Discrete algorithms and methods for security of statistical databases related to the work of Mirka Miller
暂无分享,去创建一个
Joseph F. Ryan | Jennifer Seberry | Xun Yi | Leanne Rylands | Andrei Kelarev | X. Yi | J. Seberry | A. Kelarev | L. Rylands | Joseph F. Ryan
[1] Josep Domingo-Ferrer,et al. A k-anonymous approach to privacy preserving collaborative filtering , 2015, J. Comput. Syst. Sci..
[2] Elisa Bertino,et al. Private Information Retrieval , 2013, Private Information Retrieval.
[3] Elisa Bertino,et al. Homomorphic Encryption and Applications , 2014, SpringerBriefs in Computer Science.
[4] Mirka Miller,et al. Towards a Practical Auditing Method for the Prevention of Statistical Database Compromise , 1996, Australasian Database Conference.
[5] Josep Domingo-Ferrer,et al. New directions in anonymization: Permutation paradigm, verifiability by subjects and intruders, transparency to users , 2015, Inf. Sci..
[6] Dongxi Liu,et al. Privacy of outsourced k-means clustering , 2014, AsiaCCS.
[7] Francesc Sebé,et al. Triangle randomization for social network data anonymization , 2014, Ars Math. Contemp..
[8] Ljiljana Brankovic,et al. VICUS - A Noise Addition Technique for Categorical Data , 2012, AusDM.
[9] Jennifer Seberry,et al. Applications of smartcards for anonymous and verifiable databases , 1995, Comput. Secur..
[10] Jennifer Seberry,et al. Fundamentals of Computer Security , 2003, Springer Berlin Heidelberg.
[11] J Cooper,et al. Security considerations for present and future medical databases. , 1996, International journal of bio-medical computing.
[12] Lynn Batten,et al. Public Key Cryptography: Applications and Attacks , 2013 .
[13] Mirka Miller,et al. On Range Query Usability Of Statistical Databases , 2002, Int. J. Comput. Math..
[14] Mirka Miller,et al. Relative Compromise of Statistical Databases , 1990, Aust. Comput. J..
[15] Md Zahidul Islam,et al. Privacy preserving data mining: A noise addition framework using a novel clustering technique , 2011, Knowl. Based Syst..
[16] Jennifer Seberry,et al. Database authentication revisited , 1994, Comput. Secur..
[17] Ljiljana Brankovic,et al. Quantifying Privacy: A Novel Entropy-Based Measure of Disclosure Risk , 2014, IWOCA.
[18] Josep Domingo-Ferrer,et al. A Survey of Inference Control Methods for Privacy-Preserving Data Mining , 2008, Privacy-Preserving Data Mining.
[19] Ljiljana Brankovic,et al. Data Swapping: Balancing Privacy against Precision in Mining for Logic Rules , 1999, DaWaK.
[20] Mirka Miller,et al. A Combinatorial Problem in Database Security , 1999, Discret. Appl. Math..
[21] Dongxi Liu,et al. Privacy-Preserving and Outsourced Multi-user K-Means Clustering , 2014, 2015 IEEE Conference on Collaboration and Internet Computing (CIC).
[22] Rudolf Ahlswede,et al. On security of statistical databases , 2006, 2006 IEEE International Symposium on Information Theory.
[23] Ljiljana Brankovic,et al. THE EIGENSPACE OF THE EIGENVALUE -2 IN GENERALIZED LINE GRAPHS AND A PROBLEM IN SECURITY OF STATISTICAL DATABASES , 2003 .
[24] Gultekin Özsoyoglu,et al. Auditing and Inference Control in Statistical Databases , 1982, IEEE Transactions on Software Engineering.
[25] Md Zahidul Islam,et al. Privacy-Preserving Data Mining , 2007, Security, Privacy, and Trust in Modern Data Management.
[26] Herbert F. Jelinek,et al. A survey of state-of-the-art methods for securing medical databases , 2018 .
[27] Mirka Miller,et al. An Optimization Problem in Statistical Databases , 2000, SIAM J. Discret. Math..
[28] J. Aisbett,et al. Shield privacy Hippocratic security method for virtual community , 2004, 30th Annual Conference of IEEE Industrial Electronics Society, 2004. IECON 2004.
[29] Ljiljana Brankovic,et al. 2-Compromise Usability in 1-Dimensional Statistical Databases , 2002, COCOON.
[30] Gyula O. H. Katona,et al. On the Security of Individual Data , 2004, FoIKS.
[31] H. Giggins,et al. Statistical Disclosure Control: To Trust or Not to Trust , 2008, International Symposium on Computer Science and its Applications.
[32] L. Brankovic,et al. DETECTIVE: a decision tree based categorical value clustering and perturbation technique for preserving privacy in data mining , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..
[33] Graham Wrightson,et al. Usability of compromise-free statistical databases , 1997, Proceedings. Ninth International Conference on Scientific and Statistical Database Management (Cat. No.97TB100150).
[34] Andrew Stranieri,et al. Knowledge based regulation of statistical databases , 2006 .
[35] Josep Domingo-Ferrer,et al. Inference Control in Statistical Databases , 2002, Lecture Notes in Computer Science.
[36] Md Zahidul Islam,et al. A Framework for Privacy Preserving Classification in Data Mining , 2004, ACSW.
[37] Mirka Miller,et al. SUM GRAPH BASED ACCESS STRUCTURE IN A SECRET SHARING SCHEME , 2006 .
[38] Ljiljana Brankovic,et al. Statistical Database Security , 2007, Security, Privacy, and Trust in Modern Data Management.
[39] Jerrold R. Griggs. Database Security and the Distribution of Subset Sums in R m , 1998 .