Biography

Prof. Steven A. Demurjian

The University of Connecticut, USA


Email: steve@engr.uconn.edu


Qualifications

1987  Ph.D., The Ohio State University

1982  M.S., Michigan State University

1980  B.A., Boston College


Publications (Selected)

  1. Software Engineering: Effective Teaching and Learning Approaches and Practice, Ellis, H., Demurjian, S., and Naveda, F. (eds). IGI Global.  Collection of 20+ articles, Sept. 2008.
  2. Database Security, IX: Status and Prospects, Spooner, D., Demurjian, S., and Dobson, J. (eds.), Springer, Jan. 1996.
  3. Demurjian, S., Hsiao, D., and Marshall, R., Design-Analysis and Performance-Evaluation Methodologies for Database Computers, monograph, Prentice-Hall, Inc., May 1987.
  4. Ph.D. Dissertation: "The Multi-Lingual Database System - A Paradigm and Test-Bed for the Investigation of Data-Model Transformations, Data-Language Translations and Data-Model Semantics"; Co-Advisors: David K. Hsiao and Douglas S. Kerr.
  5. Pavlich-Mariscal, J., Demurjian, S., and Michel, L, “A Framework of Composable Security Features: Preserving Separation of Security Concerns from Models to Code” in: Computer & Security Journal, special issue on Software Engineering for Secure Systems, Vol. 29, No. 3, May 2010, pp. 350-379, Elsevier EES.
  6. Doan, T., Demurjian, S., Michel, L., and Berhe, S. “Integrating Access Control into UML for Secure Software Modeling and Analysis”, in: International Journal of Secure Software Engineering,IGI Global, Vol. 1, No. 1, Jan.-March 2010, pp. 1-19.
  7. Demurjian, S., Ren, H., Berhe, S., Devineni, M., Vegad, S., and Polineni, K., “Chapter 24: Improving the Information Security of Collaborative Web Portals via Fine-Grained Role-Based Access Control,” in Handbook of Research on Web 2.0, 3.0 and X.0: Technologies, Business and Social Applications, S. Murugesan (ed.), a volume of the Advances in E-Business Research Series, IGI Global, Apr. 2010, pp. 430-448.
  8. Crowell, R., Agresta, T., Cook, M., Fifield, J., Demurjian, S., Carter, S., Becerra-Ortiz, I., Vegad, S., and Polineni, K., “Chapter 39: Using a Collaborative Web Portal for Making Health Information Technology (HIT) Decisions,” in Handbook of Research on Web 2.0, 3.0 and X.0: Technologies, Business and Social Applications, a volume of the Advances in E-Business Research Series, S. Murugesan (ed.), IGI Global, Apr. 2010, pp. 862-698.
  9. Demurjian, S., “Assessment of Candidate Information Models for Granular Computing,” International Journal of Granular Computing, Rough Sets, and Intelligent Systems (IJGCRSIS), Vol. 1., No. 1, July 2009, pp. 1-20.
  10. Berhe, S., Demurjian, S., and Agresta, T. “Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC,” in Research Directions  in Data and Applications Security XXIII, E. Gudes and J. Viadya (eds.), LNCS 5645, Springer, July 2009, pp. 283-290.
  11. Demurjian, S., “Granular Computing, Information Models for,” in Encyclopedia of Complexity and Systems Science, R. Meyers (Editor-in-Chief), Granular Computing Section, T. Y. Lin (ed.), Springer, June 2009, pp. 4305-4313.
  12. Demurjian, S. and D. Needham, “Experiences in Project-Based Software Engineering - What Works, What Doesn't,” in: Software Engineering: Effective Teaching and Learning Approaches and Practice,
  13. H. Ellis, S. Demurjian, and F. Naveda (eds.), IGI Global, Sept. 2008, pp. 191-212.
  14. Ammar, R., Demurjian, S., Greenshields, I., Pattipati, K., and Rajasekaran, S., “Analysis of Heterogeneous Data in Ultrahigh Dimensions,” in Emergent Information Technologies and Enabling Policies for Counter Terrorism. R. Popp and J. Yen (eds.), IEEE Press Series on Computational Intelligence, D. Fogel (series ed.), 2006, pp. 105-121.
  15. Pavlich-Mariscal, J., Michel, L., and Demurjian, S., “A Framework for Composable Security Definition, Assurance, and Enforcement, ” Satellite Events at the MoDELS 2005 Conference, ModELS 2005 International Workshops, Doctoral Symposium, Educators Symposium, LNCS 3844, Springer, Oct. 2005, pp. 353-354.
  16. Pavlich-Mariscal, J., Doan, T., Michel, L., Demurjian, S., and Ting, T.C., “Role Slices: A Notation for RBAC Permission Assignment and Enforcement,” in Research Directions  in Data and Applications Security XIX, S. Jajodia (ed.), LNCS 3654, Springer, July 2005, pp. 40-53.
  17. Phillips, C., Demurjian, S., and Bessette, K., “A Service-Based Approach for RBAC and MAC Security,” in Service-Oriented Software System Engineering: Challenges and Practices, Z. Stojanovic and A. Dahanayake (eds.), Idea Group, Apr.  2005, pp. 317-339.
