-
1
-
-
3142684053
-
The challenges of insider misuse
-
article prepared for the, RAND, Santa Monica, 16-18 August 1999
-
Neumann, P.G. 1999. "The Challenges of Insider Misuse", article prepared for the Workshop on Preventing, Detecting and Responding to Malicious Insider Misuse, RAND, Santa Monica, 16-18 August 1999. http://www.csl.sri.com/ users/neumann/pgn-misuse.html .
-
(1999)
Workshop on Preventing, Detecting and Responding to Malicious Insider Misuse
-
-
Neumann, P.G.1
-
2
-
-
3142720692
-
-
DTI. Department of Trade & Industry, April 2004. URN 04/617
-
DTI. 2004. Information Security Breaches Survey 2004. Department of Trade & Industry, April 2004. URN 04/617.
-
(2004)
Information Security Breaches Survey 2004
-
-
-
3
-
-
3142717720
-
P45s for porn surfers
-
9 July 2002
-
Leyden, J. 2002. "P45s for Porn Surfers", The Register, 9 July 2002.
-
(2002)
The Register
-
-
Leyden, J.1
-
7
-
-
3142692847
-
Disgruntled employee sentenced to 41 months in prison
-
Schultz E. "Disgruntled employee sentenced to 41 months in prison", Computers & Security. 21:(no. 3):2002;p206.
-
(2002)
Computers & Security
, vol.21
, Issue.3
, pp. 206
-
-
Schultz, E.1
-
8
-
-
3142659036
-
Defence lab in Net porn scandal
-
21 June 1998
-
BBC. 1998. "Defence lab in Net porn scandal", BBC News Online, 21 June 1998.
-
(1998)
BBC News Online
-
-
-
9
-
-
3142694330
-
Tax records 'for sale' scandal
-
16 January 2003
-
BBC. 2003. "Tax records 'for sale' scandal", BBC News Online, 16 January 2003.
-
(2003)
BBC News Online
-
-
-
10
-
-
0010886652
-
The insider threat to information systems: The psychology ofthe dangerous insider
-
Shaw, E.D., Ruby, K.G. and Post, J.M. 1998. "The Insider Threat to Information Systems: The Psychology ofthe Dangerous Insider", Security Awareness Bulletin, 2-98, pp27-46.
-
(1998)
Security Awareness Bulletin
, vol.2
, Issue.98
, pp. 27-46
-
-
Shaw, E.D.1
Ruby, K.G.2
Post, J.M.3
-
12
-
-
0030086382
-
Role-based access control models
-
Sandhu R.S., Coyne E.J., Feinstein H.L., Youman C.E. "Role-based access control models" IEEE Computer. 29:(2):1996;38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
13
-
-
1642409662
-
DEMIDS: A misuse detection system for database systems
-
Amsterdam, The Netherlands, 18-19 November 1999
-
Chung, C.Y., Gertz, M. and Levitt, K. 1999. "DEMIDS: A Misuse Detection System for Database Systems", in Proceedings of the 3rd International Working Conference on Integrity and Internal control in Information Systems, Amsterdam, The Netherlands, 18-19 November 1999.
-
(1999)
Proceedings of the 3rd International Working Conference on Integrity and Internal Control in Information Systems
-
-
Chung, C.Y.1
Gertz, M.2
Levitt, K.3
-
14
-
-
84909595754
-
DIDAFIT: Detecting intrusions in databases through fingerprinting transactions
-
Ciudal Real, Spain, 2-6 April 2002
-
Low, W.L., Lee, J. and Teoh, P. 2002. "DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions". in Proceedings of the 4th International Conference on Enterprise Information Systems, Ciudal Real, Spain, 2-6 April 2002, pp121-128.
-
(2002)
Proceedings of the 4th International Conference on Enterprise Information Systems
, pp. 121-128
-
-
Low, W.L.1
Lee, J.2
Teoh, P.3
-
15
-
-
3142736748
-
A framework for monitoring insider misuse of IT applications
-
Johannesburg, South Africa, 30 June - 2 July 2004
-
Phyo, A.H., Furnell, S. and Ifeachor, E. 2004. "A framework for monitoring insider misuse of IT applications", in Proceedings of Information Security South Africa 2004, Johannesburg, South Africa, 30 June - 2 July 2004.
-
(2004)
Proceedings of Information Security South Africa 2004
-
-
Phyo, A.H.1
Furnell, S.2
Ifeachor, E.3
|