1[1]Han Jiawei,Kamber M. Data Mining Concepts and Techniques.Morgan Kaufmann Publishers, Inc. 2001
2[2]Thuraisingham T. Data Mining Technologies, Techniques,Tools, and Trends. CRC Press, 1999
3[3]Liu P,Jajodia S,McCollum C D. Intrusion Confinement by Isolation in Information Systems. in Research Advances in Database and Information System Security, Vijayalakshmi Atluri, John Hale, eds. Kluwer Academic Publishers,2000
4[4]Morgenstern M. Security and Interference in Multilevel Database and Knowledge Base Systems. In:Proc. of the 1987 ACM SIGMOD Conference, San Francisco, CA, June 1987
5[5]Thuraisingham B. Security Checking in Relational Database Systems Augmented by an Interference Engine. Computers and Security, Vol. 6,1987
6[6]Hinke T. Interference and Aggregation Detection in Database Management Systems. In:Proc. of the 1988 Conf. on Security and Privacy, Oakland, CA, April 1988
7[7]Clifton C, Marks D. Security and Privacy Implications of Data Mining. ACM SIGMOD Workshop on Data Mining and Knowledge Discovery, Montreal, Canada, June 2 , 1996
8[8]Thuraisingham B. Design and Implementation of a Database Interference Controller. Data and Knowledge Engineering Journal,North Holland, 1993 (8)
9[9]Agrawal R, Srikant R. Privacy-Preserving Data Mining. In: Proc.Of the ACM SIGMOD Conf. on Management of Data, Dallas,May 2000
10[10]Dawson S, et al. Maximizing Sharing of Protected Information.Journal of Computer and System Sciences, 2001