-
1
-
-
0242674432
-
Hippocratic databases
-
Morgan-Kaufmann
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Hippocratic databases", 28th international conference on Very Large Data Bases (VLDB), Morgan-Kaufmann, 2002.
-
(2002)
28th international conference on Very Large Data Bases (VLDB)
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
33846284740
-
A roadmap for comprehensive online privacy policies
-
2004-47, 2004
-
A. Anton, E.Bertino, N.Li, and T.Yu, "A roadmap for comprehensive online privacy policies", In CERIAS Technical Report, 2004-47, 2004.
-
In CERIAS Technical Report
-
-
Anton, A.1
Bertino, E.2
Li, N.3
Yu, T.4
-
4
-
-
1642409662
-
DEMIDS: A Misuse Detection System for Database Systems
-
Kluwer Academic Publishers
-
Christina Yip Chung, Michael Gertz, Karl Levitt, "DEMIDS: A Misuse Detection System for Database Systems", Third International IFIP TC-11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems, Kluwer Academic Publishers, 1999, 159 - 178.
-
(1999)
Third International IFIP TC-11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems
, pp. 159-178
-
-
Yip Chung, C.1
Gertz, M.2
Levitt, K.3
-
5
-
-
56749141493
-
Gordon, Martin P
-
Computer Security Institute. Computer crime and security survey
-
Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn and Robert Richardson, Computer Security Institute. Computer crime and security survey, 2006.
-
(2006)
Loeb, William Lucyshyn and Robert Richardson
-
-
Lawrence, A.1
-
8
-
-
82955176200
-
DAIS: A Real-time Data Attack Isolation System for Commercial Database Applications
-
Peng Liu, "DAIS: A Real-time Data Attack Isolation System for Commercial Database Applications", 17th Annual Computer Security Applications Conference, 2001.
-
(2001)
17th Annual Computer Security Applications Conference
-
-
Liu, P.1
-
12
-
-
29844441493
-
Oracle® Database Concepts 10g Release 1 (10.1)
-
Oracle Corporation
-
Oracle Corporation, "Oracle® Database Concepts 10g Release 1 (10.1)", 2003.
-
(2003)
-
-
-
15
-
-
0034325396
-
Detecting Masquerades in Intrusion Detection Based on Unpopular Commands
-
M. Schonlau, M. Theus, "Detecting Masquerades in Intrusion Detection Based on Unpopular Commands," Information Processing Letters, 76, 33-38, 2000.
-
(2000)
Information Processing Letters
, vol.76
, pp. 33-38
-
-
Schonlau, M.1
Theus, M.2
-
16
-
-
0012282403
-
Computer intrusion: Detecting masquerades
-
February
-
M. Schonlau, W. DuMouchel, W.-H. Ju, A. F. Karr, M. Theus, and Y. Vardi, "Computer intrusion: Detecting masquerades", Statistical Science, 16(1):58-74, February 2001.
-
(2001)
Statistical Science
, vol.16
, Issue.1
, pp. 58-74
-
-
Schonlau, M.1
DuMouchel, W.2
Ju, W.-H.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
-
17
-
-
56749134925
-
TPC Benchmark C
-
Transaction Processing Performance Council, Version 5.4, available at
-
Transaction Processing Performance Council, "TPC Benchmark C, Standard Specification, Version 5.4", 2005, available at: http://www.tpc.org/tpcc/.
-
(2005)
Standard Specification
-
-
-
18
-
-
33847275237
-
Detection of malicious transactions in DBMS
-
Changsha, Hunan, China, December
-
Marco Vieira, Henrique Madeira, "Detection of malicious transactions in DBMS", The 11th IEEE Intl Symposium Pacific Rim Dependable Computing, PRDC2005, Changsha, Hunan, China, December-2005.
-
(2005)
The 11th IEEE Intl Symposium Pacific Rim Dependable Computing, PRDC2005
-
-
Vieira, M.1
Madeira, H.2
-
19
-
-
56749108239
-
Comprehensive Database Security Requires Native DBMS Features and Third-Party Tools
-
Forrester Research Inc, May
-
Noel Yuhanna, "Comprehensive Database Security Requires Native DBMS Features and Third-Party Tools", Market overview, Forrester Research Inc., May 2005
-
(2005)
Market overview
-
-
Yuhanna, N.1
|