![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Teresa F. Lunt
Person information
Refine list
![note](https://dblp1.uni-trier.de/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2005
- [j16]Peter Jarvis, Teresa F. Lunt, Karen L. Myers:
Identifying Terrorist Activity with AI Plan Recognition Technology. AI Mag. 26(3): 73-81 (2005) - 1997
- [j15]James P. Anderson, Sheila Brand, Li Gong, Thomas Haigh, Steven B. Lipner, Teresa F. Lunt, Ruth Nelson, William Neugent, Hilarie K. Orman, Marcus J. Ranum, Roger R. Schell, Eugene H. Spafford:
Firewalls: An Expert Roundtable. IEEE Softw. 14(5): 60-66 (1997) - [j14]Xiaolei Qian, Teresa F. Lunt:
A Semantic Framework of the Multilevel Secure Relational Model. IEEE Trans. Knowl. Data Eng. 9(2): 292-301 (1997) - 1996
- [j13]Teresa F. Lunt:
Securing the Information Infrastructure. Commun. ACM 39(6): 130 (1996) - [j12]Xiaolei Qian, Teresa F. Lunt:
A MAC Policy Framework for Multilevel Relational Databases. IEEE Trans. Knowl. Data Eng. 8(1): 3-15 (1996) - 1993
- [j11]Teresa F. Lunt:
A survey of intrusion detection techniques. Comput. Secur. 12(4): 405-418 (1993) - [j10]Marshall D. Abrams, Edward Amoroso, Leonard J. LaPadula, Teresa F. Lunt, James G. Williams:
Report of an integrity research study group. Comput. Secur. 12(7): 679-689 (1993) - [j9]Teresa F. Lunt:
Automated Instruction Detection. Inf. Secur. J. A Glob. Perspect. 1(4): 38-50 (1993) - 1992
- [j8]Teresa F. Lunt:
Security in database systems: A research perspective. Comput. Secur. 11(1): 41-56 (1992) - 1991
- [j7]Teresa F. Lunt, Deborah M. Cooper:
Introduction: Security and Privacy. IEEE Trans. Software Eng. 17(11): 1145-1146 (1991) - 1990
- [j6]Teresa F. Lunt, Eduardo B. Fernández:
Database Security. IEEE Data Eng. Bull. 13(4): 43-50 (1990) - [j5]Teresa F. Lunt, Eduardo B. Fernández:
Database Security. SIGMOD Rec. 19(4): 90-97 (1990) - [j4]Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell
, Mark R. Heckman, William R. Shockley:
The SeaView Security Model. IEEE Trans. Software Eng. 16(6): 593-607 (1990) - 1989
- [j3]Teresa F. Lunt:
Access control policies: Some unanswered questions. Comput. Secur. 8(1): 43-54 (1989) - 1988
- [j2]Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell
, Mark R. Heckman, William R. Shockley:
Element-level classification with A1 assurance. Comput. Secur. 7(1): 73-82 (1988) - 1987
- [j1]Dorothy E. Denning, Selim G. Akl, Mark R. Heckman, Teresa F. Lunt, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell:
Views for Multilevel Database Security. IEEE Trans. Software Eng. 13(2): 129-140 (1987)
Conference and Workshop Papers
- 2004
- [c38]Peter Jarvis, Teresa F. Lunt, Karen L. Myers:
Identifying Terrorist Activity with AI Plan Recognition Technology. AAAI 2004: 858-863 - 2000
- [c37]Teresa F. Lunt:
Foundations for Intrusion Detection?. CSFW 2000: 104-106 - 1996
- [c36]Teresa F. Lunt, John Kimmins, Bob McKosky:
Security and the National Telecommunications Infrastructure. ACSAC 1996: 138 - [c35]Teresa F. Lunt:
Strategic Directions in Computer Security. DBSec 1996: 3-10 - 1995
- [c34]Xiaolei Qian, Teresa F. Lunt:
Towards a MAC Policy Framework. DBSec 1995: 165-180 - 1994
- [c33]Peter K. Boucher, Teresa F. Lunt:
A prototype multilevel-secure DoD directory. ACSAC 1994: 180-188 - 1993
- [c32]Raymond K. Clark, Ira B. Greenberg, Peter K. Boucher, Teresa F. Lunt, Peter G. Neumann, Douglas M. Wells, E. Douglas Jensen:
Effects of multilevel security on real-time applications. ACSAC 1993: 120-129 - [c31]Xiaolei Qian, Mark E. Stickel, Peter D. Karp, Teresa F. Lunt, Thomas D. Garvey:
Detection and elimination of inference channels in multilevel relational database systems. S&P 1993: 196-205 - 1992
- [c30]Thomas D. Garvey, Teresa F. Lunt, Xiaolei Qian, Mark E. Stickel:
