Association rule hiding
暂无分享,去创建一个
Elisa Bertino | Yücel Saygin | Ahmed K. Elmagarmid | Vassilios S. Verykios | Elena Dasseni | E. Bertino | A. Elmagarmid | V. Verykios | Y. Saygin | Elena Dasseni
[1] Chris Clifton,et al. SECURITY AND PRIVACY IMPLICATIONS OF DATA MINING , 1996 .
[2] Chris Clifton,et al. Protecting Against Data Mining through Samples , 1999, DBSec.
[3] Gregory Piatetsky-Shapiro,et al. Advances in Knowledge Discovery and Data Mining , 2004, Lecture Notes in Computer Science.
[4] Bhavani Thuraisingham,et al. Security Constraint Processing in a Multilevel Secure Distributed Database Management System , 2004 .
[5] R. Stephenson. A and V , 1962, The British journal of ophthalmology.
[6] D.G. Marks,et al. Inference in MLS Database Systems , 1996, IEEE Trans. Knowl. Data Eng..
[7] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[8] Vassilios S. Verykios,et al. Disclosure limitation of sensitive rules , 1999, Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX'99) (Cat. No.PR00453).
[9] Vijay V. Raghavan,et al. Impact of Decision-Region Based Classification Mining Algorithms on Database Security , 1999, DBSec.
[10] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[11] Daniel E. O'Leary,et al. Knowledge Discovery as a Threat to Database Security , 1991, Knowledge Discovery in Databases.
[12] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..