-
1
-
-
0024914229
-
Security-control methods for statistical databases: a comparative study
-
Adam N.R., and Wortmann J.C. Security-control methods for statistical databases: a comparative study. ACM Computing Surveys 21 4 (1989) 515-556
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
2
-
-
34250661905
-
Achieving anonymity via clustering
-
Aggarwal G., Feder T., Kenthapadi K., Khuller S., Panigrahy R., Thomas D., and Zhu A. Achieving anonymity via clustering. Proceedings of the 25th Symposium on Principles of Database Systems (PODS'06), Chicago, IL (2006) 153-162
-
(2006)
Proceedings of the 25th Symposium on Principles of Database Systems (PODS'06), Chicago, IL
, pp. 153-162
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
4
-
-
33846040793
-
Dare to share: protecting sensitive knowledge with data sanitization
-
Amiri A. Dare to share: protecting sensitive knowledge with data sanitization. Decision Support Systems 43 1 (2007) 181-191
-
(2007)
Decision Support Systems
, vol.43
, Issue.1
, pp. 181-191
-
-
Amiri, A.1
-
5
-
-
0347763609
-
Using evolutionary algorithms as instance selection for data reduction in KDD: an experimental study
-
Cano J.R., Herrera F., and Lozano M. Using evolutionary algorithms as instance selection for data reduction in KDD: an experimental study. IEEE Transactions on Evolutionary Computation 7 6 (2003) 561-575
-
(2003)
IEEE Transactions on Evolutionary Computation
, vol.7
, Issue.6
, pp. 561-575
-
-
Cano, J.R.1
Herrera, F.2
Lozano, M.3
-
6
-
-
32544451777
-
Intelligence and security informatics: information systems perspective
-
Chen H. Intelligence and security informatics: information systems perspective. Decision Support Systems 41 3 (2006) 555-559
-
(2006)
Decision Support Systems
, vol.41
, Issue.3
, pp. 555-559
-
-
Chen, H.1
-
7
-
-
0033349024
-
Disclosure detection in multivariate categorical databases: auditing confidentiality protection through two new matrix operators
-
Chowdhury D.S., Duncan G.T., Krishnan R., Roehrig S.F., and Mukherjee S. Disclosure detection in multivariate categorical databases: auditing confidentiality protection through two new matrix operators. Management Science 45 12 (1999) 1710-1723
-
(1999)
Management Science
, vol.45
, Issue.12
, pp. 1710-1723
-
-
Chowdhury, D.S.1
Duncan, G.T.2
Krishnan, R.3
Roehrig, S.F.4
Mukherjee, S.5
-
8
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
Clifton C., Kantarcioglu M., Vaidya J., Lin X., and Zhu M. Tools for privacy preserving distributed data mining. SIGKDD Explorations 4 2 (2002) 38-44
-
(2002)
SIGKDD Explorations
, vol.4
, Issue.2
, pp. 38-44
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.5
-
9
-
-
0001501223
-
How did they get my name?: an exploratory investigation of consumer attitudes toward secondary information use
-
Culnan M. How did they get my name?: an exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly 17 3 (1993) 341-363
-
(1993)
MIS Quarterly
, vol.17
, Issue.3
, pp. 341-363
-
-
Culnan, M.1
-
11
-
-
0242625281
-
Privacy preserving mining of association rules
-
Evfimievski A., Srikant R., Agrawal R., and Gehrke J. Privacy preserving mining of association rules. Proceedings of 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Canada (2002) 217-228
-
(2002)
Proceedings of 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Canada
, pp. 217-228
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
12
-
-
0003024008
-
On the handling of continuous-valued attributes in decision tree generation
-
Fayyad U.M., and Irani K.B. On the handling of continuous-valued attributes in decision tree generation. Machine Learning 8 (1992) 87-102
-
(1992)
Machine Learning
, vol.8
, pp. 87-102
-
-
Fayyad, U.M.1
Irani, K.B.2
-
14
-
-
0036602405
-
Privacy protection of binary confidential data against deterministic, stochastic, and insider threat
-
Garfinkel R., Gopal R., and Goes P. Privacy protection of binary confidential data against deterministic, stochastic, and insider threat. Management Science 48 6 (2002) 749-764
-
(2002)
Management Science
, vol.48
, Issue.6
, pp. 749-764
-
-
Garfinkel, R.1
Gopal, R.2
Goes, P.3
-
16
-
-
0002263606
-
Privacy: entitlement or illusion?
