Secure and useful data sharing
暂无分享,去创建一个
[1] Hau L. Lee,et al. Information sharing in a supply chain , 2000, Int. J. Manuf. Technol. Manag..
[2] Dorothy E. Denning,et al. Inference Controls for Statistical Databases , 1983, Computer.
[3] Stephen E. Fienberg,et al. Disclosure limitation using perturbation and related methods for categorical data , 1998 .
[4] Seungjin Whang,et al. Supply Chain Integration Over the Internet , 2002 .
[5] P. Ivax,et al. A THEORY FOR RECORD LINKAGE , 2004 .
[6] Ramayya Krishnan,et al. Special Issue: OR/MS and E-Business: Prospects for Operations Research in the E-Business Era , 2001, Interfaces.
[7] William E. Winkler,et al. Advanced Methods For Record Linkage , 1994 .
[8] Gérard P. Cachon,et al. Contracting to Assure Supply: How to Share Demand Forecasts in a Supply Chain , 2001, Manag. Sci..
[9] William E. Winkler. Record Linkage Software and Methods for Merging Administrative Lists , 2001 .
[10] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..
[11] George T. Duncan,et al. Disclosure-Limited Data Dissemination , 1986 .
[12] Jeffrey S. Simonoff,et al. The use of regression methodology for the compromise of confidential information in statistical databases , 1987, TODS.
[13] William E. Winkler,et al. The State of Record Linkage and Current Research Problems , 1999 .
[14] L. Willenborg,et al. Elements of Statistical Disclosure Control , 2000 .
[15] George T. Duncan,et al. Optimal Disclosure Limitation Strategy in Statistical Databases: Deterring Tracker Attacks through Additive Noise , 2000 .
[16] Paulo B. Góes,et al. Interval Protection of Confidential Information in a Database , 1998, INFORMS J. Comput..
[17] Sumitra Mukherjee,et al. A Polynomial Algorithm for Optimal Univariate Microaggregation , 2003, IEEE Trans. Knowl. Data Eng..
[18] George T. Duncan,et al. Enhancing Access to Microdata while Protecting Confidentiality: Prospects for the Future , 1991 .
[19] Christopher S. Tang,et al. The Value of Information Sharing in a Two-Level Supply Chain , 2000 .
[20] Rathindra Sarathy,et al. Perturbing Nonnormal Confidential Attributes: The Copula Approach , 2002, Manag. Sci..
[21] Josep Domingo-Ferrer,et al. Inference Control in Statistical Databases , 2002, Lecture Notes in Computer Science.
[22] L. Cox. Statistical Disclosure Limitation , 2006 .
[23] Sumit Sarkar,et al. A Probabilistic Decision Model for Entity Matching in Heterogeneous Databases , 1998 .
[24] Marshall L. Fisher,et al. Supply Chain Inventory Management and the Value of Shared Information , 2000 .
[25] Gultekin Özsoyoglu,et al. Auditing and Inference Control in Statistical Databases , 1982, IEEE Transactions on Software Engineering.
[26] G. Salton,et al. Measuring success. , 2008, Canadian family physician Medecin de famille canadien.
[27] Stephen E. Fienberg,et al. Confidentiality and Data Protection Through Disclosure Limitation: Evolving Principles and Technical Advances , 2000 .
[28] R. Kapuściński,et al. Value of Information in Capacitated Supply Chains , 1999 .
[29] Joseph B. Kadane. Some Statistical Problems in Merging Data Files , 2001 .
[30] Paul H. Zipkin,et al. Competitive and Cooperative Inventory Policies in a Two-Stage Supply Chain , 1999 .
[31] Ramayya Krishnan,et al. Disclosure Detection in Multivariate Categorical Databases: Auditing Confidentiality Protection Through Two New Matrix Operators , 1999 .
[32] Rathindra Sarathy,et al. The Security of Confidential Numerical Data in Databases , 2002, Inf. Syst. Res..
[33] James P. Kelly,et al. Controlled Rounding of Tabular Data , 1990, Oper. Res..
[34] Paulo B. Góes,et al. Confidentiality via Camouflage: The CVC Approach to Disclosure Limitation When Answering Queries to Databases , 2002, Oper. Res..
[35] Paulo B. Góes,et al. Privacy Protection of Binary Confidential Data Against Deterministic, Stochastic, and Insider Threat , 2002, Manag. Sci..
[36] Jeff Smith,et al. Privacy policies and practices: inside the organizational maze , 1993, CACM.
[37] Rathindra Sarathy,et al. A General Additive Data Perturbation Method for Database Security , 1999 .
[38] Debabrata Dey,et al. Record Matching in Data Warehouses: A Decision Model for Data Consolidation , 2003, Oper. Res..