-
1
-
-
84863121329
-
How much privacy? - A system to safe guard personal privacy while releasing database
-
LNCS 2475. Springer-Verlag
-
Chiang YT, Chiang YC, Hsu T-s, Liau CJ, Wang DW. How much privacy? - a system to safe guard personal privacy while releasing database. In: Proceedings of the Third International Conference on Rough Sets and Current Trends in Computing, LNCS 2475. Springer-Verlag, 2002. pp. 226-233.
-
(2002)
Proceedings of the Third International Conference on Rough Sets and Current Trends in Computing
, pp. 226-233
-
-
Chiang, Y.T.1
Chiang, Y.C.2
Hsu, T.-S.3
Liau, C.J.4
Wang, D.W.5
-
3
-
-
0018160897
-
Access to social security microdata files for research and statistical purposes
-
Alexander L, Jabine T. Access to social security microdata files for research and statistical purposes. Soc Secur Bull 1978;41(8).
-
(1978)
Soc Secur Bull
, vol.41
, Issue.8
-
-
Alexander, L.1
Jabine, T.2
-
4
-
-
0041446760
-
Guaranteeing anonymity when sharing medical data, the Datafly system
-
AIWP-WP344. MIT AI Lab.
-
Sweeney L. Guaranteeing anonymity when sharing medical data, the Datafly system. A.I. Working Paper, AIWP-WP344. MIT AI Lab. 1997.
-
(1997)
A.I. Working Paper
-
-
Sweeney, L.1
-
10
-
-
0042090221
-
Preserving confidentiality when sharing medical database with the Cellsecu system
-
Chiang Y.C., Hsu T.-s., Kuo S., Liau C.J., Wang D.W. Preserving confidentiality when sharing medical database with the Cellsecu system. Int. J. Med. Inform. 71:2003;17-23
-
(2003)
Int. J. Med. Inform.
, vol.71
, pp. 17-23
-
-
Chiang, Y.C.1
Hsu, T.-S.2
Kuo, S.3
Liau, C.J.4
Wang, D.W.5
-
11
-
-
0005616406
-
Getting a personal dossier from a statistical data bank
-
Hoffman L.J., Miller W.F. Getting a personal dossier from a statistical data bank. Datamation. 16(5):1970;74
-
(1970)
Datamation
, vol.16
, Issue.5
, pp. 74
-
-
Hoffman, L.J.1
Miller, W.F.2
-
12
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
Adam NR, Wortmann JC. Security-control methods for statistical databases: a comparative study. ACM Comput. Surveys 1989;21(4).
-
(1989)
ACM Comput. Surveys
, vol.21
, Issue.4
-
-
Adam, N.R.1
Wortmann, J.C.2
-
15
-
-
0042949864
-
-
Final Report, ECU 2528. SRI International
-
Garvey TD, Lunt TF, Quin X, Stickel ME. Inference channel detection and elimination in knowledge-based systems. Final Report, ECU 2528. SRI International, 1994.
-
(1994)
Inference Channel Detection and Elimination in Knowledge-based Systems
-
-
Garvey, T.D.1
Lunt, T.F.2
Quin, X.3
Stickel, M.E.4
-
16
-
-
0023292280
-
Views for multilevel database security
-
Denning DE, Akl SG, Heckman M, Lunt TF, Morgenstern M, Neumann PG, et al. Views for multilevel database security. IEEE Trans Software Eng 1987;13(2):129-40.
-
(1987)
IEEE Trans Software Eng
, vol.13
, Issue.2
, pp. 129-140
-
-
Denning, D.E.1
Akl, S.G.2
Heckman, M.3
Lunt, T.F.4
Morgenstern, M.5
Neumann, P.G.6
-
17
-
-
0022583507
-
Security of statistical databases compromise through attribute correlational modeling
-
Palley MA. Security of statistical databases compromise through attribute correlational modeling. In: Proceedings of IEEE Conference on Data Engineering, 1986. pp. 67-74.
-
(1986)
Proceedings of IEEE Conference on Data Engineering
, pp. 67-74
-
-
Palley, M.A.1
-
20
-
-
0033105319
-
Using Boolean reasoning to anonymize databases
-
Øhrn A., Ohno-Machado L. Using Boolean reasoning to anonymize databases. Artif. Intell. Med. 15:1999;235-254
-
(1999)
Artif. Intell. Med.
, vol.15
, pp. 235-254
-
-
Øhrn, A.1
Ohno-Machado, L.2
-
23
-
-
0000313665
-
Granular computing on binary relations. I. Data mining and neighborhood systems
-
Skoworn A, Polkowski L, editors. Physica-Verlag
-
Lin TY. Granular computing on binary relations. I. Data mining and neighborhood systems. In: Skoworn A, Polkowski L, editors. Rough sets in knowledge discovery, vol. 1: methodology and applications. Physica-Verlag, 1998. p. 107-21.
-
(1998)
Rough Sets in Knowledge Discovery, Vol. 1: Methodology and Applications
, vol.1
, pp. 107-121
-
-
Lin, T.Y.1
-
24
-
-
1642469977
-
Toward a theory of fuzzy information granulation and its centrality in haman reasoning and fuzzy logic
-
Zadeh L.A. Toward a theory of fuzzy information granulation and its centrality in haman reasoning and fuzzy logic. Fuzzy Sets Syst. 90:1997;111-127
-
(1997)
Fuzzy Sets Syst.
, vol.90
, pp. 111-127
-
-
Zadeh, L.A.1
-
25
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
Sweeney L. Achieving. k -anonymity privacy protection using generalization and suppression Int. J. Uncertain. Fuzz. Knowledge-based Syst. 10(5):2002;571-588
-
(2002)
Int. J. Uncertain. Fuzz. Knowledge-based Syst.
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
27
-
-
0003515463
-
-
Prentice-Hall Inc.
-
Ahuja RK, Magnanti TL, Orlin JB. Network flows: theory, algorithms, and applications. Prentice-Hall Inc., 1993.
-
(1993)
Network Flows: Theory, Algorithms, and Applications
-
-
Ahuja, R.K.1
Magnanti, T.L.2
Orlin, J.B.3
-
28
-
-
0000682065
-
Network flow and testing graph connectivity
-
Even S., Tarjan R.E. Network flow and testing graph connectivity. SIAM J. Comput. 4:1975;507-518
-
(1975)
SIAM J. Comput.
, vol.4
, pp. 507-518
-
-
Even, S.1
Tarjan, R.E.2
|