Krish Muralidhar
Krish Muralidhar
Geverifieerd e-mailadres voor ou.edu
Titel
Geciteerd door
Geciteerd door
Jaar
An empirical investigation of the relationship between change in corporate social performance and financial performance: A stakeholder theory perspective
BM Ruf, K Muralidhar, RM Brown, JJ Janney, K Paul
Journal of business ethics 32 (2), 143-156, 2001
12962001
The development of a systematic, aggregate measure of corporate social performance
BM Ruf, K Muralidhar, K Paul
Journal of Management 24 (1), 119-133, 1998
2861998
A general additive data perturbation method for database security
K Muralidhar, R Parsa, R Sarathy
management science 45 (10), 1399-1415, 1999
2181999
Data shuffling—A new masking approach for numerical data
K Muralidhar, R Sarathy
Management Science 52 (5), 658-670, 2006
1742006
Using the analytic hierarchy process for information system project selection
K Muralidhar, R Santhanam, RL Wilson
Information & Management 18 (2), 87-95, 1990
1651990
Evaluating Laplace noise addition to satisfy differential privacy for numeric data.
R Sarathy, K Muralidhar
Trans. Data Priv. 4 (1), 1-17, 2011
1382011
Security of random data perturbation methods
K Muralidhar, R Sarathy
ACM Transactions on Database Systems (TODS) 24 (4), 487-493, 1999
1031999
Accessibility, security, and accuracy in statistical databases: The case for the multiplicative fixed data perturbation approach
K Muralidhar, D Batra, PJ Kirs
Management Science 41 (9), 1549-1564, 1995
881995
Fool's gold: an illustrated critique of differential privacy
J Bambauer, K Muralidhar, R Sarathy
Vand. J. Ent. & Tech. L. 16, 701, 2013
702013
The security of confidential numerical data in databases
R Sarathy, K Muralidhar
information systems research 13 (4), 389-403, 2002
662002
A theoretical basis for perturbation methods
K Muralidhar, R Sarathy
Statistics and Computing 13 (4), 329-335, 2003
632003
A zero-one goal programming approach for information system project selection
R Santhanam, K Muralidhar, M Schniederjans
Omega 17 (6), 583-593, 1989
601989
Perturbing nonnormal confidential attributes: The copula approach
R Sarathy, K Muralidhar, R Parsa
Management Science 48 (12), 1613-1627, 2002
542002
Secure and useful data sharing
R Sarathy, K Muralidhar
Decision Support Systems 42 (1), 204-220, 2006
512006
New directions in anonymization: permutation paradigm, verifiability by subjects and intruders, transparency to users
J Domingo-Ferrer, K Muralidhar
Information Sciences 337, 11-24, 2016
502016
Generating Sufficiency-based Non-Synthetic Perturbed Data.
K Muralidhar, R Sarathy
Trans. Data Priv. 1 (1), 17-33, 2008
472008
Describing processing time when simulating JIT environments
K Muralidhar, SR SWENSETHJ, RL WILSON
THE INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH 30 (1), 1-11, 1992
441992
An improved security requirement for data perturbation with implications for e‐commerce
K Muralidhar, R Sarathy, R Parsa
Decision Sciences 32 (4), 683-698, 2001
432001
Some additional insights on applying differential privacy for numeric data
R Sarathy, K Muralidhar
International Conference on Privacy in Statistical Databases, 210-219, 2010
402010
Does differential privacy protect terry gross’ privacy?
K Muralidhar, R Sarathy
International Conference on Privacy in Statistical Databases, 200-209, 2010
372010
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20