Papers by Steven Demurjian
Technologies, Business, and Social Applications, 2010
This chapter presents a case study highlighting development of a Web-based wiki-driven collaborat... more This chapter presents a case study highlighting development of a Web-based wiki-driven collaboration portal that is being used by a distributed group of community health organizations engaged in devel-oping a strategic implementation plan for health information technology (HIT) at the ...
Popp/Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2005
... 1 structure, and the KLT can be worse than useless when confronted with mix-ture distribution... more ... 1 structure, and the KLT can be worse than useless when confronted with mix-ture distributions ... to the statistical learning methods that minimize the error on the training data, SRM ... Distributed LSI seeks to address issues related to scalability within a more realistic environment as ...
IFIP International Federation for Information Processing, 2001
A distributed resource environment (DRE) allows distributed components (i.e., servers, legacy sys... more A distributed resource environment (DRE) allows distributed components (i.e., servers, legacy systems, databases, COTs, printers, scanners, etc.) to be treated akin to OS resources, where each component (resource) can publish services (an API), that are then available for use by clients and resources alike. DREs have lagged in support of security. To address this deficiency, this paper concentrates on proposing a technique for seamlessly integrating a role-based security model, authorization, authentication, and enforcement into a DRE, including our prototyping with the JINI DRE.
IFIP International Federation for Information Processing, 2004
Our role-based/mandatory access control (RBAC/MAC) security model and enforcement framework for i... more Our role-based/mandatory access control (RBAC/MAC) security model and enforcement framework for inter-operating legacy, COTS, GOTS, databases, servers, etc., limits: who (user/user role) can invoke which methods (based on value and MAC level) of artifact APIs at what times, and who (user) can delegate which responsibility (user role) at what times. In this chapter, we focus on assurance for the timeframe
Proceedings of the tenth international conference on Information Systems - ICIS '89, 1989
... Source, Pages: 131. Year of Publication: 1990. Order Number:AAI9110424. Authors, Joan Marie P... more ... Source, Pages: 131. Year of Publication: 1990. Order Number:AAI9110424. Authors, Joan Marie Peckham, Major Advisers, Fred Marmanski, Publisher, The University of Connecticut. ... Collaborative Colleagues: Joan Marie Peckham: colleagues. Fred Marmanski: colleagues. ...
Proceedings of the first ACM Workshop on Role-based access control - RBAC '95, 1996
Proceedings of Phoenix Conference on Computers and Communications, 1993
User-role based security (URBS) is a technique for characterizing database security that takes th... more User-role based security (URBS) is a technique for characterizing database security that takes the responsibilities of individuals into consideration when determining the security requirements of an application. In previous work, the authors developed a set of techniques for defining and analyzing URBS for an application. They extend this work by considering an actual individual's authorized access rights in an application,
Conference Proceedings 1991 IEEE International Conference on Systems, Man, and Cybernetics, 1991
A dynamic distributed decision-making (DDD) environment for US Naval command and control is being... more A dynamic distributed decision-making (DDD) environment for US Naval command and control is being utilized for experimentation on the cooperation of human decision-makers as they attempt to attain common goals. ADAM/DDD is a design tool that promotes the specification of a complete and accurate scenario for a given experiment. From conceptually structured designs, ADAM/DDD generates the information and facts that
Eleventh Annual International Phoenix Conference on Computers and Communication [1992 Conference Proceedings], 1992
ABSTRACT

Proceedings SCCC'98. 18th International Conference of the Chilean Society of Computer Science (Cat. No.98EX212), 1998
Software architectural design is essential for complex distributed applications. Architectural sp... more Software architectural design is essential for complex distributed applications. Architectural specifications need to define the key aspects of the application, including its intended functions, interfaces, interoperability requirements, distributability, scalability, extensibility, target platforms and networks, and required middleware services. In this paper, we present an architectural extension for specifying distributable components of the application and for quantifying their interaction patterns. The goal of the specification is to serve as the basis for obtaining optimal distributions of the application components over a target network that minimizes remote communication among the components. The optimal distributions are obtained by using the architectural specification to derive a BIP (binary integer programming) model and solving the resulting system. We formalize the object-oriented architectural style using the Z specification language. This style defines the detailed information necessary to derive optimal distributions using the BIP model.
Proceedings of the conference on TRI-Ada '97 - TRI-Ada '97, 1997
ABSTRACT
Research Advances in Database and Information Systems Security, 2000
Knowledge Intensive CAD, 1997
ABSTRACT
ACM SIGAda Ada Letters, 2000
Eighth Annual International Phoenix Conference on Computers and Communications. 1989 Conference Proceedings, 1989

Database Security XII, 1999
ABSTRACT : In the past two years, Java has exploded onto the computing landscape, offering an obj... more ABSTRACT : In the past two years, Java has exploded onto the computing landscape, offering an object-oriented language and environment that is suitable for a wide variety of application domains. Java is targeted for applications that include: advanced capabilities in WWW browsers via applets; enterprise computing with database connectivity, CORBA, and RMI; usage in personal, commercial, and consumer market products; embedded computing applications with real-time constraints; and, smart card technology. Security is an integral component of many of these applications, to control access and prevent misuse. The purpose of this chapter is to focus on the security capabilities and potentials of Java. There must be an understanding of the available security primitives in Java, an investigation of the ability of Java to support existing object-oriented security approaches, and a consideration of potential security solutions for distributed object computing applications. 1.1 INTRODUCTION T...
Proceedings of the 1985 ACM annual conference on The range of computing : mid-80's perspective mid-80's perspective - ACM '85, 1985
Proceedings of the 1985 ACM annual conference on The range of computing : mid-80's perspective mid-80's perspective - ACM '85, 1985
1986 IEEE Second International Conference on Data Engineering, 1986
Advances in Computers, 1986
Uploads
Papers by Steven Demurjian