메뉴 건너뛰기




Volumn 3, Issue 1, 2000, Pages 1-29

Balancing Cooperation and Risk in Intrusion Detection

Author keywords

Access control models; authorization mechanisms; collaborative systems; Management; Security

Indexed keywords


EID: 0007724451     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/353323.353324     Document Type: Article
Times cited : (33)

References (24)
  • 1
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • Bedford, MA
    • Bell, D. and Lapadula, L. 1973. Secure computer systems: Mathematical foundations and model. Tech. Rep. M74-244. MITRE Corp., Bedford, MA
    • (1973) Tech. Rep. M74-244. MITRE Corp.
    • Bell, D.1    Lapadula, L.2
  • 2
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Air Force, Hanscom AFB, MA
    • Biba, K. 1977. Integrity considerations for secure computer systems. Tech. Rep. ESD-TR-76-372. Electronic Systems Div., Air Force, Hanscom AFB, MA
    • (1977) Tech. Rep. ESD-TR-76-372. Electronic Systems Div.
    • Biba, K.1
  • 3
    • 0004238984 scopus 로고
    • Cryptography and Data Security
    • ACM Press/Addison-Wesley Publ. Co., New York, NY
    • Denning, D. E. 1982. Cryptography and Data Security. ACM Press/Addison-Wesley Publ. Co., New York, NY
    • (1982)
    • Denning, D.E.1
  • 5
    • 85024250583 scopus 로고    scopus 로고
    • Protecting Networks with SATAN
    • Inc., Sebastopol, CA
    • Freiss, M. 1997. Protecting Networks with SATAN. O'Reilly & Associates, Inc., Sebastopol, CA
    • (1997) O'Reilly & Associates
    • Freiss, M.1
  • 6
    • 85024289836 scopus 로고    scopus 로고
    • Hierarchical management of misuse reports. Comput. Inf
    • Frincke, D., Evans, J., and Aucutt, D. 1996. Hierarchical management of misuse reports. Comput. Inf
    • (1996)
    • Frincke, D.1    Evans, J.2    Aucutt, D.3
  • 8
    • 85024255095 scopus 로고
    • Secure Alpha: Security policy and policy interpretation for a class B3 multilevel secure real-time distributed operating system
    • SRI International, Menlo Park, CA
    • Greenberg, I. and Lunt, T. 1993. Secure Alpha: Security policy and policy interpretation for a class B3 multilevel secure real-time distributed operating system. Tech. Rep. SRI Project 2385. Computer Science Laboratory, SRI International, Menlo Park, CA
    • (1993) Tech. Rep. SRI Project 2385. Computer Science Laboratory
    • Greenberg, I.1    Lunt, T.2
  • 9
    • 0024984013 scopus 로고
    • A network security monitor
    • In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA), IEEE Computer Society Press, Los Alamitos, CA
    • Heberlein, L. T., Dias, G. V., Levitt, K. N., Mukherjee, B., Wood, J., and Wolber, D. 1990. A network security monitor. In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA), IEEE Computer Society Press, Los Alamitos, CA, 296-30304
    • (1990) , pp. 296-30304
    • Heberlein, L.T.1    Dias, G.V.2    Levitt, K.N.3    Mukherjee, B.4    Wood, J.5    Wolber, D.6
  • 10
    • 84944988628 scopus 로고
    • Towards detecting intrusions in a networked environment
    • In Proceedings of the 14th NIST-NCSC National Conference on Computer Security (Washington, D. C., Oct.)
    • Heberlein, L., Mukherjee, B., Levitt, K., Dias, G., and Mansur, D. 1991. Towards detecting intrusions in a networked environment. In Proceedings of the 14th NIST-NCSC National Conference on Computer Security (Washington, D. C., Oct.)
    • (1991)
    • Heberlein, L.1    Mukherjee, B.2    Levitt, K.3    Dias, G.4    Mansur, D.5
  • 11
    • 62349120986 scopus 로고    scopus 로고
    • Partial order state transition analysis for an intrusion detection system
    • Master's Thesis. University of Idaho, Moscow, ID
    • Ho, Y. 1997. Partial order state transition analysis for an intrusion detection system. Master's Thesis. University of Idaho, Moscow, ID
    • (1997)
    • Ho, Y.1
  • 12
    • 0029267472 scopus 로고
    • State transition analysis: a rule-based intrusion detection approach
    • (Mar.)
    • Ilgun, K., Kemmerer, R. A., and Porras, P. A. 1995. State transition analysis: a rule-based intrusion detection approach. IEEE Trans. Softw. Eng. 21, 3 (Mar. 1995), 181-199
    • (1995) IEEE Trans. Softw. Eng. , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 14
    • 0343050450 scopus 로고
    • Using Kerberos for authentication on computer networks
    • Neuman, C. 1994. Using Kerberos for authentication on computer networks. IEEE Commun. Mag. 32, 9
    • (1994) IEEE Commun. Mag. , vol.32 , pp. 9
    • Neuman, C.1
  • 18
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • Sandhu, R. S. 1993. Lattice-based access control models. IEEE Computer 26, 11, 9-19
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 19
    • 0346482196 scopus 로고    scopus 로고
    • From the president: Building big brother
    • Simons, B. 2000. From the president: Building big brother. Commun. ACM, 31-32
    • (2000) Commun. ACM , pp. 31-32
    • Simons, B.1
  • 20
    • 85024280267 scopus 로고
    • Classifying and downgrading: Is a human needed in the loop?
    • T. Lunt, Ed. Springer-Verlag, New York, NY
    • Smith, G. 1992. Classifying and downgrading: Is a human needed in the loop? In Research Directions in Database Security, T. Lunt, Ed. Springer-Verlag, New York, NY, 13-30
    • (1992) Research Directions in Database Security , pp. 13-30
    • Smith, G.1
  • 21
    • 0002473030 scopus 로고
    • DIDS (Distributed Intrusion Detection System): Motivation, architecture and an early prototype
    • In Proceedings of the 14th NIST-NCSC National Conference on Computer Security (Washington, D. C., Oct.)
    • Snapp, S. and Brentano, J. 1991. DIDS (Distributed Intrusion Detection System): Motivation, architecture and an early prototype. In Proceedings of the 14th NIST-NCSC National Conference on Computer Security (Washington, D. C., Oct.)
    • (1991)
    • Snapp, S.1    Brentano, J.2
  • 22
    • 0000949239 scopus 로고    scopus 로고
    • GrIDS: A graph-based intrusion detection system for large networks
    • In Proceedings of the Conference on Computer Security (ESORICS 96, Rome, Italy), E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds. Springer-Verlag, New York, NY
    • Staniford-Chen, S. and Cheung, S. 1996. GrIDS: A graph-based intrusion detection system for large networks. In Proceedings of the Conference on Computer Security (ESORICS 96, Rome, Italy), E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds. Springer-Verlag, New York, NY
    • (1996)
    • Staniford-Chen, S.1    Cheung, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.