Author:
Mohammed Noman,Fung Benjamin C. M.,Debbabi Mourad
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems
Reference61 articles.
1. Adam N.R., Wortman J.C.: Security control methods for statistical databases. ACM Comput. Surv. 21(4), 515–556 (1989)
2. Agrawal, R., Terzi, E.: On honesty in sovereign information sharing. In: Proceedings of the EDBT (2006)
3. Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: Proceedings of ACM SIGMOD, San Diego, CA (2003)
4. Axelrod R.: The Evolution of Cooperation. Basic Books, New York (1984)
5. Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE (2005)
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献