Steven A. Demurjian
Affiliations:- University of Connecticut, USA
According to our database1,
Steven A. Demurjian
authored at least 88 papers
between 1985 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
1985
1990
1995
2000
2005
2010
2015
2020
0
1
2
3
4
5
6
7
1
1
1
1
1
1
1
1
1
3
1
1
1
1
1
1
1
1
1
1
2
4
1
2
3
1
2
1
1
4
2
3
3
2
2
3
4
4
2
2
3
3
1
2
2
1
2
1
3
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2022
Experiences with Cyclical User-Centered Design for Patient and Clinician Facing Medication Reconciliation mHealth Applications.
Proceedings of the AMIA 2022, 2022
2021
Proceedings of the 16th International Conference on Software Technologies, 2021
2020
Alternative Approaches for Supporting Lattice-based Access Control (LBAC) in the Fast Healthcare Interoperability Resources (FHIR) Standard.
Proceedings of the 16th International Conference on Web Information Systems and Technologies, 2020
Proceedings of the 9th International Conference on Data Science, 2020
2019
Digit. Commun. Networks, 2019
2017
Semantic Reconciliation of Electronic Health Records Using Semantic Web Technologies.
Int. J. Inf. Technol. Web Eng., 2017
Attaining Role-Based, Mandatory, and Discretionary Access Control for Services by Intercepting API Calls in Mobile Systems.
Proceedings of the Web Information Systems and Technologies, 2017
Proceedings of the 13th International Conference on Web Information Systems and Technologies, 2017
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017
An Access Control Framework for Secure and Interoperable Cloud Computing Applied to the Healthcare Domain.
Proceedings of the Research Advances in Cloud Computing, 2017
2016
Extending the UML Standards to Model Tree-Structured Data and Their Access Control Requirements.
Proceedings of the Security Standardisation Research - Third International Conference, 2016
2015
Int. J. Inf. Technol. Web Eng., 2015
2013
Int. J. Semantic Web Inf. Syst., 2013
Generating XACML Enforcement Policies for Role-Based Access Control of XML Documents.
Proceedings of the Web Information Systems and Technologies - 9th International Conference, 2013
Defining and Enforcing XACML Role-based Security Policies within an XML Security Framework.
Proceedings of the WEBIST 2013, 2013
2012
Proceedings of the 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2012
A proposed star schema and extraction process to enhance the collection of contextual & semantic information for clinical research data warehouses.
Proceedings of the 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2012
Proceedings of the 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2012
2011
Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC.
Proceedings of the Data and Applications Security and Privacy XXV, 2011
2010
Int. J. Secur. Softw. Eng., 2010
Comput. Secur., 2010
A framework of composable access control features: Preserving separation of access control concerns from models to code.
Comput. Secur., 2010
2009
Proceedings of the Encyclopedia of Complexity and Systems Science, 2009
Int. J. Granul. Comput. Rough Sets Intell. Syst., 2009
An Integrated Ontology Framework for Health Information Exchange.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009
Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC.
Proceedings of the Data and Applications Security XXIII, 2009
2008
Proceedings of the XXVII International Conference of the Chilean Computer Science Society (SCCC 2008), 2008
2006
A Formal Framework for Secure Design and Constraint Checking in UML.
Proceedings of the 2006 IEEE International Symposium on Secure Software Engineering, 2006
Analysis of Heterogeneous Data in Ultrahigh Dimensions.
Proceedings of the Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006
2005
A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming.
Proceedings of the Model Driven Engineering Languages and Systems, 2005
Proceedings of the Satellite Events at the MoDELS 2005 Conference, 2005
Stateful Design for Secure Information Systems.
Proceedings of the Security in Information Systems, 2005
Proceedings of the Data and Applications Security XIX, 2005
2004
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, 2004
2003
Security Assurance for an RBAC/MAC Security Model.
Proceedings of the IEEE Systems, 2003
Guided Generation of Use-Case-Based Software Requirements.
Proceedings of the 12th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
2002
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002
Proceedings of the Software Reuse: Methods, 2002
Role Delegation for a Resource-Based Security Model.
Proceedings of the Research Directions in Data and Applications Security, 2002
2001
Producing reusable object-oriented components: a domain-and-organization-specific perspective.
Proceedings of the ACM SIGSOFT Symposium on Software Reusability: Putting Software Reuse in Context, 2001
Two Optimization Techniques for Component-Based Systems Deployment.
Proceedings of the Thirteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2001), 2001
2000
Proceedings of the 20st International Conference of the Chilean Computer Science Society (SCCC 2000), 2000
Proceedings of the Data and Application Security, 2000
1999
Proceedings of the Proceedings ACM SIGAda Annual International Conference, 1999
A Framework for Architectural Specification of Distributed Object Systems.
