Author of the publication

Responding to Anomalous Database Requests.

, , and . Secure Data Management, volume 5159 of Lecture Notes in Computer Science, page 50-66. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Database Intrusion Detection and Response., and . RAID, volume 5230 of Lecture Notes in Computer Science, page 400-401. Springer, (2008)Responding to Anomalous Database Requests., , and . Secure Data Management, volume 5159 of Lecture Notes in Computer Science, page 50-66. Springer, (2008)Access Control for Databases: Concepts and Systems., , and . Found. Trends Databases, 3 (1-2): 1-148 (2011)Efficient k -Anonymization Using Clustering Techniques., , , and . DASFAA, volume 4443 of Lecture Notes in Computer Science, page 188-200. Springer, (2007)Database Security., , and . Security, Privacy, and Trust in Modern Data Management, Springer, (2007)Intrusion Detection in RBAC-administered Databases., , , and . ACSAC, page 170-182. IEEE Computer Society, (2005)Detecting anomalous access patterns in relational databases., , and . VLDB J., 17 (5): 1063-1077 (2008)PostgreSQL anomalous query detector., , , and . EDBT, page 741-744. ACM, (2013)Design and Implementation of an Intrusion Response System for Relational Databases., and . IEEE Trans. Knowl. Data Eng., 23 (6): 875-888 (2011)Privilege States Based Access Control for Fine-Grained Intrusion Response., and . RAID, volume 6307 of Lecture Notes in Computer Science, page 402-421. Springer, (2010)