The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Murat Kantarcioglu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ismail H. Toroslu, Murat Kantarcioglu
    Mining Cyclically Repeated Patterns. [Citation Graph (0, 0)][DBLP]
    DaWaK, 2001, pp:83-92 [Conf]
  2. Murat Kantarcioglu, Chris Clifton
    Security Issues in Querying Encrypted Data. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:325-337 [Conf]
  3. Chris Clifton, Murat Kantarcioglu, AnHai Doan, Gunther Schadow, Jaideep Vaidya, Ahmed K. Elmagarmid, Dan Suciu
    Privacy-preserving data integration and sharing. [Citation Graph (0, 0)][DBLP]
    DMKD, 2004, pp:19-26 [Conf]
  4. Murat Kantarcioglu, Chris Clifton
    Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data. [Citation Graph (0, 0)][DBLP]
    DMKD, 2002, pp:- [Conf]
  5. Murat Kantarcioglu, Chris Clifton
    Assuring privacy when big brother is watching. [Citation Graph (0, 0)][DBLP]
    DMKD, 2003, pp:88-93 [Conf]
  6. Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu, Yaping Li
    Sovereign Joins. [Citation Graph (0, 0)][DBLP]
    ICDE, 2006, pp:26- [Conf]
  7. Murat Kantarcioglu, Jiashun Jin, Chris Clifton
    When do data mining results violate privacy? [Citation Graph (0, 0)][DBLP]
    KDD, 2004, pp:599-604 [Conf]
  8. Murat Kantarcioglu, Chris Clifton
    Privately Computing a Distributed k-nn Classifier. [Citation Graph (0, 0)][DBLP]
    PKDD, 2004, pp:279-290 [Conf]
  9. Wen-Syan Li, Kemal Altintas, Murat Kantarcioglu
    On demand synchronization and load distribution for database grid-based Web applications. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2004, v:51, n:3, pp:295-323 [Journal]
  10. Chris Clifton, Murat Kantarcioglu, Jaideep Vaidya, Xiaodong Lin, Michael Y. Zhu
    Tools for Privacy Preserving Data Mining. [Citation Graph (0, 0)][DBLP]
    SIGKDD Explorations, 2002, v:4, n:2, pp:28-34 [Journal]
  11. Murat Kantarcioglu, Chris Clifton
    Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2004, v:16, n:9, pp:1026-1037 [Journal]
  12. Mustafa Canim, Murat Kantarcioglu
    Design and Analysis of Querying Encrypted Data in Relational Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:177-194 [Conf]
  13. Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thuraisingham
    Enforcing Honesty in Assured Information Sharing Within a Distributed System. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:113-128 [Conf]
  14. Ebru Celikel, Murat Kantarcioglu, Bhavani M. Thuraisingham, Elisa Bertino
    Managing Risks in RBAC Employed Distributed Environments. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2007, pp:1548-1566 [Conf]
  15. Jaideep Vaidya, Murat Kantarcioglu, Chris Clifton
    Privacy-preserving Naïve Bayes classification. [Citation Graph (0, 0)][DBLP]
    VLDB J., 2008, v:0, n:, pp:- [Journal]

  16. The Challenge of Assuring Data Trustworthiness. [Citation Graph (, )][DBLP]


  17. Scalable and Efficient Reasoning for Enforcing Role-Based Access Control. [Citation Graph (, )][DBLP]


  18. Private record matching using differential privacy. [Citation Graph (, )][DBLP]


  19. Real-Time Knowledge Discovery and Dissemination for Intelligence Analysis. [Citation Graph (, )][DBLP]


  20. Privacy Preserving Decision Tree Mining from Perturbed Data. [Citation Graph (, )][DBLP]


  21. A Hybrid Approach to Private Record Linkage. [Citation Graph (, )][DBLP]


  22. Using Anonymized Data for Classification. [Citation Graph (, )][DBLP]


  23. Privacy-Preserving Data Mining Applications in the Malicious Model. [Citation Graph (, )][DBLP]


  24. Simulating bioterrorism through epidemiology approximation. [Citation Graph (, )][DBLP]


  25. Design of a temporal geosocial semantic web for military stabilization and reconstruction operations. [Citation Graph (, )][DBLP]


  26. An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining. [Citation Graph (, )][DBLP]


  27. A Privacy-Preserving Framework for Integrating Person-Specific Databases. [Citation Graph (, )][DBLP]


  28. A semantic web based framework for social network access control. [Citation Graph (, )][DBLP]


  29. An Approach to Evaluate Data Trustworthiness Based on Data Provenance. [Citation Graph (, )][DBLP]


  30. Query Processing Techniques for Compliance with Data Confidence Policies. [Citation Graph (, )][DBLP]


  31. Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning. [Citation Graph (, )][DBLP]


  32. A Hybrid Technique for Private Location-Based Queries with Database Protection. [Citation Graph (, )][DBLP]


  33. Inferring private information using social network data. [Citation Graph (, )][DBLP]


  34. Incentive and Trust Issues in Assured Information Sharing. [Citation Graph (, )][DBLP]


  35. Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations. [Citation Graph (, )][DBLP]


  36. Transforming semi-honest protocols to ensure accountability. [Citation Graph (, )][DBLP]


  37. The applicability of the perturbation based privacy preserving data mining for real-world data. [Citation Graph (, )][DBLP]


  38. Formal anonymity models for efficient privacy-preserving joins. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002