Databases Reference
In-Depth Information
40. Shubha U. Nabar, Bhaskara Marthi, Krishnaram Kenthapadi, Nina Mishra, and
Rajeev Motwani. Towards robustness in query auditing. In Proceedings of the
32nd International Conference on Very Large Data Bases (VLDB06) , pages
151-162, 2006.
41. Arup Nanda and Donald K. Burleson. Oracle Privacy Security Auditing . Ram-
pant Techpress, 2003.
42. Ron Ben Natan. Implementing Database Security and Auditing: Includes Exam-
ples for Oracle, SQL Server, DB2 UDB, Sybase . Elsevier Digital Press, 2005.
43. Peter G. Neumann. The challenges of insider misuse, Papers prepared for the
workshop on preventing, detecting, and responding to malicious insider mis-
use, 16-18 August 1999, at RAND, Santa Monica, CA. Technical report, SRI
Computer Science Lab, 1999.
44. Peng Ning and Sushil Jajodia. Intrusion detection systems basics. In Hos-
sein Bidgoli (ed.), Handbook of Information Security , volume 3, pages 685-700.
Wiley, 2006.
45. Sejong Oh, Ravi S. Sandhu, and Xinwen Zhang. An effective role administration
model using organization structure. ACM Transactions on Information and
System Security , 9(2):113-137, 2006.
46. Yong-Chul Oh and Shamkant B. Navathe. Seer: Security enhanced entity-
relationship model for modeling and integrating secure database environments.
In 14th International Conference on Object-Oriented and Entity-Relationship
Modelling (ER95) , pages 170-180, 1995.
47. Kyriacos Pavlou and Richard T. Snodgrass. Forensic analysis of database tam-
pering. In Proceedings of the 2006 ACM SIGMOD international conference on
management of data , pages 109-120, 2006.
48. Richard Power. 2002 CSI/FBI computer crime and security survey. Computer
Security Issues & Trends , 8(1), 2002.
49. Marcus K. Rogers. Internal security threats. In Hossein Bidgoli (ed.), Handbook
of Information Security , volume 3, pages 3-17. Wiley, 2006.
50. Arnon Rosenthal and Marianne Winslett. Security of shared data in large sys-
tems: State of the art and research directions. Tutorial at ACM SIGMOD
International Conference on Management of Data , pages 962-964, 2004.
51. Pierangela Samarati and Sabrina De Capitani di Vimercati. Access control:
Policies, models, and mechanisms. Tutorial Lectures in Foundations of Security
Analysis and Design Springer, Springer, LNCS 2171, pages 137-196, 2000.
52. Jurgen Schlegelmilch and Ulrike Steffens. Role mining with ORCA. In 10th
ACM Symposium on Access Control Models and Technologies (SACMAT05) ,
pages 168-176, 2005.
53. Alexandr Seleznyov and Oleksiy Mazhelis. Learning temporal patterns for
anomaly intrusion detection. In Proceedings of the 2002 ACM symposium on
Applied computing , pages 209-213, 2002.
54. Robert Selby Sielken. Application intrusion detection. Master thesis, Depart-
ment of Computer Science, University of Virginia, May 1999.
55. Richard T. Snodgrass, Shilong (Stanley) Yao, and Christian S. Collberg. Tamper
detection in audit logs. In Proceedings of the 30th International Conference on
Very Large Data Bases , pages 504-515, 2004.
56. Adrian Spalka and Jan Lehnhardt. A comprehensive approach to anomaly detec-
tion in relational databases. In 19th Annual IFIP WG 11.3 Working Conference
on Data and Applications Security (DBSec05) , pages 207-221, 2005.
Search WWH ::




Custom Search