The application of anonymous mechanism in access control
暂无分享,去创建一个
[1] R. Suganya,et al. Data Mining Concepts and Techniques , 2010 .
[2] R. Sandhu,et al. Access control: principles and practice , 1994, IEEE Commun. Mag..
[3] Elisa Bertino,et al. State-of-the-art in privacy preserving data mining , 2004, SGMD.
[4] Keun Ho Ryu,et al. PRBAC: an extended role based access control for privacy preserving data mining , 2005, Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05).
[5] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[6] Philip S. Yu,et al. Anonymizing Classification Data for Privacy Preservation , 2007, IEEE Transactions on Knowledge and Data Engineering.
[7] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[8] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[9] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[10] Pierangela Samarati,et al. Generalizing Data to Provide Anonymity when Disclosing Information , 1998, PODS 1998.
[11] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.