| 
                Shaoxu Song, Lei Chen, "Efficient discovery  of similarity constraints for matching dependencies", Data & Knowledge  Engineering, Elsevier,2013.
 S. Abiteboul, R. Hull, V. Vianu, Foundations of  Databases, Addison-Wesley, 1995.
 R. Agrawal, T. Imielinski, A.N. Swami, Mining  association rules between sets of items in large databases, SIGMOD Conference,  1993, pp.207–216.
 R. Bassée, J. Wijsen, Neighborhood dependencies  for prediction, PAKDD, 2001, pp. 562–567.
 C. Batini, M. Scannapieco, Data quality:  concepts, methodologies and techniques, Data-Centric Systems and Applications,  Springer, 2006.
 L.E. Bertossi, S. Kolahi, L.V.S. Lakshmanan,  Data cleaning and query answering with matching dependencies and matching  functions, ICDT,2011, pp. 268–279.
 M. Bilenko, R.J. Mooney, W.W. Cohen, P.  Ravikumar, S.E. Fienberg, Adaptive name matching in information integration,  IEEE IntelligentSystems 18 (5) (2003) 16–23.
 D. Bitton, J. Millman, S. Torgersen, A  feasibility and performance study of dependency inference, ICDE, 1989, pp.  635–641.
 P. Bohannon, W. Fan, F. Geerts, X. Jia, A.  Kementsietsidis, Conditional functional dependencies for data cleaning, ICDE,  2007, pp. 746–755.
 L. Bravo, W. Fan, F. Geerts, S. Ma, Increasing  the expressivity of conditional functional dependencies without extra  complexity, ICDE, 2008,pp. 516–525.
 L. Bravo, W. Fan, S. Ma, Extending dependencies  with conditions, VLDB, 2007, pp. 243–254.
 T. Calders, R.T. Ng, J. Wijsen, Searching for  dependencies at multiple abstraction levels, ACM Transactions on Database  Systems 27 (3)(2002) 229–260.
 F. Chiang, R.J. Miller, Discovering data quality  rules, PVLDB 1 (1) (2008) 1166–1177.
 W.W. Cohen, Integration of heterogeneous  databases without common domains using queries based on textual similarity,  SIGMODConference, 1998, pp. 201–212.
 G. Cong, W. Fan, F. Geerts, X. Jia, S. Ma,  Improving data quality: consistency and accuracy, VLDB, 2007, pp. 315–326.
 A.K. Elmagarmid, P.G. Ipeirotis, V.S. Verykios,  Duplicate record detection: a survey, IEEE Transactions on Knowledge and Data  Engineering19 (1) (2007) 1–16.
 W. Fan, Dependencies revisited for improving  data quality, PODS, 2008, pp. 159–170.
 W. Fan, H. Gao, X. Jia, J. Li, S. Ma, Dynamic  constraints for record matching, The VLDB Journal (2010) 1–26.
 W. Fan, F. Geerts, L.V.S. Lakshmanan, M. Xiong,  Discovering conditional functional dependencies, ICDE, 2009, pp. 1231–1234.
 W. Fan, J. Li, X. Jia, S. Ma, Reasoning about  record matching rules, PVLDB, 2009.
 W. Fan, J. Li, S. Ma, N. Tang, W. Yu,  Interaction between record matching and data repairing, SIGMOD Conference,  2011, pp. 469–480.
 W. Fan, S. Ma, Y. Hu, J. Liu, Y. Wu, Propagating  functional dependencies with conditions, PVLDB 1 (1) (2008) 391–407.
 P.A. Flach, I. Savnik, Database dependency  discovery: a machine learning approach, AI Communications 12 (3) (1999)  139–160.
 J. Gardezi, L.E. Bertossi, I. Kiringa, Matching  dependencies with arbitrary attribute values: semantics, query answering and  integrityconstraints, LID, 2011, pp. 23–30.
 C. Giannella, E.L. Robertson, On approximation  measures for functional dependencies, Information Systems 29 (6) (2004)  483–507.
 L. Golab, H.J. Karloff, F. Korn, A. Saha, D.  Srivastava, Sequential dependencies, PVLDB 2 (1) (2009) 574–585.
 L. Golab, H.J. Karloff, F. Korn, D. Srivastava,  B. Yu, On generating near-optimal tableaux for conditional functional  dependencies, PVLDB 1(1) (2008) 376–390.
 L. Gravano, P.G. Ipeirotis, N. Koudas, D.  Srivastava, Text joins in an rdbms for web data integration, WWW, 2003, pp.  90–101.
 Y. Huhtala, J. Kärkkäinen, P. Porkka, H.  Toivonen, Efficient discovery of functional and approximate dependencies using  partitions, ICDE,1998, pp. 392–401.
 Y. Huhtala, J. Kärkkäinen, P. Porkka, H.  Toivonen, Tane: an efficient algorithm for discovering functional and approximate  dependencies,The Computer
 I.F. Ilyas, V. Markl, P.J. Haas, P. Brown, A.  Aboulnaga, Cords: automatic discovery of correlations and soft functional  dependencies,SIGMOD Conference, 2004, pp. 647–658.
 R.S. King, J.J. Legendre, Discovery of  functional and approximate functional dependencies in relational databases,  JAMDS 7 (1) (2003) 49–59.
 J. Kivinen, H. Mannila, Approximate inference of  functional dependencies from relations, Theoretical Computer Science 149 (1)  (1995) 129–149.
 N. Koudas, A. Saha, D. Srivastava, S.  Venkatasubramanian, Metric functional dependencies, ICDE, 2009, pp. 1275–1278.
 S. Kramer, B. Pfahringer, Efficient search for  strong partial determinations, KDD, 1996, pp. 371–374.
 S.E. Madnick, H. Zhu, Improving data quality  through effective use of data semantics, Data & Knowledge Engineering 59  (2) (2006) 460–475.
 H. Mannila, K.-J. Räihä, Design of Relational  Databases, Addison-Wesley, 1992.
 H. Mannila, K.-J. Räihä, Algorithms for  inferring functional dependencies from relations, Data & Knowledge  Engineering 12 (1) (1994) 83–99.
 McCallum, K. Nigam, L.H. Ungar, Efficient  clustering of high-dimensional data sets with application to reference  matching, KDD, 2000,pp. 169–178.
 G. Navarro, A guided tour to approximate string  matching, ACM Computing Surveys 33 (1) (2001) 31–88.
 B. Pfahringer, S. Kramer, Compression-based  evaluation of partial determinations, KDD, 1995, pp. 234–239.
 T. Scheffer, Finding association rules that  trade support optimally against confidence, Intelligent Data Analysis 9 (4)  (2005) 381–395.
 J.C. Schlimmer, Efficiently inducing  determinations: a complete and systematic search algorithm that uses optimal  pruning, ICML, 1993, pp.284–290.
 S. Song, L. Chen, Discovering matching  dependencies, CIKM, 2009, pp. 1421–1424.
 S. Song, L. Chen, Differential dependencies:  reasoning and discovery, ACM Transactions on Database Systems 36 (4) (2011).
 S. Song, L. Chen, P.S. Yu, On data dependencies  in dataspaces, ICDE, 2011, pp. 470–481.
 U. ul Hassan, S. O'Riain, E. Curry, Leveraging  matching dependencies for guided user feedback in linked data applications,  Proceedings of theNinth International Workshop on Information Integration on  the Web, IIWeb '12, ACM, New York, NY, USA, 2012, pp. 5:1–5:6.
 H. Wang, R. Liu, Privacy-preserving publishing microdata  with full functional dependencies, Data & Knowledge Engineering 70 (3)  (2011)249–268.
