The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Teresa F. Lunt: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark Heckman, William R. Shockley
    The SeaView Security Model. [Citation Graph (14, 0)][DBLP]
    IEEE Trans. Software Eng., 1990, v:16, n:6, pp:593-607 [Journal]
  2. Dorothy E. Denning, Selim G. Akl, Mark Heckman, Teresa F. Lunt, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell
    Views for Multilevel Database Security. [Citation Graph (6, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:129-140 [Journal]
  3. Teresa F. Lunt
    Access Control Policies for Database Systems. [Citation Graph (5, 0)][DBLP]
    DBSec, 1988, pp:41-52 [Conf]
  4. Xiaolei Qian, Teresa F. Lunt
    Tuple-level vs Element-level Classification. [Citation Graph (4, 0)][DBLP]
    DBSec, 1992, pp:301-316 [Conf]
  5. Teresa F. Lunt
    Multilevel Security for Object-Oriented Database Systems. [Citation Graph (3, 0)][DBLP]
    DBSec, 1989, pp:199-209 [Conf]
  6. Thomas D. Garvey, Teresa F. Lunt, Xiaolei Qian, Mark E. Stickel
    Toward a Tool to Detect and Eliminate Inference Problems in the Design of Multilevel Databases. [Citation Graph (2, 0)][DBLP]
    DBSec, 1992, pp:149-168 [Conf]
  7. Teresa F. Lunt, Donovan Hsieh
    Update Semantics for a Multilevel Relational Database System. [Citation Graph (2, 0)][DBLP]
    DBSec, 1990, pp:281-296 [Conf]
  8. Matthew Morgenstern, Teresa F. Lunt, Bhavani M. Thuraisingham, David L. Spooner
    Security Issues in Federated Database Systems: Panel Contributions. [Citation Graph (2, 0)][DBLP]
    DBSec, 1991, pp:131-148 [Conf]
  9. Teresa F. Lunt, Eduardo B. Fernández
    Database Security. [Citation Graph (2, 0)][DBLP]
    SIGMOD Record, 1990, v:19, n:4, pp:90-97 [Journal]
  10. Teresa F. Lunt, Eduardo B. Fernández
    Database Security. [Citation Graph (1, 0)][DBLP]
    IEEE Data Eng. Bull., 1990, v:13, n:4, pp:43-50 [Journal]
  11. Xiaolei Qian, Teresa F. Lunt
    A MAC Policy Framework for Multilevel Relational Databases. [Citation Graph (1, 15)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1996, v:8, n:1, pp:3-15 [Journal]
  12. Xiaolei Qian, Teresa F. Lunt
    A Semantic Framework of the Multilevel Secure Relational Model. [Citation Graph (1, 14)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1997, v:9, n:2, pp:292-301 [Journal]
  13. Peter Jarvis, Teresa F. Lunt, Karen L. Myers
    Identifying Terrorist Activity with AI Plan Recognition Technology. [Citation Graph (0, 0)][DBLP]
    AAAI, 2004, pp:858-863 [Conf]
  14. Teresa F. Lunt, John Kimmins, Bob McKosky
    Security and the National Telecommunications Infrastructure. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:138-139 [Conf]
  15. Thomas D. Garvey, Teresa F. Lunt, Mark E. Stickel
    Abductive and Approximate Reasoning Models for Characterizing Inference Channels. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:118-126 [Conf]
  16. Teresa F. Lunt
    Foundations for Intrusion Detection?. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:104-106 [Conf]
  17. Teresa F. Lunt
    Access Control Policies: Some Unanswered Questions. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:227-245 [Conf]
  18. Teresa F. Lunt
    Polyinstantiation: An Inevitable Part of a Multilevel World. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:236-238 [Conf]
  19. Ravi S. Sandhu, Sushil Jajodia, Teresa F. Lunt
    A New Polyinstantiation Integrity Constraint for Multilevel Relations. [Citation Graph (0, 0)][DBLP]
    CSFW, 1990, pp:159-165 [Conf]
  20. R. Alan Whitehurst, Teresa F. Lunt
    The Sea View Verification. [Citation Graph (0, 0)][DBLP]
    CSFW, 1989, pp:125-132 [Conf]
  21. Thomas D. Garvey, Teresa F. Lunt
    Cover Stories for Database Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 1991, pp:363-380 [Conf]
  22. Teresa F. Lunt
    Multilevel Database Systems: Meeting Class A1. [Citation Graph (0, 0)][DBLP]
    DBSec, 1988, pp:177-186 [Conf]
  23. Teresa F. Lunt
    Current Issues in Statistical Database Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 1991, pp:381-385 [Conf]
  24. Teresa F. Lunt
    Workshop Summary. [Citation Graph (0, 0)][DBLP]
    DBSec, 1992, pp:387-396 [Conf]
  25. Teresa F. Lunt
    Strategic Directions in Computer Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:3-10 [Conf]
  26. Xiaolei Qian, Teresa F. Lunt
    Towards a MAC Policy Framework. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:165-180 [Conf]
  27. Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, Mark Heckman, William R. Shockley
    A Multilevel Relational Data Model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:220-234 [Conf]
  28. Thomas A. Berson, Teresa F. Lunt
    Multilevel Security for Knowledge-Based Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:235-242 [Conf]
  29. R. A. Carlson, Teresa F. Lunt
    The Trusted Domain Machine: A Secure Communication Device for Security Guard Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:182-186 [Conf]
  30. Teresa F. Lunt
    Aggregation and Inference: Facts and Fallacies. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:102-109 [Conf]
  31. Peter Jarvis, Teresa F. Lunt, Karen L. Myers
    Identifying Terrorist Activity with AI Plan Recognition Technology. [Citation Graph (0, 0)][DBLP]
    AI Magazine, 2005, v:26, n:3, pp:73-81 [Journal]
  32. Teresa F. Lunt
    Securing the Information Infrastructure. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1996, v:39, n:6, pp:130- [Journal]
  33. Marshall D. Abrams, Edward Amoroso, Leonard J. LaPadula, Teresa F. Lunt, James G. Williams
    Report of an integrity research study group. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:7, pp:679-689 [Journal]
  34. Teresa F. Lunt
    Security in database systems: A research perspective. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:1, pp:41-56 [Journal]
  35. Teresa F. Lunt
    A survey of intrusion detection techniques. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:4, pp:405-418 [Journal]
  36. James P. Anderson, Sheila Brand, Li Gong, Thomas Haigh, Steven B. Lipner, Teresa F. Lunt, Ruth Nelson, William Neugent, Hilarie K. Orman, Marcus J. Ranum, Roger R. Schell, Eugene H. Spafford
    Firewalls: An Expert Roundtable. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 1997, v:14, n:5, pp:60-66 [Journal]
  37. Teresa F. Lunt, Deborah M. Cooper
    Introduction: Security and Privacy. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1991, v:17, n:11, pp:1145-1146 [Journal]

  38. The SeaView Secure Database System: A Progress Report. [Citation Graph (, )][DBLP]


  39. Access control policies: Some unanswered questions. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002