-
Greengard S. Privacy: entitlement or illusion?. Personnel Journal 75 5 (1996) 74-88
-
(1996)
Personnel Journal
, vol.75
, Issue.5
, pp. 74-88
-
-
Greengard, S.1
-
18
-
-
0013384310
-
Genetic-algorithm-based instance selection and feature selection
-
Liu H., and Motoda H. (Eds), Kluwer Academic, Norwell, MA
-
Ishibuchi H., Nakashima T., and Nii M. Genetic-algorithm-based instance selection and feature selection. In: Liu H., and Motoda H. (Eds). Instance Selection and Construction for Data Mining (2001), Kluwer Academic, Norwell, MA 96-112
-
(2001)
Instance Selection and Construction for Data Mining
, pp. 96-112
-
-
Ishibuchi, H.1
Nakashima, T.2
Nii, M.3
-
19
-
-
38649113213
-
Adaptive data reduction for large-scale transaction data
-
Li X.-B., and Jacob V.S. Adaptive data reduction for large-scale transaction data. European Journal of Operational Research 188 3 (2008) 910-924
-
(2008)
European Journal of Operational Research
, vol.188
, Issue.3
, pp. 910-924
-
-
Li, X.-B.1
Jacob, V.S.2
-
20
-
-
33749607006
-
l-diversity: privacy beyond k-anonymity
-
Machanavajjhala A., Gehrke J., Kifer D., and Venkitasubramaniam M. l-diversity: privacy beyond k-anonymity. Proceedings of the 22nd IEEE International Conference on Data Engineering (ICDE 2006), Atlanta, GA (2006)
-
(2006)
Proceedings of the 22nd IEEE International Conference on Data Engineering (ICDE 2006), Atlanta, GA
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
21
-
-
53349090403
-
Predicting going concern opinion with data mining
-
Martens D., Bruynseels L., Baesens B., Willekens M., and Vanthienen J. Predicting going concern opinion with data mining. Decision Support Systems 45 4 (2008) 765-777
-
(2008)
Decision Support Systems
, vol.45
, Issue.4
, pp. 765-777
-
-
Martens, D.1
Bruynseels, L.2
Baesens, B.3
Willekens, M.4
Vanthienen, J.5
-
22
-
-
33847045247
-
Minimizing information loss and preserving privacy
-
Menon S., and Sarkar S. Minimizing information loss and preserving privacy. Management Science 53 1 (2007) 102-116
-
(2007)
Management Science
, vol.53
, Issue.1
, pp. 102-116
-
-
Menon, S.1
Sarkar, S.2
-
23
-
-
25844456648
-
Maximizing accuracy of shared databases when concealing sensitive patterns
-
Menon S., Sarkar S., and Mukherjee S. Maximizing accuracy of shared databases when concealing sensitive patterns. Information Systems Research 16 3 (2005) 256-270
-
(2005)
Information Systems Research
, vol.16
, Issue.3
, pp. 256-270
-
-
Menon, S.1
Sarkar, S.2
Mukherjee, S.3
-
24
-
-
0348093374
-
Some results of individual ranking method on the system of enterprise accounts annual survey
-
Pagliuca D., and Seri G. Some results of individual ranking method on the system of enterprise accounts annual survey. Esprit SDC Project, Deliverable MI-3/D2 (1999)
-
(1999)
Esprit SDC Project, Deliverable MI-3/D2
-
-
Pagliuca, D.1
Seri, G.2
-
26
-
-
34547737555
-
Cyberinfrastructure for homeland security: advances in information sharing, data mining, and collaboration systems
-
Raghu T.S., and Chen H. Cyberinfrastructure for homeland security: advances in information sharing, data mining, and collaboration systems. Decision Support Systems 43 4 (2007) 1321-1323
-
(2007)
Decision Support Systems
, vol.43
, Issue.4
, pp. 1321-1323
-
-
Raghu, T.S.1
Chen, H.2
-
27
-
-
0034501463
-
Leadership and group search in group decision support systems
-
Rees J., and Koehler G.J. Leadership and group search in group decision support systems. Decision Support Systems 30 1 (2000) 73-82
-
(2000)
Decision Support Systems
, vol.30
, Issue.1
, pp. 73-82
-
-
Rees, J.1
Koehler, G.J.2
-
28
-
-
0346238443
-
Using genetic algorithms for training data selection in RBF networks
-
Liu H., and Motoda H. (Eds), Kluwer Academic, Norwell, MA
-
Reeves C.R., and Bush D.R. Using genetic algorithms for training data selection in RBF networks. In: Liu H., and Motoda H. (Eds). Instance Selection and Construction for Data Mining (2001), Kluwer Academic, Norwell, MA 339-356
-
(2001)
Instance Selection and Construction for Data Mining
, pp. 339-356
-
-
Reeves, C.R.1
Bush, D.R.2
-
29
-
-
0021389555
-
Practical data-swapping: the first steps
-
Reiss S.P. Practical data-swapping: the first steps. ACM Transactions on Database Systems 9 1 (1984) 20-37
-
(1984)
ACM Transactions on Database Systems
, vol.9
, Issue.1
, pp. 20-37
-
-
Reiss, S.P.1
-
30
-
-
0028203106
-
Convergence analysis of canonical genetic algorithms
-
Rudolph G. Convergence analysis of canonical genetic algorithms. IEEE Transactions on Neural Networks 5 1 (1994) 96-101
-
(1994)
IEEE Transactions on Neural Networks
, vol.5
, Issue.1
, pp. 96-101
-
-
Rudolph, G.1
-
34
-
-
16444372472
-
Impacts of user privacy preferences on personalized systems: a comparative study
-
Karat C.M., Blom J., and Karat J. (Eds), Kluwer Academic Publishers, Dordrecht, Netherlands
-
Teltzrow M., and Kobsa A. Impacts of user privacy preferences on personalized systems: a comparative study. In: Karat C.M., Blom J., and Karat J. (Eds). Designing Personalized User Experiences in eCommerce (2004), Kluwer Academic Publishers, Dordrecht, Netherlands 315-332
-
(2004)
Designing Personalized User Experiences in eCommerce
, pp. 315-332
-
-
Teltzrow, M.1
Kobsa, A.2
-
36
-
-
2142754478
-
Association rule hiding
-
Verykios V.S., Elmagarmid A.K., Bertino E., Saygin Y., and Dasseni E. Association rule hiding. IEEE Transactions on Knowledge and Data Engineering 16 4 (2004) 434-447
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.4
, pp. 434-447
-
-
Verykios, V.S.1
Elmagarmid, A.K.2
Bertino, E.3
Saygin, Y.4
Dasseni, E.5
|