메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 170-179

Intrusion detection in RBAC-administered databases

Author keywords

[No Author keywords available]

Indexed keywords

ID MECHANISMS; ROLE BASED ACCESS CONTROL (RBAC); SYNTHETIC DATABASE TRACES;

EID: 33846299959     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2005.33     Document Type: Conference Paper
Times cited : (115)

References (25)
  • 2
    • 33846314960 scopus 로고    scopus 로고
    • R. Agrawal, R. J. B. Jr., C. Faloutsos, J. Kiernan, R. Rantzau, and R. Srikant. Auditing compliance with a hippocratic database. In Proceedings of the 30th international conference on Very Large Data Bases (VIDE), pages 516-527, 2004.
    • R. Agrawal, R. J. B. Jr., C. Faloutsos, J. Kiernan, R. Rantzau, and R. Srikant. Auditing compliance with a hippocratic database. In Proceedings of the 30th international conference on Very Large Data Bases (VIDE), pages 516-527, 2004.
  • 5
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion detection systems: A survey and taxonomy
    • Technical Report 99-15, Chalmers Univ, Mar
    • S. Axelsson. Intrusion detection systems: A survey and taxonomy. Technical Report 99-15, Chalmers Univ., Mar. 2000.
    • (2000)
    • Axelsson, S.1
  • 7
    • 0031269184 scopus 로고    scopus 로고
    • On the optimality of the simple bayesian classifier under zero-one loss
    • P. Domingos and M. J. Pazzani. On the optimality of the simple bayesian classifier under zero-one loss. Machine Learning, 29(2-3):103-130, 1997.
    • (1997) Machine Learning , vol.29 , Issue.2-3 , pp. 103-130
    • Domingos, P.1    Pazzani, M.J.2
  • 9
    • 33846323118 scopus 로고    scopus 로고
    • Intrusion-tolerant based architecture for database system security
    • February
    • Z. Jian-ming and M. Jiang-feng. Intrusion-tolerant based architecture for database system security. Journal of Xidian University, 3(1), February 2003.
    • (2003) Journal of Xidian University , vol.3 , Issue.1
    • Jian-ming, Z.1    Jiang-feng, M.2
  • 11
    • 10944270172 scopus 로고    scopus 로고
    • Privacy-preserving data mining: Why, how, and when
    • J.Vaidya and C. Clifton. Privacy-preserving data mining: Why, how, and when. IEEE Security and Privacy, 2(6): 19-27, 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.6 , pp. 19-27
    • Vaidya, J.1    Clifton, C.2
  • 20
    • 3142702944 scopus 로고    scopus 로고
    • R. Shariq, M. Alberto, S. S., and R. Prasan. Extending query rewriting techniques for fine-grained access control. In Proceedings of ACM SIGMOD, International Conference on Management of Data, 2004.
    • R. Shariq, M. Alberto, S. S., and R. Prasan. Extending query rewriting techniques for fine-grained access control. In Proceedings of ACM SIGMOD, International Conference on Management of Data, 2004.
  • 24
    • 0035163176 scopus 로고    scopus 로고
    • S. Wenhui and T. Tan. A novel intrusion detection system model for securing web-based database systems. In Proceedings of the 25th Annual International Computer Software and Applications Conference COMPSAC, 2001
    • S. Wenhui and T. Tan. A novel intrusion detection system model for securing web-based database systems. In Proceedings of the 25th Annual International Computer Software and Applications Conference (COMPSAC), 2001.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.