Items where Subject is "280000 Information, Computing and Communication Sciences > 280100 Information Systems > 280108 Database Management"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors Name | Item Type
Jump to: D | H | L | S
Number of items at this level: 13.

D

Dekeyser, Stijn and Watson, Richard and Motroen, Lasse (2008) A model, schema, and interface for metadata file systems. In: 31st Australasian Computer Science Conference (ACSC 2008), 22-25 Jan 2008, Wollongong, Australia.

de Raadt, Michael and Dekeyser, Stijn and Lee, Tien Y. (2007) A system employing peer review and enhanced computer assisted assessment of querying skills. Informatics in Education, 6 (1). pp. 163-178. ISSN 1648-5831

H

Hart, Caroline (2008) The conjurer's new card trick and the illusion of privacy: a discussion of the privacy and transparency issues associated with the proposed Australian Government Health and Social Services Access Card. University of Tasmania Law Review, 25 (1). pp. 5-43. ISSN 0082-2108

L

Li, Jiuyong and Huang, Xiaodi and Selke, Clinton and Yong, Jianming (2007) A fast algorithm for finding correlation clusters in noise data. In: 11th Pacific-Asia Conference on Knowledge Discovery and Data Mining: Advances in Knowledge Discovery and Data Mining (PAKDD2007, 22-25 May 2007, Nanjing, China.

Li, Jiuyong and Wang, Hua and Jin, Huidong and Yong, Jianming (2006) Current developments of k-anonymous data releasing. In: National e-Health Privacy and Security Symposium 2006, 24-26 October 2006, Brisbane.

Li, Min and Sun, Xiaoxun and Wang, Hua and Zhang, Yanchun (2009) Optimal privacy-aware path in hippocratic databases. In: DASFAA 2009: 14th International Conference on Database Systems for Advanced Applications, 21-23 Apr 2009, Brisbane, Australia.

Li, Min and Wang, Hua (2008) ABDM: an extended flexible delegation model in RBAC. In: 8th IEEE International Conference on Computer and Information Technology, 8-11 Jul 2008, Sydney, Australia.

Li, Min and Wang, Hua and Plank, Ashley (2009) Privacy-aware access control with generalization boundaries. In: 32nd Australasian Computer Science Conference (ACSC 2009), 19-23 Jan 2009, Wellington, New Zealand.

Li, Min and Wang, Hua and Plank, Ashley and Yong, Jianming (2008) Advanced permission-role relationship in role-based access control. In: ACISP 2008:13th Australasian Conference on Information Security and Privacy , 7-9 Jul 2008, Wollongong, Australia.

Li, Min and Wang, Hua and Ross, David (2009) Trust-based access control for privacy protection in collaborative environment. In: ICEBE 2009: IEEE International Conference on e-Business Engineering, 21-23 Oct 2009, Macau, China.

S

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong (2009) Injecting purpose and trust into data anonymisation. In: CIKM 2009: 18th ACM International Conference on Information and Knowledge Management , 2-6 Nov 2009, Hong Kong, China.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong and Ross, David (2009) Achieving p-sensitive k-anonymity via anatomy. In: ICEBE 2009: IEEE International Conference on e-Business Engineering , 21-23 Oct 2009, Macau, China.

Sun, Xiaoxun and Wang, Hua and Sun, Lili (2009) Extended K-anonymity models against attribute disclosure. In: NSS 2009: 3rd International Conference on Network and System Security, 19-21 Oct 2009, Gold Coast, Australia.

This list was generated on Sat Nov 22 23:33:19 2014 EST.