Dynamic and efficient key management for access hierarchies

MJ Atallah, M Blanton, N Fazio, KB Frikken - ACM Transactions on …, 2009 - dl.acm.org
Hierarchies arise in the context of access control whenever the user population can be
modeled as a set of partially ordered classes (represented as a directed graph). A user with …

Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, decision trees, and naive Bayes for off-line …

K Goeschel - SoutheastCon 2016, 2016 - ieeexplore.ieee.org
Intrusion detection systems monitor network or host packets in an attempt to detect malicious
activities on a system. Anomaly detection systems have success in exposing new attacks …

The SeaView security model

TF Lunt, DE Denning, RR Schell… - IEEE Transactions …, 1990 - ieeexplore.ieee.org
A multilevel database is intended to provide the security needed for database systems that
contain data at a variety of classifications and serve a set of users having different …

MauveDB: supporting model-based user views in database systems

A Deshpande, S Madden - Proceedings of the 2006 ACM SIGMOD …, 2006 - dl.acm.org
Real-world data---especially when generated by distributed measurement infrastructures
such as sensor networks---tends to be incomplete, imprecise, and erroneous, making it …

Intrusion detection using hierarchical neural networks

C Zhang, J Jiang, M Kamel - Pattern Recognition Letters, 2005 - Elsevier
Most intrusion detection system (IDS) with a single-level structure can only detect either
misuse or anomaly attacks. Some IDSs with multi-level structure or multi-classifier are …

A cryptographic key generation scheme for multilevel data security

L Harn, HY Lin - Computers & Security, 1990 - Elsevier
Abstract In 1982, Akl and Taylor proposed an elegant solution to the partially ordered
multilevel key distribution problem, using a cryptographic approach. Since then, continuing …

Precise, dynamic information flow for database-backed applications

J Yang, T Hance, TH Austin, A Solar-Lezama… - ACM Sigplan …, 2016 - dl.acm.org
We present an approach for dynamic information flow control across the application and
database. Our approach reduces the amount of policy code required, yields formal …

A multilevel relational data model

DE Denning, TF Lunt - 1987 IEEE Symposium on Security and …, 1987 - ieeexplore.ieee.org
A multilevel relational data model that meets the basic operational requirements for a
multilevel database system is described. The model is an extension of the standard …

Security control redundancy allocation technology and security keys based on Internet of Things

A Yang, Y Li, F Kong, G Wang, E Chen - Ieee Access, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) is widely valued by governments, academia, and industry for its
huge application prospects. The core concepts of IoT are perception, control, transmission …

A novel key management scheme based on discrete logarithms and polynomial interpolations

VRL Shen, TS Chen - Computers & Security, 2002 - Elsevier
The authors present a novel cryptographic key assignment scheme in order to solve the
dynamic access control problems in a partially ordered user hierarchy. By using the scheme …