Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases
暂无分享,去创建一个
[1] Nina Mishra,et al. Simulatable auditing , 2005, PODS.
[2] Cynthia Dwork,et al. Privacy-Preserving Datamining on Vertically Partitioned Databases , 2004, CRYPTO.
[3] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[4] Alexandre V. Evfimievski,et al. Privacy preserving mining of association rules , 2002, Inf. Syst..
[5] Elisa Bertino,et al. An Extended Authorization Model for Relational Databases , 1997, IEEE Trans. Knowl. Data Eng..
[6] Yufei Tao,et al. Personalized privacy preservation , 2006, Privacy-Preserving Data Mining.
[7] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[8] Sushil Jajodia,et al. Flexible support for multiple access control policies , 2001, TODS.
[9] Rakesh Agrawal,et al. Privacy-preserving data mining , 2000, SIGMOD 2000.
[10] Matthew Franklin,et al. Advances in Cryptology – CRYPTO 2004 , 2004, Lecture Notes in Computer Science.
[11] Duminda Wijesekera,et al. Constraints, Inference Channels and Secure Databases , 2000, CP.
[12] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .
[13] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[14] David A. Bell,et al. Secure computer systems: mathematical foundations and model , 1973 .
[15] Sushil Jajodia,et al. Auditing Interval-Based Inference , 2002, CAiSE.
[16] Rina Dechter,et al. Principles and Practice of Constraint Programming – CP 2000 , 2001, Lecture Notes in Computer Science.
[17] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[18] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..