reusability Framework for Refactoring.
Proceedings of the Software Reuse: Methods, 2002

Role Delegation for a Resource-Based Security Model.
Proceedings of the Research Directions in Data and Applications Security, 2002

2001
Producing reusable object-oriented components: a domain-and-organization-specific perspective.
SSR, 2001

Two Optimization Techniques for Component-Based Systems Deployment.
Proceedings of the Thirteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2001), 2001

2000
Comprehensive Specification of Distributed Systems Using I5 and IOA.
Proceedings of the 20st International Conference of the Chilean Computer Science Society (SCCC 2000), 2000

Role-Based Security in a Distributed Resource Environment.
Proceedings of the Data and Application Security, 2000

1999
Towards a distributed object-oriented propagation model using Ada95.
SIGAda, 1999

A Framework for Architectural Specification of Distributed Object Systems.
Proceedings of the Procedings of the 3rd International Conference on Principles of Distributed Systems. OPODIS 99, 1999

Software Agents for Role Based Security.
Proceedings of the Research Advances in Database and Information Systems Security, 1999

1998
Implementing a Culling and Self-Intersection Algorithm for Stereolithography Files in Ada 95.
SIGAda, 1998

Software Architectural Specification for Optimal Object Distribution.
Proceedings of 18th International Conference of the Chilean Computer Science Society (SCCC '98), 1998

A Binary Integer Programming Model for Optimal Object Distribution.
Proceedings of the Distributed Computing, 1998

Role Based Security and Java.
Proceedings of the Database Security XII: Status and Prospects, 1998

1997
Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications.
Journal of Computer Security, 1997

A Reusability Measurement Framework and Tool for Ada 95.
TRI-Ada, 1997

An Ada95 Basis for Propagation Modeling.
TRI-Ada, 1997

Analyzing and Measuring Reusability in Object-Oriented Designs.
Proceedings of the 1997 ACM SIGPLAN Conference on Object-Oriented Programming Systems, 1997

Software Architectural Alternatives for User Role-Based Security Policies.
Proceedings of the Database Securty XI: Status and Prospects, 1997

Traditional Software Design.
Proceedings of the Computer Science and Engineering Handbook, 1997

1996
Towards the Correctness and Consistency of Update Semantics in Semantic Database Schema.
IEEE Trans. Knowl. Data Eng., 1996

ADAM: A Language-Independent, Object-Oriented, Design Environment for Modeling Inheritance and Relationship Variants in Ada 95, C++, and Eiffel.
TRI-Ada, 1996

Extensible and Reusable Role-Based Object-Oriented Security.
Proceedings of the Database Security Volume X, 1996

1995
Role-based access control for object-oriented/C++ systems.
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995

URBS Enforcement Mechanisms for Object-Oriented Systems.
Proceedings of the Database Security IX: Status and Prospects, 1995

1994
Profiling in an Object-Oriented Design Environment That Supports Ada 9X and Ada 83 Code Generation.
TRI-Ada, 1994

Unifying Structural and Security Modeling and Analyses in the ADAM Object-Oriented Design Environment.
Proceedings of the Database Security, 1994

Transaction Management and Object-Oriented Modeling in a Distributed Dynamic Decision Making Environment.
Proceedings of the ACM 22rd Annual Computer Science Conference on Scaling up: Meeting the Challenge of Complexity in Real-World Computing Applications, 1994

1993
Programming versus databases in the object-oriented paradigm.
Information & Software Technology, 1993

Object-Oriented Design and Automatic Ada Code Generation in the Education of Software Engineers.
TRI-Ada, 1993

The Factors that Influence Apropos Security Approaches for the Object-Oriented Paradigm.
Proceedings of the Security for Object-Oriented Systems, 1993

Object-Oriented Design and Analyses for Advanced Application Development: Progress Towards a New Frontier.
Proceedings of the ACM 21th Conference on Computer Science, 1993

1992
The (Non)Importance of a Programming Language in a Software Engineering Course.
Computer Science Education, 1992

User-Role Based Security Profiles for an Object-Oriented Design Model.
Proceedings of the Database Security, 1992

1991
Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model.
Proceedings of the Database Security, 1991

ADAM: a graphical, object-oriented database-design tool and code generator.
Proceedings of the 19th annual conference on Computer Science, 1991

1990
Object-Oriented Database design for the Ozone Software Development Environment.
Proceedings of the 8th Bristish National Conference on Databases (BNCOD-8), 1990

Extending the Behavioral Capabilities of the Object-Oriented Paradigm with an Active Model of Propagation.
Proceedings of the ACM 18th Annual Computer Science Conference on Cooperation, 1990

1989
Constraint based analysis of database update propagation.
Proceedings of the 10th International Conference on Information Systems, 1989

1988
Towards a Better Understanding of Data Models Through the Multilingual Database System.
IEEE Trans. Software Eng., 1988

1987
The Multi-Lingual Database System.
Proceedings of the Third International Conference on Data Engineering, 1987

A computer-aided benchmarking system for parallel and expandable database computers.
Proceedings of the 1987 Fall Joint Computer Conference on Exploring technology: today and tomorrow, 1987

1986
Design Analysis and Performance Evaluation Methodologies for Database Computers.
Advances in Computers, 1986

A Multi-Backend Database System for Performance Gains, Capacity Growth and Hardware Upgrade.
Proceedings of the Second International Conference on Data Engineering, 1986

1985
Benchmarking Database Systems in Multiple Systems in Multiple Backend Configurations.
IEEE Database Eng. Bull., 1985

Performance Evaluation of a Database System in Multiple Backend Configurations.
Proceedings of the Database Machines, 1985

The Architectural Requirements and Integration Analyses of a Database Server for Office Automation.
Proceedings of the 1985 ACM annual conference on The range of computing: mid-80's perspective: mid-80's perspective, 1985

Performance Measurement Methodologies for Database Systems.
Proceedings of the 1985 ACM annual conference on The range of computing: mid-80's perspective: mid-80's perspective, 1985


  Loading...