Databases Reference
In-Depth Information
References
1. Birman, K.P.: Reliable Distributed Systems: Technologies, Web Services, and
Applications. Springer (2005)
2. Spector, A.Z., Daniels, D., Duchamp, D.: Distributed Transactions for Reliable
Systems. In: ACM SOSP. (1985)
3. Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Re-
covery in Database Systems. Addison-Wesley, Reading, MA (1987)
4. Gray, J., ed.: The Benchmark Handbook for Database and Transaction Pro-
cessing Systems. 2 edn. Morgan Kaufmann Publishers, Inc. (1993)
5. Seltzer, M.I., Endo, Y., Small, C., Smith, K.A.: Dealing With Disaster: Surviv-
ing Misbehaved Kernel Extensions. In: OSDI. (1996)
6. Liskov, B., Rodrigues, R.: Transactional File Systems Can Be Fast. In: 11th
ACM SIGOPS European Workshop. (2004)
7. Haskin, R., Malachi, Y., Sawdon, W., Chan, G.: Recovery management in
Quick-Silver. ACM Transactions on Computer Systems 6 (1) (1988)
8. Liskov, B., Curtis, D., Johnson, P., Scheifler, R.: Implementation of Argus . In:
ACM SOSP. (1987) 111-122
9. Schneier, B.: Attack trends 2004 and 2005. ACM Queue 3 (5) (June 2005)
10. Carter, D.L., Katz, A.J.: Computer Crime: An Emerging Challenge for Law
Enforcement. FBI Law Enforcement Bulletin 1 (8) (December 1996)
11. OWASP: Owasp top ten most critical web application security vulnerabilities.
http://www.owasp.org/documentation/topten.html (January, 27 2004)
12. Paxson, V.: Bro: a system for detecting network intruders in real-time. Com-
puter Networks (1999) 2435-2463
13. Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A Sense of Self for
Unix Processes. In: Proceedings of 1996 IEEE Symposium on Computer Security
and Privacy. (1996)
14. Chung, C.Y., Gertz, M., Levitt, K.: Demids: A misuse detection system for
database systems. In: 14th IFIP WG11.3 Working Conference on Database and
Application Security. (2000)
15. Stolfo, S., Fan, D., Lee, W.: Credit card fraud detection using meta-learning:
Issues and initial results. In: AAAI Workshop on AI Approaches to Fraud
Detection and Risk Management. (1997)
16. Bertino, E., Kamra, A., Terzi, E., Vakali, A.: Intrusion Detection in RBAC-
administered Databases. In: Proceedings of the 21st Annual Computer Security
Applications Conference. (2005)
17. Ilgun, K.: Ustat: A real-time intrusion detection system for unix. In: the IEEE
Symposium on Security and Privacy, Oakland, CA (May 1993)
18. Javitz, H.S., Valdes, A.: The sri ides statistical anomaly detector. In: Proceed-
ings IEEE Computer Society Symposium on Security and Privacy, Oakland, CA
(May 1991)
19. Lee, W., Xiang, D.: Information-theoretic measures for anomaly detection. In:
2001 IEEE Symposium on Security and Privacy, Oakland, CA (May 2001)
20. Ko, C., Ruschitzka, M., Levitt, K.: Execution monitoring of security-critical pro-
grams in distributed systems: a Specification-based approach. In: Proceedings
of the 1997 IEEE Symposium on Security and Privacy. (1997)
21. Sekar, R., Gupta, A., Frullo, J., Shanbhag, T., Tiwari, A., Yang, H., Zhou,
S.: Implementation of Argus Specification-based anomaly detection: a new ap-
proach for detecting network intrusions. In: ACM CCS. (2002)
Search WWH ::




Custom Search