Secure Data Management
暂无分享,去创建一个
[1] Petra Perner,et al. Data Mining - Concepts and Techniques , 2002, Künstliche Intell..
[2] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[3] Peter Bodorik,et al. Sociotechnical architecture for online privacy , 2005, IEEE Security & Privacy Magazine.
[4] Bettina Berendt,et al. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.
[5] M. Degroot,et al. Probability and Statistics , 1977 .
[6] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..
[7] Rathindra Sarathy,et al. A General Additive Data Perturbation Method for Database Security , 1999 .
[8] Lance J. Hoffman,et al. Building Privacy into the Semantic Web: An Ontology Needed Now , 2002 .
[9] Athman Bouguettaya,et al. Privacy on the Web: Facts, Challenges, and Solutions , 2003, IEEE Secur. Priv..
[10] I. M. Yaglom,et al. Geometric Transformations I , 1962 .
[11] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[12] Joydeep Ghosh,et al. Privacy-preserving distributed clustering using generative models , 2003, Third IEEE International Conference on Data Mining.
[13] Donna L. Hoffman,et al. Building consumer trust online , 1999, CACM.
[14] Catherine Blake,et al. UCI Repository of machine learning databases , 1998 .
[15] Asuman Dogac,et al. A Semantic based Privacy Framework for Web Services , 2003 .