-
1
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
Adam, N.R. and Wortmann, J.C. (1989) 'Security-control methods for statistical databases: A comparative study', ACM Computing Surveys Vol. 21, No. 4, pp.515-556.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
2
-
-
0242674432
-
Hippocratic databases
-
Hong Kong, China, pp
-
Agrawal, R., Kiernan, J., Srikant, R. and Xu, Y. (2002) 'Hippocratic databases', 28th Int'l Conference on Very Large Databases, Hong Kong, China, pp.143-154.
-
(2002)
28th Int'l Conference on Very Large Databases
, pp. 143-154
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
3
-
-
34548151827
-
-
Kluwer, MA
-
Bestougeff, H., Dubois, J.E. and Thuraisingham, B. (2002) Heterogeneous Information Exchange and Organizational Hubs, Kluwer, MA.
-
(2002)
Heterogeneous Information Exchange and Organizational Hubs
-
-
Bestougeff, H.1
Dubois, J.E.2
Thuraisingham, B.3
-
4
-
-
0003504808
-
Security and privacy implications of data mining
-
Montreal, Canada, pp
-
Clifton, C. and Marks, D. (1996) 'Security and privacy implications of data mining', ACM SIGMOD Workshop on Data Mining and Knowledge Discovery, Montreal, Canada, pp.15-19.
-
(1996)
ACM SIGMOD Workshop on Data Mining and Knowledge Discovery
, pp. 15-19
-
-
Clifton, C.1
Marks, D.2
-
7
-
-
48649102970
-
Risk-based Role-based Access Control
-
Technical Report, The University of Texas at Dallas
-
Kantarcioglu, M., Celikel, E. and Thuraisingham, B. (2006) Risk-based Role-based Access Control, Technical Report, The University of Texas at Dallas.
-
(2006)
-
-
Kantarcioglu, M.1
Celikel, E.2
Thuraisingham, B.3
-
8
-
-
12244296735
-
When do data mining results violate privacy?
-
Seattle, WA, pp
-
Kantarcioglu, M., Jin, J. and Clifton, C. (2004) 'When do data mining results violate privacy?', Proceedings of the 2004 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, WA, pp.599-604.
-
(2004)
Proceedings of the 2004 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 599-604
-
-
Kantarcioglu, M.1
Jin, J.2
Clifton, C.3
-
10
-
-
0030086382
-
Role-based access control models
-
Sandhu, R., Coyne, E., Feinstein, H. and Youman, C. (1996) 'Role-based access control models', IEEE Computer, Vol. 29, No. 2, pp.38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
12
-
-
0036811662
-
k-anonymity: A model for protecting privacy
-
Sweeney, L. (2002) 'k-anonymity: A model for protecting privacy', International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, Vol. 10, No. 5, pp.557-570.
-
(2002)
International Journal on Uncertainty, Fuzziness and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
13
-
-
10444271317
-
Data mining, national security, privacy and civil liberties
-
Thuraisingham, B. (2002) 'Data mining, national security, privacy and civil liberties', SIGKDD Explorations, Vol. 4, No. 2, pp.1-5.
-
(2002)
SIGKDD Explorations
, vol.4
, Issue.2
, pp. 1-5
-
-
Thuraisingham, B.1
-
14
-
-
0026403732
-
Multilevel security issues in distributed database management systems II
-
Thuraisingham, B. (1991) 'Multilevel security issues in distributed database management systems II', Computers and Security, Vol. 10, No. 8, pp.727-747.
-
(1991)
Computers and Security
, vol.10
, Issue.8
, pp. 727-747
-
-
Thuraisingham, B.1
-
15
-
-
0027593498
-
Towards developing a standard multilevel relational data model for representing a multilevel universe
-
Thuraisingham, B. (1993) 'Towards developing a standard multilevel relational data model for representing a multilevel universe', Computer Standards and Interfaces Journal (North Holland), Vol. 15, No. 1, pp.21-34.
-
(1993)
Computer Standards and Interfaces Journal (North Holland)
, vol.15
, Issue.1
, pp. 21-34
-
-
Thuraisingham, B.1
-
16
-
-
0027334758
-
Parallel processing and trusted database management systems
-
ACM, New York, NY, pp
-
Thuraisingham, B. and Ford, W. (1993) 'Parallel processing and trusted database management systems', Proceedings of the 1993 ACM Conference on Computer Science (Indianapolis, Indiana, United States, February 16-18, 1993), CSC '93, ACM, New York, NY, pp.162-167.
-
(1993)
Proceedings of the 1993 ACM Conference on Computer Science (Indianapolis, Indiana, United States, February 16-18, 1993), CSC '93
, pp. 162-167
-
-
Thuraisingham, B.1
Ford, W.2
-
17
-
-
0028730609
-
Security issues for federated database systems
-
Thuraisingham, B. (1994) 'Security issues for federated database systems', Computers and Security, Vol. 13, p.6.
-
(1994)
Computers and Security
, vol.13
, pp. 6
-
-
Thuraisingham, B.1
-
18
-
-
48649109782
-
-
Thuraisingham, B. (1997) 'Data warehousing, data mining and security', Presented at the IFIP Database Security Conference, Paper Published in formal proceedings by Chapman and Hall, Como, Italy, 1996.
-
Thuraisingham, B. (1997) 'Data warehousing, data mining and security', Presented at the IFIP Database Security Conference, Paper Published in formal proceedings by Chapman and Hall, Como, Italy, 1996.
-
-
-
|