International Journal of Soft Computing

Year: 2017
Volume: 12
Issue: 2
Page No. 112 - 119

UML Modeling of Securing Sensitive Data by Inference Control Method

Authors : Anurag , Deepak Arora and Upendra Kumar

References

Accorsi, R. and G. Muller, 2013. Preventive inference control in data-centric business models. Proceedings of the Workshops on Security and Privacy (SPW), May 23-24, 2013, IEEE, New York, USA., ISBN:978-1-4799-0458-7, pp: 28-33.

Jagannathan, G. and R.N. Wright, 2007. Private inference control for aggregate database queries. Proceedings of the 7th IEEE International Conference on Data Mining Workshops, October 28-31, 2007, IEEE, New York, USA., ISBN:978-0-7695-3019-2, pp: 711-716.

Jalote, P., 1997. An Integrated Approach to Software Engineering. 2nd Edn., Springer, Berlin, Heidelberg, New York, ISBN: 9780387948997, Pages: 497.

Lawrence, S., 2003. Software Engineering Theory and Practices. 2nd Edn., Pearson Education, Upper Saddle River, New Jersey, USA.,.

Paci, F. and N. Zannone, 2015. Preventing information inference in access control. Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, June 1-3, 2015, ACM, New York, USA., ISBN:978-1-4503-3556-0, pp: 87-97.

Pressman, R.S., 2005. Software Engineering: A Practitioners Approach. 6th Edn., McGraw-Hill, Boston, ISBN: 978-0071238403, pp: 1-880.

Sommerville, I., 2004. Software Engineering. 6th Edn., Pearson Education, Upper Saddle River, New Jersey, USA.,.

Thuraisingham, B., T. Cadenhead, M. Kantarcioglu and V. Khadilkar, 2014. Secure Data Provenance and Inference Control with Semantic Web. CRC Press, Boca Raton, Florida, USA., Pages: 429.

Thuraisingham, B., W. Ford, M. Collins and J. O'Keeffe, 1993. Design and implementation of a database inference controller. Data Knowl. Eng., 11: 271-297.
Direct Link  |  

Turkanovic, M., T.W. Druzovec and M. Holbl, 2015. Inference attacks and control on database structures. TEM. J., 4: 1-13.
Direct Link  |  

Waman, S.J., 2009. Software Engineering Principal and Practices. McGraw-Hill, New York, USA.,.

Xu, L., C. Jiang, J. Wang, J. Yuan and Y. Ren, 2014. Information security in big data: Privacy and data mining. IEEE. Access, 2: 1149-1176.
CrossRef  |  Direct Link  |  

Zhang, N. and W. Zhao, 2007. Privacy-preserving data mining systems. Comput., 40: 52-58.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved