Auditing Interval-Based Inference
CAiSE '02 Proceedings of the 14th International Conference on Advanced Information Systems Engineering
Censoring Statistical Tables to Protect Sensitive Information: Easy and Hard Problems
SSDBM '96 Proceedings of the Eighth International Conference on Scientific and Statistical Database Management
Security Problems for Statistical Databases with General Cell Suppressions
SSDBM '97 Proceedings of the Ninth International Conference on Scientific and Statistical Database Management
Cardinality-Based Inference Control in Sum-Only Data Cubes
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
Parity-based inference control for multi-dimensional range sum queries
Journal of Computer Security
Smallest Bipartite Bridge-Connectivity Augmentation (Extended Abstract)
AAIM '07 Proceedings of the 3rd international conference on Algorithmic Aspects in Information and Management
A Robust Sampling-Based Framework for Privacy Preserving OLAP
DaWaK '08 Proceedings of the 10th international conference on Data Warehousing and Knowledge Discovery
Disclosure Analysis and Control in Statistical Databases
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Dynamic inference control in privacy preference enforcement
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
An efficient online auditing approach to limit private data disclosure
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Role based access control for a medical database
SEA '07 Proceedings of the 11th IASTED International Conference on Software Engineering and Applications
An overview of computer security
IBM Systems Journal
Auditing user queries in dynamic statistical databases
Information Sciences: an International Journal
Preventing interval-based inference by random data perturbation
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
New paradigm of inference control with trusted computing
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
The bridge-connectivity augmentation problem with a partition constraint
Theoretical Computer Science
Harmonizing privacy with security principles and practices
IBM Journal of Research and Development
HengHa: data harvesting detection on hidden databases
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
Controlling logical inference in multilevel database systems
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Journal of Computer and System Sciences
Anonymity meets game theory: secure data integration with malicious participants
The VLDB Journal — The International Journal on Very Large Data Bases
Protecting data privacy through hard-to-reverse negative databases
ISC'06 Proceedings of the 9th international conference on Information Security
Policy transformations for preventing leakage of sensitive information in email systems
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Temporal context lie detection and generation
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Auditing and inference control for privacy preservation in uncertain environments
EuroSSC'06 Proceedings of the First European conference on Smart Sensing and Context
Disclosure analysis for two-way contingency tables
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Hi-index | 4.10 |
First Page of the Article