Databases Reference
In-Depth Information
23. Amgad Fayad, Sushil Jajodia, and Catherine D. McCollum. Application-level
isolation using data inconsistency detection. In 15th Annual Computer Security
Applications Conference (ACSAC 1999) , page 119, 1999.
24. David F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn, and
Ramaswamy Chandramouli. Proposed NIST standard for role-based access con-
trol. ACM Transactions on Information and System Security , 4(3):224-274,
2001.
25. Michael Gertz and George Csaba. Monitoring mission critical data for integrity
and availability. In IFIP TC11/WG11.5 Fifth Working Conference on Integrity
and Internal Control in Information Systems (IICIS02) , Kluwer, pages 189-201,
2002.
26. Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn, and Robert Richard-
son.
2005 CSI/FBI computer crime and security survey.
Technical report,
Computer Security Institute, 2005.
27. R. J. Hulsebosch, Alfons H. Salden, Mortaza S. Bargh, P. W. G. Ebben, and
J. Reitsma. Context sensitive access control. In 10th ACM Symposium on Access
Control Models and Technologies (SACMAT05) , pages 111-119, 2005.
28. James Joshi, Elisa Bertino, Usman Latif, and Arif Ghafoor. A generalized tem-
poral role-based access control model. IEEE Trans. Knowl. Data Eng. , 17(1):4-
23, 2005.
29. Ashish Kamra, Evimaria Terzi, and Elisa Bertino. Detecting anomalous access
patterns in relational databases. To appear in The VLDB Journal , 2007.
30. David Knox. Effective Oracle Database 10g Security by Design . McGraw Hill
Professional, 2004.
31. Carl E. Landwehr. Computer security. International Journal of Information
Security , 1(1):3-13, 2001.
32. Terran Lane and Carla E. Brodley. Temporal sequence learning and data re-
duction for anomaly detection. In ACM Conference on Computer and Commu-
nications Security , pages 150-158, 1998.
33. Terran Lane and Carla E. Brodley. Temporal sequence learning and data re-
duction for anomaly detection. ACM Transactions on Information and System
Security , 2(3):295-331, 1999.
34. Wenke Lee and Salvatore J. Stolfo. A framework for constructing features and
models for intrusion detection systems. ACM Transactions on Information and
System Security , 3(4):227-261, 2000.
35. Ninghui Li and Mahesh V. Tripunitara. Security analysis in role-based access
control. ACM Transactions on Information and System Security , 9(4):391-420,
2006.
36. Yingjiu Li, Ningning Wu, Xiaoyang Sean Wang, and Sushil Jajodia. Enhancing
profiles for anomaly detection using time granularities. Journal of Computer
Security , 10(1/2):137-158, 2002.
37. Peng Liu. Architectures for intrusion tolerant database systems. In 18th An-
nual Computer Security Applications Conference (ACSAC 2002) , pages 311-
320, 2002.
38. John McHugh.
Intrusion and intrusion detection.
International Journal of
Information Security , 1(1):14-35, 2001.
39. Jim Melton and Alan R. Simon. SQL: 1999 - Understanding Relational Lan-
guage Components (The Morgan Kaufmann Series in Data Management Sys-
tems) . Morgan Kaufmann, 2001.
Search WWH ::




Custom Search