default search action
Steven A. Demurjian
Person information
- affiliation: University of Connecticut, USA
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c68]Christina M. Polomoff, Sean Jeffery, Thomas Agresta, Steven A. Demurjian, Nitu Kashyap:
Experiences with Cyclical User-Centered Design for Patient and Clinician Facing Medication Reconciliation mHealth Applications. AMIA 2022 - 2021
- [c67]Timoteus B. Ziminski, Steven A. Demurjian, Thomas Agresta:
Extending the Fast Healthcare Interoperability Resources (FHIR) with Meta Resources. ICSOFT 2021: 167-176 - 2020
- [c66]Eugene Sanzi, Steven A. Demurjian:
Trust Profile based Trust Negotiation for the FHIR Standard. DATA 2020: 242-251 - [c65]Steven A. Demurjian, Thomas Agresta, Eugene Sanzi, John DeStefano:
Alternative Approaches for Supporting Lattice-based Access Control (LBAC) in the Fast Healthcare Interoperability Resources (FHIR) Standard. WEBIST 2020: 93-104
2010 – 2019
- 2019
- [j15]Yaira K. Rivera Sánchez, Steven A. Demurjian, Mohammed S. Baihan:
A service-based RBAC & MAC approach incorporated into the FHIR standard. Digit. Commun. Networks 5(4): 214-225 (2019) - 2017
- [j14]Karim El Guemhioui, Steven A. Demurjian:
Semantic Reconciliation of Electronic Health Records Using Semantic Web Technologies. Int. J. Inf. Technol. Web Eng. 12(2): 26-48 (2017) - [c64]Yaira K. Rivera Sánchez, Steven A. Demurjian, Mohammed S. Baihan:
Achieving RBAC on RESTful APIs for Mobile Apps Using FHIR. MobileCloud 2017: 139-144 - [c63]Eugene Sanzi, Steven A. Demurjian, Jack Billings:
Integrating Trust Profiles, Trust Negotiation, and Attribute Based Access Control. MobileCloud 2017: 177-184 - [c62]Yaira K. Rivera Sánchez, Steven A. Demurjian, Lukas Gnirke:
An Intercepting API-Based Access Control Approach for Mobile Applications. WEBIST 2017: 137-148 - [c61]Yaira K. Rivera Sánchez, Steven A. Demurjian, Lukas Gnirke:
Attaining Role-Based, Mandatory, and Discretionary Access Control for Services by Intercepting API Calls in Mobile Systems. WEBIST (Revised Selected Papers) 2017: 221-248 - [p2]Mohammed S. Baihan, Steven A. Demurjian:
An Access Control Framework for Secure and Interoperable Cloud Computing Applied to the Healthcare Domain. Research Advances in Cloud Computing 2017: 393-429 - 2016
- [c60]Alberto De la Rosa Algarin, Steven A. Demurjian:
Extending the UML Standards to Model Tree-Structured Data and Their Access Control Requirements. SSR 2016: 187-204 - [i1]Nic Herndon, Emily S. Grau, Iman Batra, Steven A. Demurjian, Hans A. Vasquez-Gross, Margaret E. Staton, Jill L. Wegrzyn:
CartograTree: Enabling landscape genomics for forest trees. PeerJ Prepr. 4: e2345 (2016) - 2015
- [j13]Rishi Kanth Saripalle, Steven A. Demurjian, Michael Blechner, Thomas Agresta:
HOD2MLC: Hybrid Ontology Design and Development Model with Lifecycle. Int. J. Inf. Technol. Web Eng. 10(2): 16-42 (2015) - 2013
- [j12]Rishi Kanth Saripalle, Steven A. Demurjian, Alberto De la Rosa Algarin, Michael Blechner:
A Software Modeling Approach to Ontology Design via Extensions to ODM and OWL. Int. J. Semantic Web Inf. Syst. 9(2): 62-97 (2013) - [c59]Alberto De la Rosa Algarin, Timoteus B. Ziminski, Steven A. Demurjian, Robert Kuykendall, Yaira K. Rivera Sánchez:
