-
1
-
-
67650276054
-
-
Online, Available
-
European Commission. (2006) Directive 2006/24/ec. [Online]. Available: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32006L0024:EN:HTML
-
(2006)
Directive 2006/24/ec
-
-
-
2
-
-
74549127309
-
-
T. Moses (ed, 2005) OASIS eXtensible Access Control Markup Language (XACML) Version 2.0, Online, Available
-
T. Moses (ed). (2005) OASIS eXtensible Access Control Markup Language (XACML) Version 2.0. [Online]. Available: http://docs.oasis-open.org/xacml/2.0/ access-control-xacml-2.0-core-spec-os.pdf
-
-
-
-
6
-
-
74549175018
-
-
Online, Available
-
K. M. Moriarty, B. H. Trammell. (2008) IODEF/RID over SOAP. [Online]. Available: http://www.ietf.org/internet-drafts/draft-moriarty-post- inch-rid- soap- 05.txt
-
(2008)
IODEF/RID over SOAP
-
-
Moriarty, K.M.1
Trammell, B.H.2
-
7
-
-
74549159989
-
TU-Berlin
-
INET Research Group, Online, Available
-
INET Research Group, TU-Berlin. (2008) Time machine. [Online]. Available: http://www.net.t-labs.tu-berlin.de/research/tm
-
(2008)
Time machine
-
-
-
8
-
-
37349093278
-
Privacy enhanced intrusion detection
-
G. Müller and K. Rannenberg, Eds. Addison Wesley
-
R. Büschkes, D. Kesdogan, "Privacy enhanced intrusion detection," in Multilateral Security in Communications, Information Security, G. Müller and K. Rannenberg, Eds. Addison Wesley, 1999, pp. 187-204.
-
(1999)
Multilateral Security in Communications, Information Security
, pp. 187-204
-
-
Büschkes, R.1
Kesdogan, D.2
-
9
-
-
24944578141
-
-
C. Powers, M. Schunter ed, Online, Available
-
C. Powers, M. Schunter (ed). (2003) Enterprise privacy authorization language (EPAL 1.2). [Online]. Available: http://www.zurich.ibm.com/security/ enterprise-privacy/epal/ Specification/index.html
-
(2003)
Enterprise privacy authorization language (EPAL 1.2)
-
-
-
11
-
-
74549175482
-
-
P. Periorellis, Securing Web Services. Idi Global, October 2007.
-
P. Periorellis, Securing Web Services. Idi Global, October 2007.
-
-
-
-
13
-
-
77953039681
-
-
Lawrence Berkeley National Laboratory, Online, Available
-
Lawrence Berkeley National Laboratory. (2009) Bro intrusion detection system. [Online]. Available: http://bro-ids.org
-
(2009)
Bro intrusion detection system
-
-
-
14
-
-
74549124033
-
-
Online, Available
-
Y. Vandoorselare. (2009) Preludeids. [Online]. Available: http://www.prelude-ids.com
-
(2009)
Preludeids
-
-
Vandoorselare, Y.1
-
15
-
-
74549180012
-
-
M. Roesch. (2009) Snort. http://www.snort.org.
-
(2009)
Snort
-
-
Roesch, M.1
-
16
-
-
74549161941
-
-
Tenable Network Security. (2009) Nessus. [Online]. Available: http://www.nessus.org
-
Tenable Network Security. (2009) Nessus. [Online]. Available: http://www.nessus.org
-
-
-
-
17
-
-
1242310066
-
A high-level programming environment for packet trace anonymization and transformation
-
Karlsruhe, Germany: ACM
-
R. Pang and V. Paxson, "A high-level programming environment for packet trace anonymization and transformation," in Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. Karlsruhe, Germany: ACM, 2003, pp. 339-351.
-
(2003)
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
, pp. 339-351
-
-
Pang, R.1
Paxson, V.2
-
18
-
-
18844407049
-
An efficient distributed intrusion detection scheme
-
T. Holz, "An efficient distributed intrusion detection scheme," in COMPSAC Workshops, 2004, pp. 39-40.
-
(2004)
COMPSAC Workshops
, pp. 39-40
-
-
Holz, T.1
-
19
-
-
0343472295
-
Pseudonymous audit for privacy enhanced intrusion detection
-
May
-
M. Sobirey, S. Fischer-Hübner, and K. Rannenberg, "Pseudonymous audit for privacy enhanced intrusion detection," in Proceedings of the IFIP TC11 13th International Conference on Information Security (SEC'97), May 1997, pp. 151-163.
-
(1997)
Proceedings of the IFIP TC11 13th International Conference on Information Security (SEC'97)
, pp. 151-163
-
-
Sobirey, M.1
Fischer-Hübner, S.2
Rannenberg, K.3
-
21
-
-
0037907453
-
The intrusion detection system AID - architecture and experiences in automated audit trail analysis
-
M. Sobirey, B. Richter, and H. König, "The intrusion detection system AID - architecture and experiences in automated audit trail analysis," in Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security, 1996, pp. 278-290.
-
(1996)
Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security
, pp. 278-290
-
-
Sobirey, M.1
Richter, B.2
König, H.3
-
23
-
-
74549215391
-
-
MIT Kerberos Team, The network authentication protocol, Online, Available
-
MIT Kerberos Team. (2009) Kerberos: The network authentication protocol. [Online]. Available: http://web.mit.edu/Kerberos
-
(2009)
Kerberos
-
-
-
25
-
-
44349184360
-
Towards privacy-preserving network monitoring: Issues and challenges
-
G. Bianchi et al., "Towards privacy-preserving network monitoring: Issues and challenges," in Personal, Indoor and Mobile Radio Communications, 2007. PIMRC 2007. IEEE 18th International Symposium on, 2007, pp. 1-5.
-
(2007)
Personal, Indoor and Mobile Radio Communications, 2007. PIMRC 2007. IEEE 18th International Symposium on
, pp. 1-5
-
-
Bianchi, G.1
|