Trusted Recovery and Defensive Information Warfare
暂无分享,去创建一个
[1] Marianne Winslett,et al. Formal query languages for secure relational databases , 1994, TODS.
[2] Robert E. Strom,et al. Optimistic recovery in distributed systems , 1985, TOCS.
[3] James P. Black,et al. Principles of Data Structure Error Correction , 1982, IEEE Transactions on Computers.
[4] Michael Stonebraker,et al. The Design of XPRS , 1988, VLDB.
[5] R. Sekar,et al. A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[6] Hans-Jörg Schek,et al. Concepts and Applications of Multilevel Transactions and Open Nested Transactions , 1992, Database Transaction Models for Advanced Applications.
[7] E. B. Moss,et al. Nested Transactions: An Approach to Reliable Distributed Computing , 1985 .
[8] Shiuh-Pyng Shieh,et al. On a Pattern-Oriented Model for Intrusion Detection , 1997, IEEE Trans. Knowl. Data Eng..
[9] Jeffrey D. Uuman. Principles of database and knowledge- base systems , 1989 .
[10] Andreas Reuter,et al. The ConTract Model , 1991, Database Transaction Models for Advanced Applications.
[11] Richard A. Kemmerer,et al. Penetration state transition analysis: A rule-based intrusion detection approach , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[12] Brian Randell,et al. System structure for software fault tolerance , 1975, IEEE Transactions on Software Engineering.
[13] Ravi S. Sandhu. The typed access matrix model , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[14] William E. Weihl. Commutativity-based concurrency control for abstract data types , 1988 .
[15] Salvatore J. Stolfo,et al. Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results 1 , 1997 .
[16] Fang Chen,et al. The multilevel relational (MLR) data model , 1998, TSEC.
[17] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[18] Panos K. Chrysanthis,et al. Advances in concurrency control and transaction processing - executive briefing , 1996 .
[19] Calton Pu,et al. Split-Transactions for Open-Ended Activities , 1988, VLDB.
[20] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.