Search the dblp DataBase
Teresa F. Lunt :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Teresa F. Lunt , Dorothy E. Denning , Roger R. Schell , Mark Heckman , William R. Shockley The SeaView Security Model. [Citation Graph (14, 0)][DBLP ] IEEE Trans. Software Eng., 1990, v:16, n:6, pp:593-607 [Journal ] Dorothy E. Denning , Selim G. Akl , Mark Heckman , Teresa F. Lunt , Matthew Morgenstern , Peter G. Neumann , Roger R. Schell Views for Multilevel Database Security. [Citation Graph (6, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:129-140 [Journal ] Teresa F. Lunt Access Control Policies for Database Systems. [Citation Graph (5, 0)][DBLP ] DBSec, 1988, pp:41-52 [Conf ] Xiaolei Qian , Teresa F. Lunt Tuple-level vs Element-level Classification. [Citation Graph (4, 0)][DBLP ] DBSec, 1992, pp:301-316 [Conf ] Teresa F. Lunt Multilevel Security for Object-Oriented Database Systems. [Citation Graph (3, 0)][DBLP ] DBSec, 1989, pp:199-209 [Conf ] Thomas D. Garvey , Teresa F. Lunt , Xiaolei Qian , Mark E. Stickel Toward a Tool to Detect and Eliminate Inference Problems in the Design of Multilevel Databases. [Citation Graph (2, 0)][DBLP ] DBSec, 1992, pp:149-168 [Conf ] Teresa F. Lunt , Donovan Hsieh Update Semantics for a Multilevel Relational Database System. [Citation Graph (2, 0)][DBLP ] DBSec, 1990, pp:281-296 [Conf ] Matthew Morgenstern , Teresa F. Lunt , Bhavani M. Thuraisingham , David L. Spooner Security Issues in Federated Database Systems: Panel Contributions. [Citation Graph (2, 0)][DBLP ] DBSec, 1991, pp:131-148 [Conf ] Teresa F. Lunt , Eduardo B. Fernández Database Security. [Citation Graph (2, 0)][DBLP ] SIGMOD Record, 1990, v:19, n:4, pp:90-97 [Journal ] Teresa F. Lunt , Eduardo B. Fernández Database Security. [Citation Graph (1, 0)][DBLP ] IEEE Data Eng. Bull., 1990, v:13, n:4, pp:43-50 [Journal ] Xiaolei Qian , Teresa F. Lunt A MAC Policy Framework for Multilevel Relational Databases. [Citation Graph (1, 15)][DBLP ] IEEE Trans. Knowl. Data Eng., 1996, v:8, n:1, pp:3-15 [Journal ] Xiaolei Qian , Teresa F. Lunt A Semantic Framework of the Multilevel Secure Relational Model. [Citation Graph (1, 14)][DBLP ] IEEE Trans. Knowl. Data Eng., 1997, v:9, n:2, pp:292-301 [Journal ] Peter Jarvis , Teresa F. Lunt , Karen L. Myers Identifying Terrorist Activity with AI Plan Recognition Technology. [Citation Graph (0, 0)][DBLP ] AAAI, 2004, pp:858-863 [Conf ] Teresa F. Lunt , John Kimmins , Bob McKosky Security and the National Telecommunications Infrastructure. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:138-139 [Conf ] Thomas D. Garvey , Teresa F. Lunt , Mark E. Stickel Abductive and Approximate Reasoning Models for Characterizing Inference Channels. [Citation Graph (0, 0)][DBLP ] CSFW, 1991, pp:118-126 [Conf ] Teresa F. Lunt Foundations for Intrusion Detection?. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:104-106 [Conf ] Teresa F. Lunt Access Control Policies: Some Unanswered Questions. [Citation Graph (0, 0)][DBLP ] CSFW, 1988, pp:227-245 [Conf ] Teresa F. Lunt Polyinstantiation: An Inevitable Part of a Multilevel World. [Citation Graph (0, 0)][DBLP ] CSFW, 1991, pp:236-238 [Conf ] Ravi S. Sandhu , Sushil Jajodia , Teresa F. Lunt A New Polyinstantiation Integrity Constraint for Multilevel Relations. [Citation Graph (0, 0)][DBLP ] CSFW, 1990, pp:159-165 [Conf ] R. Alan Whitehurst , Teresa F. Lunt The Sea View Verification. [Citation Graph (0, 0)][DBLP ] CSFW, 1989, pp:125-132 [Conf ] Thomas D. Garvey , Teresa F. Lunt Cover Stories for Database Security. [Citation Graph (0, 0)][DBLP ] DBSec, 1991, pp:363-380 [Conf ] Teresa F. Lunt Multilevel Database Systems: Meeting Class A1. [Citation Graph (0, 0)][DBLP ] DBSec, 1988, pp:177-186 [Conf ] Teresa F. Lunt Current Issues in Statistical Database Security. [Citation Graph (0, 0)][DBLP ] DBSec, 1991, pp:381-385 [Conf ] Teresa F. Lunt Workshop Summary. [Citation Graph (0, 0)][DBLP ] DBSec, 1992, pp:387-396 [Conf ] Teresa F. Lunt Strategic Directions in Computer Security. [Citation Graph (0, 0)][DBLP ] DBSec, 1996, pp:3-10 [Conf ] Xiaolei Qian , Teresa F. Lunt Towards a MAC Policy Framework. [Citation Graph (0, 0)][DBLP ] DBSec, 1995, pp:165-180 [Conf ] Dorothy E. Denning , Teresa F. Lunt , Roger R. Schell , Mark Heckman , William R. Shockley A Multilevel Relational Data Model. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1987, pp:220-234 [Conf ] Thomas A. Berson , Teresa F. Lunt Multilevel Security for Knowledge-Based Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1987, pp:235-242 [Conf ] R. A. Carlson , Teresa F. Lunt The Trusted Domain Machine: A Secure Communication Device for Security Guard Applications. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1986, pp:182-186 [Conf ] Teresa F. Lunt Aggregation and Inference: Facts and Fallacies. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1989, pp:102-109 [Conf ] Peter Jarvis , Teresa F. Lunt , Karen L. Myers Identifying Terrorist Activity with AI Plan Recognition Technology. [Citation Graph (0, 0)][DBLP ] AI Magazine, 2005, v:26, n:3, pp:73-81 [Journal ] Teresa F. Lunt Securing the Information Infrastructure. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:6, pp:130- [Journal ] Marshall D. Abrams , Edward Amoroso , Leonard J. LaPadula , Teresa F. Lunt , James G. Williams Report of an integrity research study group. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:7, pp:679-689 [Journal ] Teresa F. Lunt Security in database systems: A research perspective. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:1, pp:41-56 [Journal ] Teresa F. Lunt A survey of intrusion detection techniques. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:4, pp:405-418 [Journal ] James P. Anderson , Sheila Brand , Li Gong , Thomas Haigh , Steven B. Lipner , Teresa F. Lunt , Ruth Nelson , William Neugent , Hilarie K. Orman , Marcus J. Ranum , Roger R. Schell , Eugene H. Spafford Firewalls: An Expert Roundtable. [Citation Graph (0, 0)][DBLP ] IEEE Software, 1997, v:14, n:5, pp:60-66 [Journal ] Teresa F. Lunt , Deborah M. Cooper Introduction: Security and Privacy. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1991, v:17, n:11, pp:1145-1146 [Journal ] The SeaView Secure Database System: A Progress Report. [Citation Graph (, )][DBLP ] Access control policies: Some unanswered questions. [Citation Graph (, )][DBLP ] Search in 0.015secs, Finished in 0.017secs