default search action
Elizabeth A. Unger
Person information
- affiliation: Kansas State University, Manhattan, KS, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
1990 – 1999
- 1996
- [j9]Chyuan Samuel Hsieh, Elizabeth A. Unger:
On the control structure of a program slice. J. Syst. Softw. 34(2): 123-126 (1996) - 1994
- [j8]Rayford B. Vaughn, Hossein Saiedian, Elizabeth A. Unger:
A Proposed Mechanism for Implementation of Non-Discretionary Access Controls in a Network Environment. Comput. Networks ISDN Syst. 26(12): 1523-1531 (1994) - [c26]D. S. Rogers, Elizabeth A. Unger:
A deterrent to linear system inferential attacks using a mediator. SAC 1994: 15-19 - 1993
- [j7]Rayford B. Vaughn, Hossein Saiedian, Elizabeth A. Unger:
A survey of security issues in office computation and the application of secure computing models to office systems. Comput. Secur. 12(1): 79-97 (1993) - [j6]James M. Slack, Elizabeth A. Unger:
Integrity in object-oriented database systems. Comput. Secur. 12(4): 389-404 (1993) - 1992
- [j5]C. Samuel Hsieh, Elizabeth A. Unger, Ramón A. Mata-Toledo:
Using program dependence graphs for information flow control. J. Syst. Softw. 17(3): 227-232 (1992) - [c25]James M. Slack, Elizabeth A. Unger:
A model of integrity for object-oriented database systems. SAC 1992: 234-242 - 1991
- [c24]Yiu-Kai Ng, Austin Melton, Elizabeth A. Unger:
A method for constructing generalized non-normal-form models. ACM Conference on Computer Science 1991: 146-153 - [c23]S. C. Hansen, Elizabeth A. Unger:
Domain reduction dependencies: A new type of dependency for statistical database security. ACSAC 1991: 178-186 - [c22]S. C. Hansen, Elizabeth A. Unger:
An Extended Memoryless Inference Control Method: Accounting for Dependence in Table-level Controls. SIGMOD Conference 1991: 348-356 - 1990
- [c21]Hossein Saiedian, Elizabeth A. Unger:
ABSL: An Actor-Based Specification Language for Office Automation. ACM Conference on Computer Science 1990: 252-258 - [c20]James F. Peters, Sheela Ramanna, Elizabeth A. Unger:
Logic of Knowledge and Belief in the Design of an Integrity Kernel for an Office Information System (Abstract). ACM Conference on Computer Science 1990: 417 - [c19]Elizabeth A. Unger, Lein Harn, Vijay Kumar:
Entropy as a measure of database information. ACSAC 1990: 80-87 - [c18]Elizabeth A. Unger, Sallie Keller-McNulty, Paul Connelly:
Natural change in dynamic databases as a deterrent to compromise by trackers. ACSAC 1990: 116-124 - [c17]Sheela Ramanna, James F. Peters, Elizabeth A. Unger, K. W. Glander:
Designing a dynamic integrity constraint checker with nonmonotonic logic. COMPSAC 1990: 140-145 - [c16]James F. Peters, Sheela Ramanna, Elizabeth A. Unger:
Design of Knowiedge-Based Integrity Systems with ISL++. SEKE 1990: 183-188 - [c15]Kok Wai Wong, Elizabeth A. Unger:
Specification and Verification of Active Message Systems. SIGSMALL/PC Symposium 1990: 24-30 - [c14]Miguel Cabrera, Elizabeth A. Unger:
Dynamic Data as Deterrent to the Tracker. SIGSMALL/PC Symposium 1990: 31-35 - [c13]Hossein Saiedian, Elizabeth A. Unger:
A Formal Specification Tool for Office Systems. SIGSMALL/PC Symposium 1990: 215-220 - [e2]Hal Berghel, Elizabeth A. Unger, Richard Rankin:
Proceedings of the 1990 ACM SIGSMALL/PC Symposium on Small Systems, March 28-30, 1990. Crystal City, VA, USA. ACM 1990, ISBN 0-89791-347-7 [contents]
1980 – 1989
- 1988
- [c12]Chyuan Samuel Hsieh, Elizabeth A. Unger:
Resource scheduling: specification and proof techniques. ACM Conference on Computer Science 1988: 429-437 - [c11]G. Hecker, Elizabeth A. Unger:
A User Interface for Database Creation Use and Maintenance. SIGSMALL/PC 1988: 176-186 - 1987
- [c10]Chyuan Samuel Hsieh, Elizabeth A. Unger:
Manifolds: a very high-level conceptual framework of interprocess synchronization and communication. ACM Conference on Computer Science 1987: 196-204 - [c9]T. R. Hines, Elizabeth A. Unger:
A variation of conceptual graphs: an object-oriented approach. FJCC 1987: 57-68 - [c8]Elizabeth A. Unger, Charles M. Hassett, Constanza Castro:
IS and MIS: a compromise? SIGCSE 1987: 483-489 - 1986
- [c7]Janice C. Honeyman, Elizabeth A. Unger:
SFM: synchronizing forms manager. SIGSMALL 1986: 178-186 - [e1]Elizabeth A. Unger:
Proceedings of the 1986 ACM SIGSMALL/PC symposium on Small systems, SIGSMALL 1986, San Francisco, California, USA, 1086. ACM 1986, ISBN 978-0-89791-211-2 [contents] - 1984
- [j4]Ariel Pashtan, Elizabeth A. Unger:
Resource Monitors: A Design Methodology for Operating Systems. Softw. Pract. Exp. 14(8): 791-806 (1984) - 1983
- [c6]Ricky J. Barker, Elizabeth A. Unger:
A predictor for success in an introductory programming class based upon abstract reasoning development. SIGCSE 1983: 154-158 - [c5]Richard A. McBride, Elizabeth A. Unger:
Modeling jobs in a distributed system. SIGSMALL 1983: 32-41 - [c4]Diane Jantz, Elizabeth A. Unger, Richard A. McBride, Jacob Slonim:
Query processing in a distributed data base. SIGSMALL 1983: 237-244 - 1982
- [j3]Elizabeth A. Unger, Paul S. Fisher, Jacob Slonim:
Evolving to distributed database environments. Comput. Commun. 5(1): 17-22 (1982) - [j2]Jacob Slonim, L. J. MacRae, Richard A. McBride, Fred J. Maryanski, Elizabeth A. Unger, Paul S. Fisher:
A troughput model: sequential vs concurrent processing. Inf. Syst. 7(1): 65-83 (1982) - 1980
- [c3]Fred J. Maryanski, Elizabeth A. Unger:
A major in information systems. SIGCSE 1980: 213-222
1970 – 1979
- 1979
- [c2]Elizabeth A. Unger, Richard A. McBride, Jacob Slonim, Fred J. Maryanski:
Design for integration of a DBMS into a network environment. SIGCOMM 1979: 26-34 - [c1]Jacob Slonim, Elizabeth A. Unger, Paul S. Fisher:
Data base management system environments present and future. SIGSMALL 1979: 75-83 - 1976
- [j1]Elizabeth A. Unger, N. Ahmed:
An instructionally acceptable cost effective approach to a general introductory course. ACM SIGCSE Bull. 8(2): 28-31 (1976)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint