共 24 条
[1]
ADAM NR, 1989, COMPUT SURV, V21, P515, DOI 10.1145/76894.76895
[2]
Agrawal D., 2001, Proceedings of the 20th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, P247, DOI DOI 10.1145/375551.375602
[3]
[Anonymous], 2000, Privacy-preserving data mining, DOI DOI 10.1145/342009.335438
[4]
Atallah M., 1999, PROC 1999 WORKSHOP K, P45, DOI DOI 10.1109/KDEX.1999.836532
[5]
CHANG L, 2000, DATA APPL SECURITY, P161
[6]
Chang LW, 1999, NEW SECURITY PARADIGMS WOEKSHOP, PROCEEDINGS, P82
[7]
CHEUNG DW, 1996, P 1996 INT C PAR DIS
[8]
Clifton C, 1996, ACM SIGMOD WORKSH RE, P15
[9]
Clifton C., 2002, SIGKDD EXPLORATIONS, V4
[10]
Dasseni E., 2001, Information Hiding, Proceedings of the 4th International Workshop, IH 2001, Pittsburgh, PA, USA, 25-27 April 2001, P369, DOI DOI 10.1007/3-540-45496-9_27