Prof.
Steven A. Demurjian
The
University of Connecticut, USA
Email: steve@engr.uconn.edu
Qualifications
1987 Ph.D., The Ohio State University
1982 M.S., Michigan State University
1980 B.A., Boston College
Publications (Selected)
-
Software
Engineering: Effective Teaching and Learning Approaches and Practice, Ellis,
H., Demurjian, S., and Naveda, F. (eds). IGI Global. Collection of
20+ articles, Sept. 2008.
-
Database Security,
IX: Status and Prospects, Spooner, D., Demurjian, S., and Dobson, J. (eds.),
Springer, Jan. 1996.
-
Demurjian, S.,
Hsiao, D., and Marshall, R., Design-Analysis and Performance-Evaluation
Methodologies for Database Computers, monograph, Prentice-Hall, Inc.,
May 1987.
-
Ph.D. Dissertation:
"The Multi-Lingual Database System - A Paradigm and Test-Bed for the
Investigation of Data-Model Transformations, Data-Language Translations and
Data-Model Semantics"; Co-Advisors: David K. Hsiao and Douglas S. Kerr.
-
Pavlich-Mariscal,
J., Demurjian, S., and Michel, L, “A Framework of Composable Security Features:
Preserving Separation of Security Concerns from Models to Code” in: Computer
& Security Journal, special issue on Software Engineering for Secure
Systems, Vol. 29, No. 3, May 2010, pp. 350-379, Elsevier EES.
-
Doan, T.,
Demurjian, S., Michel, L., and Berhe, S. “Integrating Access Control into UML
for Secure Software Modeling and Analysis”, in: International Journal
of Secure Software Engineering,IGI Global, Vol. 1, No. 1, Jan.-March 2010,
pp. 1-19.
-
Demurjian, S., Ren,
H., Berhe, S., Devineni, M., Vegad, S., and Polineni, K., “Chapter 24:
Improving the Information Security of Collaborative Web Portals via
Fine-Grained Role-Based Access Control,” in Handbook of Research on Web
2.0, 3.0 and X.0: Technologies, Business and Social Applications, S.
Murugesan (ed.), a volume of the Advances in E-Business Research
Series, IGI Global, Apr. 2010, pp. 430-448.
-
Crowell, R.,
Agresta, T., Cook, M., Fifield, J., Demurjian, S., Carter, S., Becerra-Ortiz,
I., Vegad, S., and Polineni, K., “Chapter 39: Using a Collaborative Web Portal
for Making Health Information Technology (HIT) Decisions,” in Handbook
of Research on Web 2.0, 3.0 and X.0: Technologies, Business and Social
Applications, a volume of the Advances in E-Business Research
Series, S. Murugesan (ed.), IGI Global, Apr. 2010, pp. 862-698.
-
Demurjian, S.,
“Assessment of Candidate Information Models for Granular Computing,” International
Journal of Granular Computing, Rough Sets, and Intelligent Systems (IJGCRSIS),
Vol. 1., No. 1, July 2009, pp. 1-20.
-
Berhe, S.,
Demurjian, S., and Agresta, T. “Emerging Trends in Health Care Delivery:
Towards Collaborative Security for NIST RBAC,” in Research
Directions in Data and Applications Security XXIII, E.
Gudes and J. Viadya (eds.), LNCS 5645, Springer, July 2009, pp. 283-290.
-
Demurjian, S.,
“Granular Computing, Information Models for,” in Encyclopedia of
Complexity and Systems Science, R. Meyers (Editor-in-Chief), Granular
Computing Section, T. Y. Lin (ed.), Springer, June 2009, pp. 4305-4313.
-
Demurjian, S. and
D. Needham, “Experiences in Project-Based Software Engineering - What Works,
What Doesn't,” in: Software Engineering: Effective Teaching and
Learning Approaches and Practice,
-
H. Ellis, S.
Demurjian, and F. Naveda (eds.), IGI Global, Sept. 2008, pp. 191-212.
-
Ammar, R.,
Demurjian, S., Greenshields, I., Pattipati, K., and Rajasekaran, S., “Analysis
of Heterogeneous Data in Ultrahigh Dimensions,” in Emergent Information
Technologies and Enabling Policies for Counter Terrorism. R. Popp and
J. Yen (eds.), IEEE Press Series on Computational Intelligence, D. Fogel
(series ed.), 2006, pp. 105-121.
-
Pavlich-Mariscal,
J., Michel, L., and Demurjian, S., “A Framework for Composable Security
Definition, Assurance, and Enforcement, ” Satellite Events at the
MoDELS 2005 Conference, ModELS 2005 International Workshops, Doctoral
Symposium, Educators Symposium, LNCS 3844, Springer, Oct. 2005, pp.
353-354.
-
Pavlich-Mariscal,
J., Doan, T., Michel, L., Demurjian, S., and Ting, T.C., “Role Slices: A
Notation for RBAC Permission Assignment and Enforcement,” in Research
Directions in Data and Applications Security XIX, S.
Jajodia (ed.), LNCS 3654, Springer, July 2005, pp. 40-53.
-
Phillips, C.,
Demurjian, S., and Bessette, K., “A Service-Based Approach for RBAC and MAC
Security,” in Service-Oriented Software System Engineering: Challenges
and Practices, Z. Stojanovic and A. Dahanayake (eds.), Idea Group,
Apr. 2005, pp. 317-339.
