Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] F. Li, B. Luo, P. Liu, D. Lee, and C.-H. Chu,‖Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing,‖ IEEE Transaction 2013. [2] F. Li, B. Luo, P. Liu, D. Lee, and C.-H. Chu, ―Automaton segmentation:A new approach to preserve privacy in XML information brokering,‖in Proc. ACM CCS’07, 2007, pp. 508–518. [3] E. Damiani, S. di Vimercati, S. Paraboschi, and P.Samarati, ―Securing{XML} documents,‖ in Proc. EDBT 2000, 2000, pp. 121–135. [4] A. Carzaniga, M. J.Rutherford, andA. L.Wolf,―Arouting scheme forcontent-based networking,‖ in Proc.INFOCOM, Hong Kong, 2004,pp. 918–928 [5] Bart Kuijpers, Vanessa Lemmens, Bart Moelans, ―Privacy Preserving ID3 over Horizontally, Vertically and Grid Partitioned Data‖, avrxi0803.155v1 [cs.db], 11 march 2008. Online: http://arxiv.org/pdf/0803.1555.pdf [6] Yaping Li, Minghua Chen, Qiwei Li, And Wei Zhang ―Enabling Multilevel Trust In Privacy Preserving Data Mining‖ , IEEE Transactions On Knowledge And Data Engineering, Vol. 24, No. 9,September 2012. [7] Kawatghare, Mr Mukesh, and Ms Pradnya Kamble. "Review on Enforcing Secure And Privacy Preserving Information Brokering In Distributed Information Sharing", International Conference on Advances in Engineering & Technology (ICAET), ISSN: 2278 -0661, pp. 45-40, 2014. [8] Srinivas, D. "Privacy-Preserving Public Auditing In Cloud Storage Security." International Journal of computer science and Information Technologies,ISSN: 0975-9646, vol. 2, no. 6, pp. 2691-2693, 2011. [9] Li, Fenjun, Bo Luo, Peng Liu, Dongwon Lee, Prasenjit Mitra,Wang-Chien Lee, and Chao-Hsien Chu "In-broker access control:Towards efficient endto-end performance of information brokerage systems", In IEEE International Conference on Sensor Networks,Ubiquitous, and Trustworthy Computing, vol. 1, pp. 1-8-, 2006. [10] Snoeren, Alex C., Kenneth Conley, and David K. Gifford. "Meshbased content routing using XML." ACM SIGOPS OperatingSystems Review 35, no. 5, pp. 160-173, 2001. [11] Koudas, Nick, Michael Rabinovich, Divesh Srivastava, and Ting Yu. "Routing XML queries." In Proceedings of IEEE 20th International Conference on Data Engineering, pp. 844, 2004. [12] Koloniari, Georgia, and Evaggelia Pitoura. "Content-based routing of path queries in peer-topeer systems." In proceedings of Advances in Database Technology-EDBT-2004, pp. 29-47, Springer Berlin Heidelberg, 2004. [9] A. Yao, ―Protocols for secure computations,‖ in Proc. 23rd Ann. IEEE Symp. Foundations of Computer Science, 1982, pp.160–164, IEEE Computer Society. [10] C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu, ―Tools for privacy preserving distributed data mining,‖ ACM SIGKDD Expl
![]() | volume_1_Issue_2_paper_2.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|