Probabilistic Inference Channel Detection and Restriction Applied to Patients' Privacy Assurance
暂无分享,去创建一个
[1] Joachim Biskup,et al. Lying versus refusal for known potential secrets , 2001, Data Knowl. Eng..
[2] Gultekin Özsoyoglu,et al. Controlling FD and MVD Inferences in Multilevel Relational Database Systems , 1991, IEEE Trans. Knowl. Data Eng..
[3] L. Janczewski. Internet and Intranet Security Management: Risks and Solutions , 1999 .
[4] J. Pearl. Statistics and causal inference: A review , 2003 .
[5] Thomas S. Huang,et al. Digital Rights Management for E-Content and E-Technologies , 2006 .
[6] Thomas L. Griffiths,et al. Technical Introduction: A primer on probabilistic inference , 2005 .
[7] Reind P. van de Riet,et al. Answering queries without revealing secrets , 1983, TODS.
[8] Joachim Biskup,et al. Confidentiality Policies and Their Enforcement for Controlled Query Evaluation , 2002, ESORICS.
[9] Elisa Bertino,et al. Database security - concepts, approaches, and challenges , 2005, IEEE Transactions on Dependable and Secure Computing.
[10] Hamid R. Nemati,et al. Information Security and Ethics: Concepts, Methodologies, Tools and Applications , 2008 .
[11] Ira S. Moskowitz,et al. An Integrated Framework for Database Privacy Protection , 2000, DBSec.
[12] Judea Pearl,et al. Bayesian Networks , 1998, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[13] Michael Weiss,et al. Modelling Security Patterns Using NFR Analysis , 2007 .
[14] Yan Hongqiao,et al. Electronic Medical Records vs. Electronic Health Records:Yes,There Is a Difference , 2007 .
[15] David Heckerman,et al. A Tractable Inference Algorithm for Diagnosing Multiple Diseases , 2013, UAI.
[16] Joachim Biskup,et al. Controlled query evaluation with open queries for a decidable relational submodel , 2007, Annals of Mathematics and Artificial Intelligence.
[17] Leoan J. Buczkowski. Database Inference Controller , 1989, Database Security.
[18] Sushil Jajodia,et al. Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures , 2000, IEEE Trans. Knowl. Data Eng..
[19] David B Allison,et al. Divergence in popular diets relative to diets consumed by Americans, and implications for diet selection. , 2007, MedGenMed : Medscape general medicine.
[20] Joachim Biskup,et al. Controlled Query Evaluation for Known Policies by Combining Lying and Refusal , 2004, Annals of Mathematics and Artificial Intelligence.
[21] Sujeet Shenoi,et al. Catalytic inference analysis: detecting inference threats due to knowledge discovery , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[22] Thomas L. Griffiths,et al. Technical Introduction: A primer on probabilistic inference - eScholarship , 2006 .
[23] Robert H Eikelboom,et al. Clinical decision support systems and computer-aided diagnosis in otology , 2007, Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery.
[24] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[25] Sushil Jajodia,et al. The inference problem: a survey , 2002, SKDD.
[26] Nick Cercone,et al. Auditing and Inference Control for Privacy Preservation in Uncertain Environments , 2006, EuroSSC.
[27] Hamid R. Nemati. International Journal of Information Security and Privacy , 2007 .