Defining and Enforcing XACML Role-based Security Policies within an XML Security Framework. WEBIST 2013: 16-25 - [c58]Alberto De la Rosa Algarin, Timoteus B. Ziminski, Steven A. Demurjian, Yaira K. Rivera Sánchez, Robert Kuykendall:
Generating XACML Enforcement Policies for Role-Based Access Control of XML Documents. WEBIST (Selected Papers) 2013: 21-36 - 2012
- [c57]Alberto De la Rosa Algarin, Steven A. Demurjian, Solomon Berhe, Jaime A. Pavlich-Mariscal:
A security framework for XML schemas and documents for healthcare. BIBM Workshops 2012: 782-789 - [c56]Michael Blechner, Rishi Saripalle, Steven A. Demurjian:
A proposed star schema and extraction process to enhance the collection of contextual & semantic information for clinical research data warehouses. BIBM Workshops 2012: 798-805 - [c55]Timoteus B. Ziminski, Alberto De la Rosa Algarin, Rishi Saripalle, Steven A. Demurjian, E. Jackson:
SMARTSync: Towards patient-driven medication reconciliation. BIBM Workshops 2012: 806-813 - 2011
- [c54]Solomon Berhe, Steven A. Demurjian, Swapna S. Gokhale, Jaime A. Pavlich-Mariscal, Rishi Saripalle:
Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC. DBSec 2011: 293-300 - 2010
- [j11]Jaime A. Pavlich-Mariscal, Steven A. Demurjian, Laurent D. Michel:
A framework of composable access control features: Preserving separation of access control concerns from models to code. Comput. Secur. 29(3): 350-379 (2010) - [j10]Jaime A. Pavlich-Mariscal, Steven A. Demurjian, Laurent D. Michel:
A framework for security assurance of access control enforcement code. Comput. Secur. 29(7): 770-784 (2010) - [j9]Thuong Doan, Steven A. Demurjian, Laurent Michel, Solomon Berhe:
Integrating Access Control into UML for Secure Software Modeling and Analysis. Int. J. Secur. Softw. Eng. 1(1): 1-19 (2010)
2000 – 2009
- 2009
- [j8]Steven A. Demurjian:
Assessment of candidate information models for granular computing. Int. J. Granul. Comput. Rough Sets Intell. Syst. 1(1): 1-20 (2009) - [c53]Solomon Berhe, Steven A. Demurjian, Thomas Agresta:
Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC. DBSec 2009: 283-290 - [c52]Steven A. Demurjian, Rishi Saripalle, Solomon Berhe:
An Integrated Ontology Framework for Health Information Exchange. SEKE 2009: 575-580 - [r2]Steven A. Demurjian:
Granular Computing, Information Models for. Encyclopedia of Complexity and Systems Science 2009: 4305-4313 - 2008
- [c51]Jaime A. Pavlich-Mariscal, Steven A. Demurjian, Laurent D. Michel:
A Framework of Composable Access Control Definition, Enforcement and Assurance. SCCC 2008: 13-22 - 2006
- [c50]Thuong Doan, Laurent Michel, Steven A. Demurjian:
A Formal Framework for Secure Design and Constraint Checking in UML. ISSSE 2006 - [p1]Reda A. Ammar, Steven A. Demurjian, Ian R. Greenshields, Krishna R. Pattipati, Sanguthevar Rajasekaran:
Analysis of Heterogeneous Data in Ultrahigh Dimensions. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006 - 2005
- [c49]Jaime A. Pavlich-Mariscal, Thuong Doan, Laurent Michel, Steven A. Demurjian, T. C. Ting:
Role Slices: A Notation for RBAC Permission Assignment and Enforcement. DBSec 2005: 40-53 - [c48]Thuong Doan, Laurent D. Michel, Steven A. Demurjian, T. C. Ting:
Stateful Design for Secure Information Systems. WOSIS 2005: 277-286 - [c47]Jaime A. Pavlich-Mariscal, Steven A. Demurjian, Laurent D. Michel:
A Framework for Composable Security Definition, Assurance, and Enforcement. MoDELS (Satellite Events) 2005: 353-354 - [c46]Jaime A. Pavlich-Mariscal, Laurent Michel, Steven A. Demurjian:
A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming. MoDELS 2005: 537-552 - 2004
- [c45]Thuong Doan, Steven A. Demurjian, T. C. Ting, Andreas Ketterl:
MAC and UML for secure software design. FMSE 2004: 75-85 - [c44]Thuong Doan, Steven A. Demurjian, Charles E. Phillips, T. C. Ting:
RBAC/MAC Security Analysis and Design for UML. DBSec 2004: 189-203 - 2003
- [c43]Charles E. Phillips, Steven A. Demurjian, T. C. Ting:
Safety and Liveness for an RBAC/MAC Security Model. DBSec 2003: 316-329 - [c42]Patricia J. Pia, Steven A. Demurjian:
Guided Generation of Use-Case-Based Software Requirements. IASSE 2003: 178-182 - [c41]Charles E. Phillips, Steven A. Demurjian, T. C. Ting:
Security Assurance for an RBAC/MAC Security Model. IAW 2003: 260-267 - 2002
- [c40]M. Liebrand, Heidi J. C. Ellis, Charles E. Phillips, Steven A. Demurjian, T. C. Ting:
Role Delegation for a Resource-Based Security Model. DBSec 2002: 37-48 - [c39]Rodrigo E. Caballero, Steven A. Demurjian:
Towards the Formalization of a Reusability Framework for Refactoring. ICSR 2002: 293-308 - [c38]Charles E. Phillips, T. C. Ting, Steven A. Demurjian:
Information sharing and security in dynamic coalitions. SACMAT 2002: 87-96 - 2001
- [c37]M. Cecilia Bastarrica, Rodrigo E. Caballero, Steven A. Demurjian, Alexander A. Shvartsman:
Two Optimization Techniques for Component-Based Systems Deployment. SEKE 2001: 153-162 - [c36]Margaretha W. Price, Donald M. Needham, Steven A. Demurjian:
Producing reusable object-oriented components: a domain-and-organization-specific perspective. SSR 2001: 41-50 - 2000
- [c35]Steven A. Demurjian, T. C. Ting, J. Balthazar, H. Ren, Charles E. Phillips, Paul Barr:
Role-Based Security in a Distributed Resource Environment. DBSec 2000: 259-270 - [c34]M. Cecilia Bastarrica, Steven A. Demurjian, Alexander A. Shvartsman:
Comprehensive Specification of Distributed Systems Using I5 and IOA. SCCC 2000: 74-82
1990 – 1999
- 1999
- [c33]Steven A. Demurjian, Y. He, T. C. Ting, M. Saba:
Software Agents for Role Based Security. DBSec 1999: 79-93 - [c32]M. Cecilia Bastarrica, Steven A. Demurjian, Alexander A. Shvartsman:
A Framework for Architectural Specification of Distributed Object Systems. OPODIS 1999: 127-148 - [c31]Donald M. Needham, Steven A. Demurjian, Thomas J. Peters:
Towards a distributed object-oriented propagation model using Ada95. SIGAda 1999: 203-210 - 1998
- [c30]Debra L. Smarkusky, Steven A. Demurjian, M. Cecilia Bastarrica, T. C. Ting:
Role Based Security and Java. DBSec 1998: 205-219 - [c29]M. Cecilia Bastarrica, Alexander A. Shvartsman, Steven A. Demurjian:
A Binary Integer Programming Model for Optimal Object Distribution. OPODIS 1998: 211-226 - [c28]M. Cecilia Bastarrica, Steven A. Demurjian, Alexander A. Shvartsman:
Software Architectural Specification for Optimal Object Distribution. SCCC 1998: 25-31 - [c27]John A. Reisner, Zeenat Lainwala, Thomas J. Peters, Steven A. Demurjian:
