Privacy and Security in Ubiquitous Knowledge Discovery
暂无分享,去创建一个
[1] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[2] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[3] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[4] Elisa Bertino,et al. State-of-the-art in privacy preserving data mining , 2004, SGMD.
[5] Leon G. Higley,et al. Forensic Entomology: An Introduction , 2009 .
[6] Joshua Zhexue Huang,et al. Web services: problems and future directions , 2004, J. Web Semant..
[7] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[8] Frank Stajano,et al. Security for Ubiquitous Computing , 2002, ICISC.
[9] Rakesh Agrawal,et al. Privacy-preserving data mining , 2000, SIGMOD 2000.
[10] Chris Clifton,et al. SECURITY AND PRIVACY IMPLICATIONS OF DATA MINING , 1996 .
[11] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[12] Gregory D. Abowd,et al. The smart floor: a mechanism for natural user identification and tracking , 2000, CHI Extended Abstracts.
[13] Salvatore J. Stolfo,et al. Adaptive Intrusion Detection: A Data Mining Approach , 2000, Artificial Intelligence Review.
[14] Ling Liu,et al. Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[15] William Frawley,et al. Knowledge Discovery in Databases , 1991 .
[16] Adrian Perrig,et al. Security in wireless sensor networks - eScholarship , 2004 .
[17] Chris Clifton,et al. Defining Privacy for Data Mining , 2002 .
[18] Gregory D. Abowd,et al. Securing context-aware applications using environment roles , 2001, SACMAT '01.
[19] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[20] Stan Matwin,et al. Privacy-Preserving Collaborative Sequential Pattern Mining , 2004 .
[21] Daniel E. O'Leary,et al. Knowledge Discovery as a Threat to Database Security , 1991, Knowledge Discovery in Databases.
[22] Pierangela Samarati,et al. Generalizing Data to Provide Anonymity when Disclosing Information , 1998, PODS 1998.
[23] Sushil Jajodia,et al. Protecting Privacy Against Location-Based Personal Identification , 2005, Secure Data Management.
[24] A. Pfitzmann,et al. A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .