The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Traian Marius Truta: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Alina Campan, Gabriela Serban, Traian Marius Truta, Andrian Marcus
    An Algorithm for the Discovery of Arbitrary Length Ordinal Association Rules. [Citation Graph (0, 0)][DBLP]
    DMIN, 2006, pp:107-113 [Conf]
  2. Traian Marius Truta, Bindu Vinay
    Privacy Protection: p-Sensitive k-Anonymity Property. [Citation Graph (0, 0)][DBLP]
    ICDE Workshops, 2006, pp:94- [Conf]
  3. Traian Marius Truta, Farshad Fotouhi, Daniel C. Barth-Jones
    Disclosure risk measures for the sampling disclosure control method. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:301-306 [Conf]
  4. Traian Marius Truta, Alina Campan
    K-anonymization incremental maintenance and optimization techniques. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:380-387 [Conf]
  5. Traian Marius Truta, Farshad Fotouhi, Daniel C. Barth-Jones
    Disclosure Risk Measures for Microdata. [Citation Graph (0, 0)][DBLP]
    SSDBM, 2003, pp:15-22 [Conf]
  6. Traian Marius Truta, Farshad Fotouhi, Daniel C. Barth-Jones
    Assessing global disclosure risk in masked microdata. [Citation Graph (0, 0)][DBLP]
    WPES, 2004, pp:85-93 [Conf]
  7. Traian Marius Truta, Farshad Fotouhi, Daniel C. Barth-Jones
    Privacy and confidentiality management for the microaggregation disclosure control method: disclosure risk and information loss measures. [Citation Graph (0, 0)][DBLP]
    WPES, 2003, pp:21-30 [Conf]
  8. Traian Marius Truta, Alina Campan, Paul Meyer
    Generating Microdata with P -Sensitive K -Anonymity Property. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:124-141 [Conf]

  9. A Clustering Approach for Achieving Data Privacy. [Citation Graph (, )][DBLP]


  10. P-Sensitive K-Anonymity for Social Networks. [Citation Graph (, )][DBLP]


  11. Protecting privacy in recorded conversations. [Citation Graph (, )][DBLP]


  12. Data and Structural k-Anonymity in Social Networks. [Citation Graph (, )][DBLP]


  13. User-controlled generalization boundaries for p-sensitive k-anonymity. [Citation Graph (, )][DBLP]


Search in 0.056secs, Finished in 0.056secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002