
J. McDermott and D. Goldschlag. Towards a model of 
storage jamming. In Proceedings of the IEEE 
Computer Security Foundations 
Workshop, pages 176–185, Kenmare, Ireland, June 1996. 
B. Mukherjee, L. T. Heberlein, and K.N. Levitt. Network 
intrusion detection. IEEE Network, pages 26–41, June 
1994. 
P.A. Porras and R.A. Kemmerer. Penetration state 
transition analysis: A rule-based intrusion detection 
approach. In Proceedings of the 8th Annual Computer 
Security Applications Conference, San Antonio, 
Texas, December 1992. 
F. Rabitti, E. Bertino, W. Kim, and D. Woelk. A model of 
authorization for next generation database systems. 
ACM Transactions on Database Systems, 16(1):88–
131, 1994. 
P. Liu S. Ingsriswang. Aaid: An application aware 
transaction level database intrusion detection system. 
Technical report, Department of Information Systems, 
UMBC, Baltimore, MD, 2001. 
D. Samfat and R. Molva. Idamn: An intrusion detection 
architecture for mobile networks. IEEE Journal of 
Selected Areas in Communications, 15(7):1373–1380, 
1997. 
R. Sandhu and F. Chen. The multilevel relational (mlr) 
data model. ACM Transactions on Information and 
Systems Security, 1(1), 1998. 
S.-P. Shieh and V.D. Gligor. On a pattern-oriented model 
for intrusion detection. IEEE Transactions on 
Knowledge and Data Engi-neering, 9(4):661–667, 
1997. 
M. Winslett, K. Smith, and X. Qian. Formal query 
languages for secure relational databases. ACM 
Transactions on Database Systems, 19(4):626–662, 
1994.  
P. A. Porras and R. A. Kemmerer. Penetration state 
transitionanalysis: A rule-based intrusion detection 
approach. In Proceedings of the Eighth Annual 
Computer Security Ap-plications Conference, pages 
220–229, San Antonio, Texas, Nov. 30–Dec. 4, 1992. 
P. Proctor. Audit reduction and misuse detection in 
heterogeneous environments: Framework and 
application. In Proceedings of the Tenth Annual 
Computer Security Applications Conference, pages 
117–125, Orlando, Florida, Dec. 5–9, 1994. 
M. M. Sebring, E. Shellhouse, M. E. Hanna, and R. A. 
Whitehurst. Expert systems in intrusion detection: A 
case study. In Proceedings of the 11th National 
Computer Security Conference, pages 74–81, 
Baltimore, Maryland, Oct. 17–20, 1988. National 
Institute of Standards and Technology/National 
Computer Security Center.  
J. Habra, B. Le Charlier, A. Mounji, and I. Mathieu. 
ASAX: Software architecture and rule-based language 
for universal audit trail analysis. In Y. Deswarte et al., 
editors, Computer Security – Proceedings of 
ESORICS 92, volume 648 of LNCS, pages 435–450, 
Toulouse, France, Nov. 23–25, 1992. Springer-Verlag. 
L. T. Heberlein et al. A network security monitor. In 
Proceedings of the 1990 IEEE Symposium on Security 
and Pri-vacy, pages 296–304, Oakland, California, 
May 7–9, 1990. 
K. Ilgun. USTAT: A real-time intrusion detection system 
for UNIX. In Proceedings of the 1993 IEEE 
Symposium on Security and Privacy, pages 16–28, 
Oakland, California, May 24–26, 1993. 
U. Lindqvist and P. A. Porras. Detecting computer and 
network misuse through the production-based expert 
system toolset (P-BEST). In Proceedings of the 1999 
IEEE Symposium on Security and Privacy, pages 
146–161, Oakland, California, May 9–12, 1999. 
R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. 
Das. Analysis and results of the 1999 DARPA off-line 
intrusion detection evaluation. In H. Debar, L. M´ e, 
and S. F. Wu, editors, Recent Advances in Intrusion 
Detection (RAID 2000), volume 1907 of LNCS, pages 
162–182, Toulouse, France, Oct. 2–4, 2000. Springer-
Verlag. 
A. Mounji. Languages and Tools for Rule-Based 
Distributed Intrusion Detection. PhD thesis, Institut 
d’Informatique, University of Namur, Belgium, Sept. 
1997. 
P. G. Neumann and P. A. Porras. Experience with 
EMERALD to date. In Proceedings of the 1st 
Workshop on Intrusion Detection and Network 
Monitoring, Santa Clara, California, Apr. 9–12, 1999. 
The USENIX Association. 
A. One. Smashing the stack for fun and profit. Phrack 
Magazine, 7(49), Nov. 8, 1996. 
http://www.fc.net/phrack/files/ p49/p49-14. 
J. Picciotto. The design of an effective auditing subsystem. 
In Proceedings of the 1987 IEEE Symposium on 
Security and Privacy, pages 13–22, Oakland, 
California, Apr. 27–29, 1987. 
  
ICETE 2004 - SECURITY AND RELIABILITY IN INFORMATION SYSTEMS AND NETWORKS
280