Teresa F. Lunt
According to our database1,
Teresa F. Lunt
authored at least 53 papers
between 1986 and 2004.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2004
Identifying Terrorist Activity with AI Plan Recognition Technology.
Proceedings of the Nineteenth National Conference on Artificial Intelligence, 2004
2000
Foundations for Intrusion Detection?.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000
1997
A Semantic Framework of the Multilevel Secure Relational Model.
IEEE Trans. Knowl. Data Eng., 1997
Firewalls: An Expert Roundtable.
IEEE Software, 1997
1996
A MAC Policy Framework for Multilevel Relational Databases.
IEEE Trans. Knowl. Data Eng., 1996
Securing the Information Infrastructure.
Commun. ACM, 1996
Strategic Directions in Computer Security.
Proceedings of the Database Security Volume X, 1996
Security and the National Telecommunications Infrastructure.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996
1995
Towards a MAC Policy Framework.
Proceedings of the Database Security IX: Status and Prospects, 1995
Authorization in Object-Oriented Databases.
Modern Database Systems, 1995
1994
A prototype multilevel-secure DoD directory.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994
1993
Automated Instruction Detection.
Information Systems Security, 1993
A survey of intrusion detection techniques.
Computers & Security, 1993
Report of an integrity research study group.
Computers & Security, 1993
Detection and elimination of inference channels in multilevel relational database systems.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993
Effects of multilevel security on real-time applications.
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993
1992
Security in database systems: A research perspective.
Computers & Security, 1992
Security for object-oriented database systems.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992
Tuple-level vs Element-level Classification.
Proceedings of the Database Security, 1992
Workshop Summary.
Proceedings of the Database Security, 1992
Toward a Tool to Detect and Eliminate Inference Problems in the Design of Multilevel Databases.
Proceedings of the Database Security, 1992
1991
Introduction: Security and Privacy.
IEEE Trans. Software Eng., 1991
Security Issues in Federated Database Systems: Panel Contributions.
Proceedings of the Database Security, 1991
Current Issues in Statistical Database Security.
Proceedings of the Database Security, 1991
Cover Stories for Database Security.
Proceedings of the Database Security, 1991
Polyinstantiation: An Inevitable Part of a Multilevel World.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991
Abductive and Approximate Reasoning Models for Characterizing Inference Channels.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991
1990
The SeaView Security Model.
IEEE Trans. Software Eng., 1990
Database Security.
SIGMOD Record, 1990
Database Security.
IEEE Data Eng. Bull., 1990
The SeaView Secure Database System: A Progress Report.
Proceedings of the ESORICS 90, 1990
Update Semantics for a Multilevel Relational Database System.
Proceedings of the Database Security, 1990
A New Polyinstantiation Integrity Constraint for Multilevel Relations.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990
IDES: a progress report [Intrusion-Detection Expert System].
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990
Multilevel security for knowledge based systems.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990
1989
Aggregation and Inference: Facts and Fallacies.
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989
Multilevel Security for Object-Oriented Database Systems.
Proceedings of the Database Security, 1989
The Sea View Verification.
Proceedings of the Second IEEE Computer Security Foundations Workshop, 1989
Real-time intrusion detection.
Proceedings of the Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage, 1989
TCB subsets: the next step.
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989
Report from the second RADC database security workshop.
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989
Issues in distributed database security.
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989
1988
Element-level classification with A1 assurance.
Computers & Security, 1988
A near-term design for the SeaView multilevel database system.
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988
A prototype real-time intrusion-detection expert system.
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988
The SeaView security model.
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988
Multilevel Database Systems: Meeting Class A1.
Proceedings of the Database Security, 1988
Access Control Policies for Database Systems.
Proceedings of the Database Security, 1988
Access Control Policies: Some Unanswered Questions.
Proceedings of the First IEEE Computer Security Foundations Workshop, 1988
1987
Views for Multilevel Database Security.
IEEE Trans. Software Eng., 1987
A Multilevel Relational Data Model.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987
Multilevel Security for Knowledge-Based Systems.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987
1986
The Trusted Domain Machine: A Secure Communication Device for Security Guard Applications.
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986