메뉴 건너뛰기




Volumn 4, Issue 4, 2001, Pages 407-452

Abstraction-Based Intrusion Detection in Distributed Environments

Author keywords

Cooperative information systems; Heterogeneous systems; Intrusion detection; Misuse detection; Security

Indexed keywords


EID: 84883386223     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/503339.503342     Document Type: Article
Times cited : (56)

References (25)
  • 1
  • 3
    • 0035330891 scopus 로고    scopus 로고
    • Author-X: A comprehensive system for securing XML documents
    • Bertino, E., Castano, S., and Ferrari, E. 2001a. Author-X: A comprehensive system for securing XML documents. IEEE Internet Comput. 5, 3, 21-31.
    • (2001) IEEE Internet Comput. , vol.5 , Issue.3 , pp. 21-31
    • Bertino, E.1    Castano, S.2    Ferrari, E.3
  • 5
    • 85134887303 scopus 로고    scopus 로고
    • Specifying and enforcing access control policies for XML document sources
    • Bertino, E., Castano, S., Ferrari, E., andMesiti, M. 2001c. Specifying and enforcing access control policies for XML document sources. WWW J. 3, 3, 139-151.
    • (2001) WWW J. , vol.3 , Issue.3 , pp. 139-151
    • Bertino, E.1    Castano, S.2    Ferrari, E.3    andMesiti, M.4
  • 6
    • 85024242456 scopus 로고    scopus 로고
    • Secure and Selective Dissemination of Xml Documents
    • Department of Computer Science, University of Milano (Extended Version of This Article.)
    • Bertino, E., and Ferrari, E. 2000. Secure and Selective Dissemination of Xml Documents. Technical Report, Department of Computer Science, University of Milano (Extended Version of This Article.).
    • (2000) Technical Report
    • Bertino, E.1    Ferrari, E.2
  • 7
    • 85024257089 scopus 로고    scopus 로고
    • Access Control Policy Management For Xml Documents
    • Department of Computer Science, University of Milano, Milano, Italy, Submitted For Publication
    • Carminati, E. and Ferrari, E. 2002. Access Control Policy Management For Xml Documents. Tech. Rep. Department of Computer Science, University of Milano, Milano, Italy, Submitted For Publication.
    • (2002) Tech. Rep.
    • Carminati, E.1    Ferrari, E.2
  • 10
    • 0028404874 scopus 로고
    • A Model For Evaluation and Administration of Security in Object-Oriented Databases
    • Fernandez, E., Gudes, E., and Song, H. 1994. A Model For Evaluation and Administration of Security in Object-Oriented Databases. Ieee Trans. Knowl. Data Eng. 6, 275-292.
    • (1994) Ieee Trans. Knowl. Data Eng. , vol.6 , pp. 275-292
    • Fernandez, E.1    Gudes, E.2    Song, H.3
  • 11
    • 0003225767 scopus 로고    scopus 로고
    • Safeguarding Digital Library Contents and Users: Assuring Convenient Security and Data Quality
    • Gladney, H. and Lotspiech, J. 1997. Safeguarding Digital Library Contents and Users: Assuring Convenient Security and Data Quality. D-Lib Mag.
    • (1997) D-Lib Mag.
    • Gladney, H.1    Lotspiech, J.2
  • 15
    • 84867365927 scopus 로고    scopus 로고
    • http://www.Oasis-Open.Org.
    • Oasis Consortium. http://www.Oasis-Open.Org.
    • Oasis Consortium
  • 17
    • 0026119329 scopus 로고
    • A Model of Authorization For Next-Generation Database Systems
    • Rabitti, F., Bertino, E., Kim, W., and Woelk, D. 1991. A Model of Authorization For Next-Generation Database Systems. Acm Trans. Datab. Syst. 16, 1, 88-131.
    • (1991) Acm Trans. Datab. Syst. , vol.16 , Issue.1 , pp. 88-131
    • Rabitti, F.1    Bertino, E.2    Kim, W.3    Woelk, D.4
  • 18
    • 0030216932 scopus 로고    scopus 로고
    • An Authorization Model For A Distributed Hypertext System
    • Samarati, P., Bertino, E., and Jajodia, S. 1996. An Authorization Model For A Distributed Hypertext System. Ieee Trans. Knowl. Data Eng. 8, 4, 555-562.
    • (1996) Ieee Trans. Knowl. Data Eng. , vol.8 , Issue.4 , pp. 555-562
    • Samarati, P.1    Bertino, E.2    Jajodia, S.3
  • 20
    • 0003507850 scopus 로고    scopus 로고
    • Network Security Essentials: Applications and Standars
    • Prentice-Hall, Englewood Cliffs, N.J.
    • Stallings, W. 2000. Network Security Essentials: Applications and Standars. Prentice-Hall, Englewood Cliffs, N.J.
    • (2000)
    • Stallings, W.1
  • 21
    • 85024256949 scopus 로고    scopus 로고
    • Directories: Managing Data For Networked Applications. Tutorial Presented
    • (San Diego, Calif.). Ieee, Computer Society Press, Los Alamitos, Calif
    • Srivastava, D. 2000. Directories: Managing Data For Networked Applications. Tutorial Presented At the 16Th Ieee International Conference on Database Engineering (Icde'00) (San Diego, Calif.). Ieee, Computer Society Press, Los Alamitos, Calif.
    • (2000) 16Th Ieee International Conference on Database Engineering (Icde'00)
    • Srivastava, D.1
  • 22
    • 0010047050 scopus 로고    scopus 로고
    • Secure Computing: Threats and Safeguards
    • Mcgraw-Hill, New York
    • Summers, R. C. 1997. Secure Computing: Threats and Safeguards. Mcgraw-Hill, New York.
    • (1997)
    • Summers, R.C.1
  • 24
    • 0003551091 scopus 로고    scopus 로고
    • Available At: http://www.W3.Org/Tr/Rec-Xml
    • World Wide Web Consortium 1998. Extensible Markup Language (Xml) 1.0. Available At: http://www.W3.Org/Tr/Rec-Xml.
    • (1998) Extensible Markup Language (Xml) 1.0.
  • 25
    • 84875346296 scopus 로고    scopus 로고
    • Xml Encryption Syntax and Processing
    • Available At: http://hsts.w3.org/archives/public/xml-encryption/2000aug/att-0001/01-xmlencoverview.html
    • World Wide Web Consortium 2000. Xml Encryption Syntax and Processing. Available At: http://hsts.w3.org/archives/public/xml-encryption/2000aug/att-0001/01-xmlencoverview.html.
    • (2000)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.