-
Needham, D.,
Caballero, R., Demurjian, S., Eickhoff, F., Mehta, J., and Zhang, Y., “A Reuse
Definition and Analysis Framework for UML,” in Advances in UML and XML
based Software Evolution, H. Yang (ed.), Idea Group, Apr. 2005, pp.
286-307.
-
Demurjian, S.,
“Traditional Software Design,” in Computer Science Handbook, 2nd edition,
CRC Press, Inc., A. Tucker (ed.), June 2004, pp. 103-1 - 103-18; CD-ROM
Edition, Nov. 2004.
-
Demurjian, S. and
Pia, P., “Object-Oriented Software Design,” in Computer Science
Handbook, 2nd edition, CRC Press, Inc., A. Tucker
(ed.), June 2004, pp. 104-1 - 104-20; CD-ROM Edition, Nov. 2004.
-
Demurjian, S.,
Bessette, K., Doan, T., and Phillips, C., “Concepts and Capabilities of
Middleware Security,” in Middleware for Communications, Q.
Mohammed (ed.), John-Wiley, Aug. 2004, pp. 211236.
-
Doan, T.,
Demurjian, S., Ting, T.C., and Phillips, C., “RBAC/MAC Security for UML,” in Research
Directions in Data and Applications Security XVIII, C. Farkas and P.
Samarati (eds.), Vol. IFIP 144, 2004, Springer, July 2004, pp. 189-204.
-
Phillips, C.,
Demurjian, S., and Ting, T.C., “Safety and Liveness for an RBAC/MAC Security
Model,” in Database and Applications Security XVII: Status and
Prospects, S. di Vimercati, I. Ray, and I. Ray, (eds.), Vol. IFIP 142,
Springer, July 2004, pp. 316-329.
-
Liebrand, M.,
Ellis, H., Phillips, C., Demurjian, S., Ting, T.C., and Ellis, J., “Role
Delegation for a Resource-Based Security Model,” in Research Directions
in Data and Applications Security, E. Gudes and S. Shenoi (eds.), Vol.
IFIP 128, Springer, July 2003, pp. 37-48.
-
Demurjian, S.,
Ting, T.C., Balthazar, J., Ren, H., Phillips, C., and Barr, P., “A User
Role-Based Security Model for a Distributed Environment,” in Data and
Applications Security: Developments and Directions, B. Thuraisingham,
R. van de Riet, K. Dittrich and Z. Tari (eds.), Vol. IFIP 73, Springer, 2001,
pp. 259-270.
-
Demurjian, S., He,
Y., Ting, T.C., and Saba, M., “Software Agents for Role Based Security,” in Research
Advances in Database and Information Systems Security, V. Atluri and
J. Hale (eds.), Vol. IFIP 43, Springer, May 2000, pp. 79-93.
-
Bastarrica, M.,
Demurjian, S., and Shvartsman, A., “A Framework for Architectural Specification
of Distributed Object Systems,” Studia Informatica (Intl. J. of
Informatics), Special Issue, Vol. I, 1999, pp. 127-148.
-
Smarkusky, D.,
Demurjian, S., Bastarrica, M, and Ting, T.C., “Role-Based Security and Java,”
in Database Security, XII: Status and Prospects, S. Jajodia
(ed.), Vol. IFIP 14, Springer, Apr. 1999, pp. 205-219.
-
Demurjian, S.,
Ting, T.C., and Reisner, J., “Software Architectural Alternatives for User
Role-Based Security Policies,” in Database Security, XI: Status and
Prospects, T.Y. Lin and X. Qian (eds.), Springer, Apr. 1999, pp. 247-261.
-
Demurjian, S., and
Ting, T.C., “Towards a Definitive Paradigm for Security in Object-Oriented
Systems and Applications,” J. of Computer Security, Vol. 5, No. 4,
1997, pp. 341-382.
-
Demurjian, S.,
Ting, T.C., Price, M., and Hu, M.-Y., “Extensible and Reusable Role-Based
Object-Oriented Security,” in Database Security, X: Status and
Prospects, P. Samarati and R. Sandhu (eds.), Springer, Apr. 1997, pp.
288-307.
-
Needham, D.,
Peters, T., and Demurjian, S., “Object-Oriented Design Abstractions and Code
Generation Front Ends to CAD Systems,” in Product Modeling for Computer
Integrated Design and Manufacture, M. Pratt, R. Sriram, and M. Wozny
(eds.), Chapman Hall, 1997, pp. 43-53.
-
Demurjian, S.,
“Software Design,” Handbook of Computer Science & Engineering, CRC
Press, Inc., A. Tucker (ed.), 1997, pp. 108-1-108.32.
-
Rosiene, C., Ammar,
R., and Demurjian, S., “An Evolvable and Extensible Modeling Framework for
Performance Analysis,” Information and Systems Engineering J., Vol.
2, Nos. 3 and 4, Dec. 1996, pp. 253-276.
-
Demurjian, S.,
Ting, T.C., and Hu, M.-Y., “Security for Object-Oriented Databases, Systems,
and Applications,” Progress in Object-Oriented Databases, J. Prater
(ed.), Ablex, Nov. 1996.
-
Peckham, J.,
Maryanski, F., and Demurjian, S., “Towards the Correctness and Consistency of
Update Semantics in Semantic Database Schema,” IEEE Transactions on
Knowledge and Data Engineering, Vol. 8, No. 3, June 1996, pp. 503-507.
Profile Details:
Null