  18. Needham, D., Caballero, R., Demurjian, S., Eickhoff, F., Mehta, J., and Zhang, Y., “A Reuse Definition and Analysis Framework for UML,” in Advances in UML and XML based Software Evolution, H. Yang (ed.), Idea Group, Apr. 2005, pp. 286-307.
  19. Demurjian, S., “Traditional Software Design,” in Computer Science Handbook, 2nd edition, CRC Press, Inc., A. Tucker (ed.), June 2004, pp. 103-1 - 103-18; CD-ROM Edition, Nov. 2004.
  20. Demurjian, S. and Pia, P., “Object-Oriented Software Design,” in Computer Science Handbook, 2nd edition, CRC Press, Inc., A. Tucker (ed.), June 2004, pp. 104-1 - 104-20; CD-ROM Edition, Nov. 2004.
  21. Demurjian, S., Bessette, K., Doan, T., and Phillips, C., “Concepts and Capabilities of Middleware Security,” in Middleware for Communications, Q. Mohammed (ed.), John-Wiley, Aug. 2004, pp. 211­236.
  22. Doan, T., Demurjian, S., Ting, T.C., and Phillips, C., “RBAC/MAC Security for UML,” in Research Directions in Data and Applications Security XVIII, C. Farkas and P. Samarati (eds.), Vol. IFIP 144, 2004, Springer, July 2004, pp. 189-204.
  23. Phillips, C., Demurjian, S., and Ting, T.C., “Safety and Liveness for an RBAC/MAC Security Model,” in Database and Applications Security XVII: Status and Prospects, S. di Vimercati, I. Ray, and I. Ray, (eds.), Vol. IFIP 142, Springer, July 2004, pp. 316-329.
  24. Liebrand, M., Ellis, H., Phillips, C., Demurjian, S., Ting, T.C., and Ellis, J., “Role Delegation for a Resource-Based Security Model,” in Research Directions in Data and Applications Security, E. Gudes and S. Shenoi (eds.), Vol. IFIP 128, Springer, July 2003, pp. 37-48.
  25. Demurjian, S., Ting, T.C., Balthazar, J., Ren, H., Phillips, C., and Barr, P., “A User Role-Based Security Model for a Distributed Environment,” in Data and Applications Security: Developments and Directions, B. Thuraisingham, R. van de Riet, K. Dittrich and Z. Tari (eds.), Vol. IFIP 73, Springer, 2001, pp. 259-270.
  26. Demurjian, S., He, Y., Ting, T.C., and Saba, M., “Software Agents for Role Based Security,” in Research Advances in Database and Information Systems Security, V. Atluri and J. Hale (eds.), Vol. IFIP 43, Springer,  May 2000, pp. 79-93.
  27. Bastarrica, M., Demurjian, S., and Shvartsman, A., “A Framework for Architectural Specification of Distributed Object Systems,” Studia Informatica (Intl. J. of Informatics), Special Issue, Vol. I, 1999, pp. 127-148.
  28. Smarkusky, D., Demurjian, S., Bastarrica, M, and Ting, T.C., “Role-Based Security and Java,” in Database Security, XII: Status and Prospects, S. Jajodia (ed.), Vol. IFIP 14, Springer, Apr. 1999, pp. 205-219.
  29. Demurjian, S., Ting, T.C., and Reisner, J., “Software Architectural Alternatives for User Role-Based Security Policies,” in Database Security, XI: Status and Prospects, T.Y. Lin and X. Qian (eds.), Springer, Apr. 1999, pp. 247-261.
  30. Demurjian, S., and Ting, T.C., “Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications,” J. of Computer Security, Vol. 5, No. 4, 1997, pp. 341-382.
  31. Demurjian, S., Ting, T.C., Price, M., and Hu, M.-Y., “Extensible and Reusable Role-Based Object-Oriented Security,” in Database Security, X: Status and Prospects, P. Samarati and R. Sandhu (eds.), Springer, Apr. 1997, pp. 288-307.
  32. Needham, D., Peters, T., and Demurjian, S., “Object-Oriented Design Abstractions and Code Generation Front Ends to CAD Systems,” in Product Modeling for Computer Integrated Design and Manufacture, M. Pratt, R. Sriram, and M. Wozny (eds.), Chapman Hall, 1997, pp. 43-53.
  33. Demurjian, S., “Software Design,” Handbook of Computer Science & Engineering, CRC Press, Inc., A. Tucker (ed.), 1997, pp. 108-1-108.32.
  34. Rosiene, C., Ammar, R., and Demurjian, S., “An Evolvable and Extensible Modeling Framework for Performance Analysis,” Information and Systems Engineering J., Vol. 2, Nos. 3 and 4, Dec. 1996, pp. 253-276.
  35. Demurjian, S., Ting, T.C., and Hu, M.-Y., “Security for Object-Oriented Databases, Systems, and Applications,” Progress in Object-Oriented Databases, J. Prater (ed.), Ablex, Nov. 1996.
  36. Peckham, J., Maryanski, F., and Demurjian, S., “Towards the Correctness and Consistency of Update Semantics in Semantic Database Schema,” IEEE Transactions on Knowledge and Data Engineering, Vol. 8, No. 3, June 1996, pp. 503-507.


Profile Details:

Null

Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top