메뉴 건너뛰기




Volumn , Issue , 2009, Pages 8-14

Two tiered privacy enhanced intrusion detection system architecture

Author keywords

IDS; Network monitoring; Outsourcing; Privacy policy; XACML

Indexed keywords

DATA FORENSICS; IDS; INTRUSION DETECTION SYSTEMS; LAW-ENFORCEMENT AGENCIES; NETWORK MONITORING; PRIVACY POLICIES; PRIVACY PRESERVING; THIRD PARTIES;

EID: 74549209108     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IDAACS.2009.5343035     Document Type: Conference Paper
Times cited : (3)

References (26)
  • 1
    • 67650276054 scopus 로고    scopus 로고
    • Online, Available
    • European Commission. (2006) Directive 2006/24/ec. [Online]. Available: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32006L0024:EN:HTML
    • (2006) Directive 2006/24/ec
  • 2
    • 74549127309 scopus 로고    scopus 로고
    • T. Moses (ed, 2005) OASIS eXtensible Access Control Markup Language (XACML) Version 2.0, Online, Available
    • T. Moses (ed). (2005) OASIS eXtensible Access Control Markup Language (XACML) Version 2.0. [Online]. Available: http://docs.oasis-open.org/xacml/2.0/ access-control-xacml-2.0-core-spec-os.pdf
  • 6
    • 74549175018 scopus 로고    scopus 로고
    • Online, Available
    • K. M. Moriarty, B. H. Trammell. (2008) IODEF/RID over SOAP. [Online]. Available: http://www.ietf.org/internet-drafts/draft-moriarty-post- inch-rid- soap- 05.txt
    • (2008) IODEF/RID over SOAP
    • Moriarty, K.M.1    Trammell, B.H.2
  • 7
    • 74549159989 scopus 로고    scopus 로고
    • TU-Berlin
    • INET Research Group, Online, Available
    • INET Research Group, TU-Berlin. (2008) Time machine. [Online]. Available: http://www.net.t-labs.tu-berlin.de/research/tm
    • (2008) Time machine
  • 9
    • 24944578141 scopus 로고    scopus 로고
    • C. Powers, M. Schunter ed, Online, Available
    • C. Powers, M. Schunter (ed). (2003) Enterprise privacy authorization language (EPAL 1.2). [Online]. Available: http://www.zurich.ibm.com/security/ enterprise-privacy/epal/ Specification/index.html
    • (2003) Enterprise privacy authorization language (EPAL 1.2)
  • 11
    • 74549175482 scopus 로고    scopus 로고
    • P. Periorellis, Securing Web Services. Idi Global, October 2007.
    • P. Periorellis, Securing Web Services. Idi Global, October 2007.
  • 13
    • 77953039681 scopus 로고    scopus 로고
    • Lawrence Berkeley National Laboratory, Online, Available
    • Lawrence Berkeley National Laboratory. (2009) Bro intrusion detection system. [Online]. Available: http://bro-ids.org
    • (2009) Bro intrusion detection system
  • 14
    • 74549124033 scopus 로고    scopus 로고
    • Online, Available
    • Y. Vandoorselare. (2009) Preludeids. [Online]. Available: http://www.prelude-ids.com
    • (2009) Preludeids
    • Vandoorselare, Y.1
  • 15
    • 74549180012 scopus 로고    scopus 로고
    • M. Roesch. (2009) Snort. http://www.snort.org.
    • (2009) Snort
    • Roesch, M.1
  • 16
    • 74549161941 scopus 로고    scopus 로고
    • Tenable Network Security. (2009) Nessus. [Online]. Available: http://www.nessus.org
    • Tenable Network Security. (2009) Nessus. [Online]. Available: http://www.nessus.org
  • 18
    • 18844407049 scopus 로고    scopus 로고
    • An efficient distributed intrusion detection scheme
    • T. Holz, "An efficient distributed intrusion detection scheme," in COMPSAC Workshops, 2004, pp. 39-40.
    • (2004) COMPSAC Workshops , pp. 39-40
    • Holz, T.1
  • 23
    • 74549215391 scopus 로고    scopus 로고
    • MIT Kerberos Team, The network authentication protocol, Online, Available
    • MIT Kerberos Team. (2009) Kerberos: The network authentication protocol. [Online]. Available: http://web.mit.edu/Kerberos
    • (2009) Kerberos


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.