Differentiated security levels for personal identifiable information in identity management system
暂无分享,去创建一个
[1] Xiaomin Wang,et al. An Architecture for Differentiated Security Service , 2008, 2008 International Symposium on Electronic Commerce and Security.
[2] Chao-Fu Hong,et al. Extracting the significant-rare keywords for patent analysis , 2009, Expert Syst. Appl..
[3] Marco Casassa Mont,et al. Dealing with Privacy Obligations: Important Aspects and Technical Approaches , 2004, TrustBus.
[4] Marit Hansen,et al. Privacy and Identity Management , 2008, IEEE Security & Privacy.
[5] Jon Finke. Identity Management , 2006, LISA.
[6] Li Xiu,et al. Application of data mining techniques in customer relationship management: A literature review and classification , 2009, Expert Syst. Appl..
[7] Craig W. Thompson,et al. Extending a Natural Language Interface with Geospatial Queries , 2007, IEEE Internet Computing.
[8] ChenYen-Liang,et al. Mining fuzzy association rules from questionnaire data , 2009 .
[9] Chih-Hung Hsu. Data mining to improve industrial standards and enhance production and marketing: An empirical study in apparel industry , 2009, Expert Syst. Appl..
[10] B. Boehm. Software risk management: principles and practices , 1991, IEEE Software.
[11] Wei Xiong,et al. Identification of candidate cancer genes involved in human retinoblastoma by data mining , 2008, Child's Nervous System.
[12] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[13] Olvi L. Mangasarian,et al. Nonlinear Knowledge-Based Classification , 2008, IEEE Transactions on Neural Networks.
[14] A. Lukoševičius. Methodology of Adaptation of Data Mining Methods for Medical Decision Support: Case Study , 2009 .
[15] Alessandro Acquisti,et al. Identity Management, Privacy, and Price Discrimination , 2008, IEEE Security & Privacy.
[16] Zhao Xin. A Study of Performance Evaluation of HRM: Based on Data Mining , 2008, 2008 International Seminar on Future Information Technology and Management Engineering.
[17] Yen-Liang Chen,et al. Mining fuzzy association rules from questionnaire data , 2009, Knowl. Based Syst..
[18] Lior Rokach,et al. Mining manufacturing databases to discover the effect of operation sequence on the product quality , 2008, J. Intell. Manuf..
[19] Charles X. Ling,et al. Using AUC and accuracy in evaluating learning algorithms , 2005, IEEE Transactions on Knowledge and Data Engineering.
[20] Judy Kay,et al. Clustering and Sequential Pattern Mining of Online Collaborative Learning Data , 2009, IEEE Transactions on Knowledge and Data Engineering.
[21] Chin-Jui Chang,et al. A study on the application of data mining to disadvantaged social classes in Taiwan's population census , 2009, Expert Syst. Appl..
[22] 조영섭,et al. OASIS SAML(Security Assertion Markup Language) v2.0 고찰 및 활용 , 2006 .
[23] H. Tan. 2008 International Seminar on Future Information Technology and Management Engineering , 2009 .
[24] Silvio Romero de Lemos Meira,et al. Knowledge Reuse in Data Mining Projects and Its Practical Applications , 2009, ICEIS.