Thuong Doan's Publications

[Home]

 

Build a Compassionate World and WWW!

By Education
Education = Practice(Discipline, Creativity, Tolerance)
where Discipline = Follow(Natural Laws), Creativity = Play(Meta(Meta(Knowledge)))

and Tolerance = Give(Love)

 

 

Conference Papers | Book Chapters | Other Papers

 

Conference Papers

 

 2006

 

   

8.  

Thuong Doan, Laurent Michel, and Steven Demurjian. A Formal Framework for Secure Design and Constraint Checking in UML. In Proc. of the IEEE International Symposium on Secure Software Engineering (ISSSE’06). Virginia, USA, March, 2006.

 

 

 

 

7.

S. Demurjian, S. Rajasekaran, R. Ammar, I. Greenshields, T. Doan, and L. He. Applying LSI and Data Reduction to XML for Counter Terrorism. In Proc. of the IEEE Aerospace Conference. Montana, USA, March, 2006.

 2005

 

   

6.   

J. A. Pavlich-Mariscal, T. Doan, L. Michel, S. A. Demurjian and T.C. Ting. Role Slices: A Notation for RBAC Permission Assignment and Enforcement. Data and Applications Security XIX (Proc. of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security. Storrs, Connecticut, USA, August, 2005), Sushil Jajodia and Duminda Wijesekera (editors). LNCS 3654. Springer, 2005, pp. 40-53.

 

 

 

 

5. 

Thuong Doan, Laurent D. Michel, Steven A. Demurjian and T.C. Ting. Stateful Design for Secure Information Systems. In Proc. of the 3rd International Workshop on Security In Information Systems (WOSIS’05). Miami, USA, May 2005, pp. 277-286. [Full paper]

 2004

 

 

4.

Thuong Doan, Steven Demurjian, Reda Ammar, and T.C. Ting. UML Design with Security Integration as First Class Citizen. In Proc. of the 3rd International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications (CSITeA'04). Cairo, Egypt, December 27-29, 2004 (in CD only).[Full paper]

 

 

 

 

3.

Thuong Doan, Steven Demurjian, T.C. Ting, and Andreas Ketterl. MAC and UML for Secure Software Design. In Proc. of the 2nd ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code (FMSE'04). Washington D.C., USA, October 2004, pp. 75-85. [Full paper][ACM Digital Library link]

 

 

 

 

2.

T. Doan, S. Demurjian, T.C. Ting, and C. Phillips.RBAC/MAC Security for UML. Research Directions in Data and Applications Security XVIII (Proc. of the 18th Annual IFIP WG 11.3 Working Conference on Data and Applications Security. Sitges, Spain, July 2004), Csilla Farkas and Pierangela Samarati (editors). Kluwer Academic Publishers, 2004, pp. 189-203. ISBN 1-4020-8127-8 (or 1-4020-8128-6 for eBook). [Full paper]

 1999

 

 

1.

Thuong Doan, Peter Haddawy, Tien Nguyen, and Deva Seetharam. A Hybrid Bayesian Network Modeling Environment. In Proc. of the National Computer Science and Engineering Conference (NCSEC), Bangkok, Thailand, 1999.[Full paper]

 

 

 

 

Book Chapters

 

 2004

 

   

1.    

S. Demurjian, K. Bessette, T. Doan, and C. Phillips. Concepts and Capabilities of Middleware Security. Chapter 9 of Middleware for Communications, Qusay H. Mahmoud (editor). John Wiley & Sons, 2004. (Due to the copyright commitment, only the Introduction Section is presented here. For more details, please see the Book Information)

 

 

 

 

Other Papers

 

 2003

 

   

1.    

John. F. Cawley, Teresa. E. Foley, and Thuong Doan. Giving Students With Disabilities a Voice in the Selection of Arithmetical Content. Teaching Exceptional Children, Vol. 36, No. 1, pp. 8-16, 2003. [Journal link]

 

 

 

  

Updated on 1/1/2006.