Proceedings of the Procedings of the 3rd International Conference on Principles of Distributed Systems. OPODIS 99, 1999
Software Agents for Role Based Security.
Proceedings of the Research Advances in Database and Information Systems Security, 1999
1998
Implementing a Culling and Self-Intersection Algorithm for Stereolithography Files in Ada 95.
Proceedings of the ACM SIGAda Annual International Conference on Ada Technology, 1998
Proceedings of 18th International Conference of the Chilean Computer Science Society (SCCC '98), 1998
A Binary Integer Programming Model for Optimal Object Distribution.
Proceedings of the Distributed Computing, 1998
Role Based Security and Java.
Proceedings of the Database Security XII: Status and Prospects, 1998
1997
Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications.
J. Comput. Secur., 1997
Proceedings of the Conference, The annual meeting of the Ada programming world, 1997
Proceedings of the Conference, The annual meeting of the Ada programming world, 1997
Proceedings of the 1997 ACM SIGPLAN Conference on Object-Oriented Programming Systems, 1997
Software Architectural Alternatives for User Role-Based Security Policies.
Proceedings of the Database Securty XI: Status and Prospects, 1997
Traditional Software Design.
Proceedings of the Computer Science and Engineering Handbook, 1997
1996
Towards the Correctness and Consistency of Update Semantics in Semantic Database Schema.
IEEE Trans. Knowl. Data Eng., 1996
ADAM: A Language-Independent, Object-Oriented, Design Environment for Modeling Inheritance and Relationship Variants in Ada 95, C++, and Eiffel.
Proceedings of the annual meeting of the Ada programming world, 1996
Extensible and Reusable Role-Based Object-Oriented Security.
Proceedings of the Database Security Volume X, 1996
1995
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995
URBS Enforcement Mechanisms for Object-Oriented Systems.
Proceedings of the Database Security IX: Status and Prospects, 1995
1994
Profiling in an Object-Oriented Design Environment That Supports Ada 9X and Ada 83 Code Generation.
Proceedings of the 1994 Conference on TRI-Ada 1994, 1994
Unifying Structural and Security Modeling and Analyses in the ADAM Object-Oriented Design Environment.
Proceedings of the Database Security, 1994
Transaction Management and Object-Oriented Modeling in a Distributed Dynamic Decision Making Environment.
Proceedings of the ACM 22rd Annual Computer Science Conference on Scaling up: Meeting the Challenge of Complexity in Real-World Computing Applications, 1994
1993
Inf. Softw. Technol., 1993
Object-Oriented Design and Automatic Ada Code Generation in the Education of Software Engineers.
Proceedings of the Conference Proceedings on TRI-Ada 1993, 1993
The Factors that Influence Apropos Security Approaches for the Object-Oriented Paradigm.
Proceedings of the Security for Object-Oriented Systems, 1993
Object-Oriented Design and Analyses for Advanced Application Development: Progress Towards a New Frontier.
Proceedings of the ACM 21th Conference on Computer Science, 1993
1992
Comput. Sci. Educ., 1992
User-Role Based Security Profiles for an Object-Oriented Design Model.
Proceedings of the Database Security, 1992
1991
Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model.
Proceedings of the Database Security, 1991
Proceedings of the 19th annual conference on Computer Science, 1991
1990
Object-Oriented Database design for the Ozone Software Development Environment.
Proceedings of the 8th Bristish National Conference on Databases (BNCOD-8), 1990
Extending the Behavioral Capabilities of the Object-Oriented Paradigm with an Active Model of Propagation.
Proceedings of the ACM 18th Annual Computer Science Conference on Cooperation, 1990
1989
Proceedings of the 10th International Conference on Information Systems, 1989
1988
Towards a Better Understanding of Data Models Through the Multilingual Database System.
IEEE Trans. Software Eng., 1988
1987
Proceedings of the Third International Conference on Data Engineering, 1987
Proceedings of the 1987 Fall Joint Computer Conference on Exploring technology: today and tomorrow, 1987
1986
Adv. Comput., 1986
A Multi-Backend Database System for Performance Gains, Capacity Growth and Hardware Upgrade.
Proceedings of the Second International Conference on Data Engineering, 1986
1985
Benchmarking Database Systems in Multiple Systems in Multiple Backend Configurations.
IEEE Database Eng. Bull., 1985
Performance Evaluation of a Database System in Multiple Backend Configurations.
Proceedings of the Database Machines, 1985
The Architectural Requirements and Integration Analyses of a Database Server for Office Automation.
Proceedings of the 1985 ACM annual conference on The range of computing: mid-80's perspective: mid-80's perspective, 1985
Proceedings of the 1985 ACM annual conference on The range of computing: mid-80's perspective: mid-80's perspective, 1985