-
1
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
Adam N.R., Wortmann J.C. Security-control methods for statistical databases: a comparative study. ACM Computing Surveys. 21:(4):1989;515-556.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
2
-
-
0018160897
-
Access to social security microdata files for research and statistical purposes
-
L. Alexander, T. Jabine, Access to social security microdata files for research and statistical purposes, Social Security Bulletin 41 (8) 1978.
-
(1978)
Social Security Bulletin
, vol.41
, Issue.8
-
-
Alexander, L.1
Jabine, T.2
-
3
-
-
0041948303
-
-
Master's thesis, Graduate Institute of Information Management, National Taiwan University, in Chinese.
-
Y.-C. Chiang, Protecting Privacy in Public Database, Master's thesis, Graduate Institute of Information Management, National Taiwan University, 2000, in Chinese.
-
(2000)
Protecting Privacy in Public Database
-
-
Chiang, Y.-C.1
-
4
-
-
0041948305
-
Preserving confidentially when sharing medical data
-
APAMI-MIC
-
Y.-C. Chiang, T.-S. Hsu, S. Kuo, D.-W. Wang, Preserving confidentially when sharing medical data, in: Proceedings Asia Pacific Medical Informatics Conference (APAMI-MIC), 2000.
-
(2000)
Proceedings Asia Pacific Medical Informatics Conference
-
-
Chiang, Y.-C.1
Hsu, T.-S.2
Kuo, S.3
Wang, D.-W.4
-
5
-
-
84863121329
-
How much privacy? - A system to safe guard personal privacy while releasing database
-
Springer
-
Chiang Y.T., Chiang Y.C., Hsu T.-s., Liau C.-J., Wang D.-W. How much privacy? - A system to safe guard personal privacy while releasing database. Proceedings of the Third International Conference on Rough Sets and Current Trends in Computing, LNCS#2475. 2002;226-233 Springer.
-
(2002)
Proceedings of the Third International Conference on Rough Sets and Current Trends in Computing, LNCS#2475
, pp. 226-233
-
-
Chiang, Y.T.1
Chiang, Y.C.2
Hsu, T.-s.3
Liau, C.-J.4
Wang, D.-W.5
-
6
-
-
0004043780
-
-
Cambridge, UK: Cambridge University Press
-
Chellas B.F. Modal Logic. 1980;Cambridge University Press, Cambridge, UK.
-
(1980)
Modal Logic
-
-
Chellas, B.F.1
-
7
-
-
0023292280
-
Views for multilevel database security
-
Denning D.E., Akl S.G., Heckman M., Lunt T.F., Morgenstern M., Neumann P.G., Schell R.R. Views for multilevel database security. IEEE Transactions on Software Engineering. 13:(2):1987;129-140.
-
(1987)
IEEE Transactions on Software Engineering
, vol.13
, Issue.2
, pp. 129-140
-
-
Denning, D.E.1
Akl, S.G.2
Heckman, M.3
Lunt, T.F.4
Morgenstern, M.5
Neumann, P.G.6
Schell, R.R.7
-
10
-
-
0042949864
-
-
Final Report ECU 2528, SRI International
-
T.D. Garvey, T.F. Lunt, X. Quin, M.E. Stickel, Inference Channel Detection and Elimination in Knowledge-Based Systems, Final Report ECU 2528, SRI International, 1994.
-
(1994)
Inference Channel Detection and Elimination in Knowledge-Based Systems
-
-
Garvey, T.D.1
Lunt, T.F.2
Quin, X.3
Stickel, M.E.4
-
11
-
-
0027665952
-
Knowledge, probability, and adversaries
-
Halpern J.K., Tuttle M.R. Knowledge, probability, and adversaries. Journal of the ACM. 40:(4):1993;917-962.
-
(1993)
Journal of the ACM
, vol.40
, Issue.4
, pp. 917-962
-
-
Halpern, J.K.1
Tuttle, M.R.2
-
13
-
-
0005616406
-
Getting a personal dossier from a statistical data bank
-
Hoffman L.J., Miller W.F. Getting a personal dossier from a statistical data bank. Datamation. 16:(5):1970;74-74.
-
(1970)
Datamation
, vol.16
, Issue.5
, pp. 74-74
-
-
Hoffman, L.J.1
Miller, W.F.2
-
18
-
-
0009091214
-
Probabilistic knowledge and probabilistic common knowledge (preliminary report)
-
Z.W. Ras, M. Zemankova, Emrich M.L. Hague: Elsevier
-
Krasucki P., Parikh R., Ndjatou G. Probabilistic knowledge and probabilistic common knowledge (preliminary report). Ras Z.W., Zemankova M., Emrich M.L. Methodologies for Intelligent Systems. 5:1990;1-8 Elsevier, Hague.
-
(1990)
Methodologies for Intelligent Systems
, vol.5
, pp. 1-8
-
-
Krasucki, P.1
Parikh, R.2
Ndjatou, G.3
-
21
-
-
0022583507
-
Security of statistical databases compromise through attribute correlational modeling
-
M.A. Palley, Security of statistical databases compromise through attribute correlational modeling, in: Proceedings of IEEE Conference on Data Engineering, 1986, pp. 67-74.
-
(1986)
Proceedings of IEEE Conference on Data Engineering
, pp. 67-74
-
-
Palley, M.A.1
|