-
1
-
-
0024914229
-
'Security-control methods for statistical databases'
-
Adam, N.R. and Wortman, J.C. (1989) 'Security-control methods for statistical databases', ACM Computing Surveys, Vol. 21, No. 4, pp.515-556.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortman, J.C.2
-
2
-
-
0038533371
-
'Records privacy extended to pharmacies'
-
Available from
-
Albert, T. (2001) 'Records privacy extended to pharmacies', American Medical News. Available from: http://www.ama-assn.org/sci-pubs/amnews/pick_01/-prsb04O2.htm
-
(2001)
American Medical News
-
-
Albert, T.1
-
3
-
-
85087594541
-
'Anonymous e-prescriptions'
-
Washington, DC
-
Ateniese, G. and Medeiros, B. (2002) 'Anonymous e-prescriptions', WPES'02, Washington, DC, pp. 19-28.
-
(2002)
WPES'02
, pp. 19-28
-
-
Ateniese, G.1
Medeiros, B.2
-
5
-
-
0022130080
-
'A data distortion by probability distribution'
-
Liew, C.K., Choi, U.J. and Liew, CJ. (1985) 'A data distortion by probability distribution', ACM Transactions in Database System, Vol. 10, No. 3, pp.395-411.
-
(1985)
ACM Transactions in Database System
, vol.10
, Issue.3
, pp. 395-411
-
-
Liew, C.K.1
Choi, U.J.2
Liew, C.J.3
-
6
-
-
0141688369
-
'Discretisation: An enabling technique'
-
Liu, H., Hussain, F., Tan, C.L. and Dash, M. (2002) 'Discretisation: an enabling technique', Data Mining and Knowledge Discovery, Vol. 6, pp.393-423.
-
(2002)
Data Mining and Knowledge Discovery
, vol.6
, pp. 393-423
-
-
Liu, H.1
Hussain, F.2
Tan, C.L.3
Dash, M.4
-
8
-
-
0003408496
-
'UCI repository of machine learning databases'
-
Available from
-
Merz, C.J. and Murphy, R (1996) 'UCI repository of machine learning databases'. Available from: http://www.ics.uci.edu/~mlearn/MLRepository.html
-
(1996)
-
-
Merz, C.J.1
Murphy, R.2
-
9
-
-
0033207750
-
'A general additive data perturbation method for database security'
-
Muralidhar, K., Batra, D. and Sarathy, R. (1999) 'A general additive data perturbation method for database security', Management Science, Vol. 45, pp. 1399-1415.
-
(1999)
Management Science
, vol.45
, pp. 1399-1415
-
-
Muralidhar, K.1
Batra, D.2
Sarathy, R.3
-
10
-
-
0036971583
-
'Perturbing nonnormal confidential attributes: The copula approach'
-
Sarathy, R., Muralidhar, K. and Parsa, R. (2002) 'Perturbing nonnormal confidential attributes: the copula approach', Management Science, Vol. 48, pp. 1613-1627.
-
(2002)
Management Science
, vol.48
, pp. 1613-1627
-
-
Sarathy, R.1
Muralidhar, K.2
Parsa, R.3
-
11
-
-
0003500248
-
C4.5: Programs for Machine Learning
-
San Mateo, CA: Morgan Kaufmann
-
Quinlan, J.R. (1993) C4.5: Programs.for Machine Learning, San Mateo, CA: Morgan Kaufmann.
-
(1993)
-
-
Quinlan, J.R.1
-
12
-
-
0002779304
-
'Privacy, information technology, and healthcare'
-
Rindfleisch, T. (1997) 'Privacy, information technology, and healthcare, Communications of the ACM, Vol. 40, No. 8, pp.93-98.
-
(1997)
Communications of the ACM
, vol.40
, Issue.8
, pp. 93-98
-
-
Rindfleisch, T.1
-
13
-
-
0034332283
-
'Who's compliant?'
-
Sarudi, D. (2000) 'Who's compliant?', Hospitals & Health Networks, Vol. 74, No. 11, pp. 18-20.
-
(2000)
Hospitals & Health Networks
, vol.74
, Issue.11
, pp. 18-20
-
-
Sarudi, D.1
-
14
-
-
4444252020
-
'Beef up your vendor's security measures to avoid a breach in patient privacy'
-
Tiffany, S. and Robinson, R. (2003) 'Beef up your vendor's security measures to avoid a breach in patient privacy', Managed Healthcare Executive, Vol. 13, No. 7, pp.34-35.
-
(2003)
Managed Healthcare Executive
, vol.13
, Issue.7
, pp. 34-35
-
-
Tiffany, S.1
Robinson, R.2
-
15
-
-
3242804531
-
'Bringing healthcare online: The role of information technologies'
-
US Congress, Office of Technology Assessment OTA-ITC-624
-
US Congress, Office of Technology Assessment (1995) 'Bringing healthcare online: The role of information technologies', OTA-ITC-624.
-
(1995)
-
-
|