Does Protecting Databases Using Perturbation Techniques Impact Knowledge Discovery
暂无分享,去创建一个
[1] Sudha Ram,et al. IAIS: A Methodology to Enable Inter-Agency Information Sharing In eGovernment , 2003, J. Database Manag..
[2] Hamid R. Nemati. International Journal of Information Security and Privacy , 2007 .
[3] Philip Calvert,et al. Encyclopedia of Database Technologies and Applications , 2005 .
[4] Farshad Fotouhi,et al. TOS: A Temporal Object-Oriented System , 1994 .
[5] Yannis Manolopoulos. Spatial Databases: Technologies, Techniques and Trends , 2005, Spatial Databases.
[6] Michael Achatz,et al. On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text , 2007, Int. J. Inf. Secur. Priv..
[7] F. Nelson Ford,et al. Information Security Effectiveness: Conceptualization and Validation of a Theory , 2007, Int. J. Inf. Secur. Priv..
[8] Ina Fourie. Database Integrity: Challenges and Solutions , 2002 .
[9] Te-Wei Wang,et al. Semantic Heterogeneity in Multidatabase Systems: A Review and a Proposed Meta-Data Structure , 2004, J. Database Manag..
[10] Mari W. Buche,et al. A Unified Information Security Management Plan , 2005 .
[11] Jorge Horacio Doorn,et al. Database Integrity: Fundamental and Current Implementations , 2002, Database Integrity.
[12] Amit P. Sheth,et al. Semantic Association Identification and Knowledge Discovery for National Security Applications , 2005, J. Database Manag..