-
1
-
-
0034827009
-
On the design and quantification of privacy-preserving data mining algorithms
-
Agrawal, D., & Aggrawal, C. (2001). On the design and quantification of privacy-preserving data mining algorithms. Proceedings ACM PODS.
-
(2001)
Proceedings ACM PODS
-
-
Agrawal, D.1
Aggrawal, C.2
-
3
-
-
0242674432
-
Hippocratic databases
-
Agrawal, R., Kiernan, J., Ramakrishnan, S., & Xu, Y. (2002). Hippocratic databases. Proceedings of the VLDB Conference.
-
(2002)
Proceedings of the VLDB Conference
-
-
Agrawal, R.1
Kiernan, J.2
Ramakrishnan, S.3
Xu, Y.4
-
4
-
-
10444262311
-
Multilevel secure database systems
-
Washington D.C
-
Air Force Science Board (1983). Multilevel secure database systems. Air Force Summer Study Report, Washington D.C.
-
(1983)
Air Force Summer Study Report
-
-
-
5
-
-
0034497773
-
Using sample size to limit exposure to data mining
-
Clifton, C. (2000). Using sample size to limit exposure to data mining. Journal of Computer Security, 8, 120-142.
-
(2000)
Journal of Computer Security
, vol.8
, pp. 120-142
-
-
Clifton, C.1
-
6
-
-
10044273842
-
Tools for privacy-preserving distributed data mining
-
Clifton, C. (2003). Tools for privacy-preserving distributed data mining. SIGKDD Explorations, 4, 28-34.
-
(2003)
SIGKDD Explorations
, vol.4
, pp. 28-34
-
-
Clifton, C.1
-
10
-
-
0242625281
-
Privacy-preserving mining of association rules
-
Evfimievski, A., Srikant, R., Agrawal, R., & Gehrke, J. (2002). Privacy-preserving mining of association rules. Proceedings of the ACM SIGKDD Conference.
-
(2002)
Proceedings of the ACM SIGKDD Conference
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
15
-
-
10444253497
-
Privacy-preserving clustering with distributed EM mixture modeling
-
Lin, A., & Clifton, C. (2003). Privacy-preserving clustering with distributed EM mixture modeling. Purdue University Technical Report.
-
(2003)
Purdue University Technical Report
-
-
Lin, A.1
Clifton, C.2
-
17
-
-
84976785631
-
Security and inference in multilevel database and knowledge base systems
-
Morgenstern, M. (1987). Security and inference in multilevel database and knowledge base systems. Proceedings of the ACM SIGMOD Conference.
-
(1987)
Proceedings of the ACM SIGMOD Conference
-
-
Morgenstern, M.1
-
18
-
-
10444274552
-
Multilevel security for relational database systems augmented by an inference engine
-
Thuraisingham, B. (1987). Multilevel security for relational database systems augmented by an inference engine. Computers and Security, 6, 250-66.
-
(1987)
Computers and Security
, vol.6
, pp. 250-266
-
-
Thuraisingham, B.1
-
19
-
-
0025401329
-
Towards the design of a secure data/knowledge base management system
-
Thuraisingham, B. (1990a). Towards the design of a secure data/knowledge base management system. Data and Knowledge Engineering, 5, 59-72.
-
(1990)
Data and Knowledge Engineering
, vol.5
, pp. 59-72
-
-
Thuraisingham, B.1
-
20
-
-
10444248483
-
Recursion theoretic properties of the inference problem
-
Thuraisingham, B. (1990b). Recursion theoretic properties of the inference problem. MITRE Report MTP291.
-
(1990)
MITRE Report
, vol.MTP291
-
-
Thuraisingham, B.1
-
24
-
-
10444271317
-
Data mining, national security, privacy and civil liberties
-
Thuraisingham, B. (2002). Data mining, national security, privacy and civil liberties. SIGKDD Explorations, 4, 1-5.
-
(2002)
SIGKDD Explorations
, vol.4
, pp. 1-5
-
-
Thuraisingham, B.1
-
26
-
-
10444268481
-
Data mining for counter-terrorism
-
To appear in S. Sivakumar & H. Kargupta (Eds.). AAAI Press
-
Thuraisingham, B. (2003b). Data mining for counter-terrorism. To appear in S. Sivakumar & H. Kargupta (Eds.), Next generation data mining. AAAI Press.
-
(2003)
Next Generation Data Mining
-
-
Thuraisingham, B.1
-
27
-
-
10044295781
-
Privacy constraint processing in a privacy enhanced database system
-
forthcoming
-
Thuraisingham, B. (2003c). Privacy constraint processing in a privacy enhanced database system. Data and Knowledge Engineering Journal (forthcoming).
-
(2003)
Data and Knowledge Engineering Journal
-
-
Thuraisingham, B.1
-
28
-
-
0029290760
-
Security constraint processing in a multilevel distributed database management system
-
Thuraisingham, B., & Ford, W. (1995). Security constraint processing in a multilevel distributed database management system. IEEE Transactions on Knowledge and Data Engineering, 7, 274-93.
-
(1995)
IEEE Transactions on Knowledge and Data Engineering
, vol.7
, pp. 274-293
-
-
Thuraisingham, B.1
Ford, W.2
-
30
-
-
0027853601
-
Design and implementation of a database infernce cntroller
-
Thuraisingham, B., Ford, W., Collins, M., & O'Keeffe, J. (1993). Design and implementation of a database infernce cntroller. Data and Knowledge Engineering Journal, 11, 271-93.
-
(1993)
Data and Knowledge Engineering Journal
, vol.11
, pp. 271-293
-
-
Thuraisingham, B.1
Ford, W.2
Collins, M.3
O'Keeffe, J.4
|