Author:
Wang Da-Wei,Liau Churn-Jung,Hsu Tsan-sheng
Subject
Information Systems and Management
Reference59 articles.
1. D. Agrawal, C.C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms, in: Proceedings of the 12th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2001, pp. 247–255.
2. Network Flows: Theory, Algorithms, and Applications;Ahuja,1993
3. Disclosure control of microdata;Bethlehem;Journal of the American Statistical Association,1990
4. A general framework for time granularity and its application to temporal reasoning;Bettini;Annals of Mathematics and Artificial Intelligence,1998
5. P. Bieber, F. Cuppens, A definition of secure dependencies using the logic of security, in: Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991, pp. 2–11.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献