Teresa F. Lunt

According to our database1, Teresa F. Lunt authored at least 51 papers between 1986 and 2005.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2005
Identifying Terrorist Activity with AI Plan Recognition Technology.
AI Mag., 2005

2000
Foundations for Intrusion Detection?.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

1997
A Semantic Framework of the Multilevel Secure Relational Model.
IEEE Trans. Knowl. Data Eng., 1997

Firewalls: An Expert Roundtable.
IEEE Softw., 1997

1996
A MAC Policy Framework for Multilevel Relational Databases.
IEEE Trans. Knowl. Data Eng., 1996

Securing the Information Infrastructure.
Commun. ACM, 1996

Strategic Directions in Computer Security.
Proceedings of the Database Security Volume X, 1996

Security and the National Telecommunications Infrastructure.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996

1995
Towards a MAC Policy Framework.
Proceedings of the Database Security IX: Status and Prospects, 1995

Authorization in Object-Oriented Databases.
Proceedings of the Modern Database Systems: The Object Model, 1995

1994
A prototype multilevel-secure DoD directory.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994

1993
Automated Instruction Detection.
Inf. Secur. J. A Glob. Perspect., 1993

A survey of intrusion detection techniques.
Comput. Secur., 1993

Report of an integrity research study group.
Comput. Secur., 1993

Detection and elimination of inference channels in multilevel relational database systems.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993

Effects of multilevel security on real-time applications.
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993

1992
Security in database systems: A research perspective.
Comput. Secur., 1992

Security for object-oriented database systems.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992

Tuple-level vs Element-level Classification.
Proceedings of the Database Security, 1992

Workshop Summary.
Proceedings of the Database Security, 1992

Toward a Tool to Detect and Eliminate Inference Problems in the Design of Multilevel Databases.
Proceedings of the Database Security, 1992

1991
Introduction: Security and Privacy.
IEEE Trans. Software Eng., 1991

Security Issues in Federated Database Systems: Panel Contributions.
Proceedings of the Database Security, 1991

Current Issues in Statistical Database Security.
Proceedings of the Database Security, 1991

Cover Stories for Database Security.
Proceedings of the Database Security, 1991

Polyinstantiation: An Inevitable Part of a Multilevel World.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

Abductive and Approximate Reasoning Models for Characterizing Inference Channels.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

1990
The SeaView Security Model.
IEEE Trans. Software Eng., 1990

Database Security.
IEEE Data Eng. Bull., 1990

The SeaView Secure Database System: A Progress Report.
Proceedings of the ESORICS 90, 1990

Update Semantics for a Multilevel Relational Database System.
Proceedings of the Database Security, 1990

A New Polyinstantiation Integrity Constraint for Multilevel Relations.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990

IDES: a progress report [Intrusion-Detection Expert System].
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

Multilevel security for knowledge based systems.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

1989
Access control policies: Some unanswered questions.
Comput. Secur., 1989

Aggregation and Inference: Facts and Fallacies.
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989

Multilevel Security for Object-Oriented Database Systems.
Proceedings of the Database Security, 1989

The Sea View Verification.
Proceedings of the Second IEEE Computer Security Foundations Workshop, 1989

Real-time intrusion detection.
Proceedings of the Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage, 1989

TCB subsets: the next step.
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989

Report from the second RADC database security workshop.
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989

Issues in distributed database security.
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989

1988
Element-level classification with A1 assurance.
Comput. Secur., 1988

A near-term design for the SeaView multilevel database system.
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988

A prototype real-time intrusion-detection expert system.
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988

Multilevel Database Systems: Meeting Class A1.
Proceedings of the Database Security, 1988

Access Control Policies for Database Systems.
Proceedings of the Database Security, 1988

1987
Views for Multilevel Database Security.
IEEE Trans. Software Eng., 1987

A Multilevel Relational Data Model.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987

Multilevel Security for Knowledge-Based Systems.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987

1986
The Trusted Domain Machine: A Secure Communication Device for Security Guard Applications.
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986


  Loading...