Author:
Singh Indu,Poornima ,Kumar Nitish
Reference12 articles.
1. Bertino, E., Byun, J.W., Kamra, A.: Database security. In: Security, Privacy, and Trust in Modern Data Management, pp. 87–101. Springer, Berlin Heidelberg (2007).
2. Denning, D.E.: An intrusion-detection model. In: Transactions on Software Engineering Vol. 2, pp. 222–232. IEEE (1987).
3. Scarfone, K., Mell, P.: Guide to Intrusion Detection and Prevention Systems. In: National Institute of Standards and Technology (NIST), pp. 800–94 (2007).
4. Fernandez, E.B., Pernul, G.: Patterns for session-based access control. In: Proceedings of the 2006 conference on Pattern languages of programs. ACM (2006).
5. Ferraiolo, D., Cugini, J., Kuhn, D.R.: Role-based access control (RBAC): Features and motivations. In: Proceedings of 11th annual computer security application conference (1995).