Interfacing Trusted Applications with Intrusion Detection Systems
- 27 September 2001
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 7 references indexed in Scilit:
- LOMAC: Low Water-Mark integrity protection for COTS environmentsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Target Naming and Service ApoptosisPublished by Springer Nature ,2000
- Using Reflection as a Mechanism for Enforcing Security Policies in Mobile CodePublished by Springer Nature ,2000
- The base-rate fallacy and its implications for the difficulty of intrusion detectionPublished by Association for Computing Machinery (ACM) ,1999
- Unified login with pluggable authentication modules (PAM)Published by Association for Computing Machinery (ACM) ,1996
- Access ControlPublished by Elsevier ,1992
- Simple Network Management Protocol (SNMP)Published by RFC Editor ,1990