Search the dblp DataBase
Murat Kantarcioglu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ismail H. Toroslu , Murat Kantarcioglu Mining Cyclically Repeated Patterns. [Citation Graph (0, 0)][DBLP ] DaWaK, 2001, pp:83-92 [Conf ] Murat Kantarcioglu , Chris Clifton Security Issues in Querying Encrypted Data. [Citation Graph (0, 0)][DBLP ] DBSec, 2005, pp:325-337 [Conf ] Chris Clifton , Murat Kantarcioglu , AnHai Doan , Gunther Schadow , Jaideep Vaidya , Ahmed K. Elmagarmid , Dan Suciu Privacy-preserving data integration and sharing. [Citation Graph (0, 0)][DBLP ] DMKD, 2004, pp:19-26 [Conf ] Murat Kantarcioglu , Chris Clifton Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data. [Citation Graph (0, 0)][DBLP ] DMKD, 2002, pp:- [Conf ] Murat Kantarcioglu , Chris Clifton Assuring privacy when big brother is watching. [Citation Graph (0, 0)][DBLP ] DMKD, 2003, pp:88-93 [Conf ] Rakesh Agrawal , Dmitri Asonov , Murat Kantarcioglu , Yaping Li Sovereign Joins. [Citation Graph (0, 0)][DBLP ] ICDE, 2006, pp:26- [Conf ] Murat Kantarcioglu , Jiashun Jin , Chris Clifton When do data mining results violate privacy? [Citation Graph (0, 0)][DBLP ] KDD, 2004, pp:599-604 [Conf ] Murat Kantarcioglu , Chris Clifton Privately Computing a Distributed k-nn Classifier. [Citation Graph (0, 0)][DBLP ] PKDD, 2004, pp:279-290 [Conf ] Wen-Syan Li , Kemal Altintas , Murat Kantarcioglu On demand synchronization and load distribution for database grid-based Web applications. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2004, v:51, n:3, pp:295-323 [Journal ] Chris Clifton , Murat Kantarcioglu , Jaideep Vaidya , Xiaodong Lin , Michael Y. Zhu Tools for Privacy Preserving Data Mining. [Citation Graph (0, 0)][DBLP ] SIGKDD Explorations, 2002, v:4, n:2, pp:28-34 [Journal ] Murat Kantarcioglu , Chris Clifton Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2004, v:16, n:9, pp:1026-1037 [Journal ] Mustafa Canim , Murat Kantarcioglu Design and Analysis of Querying Encrypted Data in Relational Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 2007, pp:177-194 [Conf ] Ryan Layfield , Murat Kantarcioglu , Bhavani M. Thuraisingham Enforcing Honesty in Assured Information Sharing Within a Distributed System. [Citation Graph (0, 0)][DBLP ] DBSec, 2007, pp:113-128 [Conf ] Ebru Celikel , Murat Kantarcioglu , Bhavani M. Thuraisingham , Elisa Bertino Managing Risks in RBAC Employed Distributed Environments. [Citation Graph (0, 0)][DBLP ] OTM Conferences (2), 2007, pp:1548-1566 [Conf ] Jaideep Vaidya , Murat Kantarcioglu , Chris Clifton Privacy-preserving Naïve Bayes classification. [Citation Graph (0, 0)][DBLP ] VLDB J., 2008, v:0, n:, pp:- [Journal ] The Challenge of Assuring Data Trustworthiness. [Citation Graph (, )][DBLP ] Scalable and Efficient Reasoning for Enforcing Role-Based Access Control. [Citation Graph (, )][DBLP ] Private record matching using differential privacy. [Citation Graph (, )][DBLP ] Real-Time Knowledge Discovery and Dissemination for Intelligence Analysis. [Citation Graph (, )][DBLP ] Privacy Preserving Decision Tree Mining from Perturbed Data. [Citation Graph (, )][DBLP ] A Hybrid Approach to Private Record Linkage. [Citation Graph (, )][DBLP ] Using Anonymized Data for Classification. [Citation Graph (, )][DBLP ] Privacy-Preserving Data Mining Applications in the Malicious Model. [Citation Graph (, )][DBLP ] Simulating bioterrorism through epidemiology approximation. [Citation Graph (, )][DBLP ] Design of a temporal geosocial semantic web for military stabilization and reconstruction operations. [Citation Graph (, )][DBLP ] An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining. [Citation Graph (, )][DBLP ] A Privacy-Preserving Framework for Integrating Person-Specific Databases. [Citation Graph (, )][DBLP ] A semantic web based framework for social network access control. [Citation Graph (, )][DBLP ] An Approach to Evaluate Data Trustworthiness Based on Data Provenance. [Citation Graph (, )][DBLP ] Query Processing Techniques for Compliance with Data Confidence Policies. [Citation Graph (, )][DBLP ] Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning. [Citation Graph (, )][DBLP ] A Hybrid Technique for Private Location-Based Queries with Database Protection. [Citation Graph (, )][DBLP ] Inferring private information using social network data. [Citation Graph (, )][DBLP ] Incentive and Trust Issues in Assured Information Sharing. [Citation Graph (, )][DBLP ] Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations. [Citation Graph (, )][DBLP ] Transforming semi-honest protocols to ensure accountability. [Citation Graph (, )][DBLP ] The applicability of the perturbation based privacy preserving data mining for real-world data. [Citation Graph (, )][DBLP ] Formal anonymity models for efficient privacy-preserving joins. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.301secs