default search action
T. C. Ting
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2009
- [c41]Frederick C. Harris Jr., Gordon K. Lee, Stuart Harvey Rubin, T. C. Ting, Billy Gaston, Gongzhu Hu:
Impact of Computing on the World Economy: A Position Paper. CATA 2009: 271-277 - 2006
- [c40]T. C. Ting, Peter P. Chen, Leah Y. Wong:
Architecture for Active Conceptual Modeling of Learning. Active Conceptual Modeling of Learning 2006: 7-16 - 2005
- [c39]Jaime A. Pavlich-Mariscal, Thuong Doan, Laurent Michel, Steven A. Demurjian, T. C. Ting:
Role Slices: A Notation for RBAC Permission Assignment and Enforcement. DBSec 2005: 40-53 - [c38]Thuong Doan, Laurent D. Michel, Steven A. Demurjian, T. C. Ting:
Stateful Design for Secure Information Systems. WOSIS 2005: 277-286 - 2004
- [c37]Thuong Doan, Steven A. Demurjian, T. C. Ting, Andreas Ketterl:
MAC and UML for secure software design. FMSE 2004: 75-85 - [c36]Thuong Doan, Steven A. Demurjian, Charles E. Phillips, T. C. Ting:
RBAC/MAC Security Analysis and Design for UML. DBSec 2004: 189-203 - 2003
- [c35]Charles E. Phillips, Steven A. Demurjian, T. C. Ting:
Safety and Liveness for an RBAC/MAC Security Model. DBSec 2003: 316-329 - [c34]Charles E. Phillips, Steven A. Demurjian, T. C. Ting:
Security Assurance for an RBAC/MAC Security Model. IAW 2003: 260-267 - 2002
- [c33]M. Liebrand, Heidi J. C. Ellis, Charles E. Phillips, Steven A. Demurjian, T. C. Ting:
Role Delegation for a Resource-Based Security Model. DBSec 2002: 37-48 - [c32]Charles E. Phillips, T. C. Ting, Steven A. Demurjian:
Information sharing and security in dynamic coalitions. SACMAT 2002: 87-96 - 2000
- [c31]Steven A. Demurjian, T. C. Ting, J. Balthazar, H. Ren, Charles E. Phillips, Paul Barr:
Role-Based Security in a Distributed Resource Environment. DBSec 2000: 259-270
1990 – 1999
- 1999
- [c30]T. C. Ting:
Privacy and Confidentiality in Healthcare Delivery Information System. CBMS 1999: 2- - [c29]Steven A. Demurjian, Y. He, T. C. Ting, M. Saba:
Software Agents for Role Based Security. DBSec 1999: 79-93 - [c28]T. C. Ting, Ming-Yuh Huang, D. Shayne Pitcock, Chris Clifton, Tsau Young Lin:
Panel on Intrusion Detection. DBSec 1999: 227-234 - 1998
- [c27]M. Jin, T. C. Ting:
An Object-oriented database framework for supporting product evolution. CATA 1998: 169-172 - [c26]Debra L. Smarkusky, Steven A. Demurjian, M. Cecilia Bastarrica, T. C. Ting:
Role Based Security and Java. DBSec 1998: 205-219 - 1997
- [j4]Steven A. Demurjian, T. C. Ting:
Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications. J. Comput. Secur. 5(4): 341-382 (1997) - [c25]Steven A. Demurjian, T. C. Ting, John A. Reisner:
Software Architectural Alternatives for User Role-Based Security Policies. DBSec 1997: 247-261 - 1996
- [c24]Steven A. Demurjian, T. C. Ting, Margaretha W. Price, M.-Y. Hu:
Extensible and Reusable Role-Based Object-Oriented Security. DBSec 1996: 288-307 - [e2]Bhavani Thuraisingham, T. C. Ting:
Guest Editors' Introduction to the Special Issue on Secure Database Systems Technology. IEEE Trans. Knowl. Data Eng. 8(1): 1-2 (1996) - 1995
- [c23]T. C. Ting:
How Secure is Secure: Some Thoughts on Security Metrics. DBSec 1995: 3-7 - [c22]Steven A. Demurjian, T. A. Daggett, T. C. Ting, M.-Y. Hu:
URBS Enforcement Mechanisms for Object-Oriented Systems. DBSec 1995: 79-94 - [c21]Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting:
Panel Discussion: Role-Based Access Control and Next-Generation Security Models. DBSec 1995: 289-298 - [c20]Steven A. Demurjian, T. C. Ting, M.-Y. Hu:
