-
1
-
-
0003400251
-
Secure computer systems: Mathematical foundations and model
-
Bedford, MA
-
Bell, D. and Lapadula, L. 1973. Secure computer systems: Mathematical foundations and model. Tech. Rep. M74-244. MITRE Corp., Bedford, MA
-
(1973)
Tech. Rep. M74-244. MITRE Corp.
-
-
Bell, D.1
Lapadula, L.2
-
2
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Air Force, Hanscom AFB, MA
-
Biba, K. 1977. Integrity considerations for secure computer systems. Tech. Rep. ESD-TR-76-372. Electronic Systems Div., Air Force, Hanscom AFB, MA
-
(1977)
Tech. Rep. ESD-TR-76-372. Electronic Systems Div.
-
-
Biba, K.1
-
3
-
-
0004238984
-
Cryptography and Data Security
-
ACM Press/Addison-Wesley Publ. Co., New York, NY
-
Denning, D. E. 1982. Cryptography and Data Security. ACM Press/Addison-Wesley Publ. Co., New York, NY
-
(1982)
-
-
Denning, D.E.1
-
5
-
-
85024250583
-
Protecting Networks with SATAN
-
Inc., Sebastopol, CA
-
Freiss, M. 1997. Protecting Networks with SATAN. O'Reilly & Associates, Inc., Sebastopol, CA
-
(1997)
O'Reilly & Associates
-
-
Freiss, M.1
-
6
-
-
85024289836
-
-
Hierarchical management of misuse reports. Comput. Inf
-
Frincke, D., Evans, J., and Aucutt, D. 1996. Hierarchical management of misuse reports. Comput. Inf
-
(1996)
-
-
Frincke, D.1
Evans, J.2
Aucutt, D.3
-
8
-
-
85024255095
-
Secure Alpha: Security policy and policy interpretation for a class B3 multilevel secure real-time distributed operating system
-
SRI International, Menlo Park, CA
-
Greenberg, I. and Lunt, T. 1993. Secure Alpha: Security policy and policy interpretation for a class B3 multilevel secure real-time distributed operating system. Tech. Rep. SRI Project 2385. Computer Science Laboratory, SRI International, Menlo Park, CA
-
(1993)
Tech. Rep. SRI Project 2385. Computer Science Laboratory
-
-
Greenberg, I.1
Lunt, T.2
-
9
-
-
0024984013
-
A network security monitor
-
In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA), IEEE Computer Society Press, Los Alamitos, CA
-
Heberlein, L. T., Dias, G. V., Levitt, K. N., Mukherjee, B., Wood, J., and Wolber, D. 1990. A network security monitor. In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA), IEEE Computer Society Press, Los Alamitos, CA, 296-30304
-
(1990)
, pp. 296-30304
-
-
Heberlein, L.T.1
Dias, G.V.2
Levitt, K.N.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
10
-
-
84944988628
-
Towards detecting intrusions in a networked environment
-
In Proceedings of the 14th NIST-NCSC National Conference on Computer Security (Washington, D. C., Oct.)
-
Heberlein, L., Mukherjee, B., Levitt, K., Dias, G., and Mansur, D. 1991. Towards detecting intrusions in a networked environment. In Proceedings of the 14th NIST-NCSC National Conference on Computer Security (Washington, D. C., Oct.)
-
(1991)
-
-
Heberlein, L.1
Mukherjee, B.2
Levitt, K.3
Dias, G.4
Mansur, D.5
-
11
-
-
62349120986
-
Partial order state transition analysis for an intrusion detection system
-
Master's Thesis. University of Idaho, Moscow, ID
-
Ho, Y. 1997. Partial order state transition analysis for an intrusion detection system. Master's Thesis. University of Idaho, Moscow, ID
-
(1997)
-
-
Ho, Y.1
-
12
-
-
0029267472
-
State transition analysis: a rule-based intrusion detection approach
-
(Mar.)
-
Ilgun, K., Kemmerer, R. A., and Porras, P. A. 1995. State transition analysis: a rule-based intrusion detection approach. IEEE Trans. Softw. Eng. 21, 3 (Mar. 1995), 181-199
-
(1995)
IEEE Trans. Softw. Eng.
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
14
-
-
0343050450
-
Using Kerberos for authentication on computer networks
-
Neuman, C. 1994. Using Kerberos for authentication on computer networks. IEEE Commun. Mag. 32, 9
-
(1994)
IEEE Commun. Mag.
, vol.32
, pp. 9
-
-
Neuman, C.1
-
15
-
-
85095970245
-
Experience with EMERALD to date
-
USENIX Assoc., Berkeley, CA
-
Neumann, P. and Porras, P. 1999. Experience with EMERALD to date. In Proceedings of the First USENIX Workshop on Intrusion Detection and Network Monitoring, USENIX Assoc., Berkeley, CA, 73-80
-
(1999)
Proceedings of the First USENIX Workshop on Intrusion Detection and Network Monitoring
, pp. 73-80
-
-
Neumann, P.1
Porras, P.2
-
16
-
-
0001833836
-
A frame work for cooperative intrusion detection
-
Polla, D., Mcconnell, J., Johnson, T., Marconi, J., Tobin, D., and Frincke, D. 1998. A frame work for cooperative intrusion detection. In Proceedings of the National Conference on Computer Security Systems, 361-373
-
(1998)
Proceedings of the National Conference on Computer Security Systems
, pp. 361-373
-
-
Polla, D.1
Mcconnell, J.2
Johnson, T.3
Marconi, J.4
Tobin, D.5
Frincke, D.6
-
18
-
-
0027699087
-
Lattice-based access control models
-
Sandhu, R. S. 1993. Lattice-based access control models. IEEE Computer 26, 11, 9-19
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
19
-
-
0346482196
-
From the president: Building big brother
-
Simons, B. 2000. From the president: Building big brother. Commun. ACM, 31-32
-
(2000)
Commun. ACM
, pp. 31-32
-
-
Simons, B.1
-
20
-
-
85024280267
-
Classifying and downgrading: Is a human needed in the loop?
-
T. Lunt, Ed. Springer-Verlag, New York, NY
-
Smith, G. 1992. Classifying and downgrading: Is a human needed in the loop? In Research Directions in Database Security, T. Lunt, Ed. Springer-Verlag, New York, NY, 13-30
-
(1992)
Research Directions in Database Security
, pp. 13-30
-
-
Smith, G.1
-
21
-
-
0002473030
-
DIDS (Distributed Intrusion Detection System): Motivation, architecture and an early prototype
-
In Proceedings of the 14th NIST-NCSC National Conference on Computer Security (Washington, D. C., Oct.)
-
Snapp, S. and Brentano, J. 1991. DIDS (Distributed Intrusion Detection System): Motivation, architecture and an early prototype. In Proceedings of the 14th NIST-NCSC National Conference on Computer Security (Washington, D. C., Oct.)
-
(1991)
-
-
Snapp, S.1
Brentano, J.2
-
22
-
-
0000949239
-
GrIDS: A graph-based intrusion detection system for large networks
-
In Proceedings of the Conference on Computer Security (ESORICS 96, Rome, Italy), E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds. Springer-Verlag, New York, NY
-
Staniford-Chen, S. and Cheung, S. 1996. GrIDS: A graph-based intrusion detection system for large networks. In Proceedings of the Conference on Computer Security (ESORICS 96, Rome, Italy), E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds. Springer-Verlag, New York, NY
-
(1996)
-
-
Staniford-Chen, S.1
Cheung, S.2
|