NUYA: An encrypted mechanism for securing cloud data from data mining attacks
暂无分享,去创建一个
[1] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[2] Yashwant Singh Patel,et al. Kerberos based ATM Voting System: Voting Friendly Model , 2013 .
[3] Gary M. Weiss. Data Mining in the Real World: Experiences, Challenges, and Recommendations , 2009, DMIN.
[4] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[5] Michael J. Shaw,et al. Knowledge management and data mining for marketing , 2001, Decis. Support Syst..
[6] Lambèr M. M. Royakkers,et al. Ethical issues in web data mining , 2004, Ethics and Information Technology.
[7] Min Zhang,et al. The Strategy of Mining Association Rule Based on Cloud Computing , 2011, 2011 International Conference on Business Computing and Global Informatization.
[8] W. Marsden. I and J , 2012 .
[9] Peng Wang,et al. Data Mining of Mass Storage Based on Cloud Computing , 2010, 2010 Ninth International Conference on Grid and Cloud Computing.
[10] Wei-keng Liao,et al. Performance evaluation and characterization of scalable data mining algorithms , 2004 .
[11] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[12] Mohammed Eunus Ali,et al. An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks , 2012, 2012 SC Companion: High Performance Computing, Networking Storage and Analysis.