Author:
Agrawal Rakesh,Kiernan Jerry,Srikant Ramakrishnan,Xu Yirong
Reference61 articles.
1. Security-control methods for statistical databases;Adam;ACM Computing Surveys,1989
2. Privacy and human rights;Banisar,2000
3. ADAM: A testbed for exploring the use of data mining in intrusion detection;Barbara;SIGMOD Record,2001
4. A security mechanism for statistical databases;Beck;ACM Transactions on Database Systems,1980
5. Regulating Privacy: Data Protection and Public Policy in Europe and the United States;Bennett,1992
Cited by
198 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Rethinking People Analytics With Inverse Transparency by Design;Proceedings of the ACM on Human-Computer Interaction;2023-09-28
2. Data Engineering Challenges in AI automation;2023 International Conference on Computing, Electronics & Communications Engineering (iCCECE);2023-08-14
3. Large scale proteomic studies create novel privacy considerations;Scientific Reports;2023-06-07
4. Federated Visualization: A Privacy-Preserving Strategy for Aggregated Visual Query;IEEE Transactions on Visualization and Computer Graphics;2023-06-01
5. Data station;Proceedings of the VLDB Endowment;2022-07