Author of the publication

WiP: A Distributed Approach for Statistical Disclosure Control Technologies.

, , and . ICISS, volume 13146 of Lecture Notes in Computer Science, page 142-153. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Enabling Smart Government: A Legal Logistics Framework for Future Criminal Justice Systems., , , , and . DG.O, page 293-302. ACM, (2016)A Conceptual Framework for Addressing IoT Threats: Challenges in Meeting Challenges., , , , , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2018)Towards Applying Design-Thinking for Designing Privacy-Protecting Information Systems., and . TPS-ISA, page 196-202. IEEE, (2019)Context sensitive access control., , , , and . SACMAT, page 111-119. ACM, (2005)Maturing Pay-as-you-go Data Quality Management: Towards Decision Support for Paying the Larger Bills., , , and . DATA (Revised Selected Papers), volume 737 of Communications in Computer and Information Science, page 102-124. Springer, (2016)On Usage Control in Relational Database Management Systems - Obligations and Their Enforcement in Joining Datasets., , and . ICISSP, page 190-201. SciTePress, (2017)Mapping crime descriptions to law articles using deep learning., , , , and . ICEGOV, page 33-43. ACM, (2020)Managing Mobility in Beyond-3G Environments., , and . HSNMC, volume 3079 of Lecture Notes in Computer Science, page 545-555. Springer, (2004)Compressing Large Amounts of NetFlow Data Using a Pattern Classification Scheme., , , , and . BigDataSecurity/HPSC/IDS, page 364-370. IEEE, (2016)Exploring a Warrior Paradigm to Design Out Cybercrime., , , and . EISIC, page 84-90. IEEE Computer Society, (2012)