Role-based access control for object-oriented/C++ systems. ACM Workshop on Role-Based Access Control 1995 - 1994
- [c19]M.-Y. Hu, Steven A. Demurjian, T. C. Ting:
Unifying Structural and Security Modeling and Analyses in the ADAM Object-Oriented Design Environment. DBSec 1994: 77-94 - [c18]Dong-Guk Shin, Rohit Gupta, T. C. Ting:
Achieving Interoperability between Heterogeneous Object-Oriented Genomic Databases. HICSS (5) 1994: 77-86 - [c17]Shail Arora, Mamdouh Ibrahim, Bhavani Thuraisingham, T. C. Ting:
Object-oriented technology for health care and medical information systems. OOPSLA Addendum 1994: 122-126 - [e1]Bhavani Thuraisingham, Ravi S. Sandhu, T. C. Ting:
Security for Object-Oriented Systems, Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993. Workshops in Computing, Springer 1994, ISBN 3-540-19877-6 [contents] - 1993
- [j3]Steven A. Demurjian, George McA. Beshers, T. C. Ting:
Programming versus databases in the object-oriented paradigm. Inf. Softw. Technol. 35(2): 78-88 (1993) - [c16]Bhavani Thuraisingham, Ravi S. Sandhu, T. C. Ting:
Security for Object-Oriented Systems: An Editorial Overview. Security for Object-Oriented Systems 1993: 1-7 - [c15]Steven A. Demurjian, T. C. Ting:
The Factors that Influence Apropos Security Approaches for the Object-Oriented Paradigm. Security for Object-Oriented Systems 1993: 151-165 - [c14]T. C. Ting:
Modeling Security Requirements for Applications (Panel). OOPSLA 1993: 305 - [c13]Bhavani Thuraisingham, T. C. Ting, Peter J. Sell, Ravi S. Sandhu, Thomas F. Keefe:
Integrating security technology and object-oriented technology (panel). OOPSLA Addendum 1993: 59-61 - [c12]Bhavani Thuraisingham, Ravi S. Sandhu, T. C. Ting:
Security for object-oriented systems. OOPSLA Addendum 1993: 77-78 - 1992
- [c11]M.-Y. Hu, Steven A. Demurjian, T. C. Ting:
User-Role Based Security Profiles for an Object-Oriented Design Model. DBSec 1992: 333-348 - [c10]Bin Li, T. C. Ting:
An Event-State Approach to Handling Temporal Queries in an Extended Relational Database System. RIDE-TQP 1992: 218-219 - 1991
- [c9]T. C. Ting, Steven A. Demurjian, M.-Y. Hu:
Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model. DBSec 1991: 275-296
1980 – 1989
- 1989
- [c8]T. C. Ting:
Application Information Security Semantics: A Case of Mental Health Delivery. DBSec 1989: 1-12 - 1988
- [c7]T. C. Ting, Lee A. Becker, Z. Q. Tan:
U2RS: an upgradable universal relation system. ACM Conference on Computer Science 1988: 188-196 - [c6]Ion Tim Ieong, T. C. Ting:
An Analysis of Database Security with Queries for High Order Statistical Information. DBSec 1988: 207-223 - 1987
- [c5]T. C. Ting:
A User-Role Based Data Security Approach. DBSec 1987: 187-208
1970 – 1979
- 1979
- [c4]T. C. Ting:
Some Propositions of the Entity-Relationship Model. ER 1979: 541-542 - 1977
- [j2]T. C. Ting, Y. W. Wang:
Multiway Replacement Selection Sort with Dynamic Reservoir. Comput. J. 20(4): 298-301 (1977) - [j1]T. C. Ting:
Compacting homogeneous text for minimizing storage space. Int. J. Parallel Program. 6(3): 211-221 (1977) - 1976
- [c3]T. C. Ting, Fred R. Sias Jr., Eric Campbell:
On data error control problems in medical information systems. ACM-SE 1976: 362-368 - 1974
- [c2]T. C. Ting, A. P. Jensen:
An on-line interactive audiographic learning system. ACM Annual Conference (1) 1974: 239-244
1960 – 1969
- 1969
- [c1]Eugene G. Kerr, T. C. Ting, William E. Walden:
A control program for Computer Assisted Instruction on a general purpose computer. ACM National Conference 1969: 111-116
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint