Reasoning under uncertainty and multi-criteria decision making in data privacy
暂无分享,去创建一个
Gerardo Canfora | Massimo Squillante | Bice Cavallo | Livia D’Apuzzo | G. Canfora | M. Squillante | L. D'Apuzzo | B. Cavallo
[1] Gerardo Canfora,et al. A Bayesian Approach for On-Line Sum/Count/Max/Min Auditing on Boolean Data , 2012, Privacy in Statistical Databases.
[2] Cynthia Dwork,et al. Practical privacy: the SuLQ framework , 2005, PODS.
[3] Bice Cavallo,et al. Transitive pairwise comparison matrices over abelian linearly ordered groups , 2009 .
[4] Nancy R. Mead,et al. Adapting the SQUARE Process for Privacy Requirements Engineering , 2010 .
[5] Sampath Srinivas,et al. A Generalization of the Noisy-Or Model , 1993, UAI.
[6] Massimo Squillante,et al. About a consistency index for pairwise comparison matrices over a divisible alo‐group , 2012, Int. J. Intell. Syst..
[7] Judea Pearl,et al. Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.
[8] Gerardo Canfora,et al. A Bayesian model for disclosure control in statistical databases , 2009, Data Knowl. Eng..
[9] Massimo Squillante,et al. Building Consistent Pairwise Comparison Matrices over Abelian Linearly Ordered Groups , 2009, ADT.
[10] Francis Y. L. Chin,et al. Security problems on inference control for SUM, MAX, and MIN queries , 1986, JACM.
[11] Rajeev Motwani,et al. Towards robustness in query auditing , 2006, VLDB.
[12] Bice Cavallo,et al. Investigating Properties of the ⊙-Consistency Index , 2012, IPMU.
[13] T. L. Saaty. A Scaling Method for Priorities in Hierarchical Structures , 1977 .
[14] Gerardo Canfora,et al. Reasoning under Uncertainty in On-Line Auditing , 2008, Privacy in Statistical Databases.
[15] Thomas L. Saaty,et al. DECISION MAKING WITH THE ANALYTIC HIERARCHY PROCESS , 2008 .
[16] Thomas L. Saaty,et al. Marketing Applications of the Analytic Hierarchy Process , 1980 .
[17] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[18] J. Barzilai. Consistency Measures for Pairwise Comparison Matrices , 1998 .
[19] T. Saaty. Axiomatic foundation of the analytic hierarchy process , 1986 .
[20] Henryk Wozniakowski,et al. The statistical security of a statistical database , 1984, TODS.
[21] Thomas L. Saaty,et al. Negotiating the Israeli-Palestinian Controversy from a New Perspective , 2011, Int. J. Inf. Technol. Decis. Mak..
[22] Steen Andreassen,et al. A munin network for the median nerve - a case study on loops , 1989, Appl. Artif. Intell..
[23] Ricardo Viana Vargas. USING THE ANALYTIC HIERARCHY PROCESS (AHP) TO SELECT AND PRIORITIZE PROJECTS IN A PORTFOLIO , 2010 .
[24] Bice Cavallo,et al. Pairwise Comparison Matrices: Some Issue on Consistency and a New Consistency Index , 2010, Preferences and Decisions.
[25] Irit Dinur,et al. Revealing information while preserving privacy , 2003, PODS.
[26] T. Saaty,et al. The Analytic Hierarchy Process , 1985 .
[27] Gerardo Canfora,et al. A Bayesian approach for on-line max and min auditing , 2008, PAIS '08.
[28] Bice Cavallo,et al. Deriving weights from a pairwise comparison matrix over an alo-group , 2011, Soft Computing.
[29] Marina Moscarini,et al. Auditing sum-queries to make a statistical database secure , 2006, TSEC.
[30] Norman S. Matloff. Another Look at the Use of Noise Addition for Database Security , 1986, 1986 IEEE Symposium on Security and Privacy.
[31] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..
[32] Leland L. Beck,et al. A security machanism for statistical database , 1980, TODS.
[33] Peter J. Denning,et al. The tracker: a threat to statistical database security , 1979, TODS.
[34] Gerardo Canfora,et al. A Bayesian Approach for on-Line Max Auditing , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[35] S L Warner,et al. Randomized response: a survey technique for eliminating evasive answer bias. , 1965, Journal of the American Statistical Association.
[36] Richard J. Lipton,et al. Secure databases: protection against user influence , 1979, TODS.
[37] L. D'Apuzzo,et al. A general unified framework for pairwise comparison matrices in multicriterial methods , 2009 .
[38] Dorothy E. Denning,et al. Secure statistical databases with random sample queries , 1980, TODS.
[39] J. Schlörer. Identification and Retrieval of Personal Records from a Statistical Data Bank , 1975, Methods of Information in Medicine.
[40] Gerardo Canfora,et al. A Bayesian Approach for on-Line Max Auditing , 2008, ARES.
[41] Thomas L. Saaty,et al. Decision making for leaders , 1985, IEEE Transactions on Systems, Man, and Cybernetics.
[42] Bice Cavallo,et al. Characterizations of consistent pairwise comparison matrices over abelian linearly ordered groups , 2010 .
[43] Jon M. Kleinberg,et al. Auditing Boolean attributes , 2003, J. Comput. Syst. Sci..
[44] Gerardo Canfora,et al. A Probabilistic Approach for On-Line Sum-Auditing , 2010, 2010 International Conference on Availability, Reliability and Security.
[45] Livia D'Apuzzo,et al. Weak Consistency and Quasi-Linear Means Imply the Actual Ranking , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[46] Ivan P. Fellegi,et al. On the Question of Statistical Confidentiality , 1972 .
[47] Nina Mishra,et al. Simulatable auditing , 2005, PODS.
[48] David Heckerman,et al. Causal Independence for Knowledge Acquisition and Inference , 1993, UAI.