Computer Science ›› 2013, Vol. 40 ›› Issue (Z6): 149-152.
Previous Articles Next Articles
ZHOU Cai-xia and CHEN Qi-mai
[1] Wang L,Li Y,Wijesekera D,et al.Cardinality-Based Inference Control in Data Cubes[J].Journal of Computer Security,2004,2(5):655-692 [2] Zhang Da-yong,Zeng Yong,Wang Ling-yu,et al.Modeling and evaluating information leakage caused by inferences in supply c hains[J].2011,2(3):351-363 [3] Wang Ling-yu,Lu H,Deng R H.Practical Inference Control for Data Cubes[C]∥Proceeding of IEEE Transactions on Dependable and Secure Computing.Canana:IEEE Computer Society,2006:115-120 [4] Wijesekera L D,Jajodia S.Inferences in Data Cubes[J].Berlin:Heidelberg,Springer-Verlag,2002,9(1):37-51 [5] Wang Ling-yu,Wijesekera D,Jajodia S.Cardinality-Based Infe-rence Control in Sum-OnlyData Cubes[J].Berlin:Heidelberg,Springer-Verlag,2002,2:55-71 [6] Wang Ling-yu,Wijesekera D,Jajodia S.Parity-based Inference Control for Multi-dimensional Range Sum Queries[J].Journal of Computer Security,2007,15(4):417-445 [7] Wang Ling-yu,Li Ying-jiu.Precisely Answering Multidimen-sional Range Queries Without Privacy Breaches[C]∥Proc.of ESORICS’03.Gjovik,Norway:[s.n.],2003 [8] Wang Ling-yu,Wijesekera D,Jajodia S.Preserving Privacy inOn-line Analytical Processing(OLAP)[M].[S.l.]:Springer-Verlag,2007 [9] 周海晴.陈启买,刘海.基于数据立方体的数据仓库安全控制[J].计算机工程,2010,36(10) [10] 黄晓森,彭利宁,陈启买.基于数据立方体的动态推理控制方法研究[J].计算机工程,2011,7(17) [11] Gray J,Bosworth A,Bosworth A,et al.Data cube:A relational aggregation operator generalizing group-by,cross-tab and sub-totals[J].Data Mining and Knowledge Discovery,1997,1(1):29-53 [12] Donnellan T.Lattice Theory[M].Pergamon Press,Oxford,1968 |
No related articles found! |
|