-
1
-
-
38149079272
-
Understanding the insider threat
-
RAND Corporation, Santa Monica, CA, March
-
R. Brackney and R. Anderson, "Understanding the insider threat", In Proceedings of a march 2004 workshop, Technical report, RAND Corporation, Santa Monica, CA, March 2004.
-
(2004)
Proceedings of a March 2004 Workshop, Technical Report
-
-
Brackney, R.1
Anderson, R.2
-
2
-
-
78650760432
-
Defining the insider threat
-
Oak Ridge, Tennessee, May, article 15
-
M. Bishop and C. Gates, "Defining the Insider Threat", In Proceedings of the 4th annual workshop on Cyber security and information intelligence research, Oak Ridge, Tennessee, May 2008, article 15, Vol. 288.
-
(2008)
Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research
, vol.288
-
-
Bishop, M.1
Gates, C.2
-
3
-
-
12244265258
-
The inference problem: A survey
-
December
-
C. Farkas and S. Jajodia, "The Inference Problem: A Survey", ACM SIGKDD Explorations, December 2002. Vol. 4(2), pp. 6 - 11.
-
(2002)
ACM SIGKDD Explorations
, vol.4
, Issue.2
, pp. 6-11
-
-
Farkas, C.1
Jajodia, S.2
-
4
-
-
0034314077
-
Secure databases: Constraints, inference channels and monitoring disclosures
-
December
-
A. Brodsky, C. Farkas, S. Jajodia, "Secure Databases: Constraints, Inference Channels and Monitoring Disclosures", IEEE Trans. on Knowledge and Data Engineering, December 2000, Vol. 12, pp 900-919.
-
(2000)
IEEE Trans. on Knowledge and Data Engineering
, vol.12
, pp. 900-919
-
-
Brodsky, A.1
Farkas, C.2
Jajodia, S.3
-
5
-
-
0023861339
-
Inference aggregation detection in database management systems
-
Oakland, CA, Apr
-
T. Hinke, "Inference Aggregation Detection In Database Management Systems", In proceeding of IEEE Symposium on Security and Privacy, Oakland, CA, Apr1988, pp.96-106.
-
(1988)
Proceeding of IEEE Symposium on Security and Privacy
, pp. 96-106
-
-
Hinke, T.1
-
6
-
-
0031643164
-
Data level inference detection in database systems
-
Rockport, MA, June
-
R. Yip and K. Levitt, "Data Level Inference Detection in Database Systems", In Proceedings of the 11th Computer Security Foundations Workshop, Rockport, MA, June 1998, pp. 179-189.
-
(1998)
Proceedings of the 11th Computer Security Foundations Workshop
, pp. 179-189
-
-
Yip, R.1
Levitt, K.2
-
7
-
-
33746919594
-
Controlling FD and MVD inferences in MLS
-
September
-
Y. Heping, L. Bing, Y. Xiaoming, W. Wei, S. Baile and Y. Genxing, "Controlling FD and MVD inferences in MLS", In Proceedings of the Fifth International Conference on Computer and Information Technology, September 2005, pp. 82 - 87.
-
(2005)
Proceedings of the Fifth International Conference on Computer and Information Technology
, pp. 82-87
-
-
Heping, Y.1
Bing, L.2
Xiaoming, Y.3
Wei, W.4
Baile, S.5
Genxing, Y.6
-
8
-
-
0026367603
-
Controlling FD and MVD inferences in multilevel relational database systems
-
December
-
T. Su and G. Ozsoyglu, "Controlling FD and MVD Inferences in Multilevel Relational Database Systems", IEEE Transactions on Knowledge and Data Engineering, December 1991, Vol. 3(4), pp. 474 - 485.
-
(1991)
IEEE Transactions on Knowledge and Data Engineering
, vol.3
, Issue.4
, pp. 474-485
-
-
Su, T.1
Ozsoyglu, G.2
-
9
-
-
0023252564
-
Data dependencies and inference control in multilevel relational database systems
-
Los Alamitos, CA
-
T. Su and G. Ozsoyglu, "Data dependencies and inference control in multilevel relational database systems", In Proceedings of the IEEE Symposium on Security and Privacy, Los Alamitos, CA, 1987, pp. 202-211.
-
(1987)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 202-211
-
-
Su, T.1
Ozsoyglu, G.2
-
10
-
-
38349076728
-
Analysis and detection of malicious insiders
-
McLean, VA, March
-
M. Maybury, P. Chase, B. Cheikes, D. Brackney, S. Matznera, T. Hetherington, B. Wood, C. Sibley, J. Marin and T. Longstaff, "Analysis and Detection of Malicious Insiders", In Proceedings of the International Conference on Intelligence Analysis, McLean, VA, March 2005.
-
(2005)
Proceedings of the International Conference on Intelligence Analysis
-
-
Maybury, M.1
Chase, P.2
Cheikes, B.3
Brackney, D.4
Matznera, S.5
Hetherington, T.6
Wood, B.7
Sibley, C.8
Marin, J.9
Longstaff, T.10
-
12
-
-
84976785631
-
Security and inference in multilevel database and knowledge-base systems
-
NewYork, December
-
M. Morgenstern, "Security and Inference in Multilevel Database and Knowledge-Base Systems", ACM SIGMOD Record. NewYork, December 1987, Vol. 16, pp. 357 - 373.
-
(1987)
ACM SIGMOD Record
, vol.16
, pp. 357-373
-
-
Morgenstern, M.1
-
14
-
-
15944381188
-
Fuzzy dependency and its applications in damage assessment and recovery
-
West Point, NY, June
-
Y. Zuo and B. Panda, "Fuzzy dependency and its applications in damage assessment and recovery", In Proceedings of the 5th Annual IEEE Information Assurance Workshop, West Point, NY, June 2004, pp. 350- 357.
-
(2004)
Proceedings of the 5th Annual IEEE Information Assurance Workshop
, pp. 350-357
-
-
Zuo, Y.1
Panda, B.2
|