共 24 条
- [1] ADAM NR, 1989, COMPUT SURV, V21, P515, DOI 10.1145/76894.76895
- [2] Agrawal D., 2001, Proceedings of the 20th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, P247, DOI DOI 10.1145/375551.375602
- [3] [Anonymous], 2000, Privacy-preserving data mining, DOI DOI 10.1145/342009.335438
- [4] Atallah M., 1999, PROC 1999 WORKSHOP K, P45, DOI DOI 10.1109/KDEX.1999.836532
- [5] CHANG L, 2000, DATA APPL SECURITY, P161
- [6] Chang LW, 1999, NEW SECURITY PARADIGMS WOEKSHOP, PROCEEDINGS, P82
- [7] CHEUNG DW, 1996, P 1996 INT C PAR DIS
- [8] Clifton C, 1996, ACM SIGMOD WORKSH RE, P15
- [9] Clifton C., 2002, SIGKDD EXPLORATIONS, V4
- [10] Dasseni E., 2001, Information Hiding, Proceedings of the 4th International Workshop, IH 2001, Pittsburgh, PA, USA, 25-27 April 2001, P369, DOI DOI 10.1007/3-540-45496-9_27