Implementing a Culling and Self-Intersection Algorithm for Stereolithography Files in Ada 95. SIGAda 1998: 104-113 - 1997
- [j7]Steven A. Demurjian, T. C. Ting:
Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications. J. Comput. Secur. 5(4): 341-382 (1997) - [c26]Steven A. Demurjian, T. C. Ting, John A. Reisner:
Software Architectural Alternatives for User Role-Based Security Policies. DBSec 1997: 247-261 - [c25]Margaretha W. Price, Steven A. Demurjian:
Analyzing and Measuring Reusability in Object-Oriented Designs. OOPSLA 1997: 22-33 - [c24]Margaretha W. Price, Steven A. Demurjian, Donald M. Needham:
A Reusability Measurement Framework and Tool for Ada 95. TRI-Ada 1997: 125-132 - [c23]Donald M. Needham, Steven A. Demurjian, Thomas J. Peters:
An Ada95 Basis for Propagation Modeling. TRI-Ada 1997: 263-272 - [r1]Steven A. Demurjian:
Traditional Software Design. The Computer Science and Engineering Handbook 1997: 2323-2351 - 1996
- [j6]Joan Peckham, Fred J. Maryanski, Steven A. Demurjian:
Towards the Correctness and Consistency of Update Semantics in Semantic Database Schema. IEEE Trans. Knowl. Data Eng. 8(3): 503-507 (1996) - [c22]Steven A. Demurjian, T. C. Ting, Margaretha W. Price, M.-Y. Hu:
Extensible and Reusable Role-Based Object-Oriented Security. DBSec 1996: 288-307 - [c21]Donald M. Needham, Steven A. Demurjian, Karim El Guemhioui, Thomas J. Peters, P. Zamani, M. McMahon, Heidi J. C. Ellis:
ADAM: A Language-Independent, Object-Oriented, Design Environment for Modeling Inheritance and Relationship Variants in Ada 95, C++, and Eiffel. TRI-Ada 1996: 99-113 - [e1]David L. Spooner, Steven A. Demurjian, John E. Dobson:
Database Security IX: Status and Prospects, Proceedings of the Ninth Annual IFIP WG11 Working Conference on Database Security, Rensselaerville, New York, USA, 13-16 August 1995. IFIP Conference Proceedings 51, Chapman & Hall 1996, ISBN 0-412-72920-2 [contents] - 1995
- [c20]Steven A. Demurjian, T. A. Daggett, T. C. Ting, M.-Y. Hu:
URBS Enforcement Mechanisms for Object-Oriented Systems. DBSec 1995: 79-94 - [c19]Steven A. Demurjian, T. C. Ting, M.-Y. Hu:
Role-based access control for object-oriented/C++ systems. ACM Workshop on Role-Based Access Control 1995 - 1994
- [c18]Anlan Song, Steven A. Demurjian, David L. Kleinman:
Transaction Management and Object-Oriented Modeling in a Distributed Dynamic Decision Making Environment. ACM Conference on Computer Science 1994: 189-195 - [c17]M.-Y. Hu, Steven A. Demurjian, T. C. Ting:
Unifying Structural and Security Modeling and Analyses in the ADAM Object-Oriented Design Environment. DBSec 1994: 77-94 - [c16]Karim El Guemhioui, Steven A. Demurjian, Thomas J. Peters, Heidi J. C. Ellis:
Profiling in an Object-Oriented Design Environment That Supports Ada 9X and Ada 83 Code Generation. TRI-Ada 1994: 180-190 - 1993
- [j5]Steven A. Demurjian, George McA. Beshers, T. C. Ting:
Programming versus databases in the object-oriented paradigm. Inf. Softw. Technol. 35(2): 78-88 (1993) - [c15]Heidi J. C. Ellis, Steven A. Demurjian:
Object-Oriented Design and Analyses for Advanced Application Development: Progress Towards a New Frontier. ACM Conference on Computer Science 1993: 332-337 - [c14]Steven A. Demurjian, T. C. Ting:
