![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Teresa F. Lunt
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2005
- [j16]Peter Jarvis, Teresa F. Lunt, Karen L. Myers:
Identifying Terrorist Activity with AI Plan Recognition Technology. AI Mag. 26(3): 73-81 (2005) - 2004
- [c38]Peter Jarvis, Teresa F. Lunt, Karen L. Myers:
Identifying Terrorist Activity with AI Plan Recognition Technology. AAAI 2004: 858-863 - 2000
- [c37]Teresa F. Lunt:
Foundations for Intrusion Detection?. CSFW 2000: 104-106
1990 – 1999
- 1997
- [j15]James P. Anderson, Sheila Brand, Li Gong, Thomas Haigh, Steven B. Lipner, Teresa F. Lunt, Ruth Nelson, William Neugent, Hilarie K. Orman, Marcus J. Ranum, Roger R. Schell, Eugene H. Spafford:
Firewalls: An Expert Roundtable. IEEE Softw. 14(5): 60-66 (1997) - [j14]Xiaolei Qian, Teresa F. Lunt:
A Semantic Framework of the Multilevel Secure Relational Model. IEEE Trans. Knowl. Data Eng. 9(2): 292-301 (1997) - 1996
- [j13]Teresa F. Lunt:
Securing the Information Infrastructure. Commun. ACM 39(6): 130 (1996) - [j12]Xiaolei Qian, Teresa F. Lunt:
A MAC Policy Framework for Multilevel Relational Databases. IEEE Trans. Knowl. Data Eng. 8(1): 3-15 (1996) - [c36]Teresa F. Lunt, John Kimmins, Bob McKosky:
Security and the National Telecommunications Infrastructure. ACSAC 1996: 138 - [c35]Teresa F. Lunt:
Strategic Directions in Computer Security. DBSec 1996: 3-10 - 1995
- [c34]Xiaolei Qian, Teresa F. Lunt:
Towards a MAC Policy Framework. DBSec 1995: 165-180 - [p1]Teresa F. Lunt:
Authorization in Object-Oriented Databases. Modern Database Systems 1995: 130-145 - 1994
- [c33]Peter K. Boucher, Teresa F. Lunt:
A prototype multilevel-secure DoD directory. ACSAC 1994: 180-188 - 1993
- [j11]Teresa F. Lunt:
A survey of intrusion detection techniques. Comput. Secur. 12(4): 405-418 (1993) - [j10]Marshall D. Abrams, Edward Amoroso, Leonard J. LaPadula, Teresa F. Lunt, James G. Williams:
Report of an integrity research study group. Comput. Secur. 12(7): 679-689 (1993) - [j9]Teresa F. Lunt:
Automated Instruction Detection. Inf. Secur. J. A Glob. Perspect. 1(4): 38-50 (1993) - [c32]Raymond K. Clark, Ira B. Greenberg, Peter K. Boucher, Teresa F. Lunt, Peter G. Neumann, Douglas M. Wells, E. Douglas Jensen:
Effects of multilevel security on real-time applications. ACSAC 1993: 120-129 - [c31]Xiaolei Qian, Mark E. Stickel, Peter D. Karp, Teresa F. Lunt, Thomas D. Garvey:
Detection and elimination of inference channels in multilevel relational database systems. S&P 1993: 196-205 - 1992
- [j8]Teresa F. Lunt:
Security in database systems: A research perspective. Comput. Secur. 11(1): 41-56 (1992) - [c30]Thomas D. Garvey, Teresa F. Lunt, Xiaolei Qian, Mark E. Stickel:
Toward a Tool to Detect and Eliminate Inference Problems in the Design of Multilevel Databases. DBSec 1992: 149-168 - [c29]Xiaolei Qian, Teresa F. Lunt:
Tuple-level vs Element-level Classification. DBSec 1992: 301-316 - [c28]Teresa F. Lunt:
Workshop Summary. DBSec 1992: 387-396 - [c27]Jonathan K. Millen, Teresa F. Lunt:
Security for object-oriented database systems. S&P 1992: 260-272 - 1991
- [j7]Teresa F. Lunt, Deborah M. Cooper:
Introduction: Security and Privacy. IEEE Trans. Software Eng. 17(11): 1145-1146 (1991) - [c26]Thomas D. Garvey, Teresa F. Lunt, Mark E. Stickel:
Abductive and Approximate Reasoning Models for Characterizing Inference Channels. CSFW 1991: 118-126 - [c25]Teresa F. Lunt:
Polyinstantiation: An Inevitable Part of a Multilevel World. CSFW 1991: 236-238 - [c24]Matthew Morgenstern, Teresa F. Lunt, Bhavani Thuraisingham, David L. Spooner:
