| 2005 |
40 | | Peter Jarvis,
Teresa F. Lunt,
Karen L. Myers:
Identifying Terrorist Activity with AI Plan Recognition Technology.
AI Magazine 26(3): 73-81 (2005) |
| 2004 |
39 | | Peter Jarvis,
Teresa F. Lunt,
Karen L. Myers:
Identifying Terrorist Activity with AI Plan Recognition Technology.
AAAI 2004: 858-863 |
| 2000 |
38 | | Teresa F. Lunt:
Foundations for Intrusion Detection?.
CSFW 2000: 104-106 |
| 1997 |
37 | | James P. Anderson,
Sheila Brand,
Li Gong,
Thomas Haigh,
Steven B. Lipner,
Teresa F. Lunt,
Ruth Nelson,
William Neugent,
Hilarie K. Orman,
Marcus J. Ranum,
Roger R. Schell,
Eugene H. Spafford:
Firewalls: An Expert Roundtable.
IEEE Software 14(5): 60-66 (1997) |
36 | | Xiaolei Qian,
Teresa F. Lunt:
A Semantic Framework of the Multilevel Secure Relational Model.
IEEE Trans. Knowl. Data Eng. 9(2): 292-301 (1997) |
| 1996 |
35 | | Teresa F. Lunt,
John Kimmins,
Bob McKosky:
Security and the National Telecommunications Infrastructure.
ACSAC 1996: 138-139 |
34 | | Teresa F. Lunt:
Strategic Directions in Computer Security.
DBSec 1996: 3-10 |
33 | | Teresa F. Lunt:
Securing the Information Infrastructure.
Commun. ACM 39(6): 130 (1996) |
32 | | Xiaolei Qian,
Teresa F. Lunt:
A MAC Policy Framework for Multilevel Relational Databases.
IEEE Trans. Knowl. Data Eng. 8(1): 3-15 (1996) |
| 1995 |
31 | | Xiaolei Qian,
Teresa F. Lunt:
Towards a MAC Policy Framework.
DBSec 1995: 165-180 |
30 | | Teresa F. Lunt:
Authorization in Object-Oriented Databases.
Modern Database Systems 1995: 130-145 |
| 1993 |
29 | | Teresa F. Lunt:
A survey of intrusion detection techniques.
Computers & Security 12(4): 405-418 (1993) |
28 | | Marshall D. Abrams,
Edward Amoroso,
Leonard J. LaPadula,
Teresa F. Lunt,
James G. Williams:
Report of an integrity research study group.
Computers & Security 12(7): 679-689 (1993) |
| 1992 |
27 | | Thomas D. Garvey,
Teresa F. Lunt,
Xiaolei Qian,
Mark E. Stickel:
Toward a Tool to Detect and Eliminate Inference Problems in the Design of Multilevel Databases.
DBSec 1992: 149-168 |
26 | | Xiaolei Qian,
Teresa F. Lunt:
Tuple-level vs Element-level Classification.
DBSec 1992: 301-316 |
25 | | Teresa F. Lunt:
Workshop Summary.
DBSec 1992: 387-396 |
24 | | Teresa F. Lunt:
Security in database systems: A research perspective.
Computers & Security 11(1): 41-56 (1992) |
| 1991 |
23 | | Thomas D. Garvey,
Teresa F. Lunt,
Mark E. Stickel:
Abductive and Approximate Reasoning Models for Characterizing Inference Channels.
CSFW 1991: 118-126 |
22 | | Teresa F. Lunt:
Polyinstantiation: An Inevitable Part of a Multilevel World.
CSFW 1991: 236-238 |
21 | | Matthew Morgenstern,
Teresa F. Lunt,
Bhavani M. Thuraisingham,
David L. Spooner:
Security Issues in Federated Database Systems: Panel Contributions.
DBSec 1991: 131-148 |
20 | | Thomas D. Garvey,
Teresa F. Lunt:
Cover Stories for Database Security.
DBSec 1991: 363-380 |
19 | | Teresa F. Lunt:
Current Issues in Statistical Database Security.
DBSec 1991: 381-385 |
18 | | Teresa F. Lunt,
Deborah M. Cooper:
Introduction: Security and Privacy.
IEEE Trans. Software Eng. 17(11): 1145-1146 (1991) |
| 1990 |
17 | | Ravi S. Sandhu,
Sushil Jajodia,
Teresa F. Lunt:
A New Polyinstantiation Integrity Constraint for Multilevel Relations.
CSFW 1990: 159-165 |
16 | | Teresa F. Lunt,
Donovan Hsieh:
Update Semantics for a Multilevel Relational Database System.
DBSec 1990: 281-296 |
15 | | Teresa F. Lunt,
Donovan Hsieh:
The SeaView Secure Database System: A Progress Report.
ESORICS 1990: 3-13 |
14 | | Teresa F. Lunt,
Eduardo B. Fernández:
Database Security.
IEEE Data Eng. Bull. 13(4): 43-50 (1990) |
13 | | Teresa F. Lunt,
Dorothy E. Denning,
Roger R. Schell,
Mark Heckman,
William R. Shockley:
The SeaView Security Model.
IEEE Trans. Software Eng. 16(6): 593-607 (1990) |
12 | | Teresa F. Lunt,
Eduardo B. Fernández:
Database Security.
SIGMOD Record 19(4): 90-97 (1990) |
| 1989 |
11 | | R. Alan Whitehurst,
Teresa F. Lunt:
The Sea View Verification.
CSFW 1989: 125-132 |
10 | | Teresa F. Lunt:
Multilevel Security for Object-Oriented Database Systems.
DBSec 1989: 199-209 |
9 | | Teresa F. Lunt:
Aggregation and Inference: Facts and Fallacies.
IEEE Symposium on Security and Privacy 1989: 102-109 |
8 | | Teresa F. Lunt:
Access control policies: Some unanswered questions.
Computers & Security 8(1): 43-54 (1989) |
| 1988 |
7 | | Teresa F. Lunt:
Access Control Policies: Some Unanswered Questions.
CSFW 1988: 227-245 |
6 | | Teresa F. Lunt:
Multilevel Database Systems: Meeting Class A1.
DBSec 1988: 177-186 |
5 | | Teresa F. Lunt:
Access Control Policies for Database Systems.
DBSec 1988: 41-52 |
| 1987 |
4 | | Dorothy E. Denning,
Teresa F. Lunt,
Roger R. Schell,
Mark Heckman,
William R. Shockley:
A Multilevel Relational Data Model.
IEEE Symposium on Security and Privacy 1987: 220-234 |
3 | | Thomas A. Berson,
Teresa F. Lunt:
Multilevel Security for Knowledge-Based Systems.
IEEE Symposium on Security and Privacy 1987: 235-242 |
2 | | Dorothy E. Denning,
Selim G. Akl,
Mark Heckman,
Teresa F. Lunt,
Matthew Morgenstern,
Peter G. Neumann,
Roger R. Schell:
Views for Multilevel Database Security.
IEEE Trans. Software Eng. 13(2): 129-140 (1987) |
| 1986 |
1 | | R. A. Carlson,
Teresa F. Lunt:
The Trusted Domain Machine: A Secure Communication Device for Security Guard Applications.
IEEE Symposium on Security and Privacy 1986: 182-186 |