|
Dorothy E. Denning:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Nabil R. Adam:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Which papers of Nabil R. Adam cite Dorothy E. DenningOrdered by citing publication[Change the order to 'ordered by cited']
-
Nabil R. Adam, John C. Wortmann
Security-Control Methods for Statistical Databases: A Comparative Study. [Citation Graph (15, 34)][DBLP] ACM Comput. Surv., 1989, v:21, n:4, pp:515-556 [Journal] Cites:
-
Dorothy E. Denning
A Security Model for the Statistical Database Problem. [Citation Graph (4, 17)][DBLP] SSDBM, 1983, pp:368-390 [Conf]
-
Dorothy E. Denning, Jan Schlörer
Inference Controls for Statistical Databases. [Citation Graph (15, 0)][DBLP] IEEE Computer, 1983, v:16, n:7, pp:69-82 [Journal]
-
Dorothy E. Denning
Secure Statistical Databases with Random Sample Queries. [Citation Graph (21, 12)][DBLP] ACM Trans. Database Syst., 1980, v:5, n:3, pp:291-315 [Journal]
-
Dorothy E. Denning, Peter J. Denning, Mayer D. Schwartz
The Tracker: A Threat to Statistical Database Security. [Citation Graph (29, 10)][DBLP] ACM Trans. Database Syst., 1979, v:4, n:1, pp:76-96 [Journal]
-
Dorothy E. Denning, Jan Schlörer
A Fast Procedure for Finding a Tracker in a Statistical Database. [Citation Graph (13, 7)][DBLP] ACM Trans. Database Syst., 1980, v:5, n:1, pp:88-102 [Journal]
-
Mayer D. Schwartz, Dorothy E. Denning, Peter J. Denning
Linear Queries in Statistical Databases. [Citation Graph (12, 6)][DBLP] ACM Trans. Database Syst., 1979, v:4, n:2, pp:156-167 [Journal]
|