Skip to main content

and
  1. Chapter

    Safety and Liveness for an RBAC/MAC Security Model

    Our role-based/mandatory access control (RBAC/MAC) security model and enforcement framework for inter-operating legacy, COTS, GOTS, databases, servers, etc., limits: who (user/user role) can invoke which metho...

    C. Phillips, S. Demurjian, T. C. Ting in Data and Applications Security XVII (2004)

  2. Chapter and Conference Paper

    RBAC/MAC Security for UML

    In software construction, analysis investigates system requirements and design captures system functionality. To facilitate analysis and design, one popular technique is the unified modeling language, UML. In UML...

    T. Doan, S. Demurjian, T.C. Ting in Research Directions in Data and Applicatio… (2004)

  3. Chapter

    Role Delegation for a Resource-Based Security Model

    Corporations and government agencies rely on inter-operating legacy, COTs, databases, clients, servers, etc., with security addressed from different dimensions. One dimension is delegation, where an authorized...

    M. Liebrand, H. Ellis, C. Phillips in Research Directions in Data and Applicatio… (2003)

  4. Chapter

    User Role-Based Security Model for a Distributed Environment

    A distributed resource environment (DRE) allows distributed components (i.e., servers, legacy systems, databases, COTs, printers, scanners, etc.) to be treated akin to OS resources, where each component (resou...

    S. Demurjian, T.C. Ting, J. Balthazar, H. Ren, C. Phillips in Data and Application Security (2001)

  5. Chapter

    Software Agents for Role Based Security

    In the age of information technology, organizations of all types are seeking to effectively utilize and disseminate information via dependable and secure distributed computing environments. While many existing...

    S. Demurjian, Sr. Y. He, T. C. Ting, M. Saba in Research Advances in Database and Informat… (2000)