Security Issues in Federated Database Systems: Panel Contributions. DBSec 1991: 131-148 - [c23]Thomas D. Garvey, Teresa F. Lunt:
Cover Stories for Database Security. DBSec 1991: 363-380 - [c22]Teresa F. Lunt:
Current Issues in Statistical Database Security. DBSec 1991: 381-385 - 1990
- [j6]Teresa F. Lunt, Eduardo B. Fernández:
Database Security. IEEE Data Eng. Bull. 13(4): 43-50 (1990) - [j5]Teresa F. Lunt, Eduardo B. Fernández:
Database Security. SIGMOD Rec. 19(4): 90-97 (1990) - [j4]Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell
, Mark R. Heckman, William R. Shockley:
The SeaView Security Model. IEEE Trans. Software Eng. 16(6): 593-607 (1990) - [c21]Thomas D. Garvey, Teresa F. Lunt:
Multilevel security for knowledge based systems. ACSAC 1990: 148-159 - [c20]Teresa F. Lunt, Ann Tamaru, Fred Gilham, R. Jagannathan, Peter G. Neumann, Caveh Jalali:
IDES: a progress report [Intrusion-Detection Expert System]. ACSAC 1990: 273-285 - [c19]Ravi S. Sandhu, Sushil Jajodia, Teresa F. Lunt:
A New Polyinstantiation Integrity Constraint for Multilevel Relations. CSFW 1990: 159-165 - [c18]Teresa F. Lunt, Donovan Hsieh:
Update Semantics for a Multilevel Relational Database System. DBSec 1990: 281-296 - [c17]Teresa F. Lunt, Donovan Hsieh:
The SeaView Secure Database System: A Progress Report. ESORICS 1990: 3-13
1980 – 1989
- 1989
- [j3]Teresa F. Lunt:
Access control policies: Some unanswered questions. Comput. Secur. 8(1): 43-54 (1989) - [c16]Alan R. Downing, Ira B. Greenberg, Teresa F. Lunt:
Issues in distributed database security. ACSAC 1989: 196-203 - [c15]Linda L. Vetter, Gordon Smith, Teresa F. Lunt:
TCB subsets: the next step. ACSAC 1989: 216-221 - [c14]Teresa F. Lunt:
Report from the second RADC database security workshop. ACSAC 1989: 310-313 - [c13]Teresa F. Lunt:
Real-time intrusion detection. COMPCON 1989: 353- - [c12]R. Alan Whitehurst, Teresa F. Lunt:
The Sea View Verification. CSFW 1989: 125-132 - [c11]Teresa F. Lunt:
Multilevel Security for Object-Oriented Database Systems. DBSec 1989: 199-209 - [c10]Teresa F. Lunt:
Aggregation and Inference: Facts and Fallacies. S&P 1989: 102-109 - 1988
- [j2]Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell
, Mark R. Heckman, William R. Shockley:
Element-level classification with A1 assurance. Comput. Secur. 7(1): 73-82 (1988) - [c9]Teresa F. Lunt:
Access Control Policies: Some Unanswered Questions. CSFW 1988: 227-245 - [c8]Teresa F. Lunt:
Access Control Policies for Database Systems. DBSec 1988: 41-52 - [c7]Teresa F. Lunt:
Multilevel Database Systems: Meeting Class A1. DBSec 1988: 177-186 - [c6]Teresa F. Lunt, R. Jagannathan:
A prototype real-time intrusion-detection expert system. S&P 1988: 59-66 - [c5]Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, William R. Shockley, Mark R. Heckman:
The SeaView security model. S&P 1988: 218-233 - [c4]Teresa F. Lunt, Roger R. Schell, William R. Shockley, Mark R. Heckman, Dan Warren:
A near-term design for the SeaView multilevel database system. S&P 1988: 234-244 - 1987
- [j1]Dorothy E. Denning, Selim G. Akl, Mark R. Heckman, Teresa F. Lunt, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell:
Views for Multilevel Database Security. IEEE Trans. Software Eng. 13(2): 129-140 (1987) - [c3]Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, Mark R. Heckman, William R. Shockley:
A Multilevel Relational Data Model. S&P 1987: 220-234 - [c2]Thomas A. Berson, Teresa F. Lunt:
Multilevel Security for Knowledge-Based Systems. S&P 1987: 235-242 - 1986
- [c1]R. A. Carlson, Teresa F. Lunt:
The Trusted Domain Machine: A Secure Communication Device for Security Guard Applications. S&P 1986: 182-186
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint