Databases Reference
In-Depth Information
2. R. Agrawal and R. Srikant. Privacy-preserving data mining. In Proceedings
of the Nineteenth ACM SIGMOD Conference on Management of Data (SIG-
MOD'00) , pages 439-450, 2000.
3. R. Agrawal, R. Srikant, and D. Thomas. Privacy-preserving olap. In Proceed-
ings of the Twenty-fourth ACM SIGMOD Conference on Management of Data
(SIGMOD'05) , pages 251-262, 2005.
4. L.L. Beck. A security mechanism for statistical databases. ACM Trans. on
Database Systems , 5(3):316-338, 1980.
5. B. Bhargava. Security in data warehousing (invited talk). In Proceedings of the
3rd Data Warehousing and Knowledge Discovery (DaWak'00) , 2000.
6. F.Y. Chin. Security problems on inference control for sum, max, and min queries.
Journal of the Association for Computing Machinery , 33(3):451-464, 1986.
7. F.Y. Chin and G. Ozsoyoglu.
Statistical database design.
ACM Trans. on
Database Systems , 6(1):113-139, 1981.
8. F.Y. Chin and G. Ozsoyoglu. Auditing and inference control in statistical
databases. IEEE Trans. on Software Engineering , 8(6):574-582, 1982.
9. E.F. Codd, S.B. Codd, and C.T. Salley. Providing olap to user-analysts: An IT
mandate. White Paper, 1993. E.F. Codd Associates.
10. L.H. Cox.
On properties of multi-dimensional statistical tables.
Journal of
Statistical Planning and Inference , 117(2):251-273, 2003.
11. D.E. Denning. Cryptography and data security . Addison-Wesley, Reading, Mas-
sachusetts, 1982.
12. D.E. Denning and J. Schlorer. Inference controls for statistical databases. IEEE
Computer , 16(7):69-82, 1983.
13. D. Dobkin, A.K. Jones, and R.J. Lipton. Secure databases: protection against
user influence. ACM Trans. on Database Systems , 4(1):97-106, 1979.
14. W. Du and Z. Zhan. Building decision tree classifier on private data. In Proceed-
ings of the 2002 IEEE International Conference on Data Mining (ICDM'02) ,
2002.
15. J. Gray, A. Bosworth, A. Bosworth, A. Layman, D. Reichart, M. Venkatrao,
F. Pellow, and H. Pirahesh. Data cube: A relational aggregation operator gen-
eralizing group-by, cross-tab, and sub-totals. Data Mining and Knowledge Dis-
covery , 1(1):29-53, 1997.
16. P. Griths and B.W. Wade.
An authorization mechanism for a relational
database system.
ACM Transactions on Database Systems , 1(3):242-255,
September 1976.
17. J. Han. OLAP mining: Integration of OLAP with data mining. In IFIP Conf.
on Data Semantics , pages 1-11, 1997.
18. V. Harinarayan, A. Rajaraman, and J.D. Ullman. Implementing data cubes e-
ciently. In Proceedings of the Fifteenth ACM SIGMOD international conference
on Management of data (SIGMOD'96) , pages 205-227, 1996.
19. K. Hoffman. Linear Algebra . Prentice-Hall, Englewood Cliffs, New Jersey, 1961.
20. S. Jajodia, P. Samarati, M.L. Sapino, and V.S. Subrahmanian. Flexible support
for multiple access control policies. ACM Transactions on Database Systems ,
26(4):1-57, dec 2001.
21. J.M. Mateo-Sanz and J. Domingo-Ferrer. A method for data-oriented multi-
variate microaggregation. In Proceedings of the Conference on Statistical Data
Protection'98 , pages 89-99, 1998.
Search WWH ::




Custom Search