Databases Reference
In-Depth Information
formation Systems . Conference Proceedings CF-151-OSD. RAND Corporation,
1999.
7. Kun Bai, Hai Wang, and Peng Liu. Towards database firewalls. In 9th An-
nual IFIP WG 11.3 Working Conference on Data and Applications Security
(DBSec05) , pages 178-192, 2005.
8. Daniel Barbara, Julia Couto, Sushil Jajodia, and Ningning Wu. An architecture
for anomaly detection. In Daniel Barbara and Sushil Jajodia (eds.), Applica-
tions of Data Mining in Computer Security , pages 63-76. Kluwer Academic
Publishers, 2002.
9. Carlo Batini and Monica Scannapieco (eds.). Data Quality: Concepts, Method-
ologies and Techniques (Data-Centric Systems and Applications) .
Springer,
2006.
10. Elisa Bertino, Claudio Bettini, Elena Ferrari, and Pierangela Samarati. An
access control model supporting periodicity constraints and temporal reasoning.
ACM Transations on Database Systems , 23(3):231-285, 1998.
11. Matt Bishop. Computer Security: Art and Science . Addison-Wesley, 2002.
12. Silvana Castano, Maria Grazia Fugini, , Giancarlo Martella, and Pierangela
Samarati. Database Security . Addison-Wesley Professional, 1994.
13. Christina Yip Chung, Michael Gertz, and Karl N. Levitt. DEMIDS: A mis-
use detection system for database systems. In Third Working Conference on
Integrity and Internal Control in Information Systems, IFIP TC11 Working
Group 11.5 , Kluwer, pages 159-178, 1999.
14. Christina Yip Chung, Michael Gertz, and Karl N. Levitt. Misuse detection
in database systems through user profiling. In Recent Advances in Intrusion
Detection (RAID'99) , 1999.
15. Christina Yip Chung, Michael Gertz, and Karl N. Levitt. Discovery of multi-
level security policies. In FIP TC11/ WG11.3 Fourteenth Annual Working
Conference on Database Security (DBSec00) , Kluwer, pages 173-184, 2000.
16. Michael J. Covington, Wende Long, Srividhya Srinivasan, Anind K. Dey, Mus-
taque Ahamad, and Gregory D. Abowd. Securing context-aware applications
using environment roles. In 6th ACM Symposium on Access Control Models and
Technologies (SACMAT 2001) , pages 10-20, 2001.
17. Vino Fernando Crescini and Yan Zhang. PolicyUpdater: a system for dynamic
access control.
International Journal of Information Security , 5(3):145-165,
2006.
18. Tamraparni Dasu and Theodore Johnson, editors. Exploratory Data Mining and
Data Cleaning . Wiley-Interscience, 2003.
19. Department of Defense. DoD insider threat mitigation, Insider threat integrated
process team, Final report of the insider threat integrated process team. Tech-
nical report, Washington, DC, 2000.
20. Carl Endorf, Gene Schultz, and Jim Mellander. Intrusion Detection and Pre-
vention . McGraw-Hill Osborne Media, 2003.
21. Tom Fawcett and Foster J. Provost. Combining data mining and machine learn-
ing for effective user profiling. In Proceedings of the Second International Con-
ference on Knowledge Discovery and Data Mining (KDD96) , pages 8-13, 1996.
22. Tom E. Fawcett and Foster Provost. Fraud Deection. In Handbook of data
mining and knowledge discovery , pages 726-731. Oxford University Press, Inc.,
2002.
Search WWH ::




Custom Search