Toward a Tool to Detect and Eliminate Inference Problems in the Design of Multilevel Databases. DBSec 1992: 149-168 - [c29]Xiaolei Qian, Teresa F. Lunt:
Tuple-level vs Element-level Classification. DBSec 1992: 301-316 - [c28]Teresa F. Lunt:
Workshop Summary. DBSec 1992: 387-396 - [c27]Jonathan K. Millen, Teresa F. Lunt:
Security for object-oriented database systems. S&P 1992: 260-272 - 1991
- [c26]Thomas D. Garvey, Teresa F. Lunt, Mark E. Stickel:
Abductive and Approximate Reasoning Models for Characterizing Inference Channels. CSFW 1991: 118-126 - [c25]Teresa F. Lunt:
Polyinstantiation: An Inevitable Part of a Multilevel World. CSFW 1991: 236-238 - [c24]Matthew Morgenstern, Teresa F. Lunt, Bhavani Thuraisingham, David L. Spooner:
Security Issues in Federated Database Systems: Panel Contributions. DBSec 1991: 131-148 - [c23]Thomas D. Garvey, Teresa F. Lunt:
Cover Stories for Database Security. DBSec 1991: 363-380 - [c22]Teresa F. Lunt:
Current Issues in Statistical Database Security. DBSec 1991: 381-385 - 1990
- [c21]Thomas D. Garvey, Teresa F. Lunt:
Multilevel security for knowledge based systems. ACSAC 1990: 148-159 - [c20]Teresa F. Lunt, Ann Tamaru, Fred Gilham, R. Jagannathan, Peter G. Neumann, Caveh Jalali:
IDES: a progress report [Intrusion-Detection Expert System]. ACSAC 1990: 273-285 - [c19]Ravi S. Sandhu, Sushil Jajodia, Teresa F. Lunt:
A New Polyinstantiation Integrity Constraint for Multilevel Relations. CSFW 1990: 159-165 - [c18]Teresa F. Lunt, Donovan Hsieh:
Update Semantics for a Multilevel Relational Database System. DBSec 1990: 281-296 - [c17]Teresa F. Lunt, Donovan Hsieh:
The SeaView Secure Database System: A Progress Report. ESORICS 1990: 3-13 - 1989
- [c16]Alan R. Downing, Ira B. Greenberg, Teresa F. Lunt:
Issues in distributed database security. ACSAC 1989: 196-203 - [c15]Linda L. Vetter, Gordon Smith, Teresa F. Lunt:
TCB subsets: the next step. ACSAC 1989: 216-221 - [c14]Teresa F. Lunt:
Report from the second RADC database security workshop. ACSAC 1989: 310-313 - [c13]Teresa F. Lunt:
Real-time intrusion detection. COMPCON 1989: 353- - [c12]R. Alan Whitehurst, Teresa F. Lunt:
The Sea View Verification. CSFW 1989: 125-132 - [c11]Teresa F. Lunt:
Multilevel Security for Object-Oriented Database Systems. DBSec 1989: 199-209 - [c10]Teresa F. Lunt:
Aggregation and Inference: Facts and Fallacies. S&P 1989: 102-109 - 1988
- [c9]Teresa F. Lunt:
Access Control Policies: Some Unanswered Questions. CSFW 1988: 227-245 - [c8]Teresa F. Lunt:
Access Control Policies for Database Systems. DBSec 1988: 41-52 - [c7]Teresa F. Lunt:
Multilevel Database Systems: Meeting Class A1. DBSec 1988: 177-186 - [c6]Teresa F. Lunt, R. Jagannathan:
A prototype real-time intrusion-detection expert system. S&P 1988: 59-66 - [c5]Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, William R. Shockley, Mark R. Heckman:
The SeaView security model. S&P 1988: 218-233 - [c4]Teresa F. Lunt, Roger R. Schell, William R. Shockley, Mark R. Heckman, Dan Warren:
A near-term design for the SeaView multilevel database system. S&P 1988: 234-244 - 1987
- [c3]Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, Mark R. Heckman, William R. Shockley:
A Multilevel Relational Data Model. S&P 1987: 220-234 - [c2]Thomas A. Berson, Teresa F. Lunt:
Multilevel Security for Knowledge-Based Systems. S&P 1987: 235-242 - 1986
- [c1]R. A. Carlson, Teresa F. Lunt:
The Trusted Domain Machine: A Secure Communication Device for Security Guard Applications. S&P 1986: 182-186
Parts in Books or Collections
- 1995
- [p1]Teresa F. Lunt:
Authorization in Object-Oriented Databases. Modern Database Systems 1995: 130-145
Coauthor Index
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 01:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint