T. C. Ting
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2009
Impact of Computing on the World Economy: A Position Paper.
Proceedings of the ISCA 24th International Conference on Computers and Their Applications, 2009
2006
Proceedings of the Active Conceptual Modeling of Learning, 2006
2005
Stateful Design for Secure Information Systems.
Proceedings of the Security in Information Systems, 2005
Proceedings of the Data and Applications Security XIX, 2005
2004
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, 2004
2003
Security Assurance for an RBAC/MAC Security Model.
Proceedings of the IEEE Systems, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
2002
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002
Role Delegation for a Resource-Based Security Model.
Proceedings of the Research Directions in Data and Applications Security, 2002
2000
Proceedings of the Data and Application Security, 2000
1999
Panel on Intrusion Detection.
Proceedings of the Research Advances in Database and Information Systems Security, 1999
Software Agents for Role Based Security.
Proceedings of the Research Advances in Database and Information Systems Security, 1999
Proceedings of the 12th IEEE Symposium on Computer-Based Medical Systems (CBMS '99). 18-20 June 1999, 1999
1998
Role Based Security and Java.
Proceedings of the Database Security XII: Status and Prospects, 1998
An Object-oriented database framework for supporting product evolution.
Proceedings of the Computers and Their Applications (CATA-98), 1998
1997
Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications.
J. Comput. Secur., 1997
Software Architectural Alternatives for User Role-Based Security Policies.
Proceedings of the Database Securty XI: Status and Prospects, 1997
1996
Guest Editors' Introduction to the Special Issue on Secure Database Systems Technology.
IEEE Trans. Knowl. Data Eng., 1996
Extensible and Reusable Role-Based Object-Oriented Security.
Proceedings of the Database Security Volume X, 1996
1995
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995
How Secure is Secure: Some Thoughts on Security Metrics.
Proceedings of the Database Security IX: Status and Prospects, 1995
Panel Discussion: Role-Based Access Control and Next-Generation Security Models.
Proceedings of the Database Security IX: Status and Prospects, 1995
URBS Enforcement Mechanisms for Object-Oriented Systems.
Proceedings of the Database Security IX: Status and Prospects, 1995
1994
Proceedings of the Addendum to the Proceedings on Object-Oriented Programming Systems, 1994
Achieving Interoperability between Heterogeneous Object-Oriented Genomic Databases.
Proceedings of the 27th Annual Hawaii International Conference on System Sciences (HICSS-27), 1994
Unifying Structural and Security Modeling and Analyses in the ADAM Object-Oriented Design Environment.
Proceedings of the Database Security, 1994
1993
Proceedings of the Addendum to the Proceedings on Object-Oriented Programming Systems, 1993
Proceedings of the Addendum to the Proceedings on Object-Oriented Programming Systems, 1993
Inf. Softw. Technol., 1993
Proceedings of the Eighth Annual Conference on Object-Oriented Programming Systems, 1993
Security for Object-Oriented Systems: An Editorial Overview.
Proceedings of the Security for Object-Oriented Systems, 1993
The Factors that Influence Apropos Security Approaches for the Object-Oriented Paradigm.
Proceedings of the Security for Object-Oriented Systems, 1993
1992
An Event-State Approach to Handling Temporal Queries in an Extended Relational Database System.
Proceedings of the RIDE-TQP '92, 1992
User-Role Based Security Profiles for an Object-Oriented Design Model.
Proceedings of the Database Security, 1992
1991
Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model.
Proceedings of the Database Security, 1991
1989
Application Information Security Semantics: A Case of Mental Health Delivery.
Proceedings of the Database Security, 1989
1988
An Analysis of Database Security with Queries for High Order Statistical Information.
Proceedings of the Database Security, 1988
Proceedings of the Sixteenth ACM Annual Conference on Computer Science, 1988
1987
A User-Role Based Data Security Approach.
Proceedings of the Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, 1987
1979
Some Propositions of the Entity-Relationship Model.
Proceedings of the Entity-Relationship Approach to Systems Analysis and Design. Proc. 1st International Conference on the Entity-Relationship Approach, 1979
1977
Int. J. Parallel Program., 1977
1976
Proceedings of the 14th annual Southeast regional conference, 1976
1974
Proceedings of the 1974 ACM Annual Conference, 1974
1969
Proceedings of the 24th national conference, 1969