Computational disclosure control: a primer on data privacy protection
暂无分享,去创建一个
[1] Sujeet Shenoi,et al. Catalytic inference analysis: detecting inference threats due to knowledge discovery , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[2] Denise Grady,et al. Hospital files as open book. , 1997, The New York times on the Web.
[3] Constantin F. Aliferis,et al. An evaluation of machine-learning methods for predicting pneumonia mortality , 1997, Artif. Intell. Medicine.
[4] Telecommunications Board. For the Record: Protecting Electronic Health Information [link] , 1997 .
[5] Ton de Waal,et al. Statistical Disclosure Control in Practice , 1996 .
[6] C Safran,et al. Sharing electronic medical records across multiple heterogeneous and competing institutions. , 1996, Proceedings : a conference of the American Medical Informatics Association. AMIA Fall Symposium.
[7] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[8] Andrew W. Moore,et al. Efficient Algorithms for Minimizing Cross Validation Error , 1994, ICML.
[9] L. Gostin,et al. Privacy and security of personal information in a new health care system. , 1993, JAMA.
[10] Peter D. Karp,et al. Detection and elimination of inference channels in multilevel relational database systems , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[11] Gultekin Özsoyoglu,et al. Controlling FD and MVD Inferences in Multilevel Relational Database Systems , 1991, IEEE Trans. Knowl. Data Eng..
[12] George T. Duncan,et al. Enhancing Access to Microdata while Protecting Confidentiality: Prospects for the Future , 1991 .
[13] Mark E. Stickel,et al. Abductive and approximate reasoning models for characterizing inference channels , 1991, Proceedings Computer Security Foundations Workshop IV.
[14] George T. Duncan,et al. Microdata disclosure limitation in statistical databases: query size and random sample query control , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[15] Gary W. Smith,et al. Modeling security-relevant data semantics , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[16] David F. Linowes,et al. Privacy: The Workplace Issue of the '90s, 23 J. Marshall L. Rev. 591 (1990) , 1990 .
[17] Teresa F. Lunt. Aggregation and inference: facts and fallacies , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[18] Leoan J. Buczkowski. Database Inference Controller , 1989, Database Security.
[19] Thomas H. Hinke,et al. Inference aggregation detection in database management systems , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[20] Matthew Morgenstern,et al. Security and inference in multilevel database and knowledge-base systems , 1987, SIGMOD '87.
[21] Dorothy E. Denning,et al. A Multilevel Relational Data Model , 1987, 1987 IEEE Symposium on Security and Privacy.
[22] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[23] Peter J. Denning,et al. The tracker: a threat to statistical database security , 1979, TODS.
[24] Jeffrey D. Ullman,et al. Principles Of Database And Knowledge-Base Systems , 1979 .
[25] Richard O. Duda,et al. Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.
[26] Ivan P. Fellegi,et al. On the Question of Statistical Confidentiality , 1972 .
[27] Peter E. Hart,et al. Nearest neighbor pattern classification , 1967, IEEE Trans. Inf. Theory.