-
2
-
-
0027087123
-
Protecting the privacy of patient information in clinical networks: Regulatory effectiveness analysis
-
Brannigan VM: Protecting the privacy of patient information in clinical networks: regulatory effectiveness analysis, Ann NY Acad Sci, (1992) 190-201.
-
(1992)
Ann NY Acad Sci
, pp. 190-201
-
-
Brannigan, V.M.1
-
3
-
-
15844364090
-
-
Personal communication
-
Lindsay P: Personal communication, 1995.
-
(1995)
-
-
Lindsay, P.1
-
7
-
-
0012092778
-
Secret sharing schemes arising from latin squares
-
Cooper J, Donovan D and Seberry J: Secret sharing schemes arising from latin squares, Bull ICA, 1994.
-
(1994)
Bull ICA
-
-
Cooper, J.1
Donovan, D.2
Seberry, J.3
-
8
-
-
0004154170
-
-
Addison-Wesley, Reading, MA
-
Date CJ: An Introduction to Database Systems, Vol. I, 5th ed., Addison-Wesley, Reading, MA, 1990.
-
(1990)
An Introduction to Database Systems, Vol. I, 5th Ed.
, vol.1
-
-
Date, C.J.1
-
10
-
-
85030195497
-
A Model of Statistical Database Compromise Incorporating Supplementary Knowledge
-
Sydney
-
Miller M: A Model of Statistical Database Compromise Incorporating Supplementary Knowledge, Proceedings DBIS'91, Sydney, 1991, pp. 258-267.
-
(1991)
Proceedings DBIS'91
, pp. 258-267
-
-
Miller, M.1
-
11
-
-
15844406057
-
Relative compromise of statistical databases
-
Miller M and Seberry J: Relative compromise of statistical databases, Aust Comput J, 21(2) (1989) 56-61.
-
(1989)
Aust Comput J
, vol.21
, Issue.2
, pp. 56-61
-
-
Miller, M.1
Seberry, J.2
-
12
-
-
0042220876
-
Application of symmetric chains to an optimization problem in the security of statistical databases
-
Miller M, Roberts I and Simpson J: Application of symmetric chains to an optimization problem in the security of statistical databases, Bull ICA, 2 (1991) 47-58.
-
(1991)
Bull ICA
, vol.2
, pp. 47-58
-
-
Miller, M.1
Roberts, I.2
Simpson, J.3
-
13
-
-
15844418157
-
Audit Expert and statistical database security
-
Eds: B Srinivasan and J Zeleznikow, World Scientific, Singapore
-
Miller M and Seberry J: Audit Expert and statistical database security. In Databases in the 1990s (Eds: B Srinivasan and J Zeleznikow), World Scientific, Singapore, 1990, pp. 149-174.
-
(1990)
Databases in the 1990s
, pp. 149-174
-
-
Miller, M.1
Seberry, J.2
-
14
-
-
0020205885
-
Auditing and inference control in statistical databases
-
Chin FY and Oszoyoglu G: Auditing and inference control in statistical databases, IEEE Trans Softw Eng, SE-8(6) (1982) 574-582.
-
(1982)
IEEE Trans Softw Eng
, vol.SE-8
, Issue.6
, pp. 574-582
-
-
Chin, F.Y.1
Oszoyoglu, G.2
-
15
-
-
0023670513
-
An evaluation of two new inference control methods
-
Chin YH and Peng WL: An evaluation of two new inference control methods, IEEE Trans Softw Eng, 13(12) (1987) 1329-1339.
-
(1987)
IEEE Trans Softw Eng
, vol.13
, Issue.12
, pp. 1329-1339
-
-
Chin, Y.H.1
Peng, W.L.2
-
16
-
-
33645672800
-
Prevention of relative compromise in statistical databases using Audit Expert
-
Miller M, Roberts I and Simpson J: Prevention of relative compromise in statistical databases using Audit Expert, Bull ICA, 10 (1994).
-
(1994)
Bull ICA
, vol.10
-
-
Miller, M.1
Roberts, I.2
Simpson, J.3
|