T. C. Ting

438 total citations
27 papers, 201 citations indexed

About

T. C. Ting is a scholar working on Artificial Intelligence, Sociology and Political Science and Information Systems. According to data from OpenAlex, T. C. Ting has authored 27 papers receiving a total of 201 indexed citations (citations by other indexed papers that have themselves been cited), including 13 papers in Artificial Intelligence, 8 papers in Sociology and Political Science and 6 papers in Information Systems. Recurrent topics in T. C. Ting's work include Security and Verification in Computing (10 papers), Access Control and Trust (7 papers) and Information and Cyber Security (5 papers). T. C. Ting is often cited by papers focused on Security and Verification in Computing (10 papers), Access Control and Trust (7 papers) and Information and Cyber Security (5 papers). T. C. Ting collaborates with scholars based in United States, Australia and United Kingdom. T. C. Ting's co-authors include Steven A. Demurjian, B. Thuraisingham, Albert N. Badre, Ravi Sandhu, Bhavani Thuraisingham, Bin Li, P. Barr and David L. Kleinman and has published in prestigious journals such as IEEE Transactions on Knowledge and Data Engineering, The Computer Journal and Journal of Computer Security.

In The Last Decade

T. C. Ting

24 papers receiving 171 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
T. C. Ting United States 8 135 112 86 54 14 27 201
Daniel Ricardo dos Santos Brazil 7 96 0.7× 81 0.7× 138 1.6× 75 1.4× 6 0.4× 19 202
Slim Trabelsi France 9 102 0.8× 85 0.8× 126 1.5× 72 1.3× 6 0.4× 31 195
Prathima Rao United States 8 194 1.4× 231 2.1× 129 1.5× 74 1.4× 6 0.4× 14 298
Aliaksandr Lazouski Italy 9 139 1.0× 135 1.2× 122 1.4× 97 1.8× 6 0.4× 18 229
Nicodemos Damianou United Kingdom 5 135 1.0× 166 1.5× 158 1.8× 159 2.9× 7 0.5× 7 287
John DeTreville United States 5 127 0.9× 102 0.9× 64 0.7× 111 2.1× 7 0.5× 10 223
R. Khare United States 6 84 0.6× 19 0.2× 119 1.4× 107 2.0× 8 0.6× 14 184
Satoshi Hada Japan 7 276 2.0× 293 2.6× 170 2.0× 124 2.3× 4 0.3× 10 396
Manuel Koch Germany 6 109 0.8× 91 0.8× 96 1.1× 34 0.6× 71 5.1× 12 185
Laurent Bussard Germany 8 109 0.8× 82 0.7× 80 0.9× 75 1.4× 3 0.2× 21 186

Countries citing papers authored by T. C. Ting

Since Specialization
Citations

This map shows the geographic impact of T. C. Ting's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by T. C. Ting with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites T. C. Ting more than expected).

Fields of papers citing papers by T. C. Ting

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by T. C. Ting. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by T. C. Ting. The network helps show where T. C. Ting may publish in the future.

Co-authorship network of co-authors of T. C. Ting

This figure shows the co-authorship network connecting the top 25 collaborators of T. C. Ting. A scholar is included among the top collaborators of T. C. Ting based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with T. C. Ting. T. C. Ting is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Demurjian, Steven A., et al.. (2004). MAC and UML for secure software design. 75–85. 29 indexed citations
2.
Demurjian, Steven A., et al.. (2002). Towards an authorization mechanism for user-role based security in an object-oriented design model. 195–202. 1 indexed citations
3.
Demurjian, Steven A., et al.. (2000). Role-Based Security in a Distributed Resource Environment. 259–270. 1 indexed citations
4.
Demurjian, Steven A. & T. C. Ting. (1997). Towards a definitive paradigm for security in object-oriented systems and applications. Journal of Computer Security. 5(4). 341–382. 8 indexed citations
5.
Demurjian, Steven A., et al.. (1996). Role-based access control for object-oriented/C++ systems. 19–es. 1 indexed citations
6.
Thuraisingham, B. & T. C. Ting. (1996). Guest Editors' Introduction to the Special Issue on Secure Database Systems Technology. IEEE Transactions on Knowledge and Data Engineering. 8(1). 1–1. 5 indexed citations
7.
Thuraisingham, Bhavani, Ravi Sandhu, & T. C. Ting. (1994). Security for object-oriented systems : proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993. Springer eBooks. 1 indexed citations
8.
Thuraisingham, Bhavani, et al.. (1994). Object-oriented technology for health care and medical information systems. 122–126. 1 indexed citations
9.
Demurjian, Steven A., et al.. (1993). User-role based security profile for an object-oriented design model. 333–348. 12 indexed citations
10.
Thuraisingham, Bhavani, Ravi Sandhu, & T. C. Ting. (1993). Security for object-oriented systems. 77–78. 3 indexed citations
11.
Ting, T. C.. (1993). Modeling security requirements for applications. 305–305. 1 indexed citations
12.
Demurjian, Steven A., et al.. (1992). User-Role Based Security Profiles for an Object-Oriented Design Model.. 333–348. 2 indexed citations
13.
Ting, T. C., et al.. (1991). Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model. 275–296. 26 indexed citations
14.
Ting, T. C.. (1989). Application Information Security Semantics: A Case of Mental Health Delivery.. 1–12. 18 indexed citations
15.
Ting, T. C., et al.. (1988). An Analysis of Database Security with Queries for High Order Statistical Information.. 8(4). 207–223. 1 indexed citations
16.
Ting, T. C.. (1987). A User-Role Based Data Security Approach.. 187–208. 5 indexed citations
17.
Ting, T. C.. (1977). Compacting homogeneous text for minimizing storage space. International Journal of Parallel Programming. 6(3). 211–221. 3 indexed citations
18.
Ting, T. C.. (1977). Multiway replacement selection sort with dynamic reservoir. The Computer Journal. 20(4). 298–301. 3 indexed citations
19.
Ting, T. C. & Albert N. Badre. (1976). A dynamic model of man-machine interactions: design and application with an audiographic learning facility. International Journal of Man-Machine Studies. 8(1). 75–88. 4 indexed citations
20.
Ting, T. C., et al.. (1974). An on-line interactive audiographic learning system. 239–244. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026