-
1
-
-
84952535404
-
The Risk of Disclosure for Microdata
-
G. Duncan and D. Lambert, The Risk of Disclosure for Microdata, Jour. of Business & Economic Statistics, Vol. 7, No. 2, April 1989, pp. 207-217.
-
(1989)
Jour. Of Business & Economic Statistics
, vol.7
, Issue.2
, pp. 207-217
-
-
Duncan, G.1
Lambert, D.2
-
2
-
-
0026152913
-
Microdata Disclosure Limitation in Statistical Databases: Query Size and Random Sample Query Control
-
on Security and Privacy, Oakland, CA
-
G. Duncan and S. Mukherjee, Microdata Disclosure Limitation in Statistical Databases: Query Size and Random Sample Query Control, Proc. IEEE Symp. on Security and Privacy, Oakland, CA, 1991, pp. 278-287.
-
(1991)
Proc. IEEE Symp
, pp. 278-287
-
-
Duncan, G.1
Mukherjee, S.2
-
3
-
-
84972531331
-
Enhancing Access to Microdata while Protecting Confidentiality: Prospects for the Future
-
G. Duncan and R. Pearson, Enhancing Access to Microdata while Protecting Confidentiality: Prospects for the Future, Statistical Science, Vol. 6, No. 3, 1991, pp. 219-239.
-
(1991)
Statistical Science
, vol.6
, Issue.3
, pp. 219-239
-
-
Duncan, G.1
Pearson, R.2
-
6
-
-
0345780103
-
A Framework for Inference-Directed Data Mining
-
Status and Prospects, (eds., Samarati & Sandhu) IFIP
-
T. Hinke, H. Delugach, & R. Wolf, A Framework for Inference-Directed Data Mining, Database Security Vol. X: Status and Prospects, (eds., Samarati & Sandhu) IFIP, (1997) pp. 229-239.
-
(1997)
Database Security
, pp. 229-239
-
-
Hinke, T.1
Delugach, H.2
Wolf, R.3
-
8
-
-
1642325969
-
Bayesian Methods Applied to the Database Inference Problem
-
on Database Security, Greece
-
L. Chang and I.S. Moskowitz, Bayesian Methods Applied to the Database Inference Problem, Proc. IFIPWG11.3Working Conf. on Database Security, Greece, 1998.
-
(1998)
Proc. Ifipwg11.3Working Conf
-
-
Chang, L.1
Moskowitz, I.S.2
-
9
-
-
84963903295
-
Parsimonious Downgrading and Decision Trees Applied to the Inference Problem
-
Charlottesville, Virginia
-
L. Chang and I.S. Moskowitz, Parsimonious Downgrading and Decision Trees Applied to the Inference Problem, Proc. New Security Paradigms 1998, Charlottesville, Virginia.
-
(1998)
Proc. New Security Paradigms
-
-
Chang, L.1
Moskowitz, I.S.2
-
10
-
-
1642285203
-
A Formal View of the Database Inference Problem
-
M. Mohammadian (Ed.), IOS Press, February
-
I.S. Moskowitz and L. Chang, A Formal View of the Database Inference Problem, Proc. CIMCA’99, Vienna, Computational Intelligence for Modelling, Control & Automation, M. Mohammadian (Ed.), IOS Press, February, 1999, pp. 254-259.
-
(1999)
Proc. CIMCA’99, Vienna, Computational Intelligence for Modelling, Control & Automation
, pp. 254-259
-
-
Moskowitz, I.S.1
Chang, L.2
-
11
-
-
84947922376
-
-
Proc. PADD’99, London, UK
-
I.S. Moskowitz and L. Chang, The Rational Downgrader, Proc. PADD’99, London, UK, Apr. 1999, pp. 159-165.
-
(1999)
The Rational Downgrader
, pp. 159-165
-
-
Moskowitz, I.S.1
Chang, L.2
-
12
-
-
33645978242
-
Security and Data Mining
-
Status and Prospects, IFIP
-
T.Y. Lin, T. Hinke, D. Marks, & B. Thuraisingham, Security and Data Mining, Database Security Vol. 9: Status and Prospects, IFIP, (1996) pp. 391-399.
-
(1996)
Database Security
, vol.9
, pp. 391-399
-
-
Lin, T.Y.1
Hinke, T.2
Marks, D.3
Thuraisingham, B.4
-
13
-
-
84950943564
-
Sequential Imputation and Bayesian Missing Data Problems
-
A. Kong, J. Liu, J. W. Wong, Sequential Imputation and Bayesian Missing Data Problems, Journal of ASA, Vol. 89, No. 425, (1994) pp. 278-288.