The Factors that Influence Apropos Security Approaches for the Object-Oriented Paradigm. Security for Object-Oriented Systems 1993: 151-165 - [c13]Karim El Guemhioui, Steven A. Demurjian, Thomas J. Peters:
Object-Oriented Design and Automatic Ada Code Generation in the Education of Software Engineers. TRI-Ada 1993: 126-136 - 1992
- [j4]Steven A. Demurjian, Thomas J. Peters, George McA. Beshers, Heidi J. C. Ellis, Greg Nichols:
The (Non)Importance of a Programming Language in a Software Engineering Course. Comput. Sci. Educ. 3(1): 35-52 (1992) - [c12]M.-Y. Hu, Steven A. Demurjian, T. C. Ting:
User-Role Based Security Profiles for an Object-Oriented Design Model. DBSec 1992: 333-348 - 1991
- [c11]Heidi J. C. Ellis, Steven A. Demurjian:
ADAM: a graphical, object-oriented database-design tool and code generator. ACM Conference on Computer Science 1991: 496-505 - [c10]T. C. Ting, Steven A. Demurjian, M.-Y. Hu:
Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model. DBSec 1991: 275-296 - 1990
- [c9]Heidi J. C. Ellis, Steven A. Demurjian, Fred J. Maryanski, George McA. Beshers, Joan Peckham:
Extending the Behavioral Capabilities of the Object-Oriented Paradigm with an Active Model of Propagation. ACM Conference on Computer Science 1990: 319-325 - [c8]Greg Nichols, Steven A. Demurjian:
Object-Oriented Database design for the Ozone Software Development Environment. BNCOD 1990: 159-178
1980 – 1989
- 1989
- [c7]Joan Peckham, Fred J. Maryanski, George McA. Beshers, H. Chapman, Steven A. Demurjian:
Constraint based analysis of database update propagation. ICIS 1989: 9-18 - 1988
- [j3]Steven A. Demurjian, David K. Hsiao:
Towards a Better Understanding of Data Models Through the Multilingual Database System. IEEE Trans. Software Eng. 14(7): 946-958 (1988) - 1987
- [c6]Steven A. Demurjian, G. P. Fenton, David K. Hsiao, J. R. Vincent:
A computer-aided benchmarking system for parallel and expandable database computers. FJCC 1987: 475-482 - [c5]Steven A. Demurjian, David K. Hsiao:
The Multi-Lingual Database System. ICDE 1987: 44-51 - 1986
- [j2]Steven A. Demurjian, David K. Hsiao, Paula R. Strawser:
Design Analysis and Performance Evaluation Methodologies for Database Computers. Adv. Comput. 25: 101-214 (1986) - [c4]Steven A. Demurjian, David K. Hsiao, Jai Menon:
A Multi-Backend Database System for Performance Gains, Capacity Growth and Hardware Upgrade. ICDE 1986: 542-554 - 1985
- [j1]Steven A. Demurjian, David K. Hsiao:
Benchmarking Database Systems in Multiple Systems in Multiple Backend Configurations. IEEE Database Eng. Bull. 8(1): 29-39 (1985) - [c3]Steven A. Demurjian, David K. Hsiao, Douglas S. Kerr, Robert C. Tekampe, Robert J. Watson:
Performance Measurement Methodologies for Database Systems. ACM Annual Conference 1985: 16-28 - [c2]Steven A. Demurjian, David K. Hsiao, Roger G. Marshall:
The Architectural Requirements and Integration Analyses of a Database Server for Office Automation. ACM Annual Conference 1985: 121-131 - [c1]Steven A. Demurjian, David K. Hsiao, Douglas S. Kerr, Paula Strawser, Robert J. Watson, Jai Menon, Robert C. Tekampe, Joel Trimble:
Performance Evaluation of a Database System in Multiple Backend Configurations. IWDM 1985: 91-111
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint