A Privacy-Enhancing Architecture for Databases
暂无分享,去创建一个
[1] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[2] Athman Bouguettaya,et al. Privacy on the Web: Facts, Challenges, and Solutions , 2003, IEEE Secur. Priv..
[3] Jayant R. Haritsa,et al. Maintaining Data Privacy in Association Rule Mining , 2002, VLDB.
[4] R. Cushman,et al. Information and medical ethics: protecting patient privacy , 1996 .
[5] David A. Wagner,et al. Privacy-enhancing technologies for the Internet , 1997, Proceedings IEEE COMPCON 97. Digest of Papers.
[6] Elisa Bertino,et al. State-of-the-art in privacy preserving data mining , 2004, SGMD.
[7] K. A. Taipale,et al. Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd , 2004 .
[8] Gregory Piatetsky-Shapiro,et al. Data mining and knowledge discovery 1996 to 2005: overcoming the hype and moving from “university” to “business” and “analytics” , 2007, Data Mining and Knowledge Discovery.
[9] J. Rubenfeld. The Right of Privacy , 1989 .
[10] J. Rachels. Why privacy is important , 1985 .
[11] Yunfeng Wang,et al. Privacy Preserving Data Mining Research: Current Status and Key Issues , 2007, International Conference on Computational Science.
[12] Thomas M. Cooley,et al. A treatise on the law of torts, or, The wrongs which arise independent of contract. , 1993 .
[13] S. Fischer-h bner. IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms , 2001 .
[14] Marc Langheinrich,et al. The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .
[15] Mikhail J. Atallah,et al. A secure protocol for computing dot-products in clustered and distributed environments , 2002, Proceedings International Conference on Parallel Processing.
[16] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[17] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[18] Ramakrishnan Srikant,et al. Hippocratic Databases , 2002, VLDB.
[19] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[20] Elisa Bertino,et al. A Framework for Evaluating Privacy Preserving Data Mining Algorithms* , 2005, Data Mining and Knowledge Discovery.
[21] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[22] L. Janczewski. New challenges in privacy protection , 2003 .
[23] Lorrie Faith Cranor,et al. The platform for privacy preferences , 1999, CACM.
[24] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[25] A. Westin. Social and Political Dimensions of Privacy , 2003 .
[26] Vladimir A. Oleshchuk,et al. Personal Privacy in a Digital World , 2007 .
[27] Thomas B. Hodel-Widmer. Designing databases that enhance people’s privacy without hindering organizations , 2006, Ethics and Information Technology.
[28] Koutarou Suzuki,et al. RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.
[29] L. Floridi. Four challenges for a theory of informational privacy , 2006, Ethics and Information Technology.
[30] Felix B. Tan. Advanced Topics In Global Information Management , 2003 .
[31] Andrew Charlesworth. Clash of the Data Titans?: US and EU Data Privacy Regulation , 2000 .
[32] Eugene Volokh,et al. Personalization and privacy , 2000, CACM.
[33] R. Gavison. Privacy and the Limits of Law , 1980 .
[34] R. Hes,et al. Privacy-Enhancing Technologies: The Path to Anonymity , 1998 .
[35] Vassilios S. Verykios,et al. Disclosure limitation of sensitive rules , 1999, Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX'99) (Cat. No.PR00453).
[36] Julia Brande Earp,et al. Internet privacy law: a comparison between the United States and the European Union , 2004, Comput. Secur..
[37] Simon Rogerson,et al. Ethics and Information Technology , 1997, Australas. J. Inf. Syst..