Elizabeth Unger

Elizabeth Unger
Kansas State University | KSU · Department of Computing and Information Sciences

About

9
Publications
279
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
63
Citations

Publications

Publications (9)
Article
An algorithm that uses program dependence graphs for static program analysis to validate secure information flow is presented. The algorithm is able to deal with a wider class of information flow policies than the well-known lattice model of secure information flow. The lattice model requires that the information flow permitted by a flow policy be...
Conference Paper
There has been considerable research in database security and inference control; however, that research deals primarily with statistical databases. Although some of the mechanisms proposed to deter compromise artificially introduce dynamicism into these otherwise static databases, very little effort has been devoted to the area of natural dynamics....
Conference Paper
An estimate of the information a database contains and the quantification of the vulnerability of that database to compromise by inferential methods is discussed. Such a measure could be used to evaluate the deterrent value of extant protection methods and provide a measure of the potential for inferential compromise through the use of one of the k...
Conference Paper
A mathematical computer programming system, MPS, implements the simplex algorithm developed for solving the linear programming (LP) problem. With the fast growing personal computer (PC) technology and the advent of software packages for the MPS PC, a class of learn-by-doing MPS users has emerged. Motivated by the fact that entering most LP data int...
Conference Paper
Object-oriented programming has become a popular programming paradigm. The number of researchers in the field has grown since the introduction of the Smalltalk programming language. Researchers interested in knowledge representation are striving to introduce more comprehensive ways to represent knowledge. Proposed is the representation of knowledge...
Article
In order to ensure a better logical data base design that captures the semantics of the enterprise application, two basic approaches, decomposition and synthesis, are employed. The synthesis approach provides a schema that envelops all the given dependencies, though currently applicable to only functional dependencies and only for 3NF. However, the...
Article
The purpose of this study was to create and validate a tool which could be administered to students enrolled in or considering enrollment in an introductory programming course to predict success in the course or alternatively to segregate enrolled students into fast and slow paced sections. Previous work which met the criteria of a self contained p...
Article
This paper describes one approach to answering the need for an introductory computer science course which will appeal to a university-wide audience. Kansas State University as many other institutions was faces with such a chllenge when financial constraints became more rigid. A large influx of students entered the Computer Science program, and man...

Network

Cited By