Zobrazeno 1 - 10
of 50
pro vyhledávání: '"Teresa F. Lunt"'
Autor:
Teresa F. Lunt
Many commercial and defense applications require a database system that protects data of different sensitivities while still allowing users of different clearances to access the system. This book is a collection of papers covering aspects of the emer
Autor:
Edward G. Amoroso, Leonard J. LaPadula, Marshall D. Abrams, Teresa F. Lunt, James G. Williams
Publikováno v:
Computers & Security. 12:679-689
This paper describes issues and results obtained in the context of an integrity research study group. A specification and modeling taxonomy is shown to provide a framework for the group's integrity discussions and investigations. In particular, the C
Autor:
Teresa F. Lunt
Publikováno v:
Computers & Security. 12:405-418
Today's computer systems are vulnerable both to abuse by insiders and to penetration by outsiders, as evidenced by the growing number of incidents reported in the press. To close all security loopholes from today's systems is infeasible, and no combi
Autor:
Teresa F. Lunt
Publikováno v:
Information Systems Security. 1:38-50
Although a computer system's primary defense is its access controls, it is plain from numerous newspaper accounts of break-ins and computerized thefts that access control mechanisms cannot be relied on in most cases to safeguard against a penetration
Autor:
Teresa F. Lunt
Publikováno v:
Computers & Security. 11:41-56
Database security has been the subject of active research for the past several years. In the last five years, rapid progress has been made in defining what security means for such systems and in developing laboratory prototypes and even products that
Autor:
Eduardo B. Fernandez, Teresa F. Lunt
Publikováno v:
ACM SIGMOD Record. 19:90-97
Autor:
Teresa F. Lunt
Publikováno v:
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
Intrusion detection technologies have well-known shortcomings, such as a very high false alarm rate and the ability to detect only a limited class of attacks on a limited set of system components. Specialized attack types on unique system components
Autor:
Philippe Jean-Paul Golle, James D. Thornton, Diana K. Smetters, Paul M. Aoki, Jessica N Staddon, Dirk Balfanz, Tomas Uribe, Glenn E. Durfee, Teresa F. Lunt
Countering terrorism involves gathering information from a wide diversity of sources to discover key facts and relationships, develop models of hypotheses, and support human reasoning on likely futures and outcomes. Many of these data sources contain
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a6e11c65a4c4cd9bbfff79033453ecc2
https://doi.org/10.21236/ada433707
https://doi.org/10.21236/ada433707
Autor:
R.A. Whitehurst, Teresa F. Lunt
Publikováno v:
Proceedings of the Computer Security Foundations Workshop II.
The SeaView project was a three-year program to create the design of a multilevel secure relational database system that meets the criteria for Class A1. The verification of the SeaView formal top-level specifications and the benefits that were gaine
Publikováno v:
ACSAC
The requirements for multilevel security have been shown to conflict with some database integrity and consistency properties. The authors examine the data consistency requirements for a distributed database system, consider the effects of multilevel