Author of the publication

ILIAD: An Integrated Laboratoty For Inference Analysis and Detection.

, , and . DBSec, volume 51 of IFIP Conference Proceedings, page 333-348. Chapman & Hall, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AERIE: Database Inference Modeling and Detection Using Conceptual Graphs., and . Workshop on Conceptual Graphs, volume 754 of Lecture Notes in Computer Science, page 206-215. Springer, (1992)Protecting databases from inference attacks., , and . Comput. Secur., 16 (8): 687-708 (1997)Metadata: The Golden Nuggets of Mining Data., , and . MD, IEEE Computer Society, (1996)A Layered TCB Implementation versus the Hinke-Schaefer Approach., , , , and . DBSec, page 151-165. North-Holland, (1989)Target-Independent Mining for Scientific Data: Capturing Transients and Trends for Phenomena Mining., , , and . KDD, page 187-190. AAAI Press, (1997)Layered Knowledge Chunks for Database Inference., , and . DBSec, volume A-47 of IFIP Transactions, page 275-295. North-Holland, (1993)Using Conceptual Graphs to Represent Database Inference Security Analysis, and . Jour. Computing and Info. Tech., 4 (4): 291-307 (1994)Database Inference Engine Design Approach.. DBSec, page 247-262. North-Holland, (1988)Aerie: An Inference Modeling and Detection Approach for Databases., and . DBSec, volume A-21 of IFIP Transactions, page 179-194. North-Holland, (1992)SDC Secure Release Terminal Project., , and . S&P, page 113-119. IEEE Computer Society, (1983)