Security Issues in Data Warehousing and Data Mining: Panel Discussion
暂无分享,去创建一个
Chris Clifton | Tsau Young Lin | Sushil Jajodia | Bhavani M. Thuraisingham | Pierangela Samarati | Linda Schlipper | P. Samarati | S. Jajodia | B. Thuraisingham | T. Lin | Chris Clifton | Linda Schlipper
[1] Barry Devlin,et al. Data Warehouse: From Architecture to Implementation , 1996 .
[2] Sushil Jajodia,et al. Database security and privacy , 1996, CSUR.
[3] Bhavani M. Thuraisingham,et al. Security Issues in Federated Database Systems: Panel Contributions , 1991, Database Security.
[4] Tsau Young Lin,et al. Security and Data Mining , 1995, DBSec.
[5] T. Y. Lin,et al. Rough Sets and Data Mining , 1997, Springer US.
[6] Sushil Jajodia,et al. A logical language for expressing authorizations , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[7] Sabrina De Capitani di Vimercati,et al. Authorization Specification and Enforcement in Federated Database Systems , 1997, Journal of computing and security.
[8] Tsau Young Lin,et al. Rough Sets and Data Mining: Analysis of Imprecise Data , 1996 .
[9] Z. Pawlak. Rough Sets: Theoretical Aspects of Reasoning about Data , 1991 .