메뉴 건너뛰기




Volumn 1768, Issue , 2000, Pages 405-418

An entropy-based framework for database inference

Author keywords

[No Author keywords available]

Indexed keywords

DATABASE SYSTEMS;

EID: 84947920864     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/10719724_28     Document Type: Conference Paper
Times cited : (9)

References (26)
  • 2
    • 0026152913 scopus 로고
    • Microdata Disclosure Limitation in Statistical Databases: Query Size and Random Sample Query Control
    • on Security and Privacy, Oakland, CA
    • G. Duncan and S. Mukherjee, Microdata Disclosure Limitation in Statistical Databases: Query Size and Random Sample Query Control, Proc. IEEE Symp. on Security and Privacy, Oakland, CA, 1991, pp. 278-287.
    • (1991) Proc. IEEE Symp , pp. 278-287
    • Duncan, G.1    Mukherjee, S.2
  • 3
    • 84972531331 scopus 로고
    • Enhancing Access to Microdata while Protecting Confidentiality: Prospects for the Future
    • G. Duncan and R. Pearson, Enhancing Access to Microdata while Protecting Confidentiality: Prospects for the Future, Statistical Science, Vol. 6, No. 3, 1991, pp. 219-239.
    • (1991) Statistical Science , vol.6 , Issue.3 , pp. 219-239
    • Duncan, G.1    Pearson, R.2
  • 6
    • 0345780103 scopus 로고    scopus 로고
    • A Framework for Inference-Directed Data Mining
    • Status and Prospects, (eds., Samarati & Sandhu) IFIP
    • T. Hinke, H. Delugach, & R. Wolf, A Framework for Inference-Directed Data Mining, Database Security Vol. X: Status and Prospects, (eds., Samarati & Sandhu) IFIP, (1997) pp. 229-239.
    • (1997) Database Security , pp. 229-239
    • Hinke, T.1    Delugach, H.2    Wolf, R.3
  • 8
    • 1642325969 scopus 로고    scopus 로고
    • Bayesian Methods Applied to the Database Inference Problem
    • on Database Security, Greece
    • L. Chang and I.S. Moskowitz, Bayesian Methods Applied to the Database Inference Problem, Proc. IFIPWG11.3Working Conf. on Database Security, Greece, 1998.
    • (1998) Proc. Ifipwg11.3Working Conf
    • Chang, L.1    Moskowitz, I.S.2
  • 9
    • 84963903295 scopus 로고    scopus 로고
    • Parsimonious Downgrading and Decision Trees Applied to the Inference Problem
    • Charlottesville, Virginia
    • L. Chang and I.S. Moskowitz, Parsimonious Downgrading and Decision Trees Applied to the Inference Problem, Proc. New Security Paradigms 1998, Charlottesville, Virginia.
    • (1998) Proc. New Security Paradigms
    • Chang, L.1    Moskowitz, I.S.2
  • 12
    • 33645978242 scopus 로고    scopus 로고
    • Security and Data Mining
    • Status and Prospects, IFIP
    • T.Y. Lin, T. Hinke, D. Marks, & B. Thuraisingham, Security and Data Mining, Database Security Vol. 9: Status and Prospects, IFIP, (1996) pp. 391-399.
    • (1996) Database Security , vol.9 , pp. 391-399
    • Lin, T.Y.1    Hinke, T.2    Marks, D.3    Thuraisingham, B.4
  • 13
    • 84950943564 scopus 로고
    • Sequential Imputation and Bayesian Missing Data Problems
    • A. Kong, J. Liu, J. W. Wong, Sequential Imputation and Bayesian Missing Data Problems, Journal of ASA, Vol. 89, No. 425, (1994) pp. 278-288.
    • (1994) Journal of ASA , vol.89 , Issue.425 , pp. 278-288
    • Kong, A.1    Liu, J.2    Wong, J.W.3
  • 14
    • 0030658310 scopus 로고    scopus 로고
    • A Framework for MLS Interoperability, Proc
    • M. Kang, J. Froscher, & I.S. Moskowitz, A Framework for MLS Interoperability, Proc. HASE'96, (1996) pp. 198-205.
    • (1996) HASE , vol.96 , pp. 198-205
    • Kang, M.1    Froscher, J.2    Moskowitz, I.S.3
  • 16
    • 84957868624 scopus 로고    scopus 로고
    • An Information–Theoretic Model for Steganography
    • 98, pp. 306-318, Portland Oregon
    • C. Cachin, An Information–Theoretic Model for Steganography, Proc. 2nd International Workshop, Information Hiding’98, pp. 306-318, Portland Oregon, April 14-17, 1998.
    • (1998) Proc. 2Nd International Workshop, Information Hiding , pp. 14-17
    • Cachin, C.1
  • 20
    • 0027621699 scopus 로고
    • Mining Association Rules between Sets of Items in Large Databases
    • Washington DC
    • R. Agrawal, T. Imielinski, & A. Swami, Mining Association Rules between Sets of Items in Large Databases, Proc. ACMSIGMOD Conference, Washington DC, May 1993.
    • (1993) Proc. ACMSIGMOD Conference
    • Agrawal, R.1    Imielinski, T.2    Swami, A.3
  • 21
    • 84890522850 scopus 로고
    • Communication Theory of Secrecy Systems
    • C. Shannon, Communication Theory of Secrecy Systems, Bell System Technical Journal, v. 28, n. 4, (1949) pp. 656-715.
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.1
  • 22
    • 0001927585 scopus 로고
    • On Information and Sufficiency
    • S. Kullback and R.A. Leibler, On Information and Sufficiency, Ann. Math. Stat., 22:79-86, 1951.
    • (1951) Ann. Math. Stat , vol.22 , pp. 79-86
    • Kullback, S.1    Leibler, R.A.2
  • 24
    • 0004678264 scopus 로고
    • A Model Distance Measure for Talker Clustering and Identification
    • J.T. Foote and H.F. Silverman, A Model Distance Measure for Talker Clustering and Identification, Proc. ICASSP-94, pp. 317-320, 1994.
    • (1994) Proc. ICASSP-94 , pp. 317-320
    • Foote, J.T.1    Silverman, H.F.2
  • 26
    • 84947937230 scopus 로고
    • An Extended Memoryless Inference Control Model: Partial-Table Level Suppression, Proc
    • S. Hansen and E. Unger, An Extended Memoryless Inference Control Model: Partial-Table Level Suppression, Proc. 1991 Symp. Applied Comp., pp. 142-149.
    • (1991) Symp. Applied Comp , pp. 142-149
    • Hansen, S.1    Unger, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.