-
(1994)
Journal of ASA
, vol.89
, Issue.425
, pp. 278-288
-
-
Kong, A.1
Liu, J.2
Wong, J.W.3
-
14
-
-
0030658310
-
A Framework for MLS Interoperability, Proc
-
M. Kang, J. Froscher, & I.S. Moskowitz, A Framework for MLS Interoperability, Proc. HASE'96, (1996) pp. 198-205.
-
(1996)
HASE
, vol.96
, pp. 198-205
-
-
Kang, M.1
Froscher, J.2
Moskowitz, I.S.3
-
16
-
-
84957868624
-
An Information–Theoretic Model for Steganography
-
98, pp. 306-318, Portland Oregon
-
C. Cachin, An Information–Theoretic Model for Steganography, Proc. 2nd International Workshop, Information Hiding’98, pp. 306-318, Portland Oregon, April 14-17, 1998.
-
(1998)
Proc. 2Nd International Workshop, Information Hiding
, pp. 14-17
-
-
Cachin, C.1
-
17
-
-
84957886335
-
Modeling the Security of Steganographic Systems
-
98, pp. 344-354, Portland Oregon
-
J. Zöllner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, & G. Wolf, Modeling the Security of Steganographic Systems, Proc. 2nd International Workshop, Information Hiding’98, pp. 344-354, Portland Oregon, April 14-17, 1998.
-
(1998)
Proc. 2Nd International Workshop, Information Hiding
, pp. 14-17
-
-
Zöllner, J.1
Federrath, H.2
Klimant, H.3
Pfitzmann, A.4
Piotraschke, R.5
Westfeld, A.6
Wicke, G.7
Wolf, G.8
-
18
-
-
84947939066
-
-
Proc. KDD, NY, NY
-
R. Subramonian, Defining diff as a data mining primitive, Proc. KDD-98, pp. 334-338, NY, NY, 1998.
-
(1998)
Defining Diff as a Data Mining Primitive
, vol.98
, pp. 334-338
-
-
Subramonian, R.1
-
20
-
-
0027621699
-
Mining Association Rules between Sets of Items in Large Databases
-
Washington DC
-
R. Agrawal, T. Imielinski, & A. Swami, Mining Association Rules between Sets of Items in Large Databases, Proc. ACMSIGMOD Conference, Washington DC, May 1993.
-
(1993)
Proc. ACMSIGMOD Conference
-
-
Agrawal, R.1
Imielinski, T.2
Swami, A.3
-
21
-
-
84890522850
-
Communication Theory of Secrecy Systems
-
C. Shannon, Communication Theory of Secrecy Systems, Bell System Technical Journal, v. 28, n. 4, (1949) pp. 656-715.
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.1
-
22
-
-
0001927585
-
On Information and Sufficiency
-
S. Kullback and R.A. Leibler, On Information and Sufficiency, Ann. Math. Stat., 22:79-86, 1951.
-
(1951)
Ann. Math. Stat
, vol.22
, pp. 79-86
-
-
Kullback, S.1
Leibler, R.A.2
-
24
-
-
0004678264
-
A Model Distance Measure for Talker Clustering and Identification
-
J.T. Foote and H.F. Silverman, A Model Distance Measure for Talker Clustering and Identification, Proc. ICASSP-94, pp. 317-320, 1994.
-
(1994)
Proc. ICASSP-94
, pp. 317-320
-
-
Foote, J.T.1
Silverman, H.F.2
-
25
-
-
84955563192
-
Stretching the Limits of Steganography
-
Cambridge, UK
-
R. Anderson, Stretching the Limits of Steganography, Proc. 1st International Workshop, Information Hiding, pp. 39-48, Cambridge, UK, May 30-June 1, 1996.
-
(1996)
Proc. 1St International Workshop, Information Hiding
, vol.30
, Issue.1
, pp. 39-48
-
-
Anderson, R.1
-
26
-
-
84947937230
-
An Extended Memoryless Inference Control Model: Partial-Table Level Suppression, Proc
-
S. Hansen and E. Unger, An Extended Memoryless Inference Control Model: Partial-Table Level Suppression, Proc. 1991 Symp. Applied Comp., pp. 142-149.
-
(1991)
Symp. Applied Comp
, pp. 142-149
-
-
Hansen, S.1
Unger, E.2
|