 C.M. Wyss, C. Giannella, E.L. Robertson,  Fastfds: a heuristic-driven, depth-first algorithm for mining functional  dependencies from relationinstances —extended abstract, DaWaK, 2001, pp.  101–110.
 B.Powmeya , Nikita Mary Ablett  ,V.Mohanapriya,S.Balamurugan,âÃâ¬ÃâAn Object Oriented approach to Model the secure  Health care Databasesystems,âÃâ¬ÃâIn proceedings of International conference on  computer , communication & signal processing(IC3SP)in association with  IETEstudents forum and the society of digital information and wireless  communication,SDIWC,2011,pp.2-3
 BalamuruganShanmugam, VisalakshiPalaniswami,  âÃâ¬Ãâ¢Modified Partitioning Algorithm for Privacy Preservation in Microdata Publishing  withFull Functional DependenciesâÃâ¬Ãâ, Australian Journal of Basic and Applied  Sciences, 7(8): pp.316-323, July 2013
 BalamuruganShanmugam, VisalakshiPalaniswami,  R.Santhya, R.S.Venkatesh âÃâ¬Ãâ¢Strategies for Privacy Preserving Publishing of  FunctionallyDependent Sensitive Data: A State-of-the-Art-SurveyâÃâ¬Ãâ, Australian  Journal of Basic and Applied Sciences, 8(15) September 2014.
 S.Balamurugan, P.Visalakshi, V.M.Prabhakaran,  S.Chranyaa, S.Sankaranarayanan, "Strategies for Solving the NP-Hard  Workflow SchedulingProblems in Cloud Computing Environments", Australian  Journal of Basic and Applied Sciences, 8(15) October 2014.
 Charanyaa, S., et. al., , A Survey on Attack  Prevention and Handling Strategies in Graph Based Data Anonymization.  International Journal ofAdvanced Research in Computer and Communication  Engineering, 2(10): 5722-5728, 2013.
 Charanyaa, S., et. al., Certain Investigations  on Approaches forProtecting Graph Privacy in Data Anonymization. International  Journal ofAdvanced Research in Computer and Communication Engineering, 1(8):  5722-5728, 2013.
 Charanyaa, S., et. al., Proposing a Novel  Synergized K-Degree L-Diversity T-Closeness Model for Graph Based Data  Anonymization.International Journal of Innovative Research in Computer and  Communication Engineering, 2(3): 3554-3561, 2014.
 Charanyaa, S., et. al., , Strategies for  Knowledge Based Attack Detection in Graphical Data Anonymization. International  Journal ofAdvanced Research in Computer and Communication Engineering, 3(2):  5722-5728, 2014.
 Charanyaa, S., et. al., Term Frequency Based  Sequence Generation Algorithm for Graph Based Data Anonymization International  Journal ofInnovative Research in Computer and Communication Engineering, 2(2):  3033-3040, 2014.
 V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa,"  Certain Investigations on Strategies for Protecting Medical Data in  Cloud",International Journal of Innovative Research in Computer and  Communication Engineering Vol 2, Issue 10, October 2014
 V.M.Prabhakaran, Prof.S.Balamurugan,  S.Charanyaa," Investigations on Remote Virtual Machine to Secure Lifetime  PHR in Cloud ",International Journal of Innovative Research in Computer  and Communication Engineering Vol 2, Issue 10, October 2014
 V.M.Prabhakaran, Prof.S.Balamurugan,  S.Charanyaa," Privacy Preserving Personal Health Care Data in Cloud"  , International AdvancedResearch Journal in Science, Engineering and Technology  Vol 1, Issue 2, October 2014
 P.Andrew, J.Anish Kumar, R.Santhya,  Prof.S.Balamurugan, S.Charanyaa, "Investigations on Evolution of Strategies  to Preserve Privacy ofMoving Data Objects" International Journal of  Innovative Research in Computer and Communication Engineering, 2(2): 3033-3040,  2014.
 P.Andrew, J.Anish Kumar, R.Santhya,  Prof.S.Balamurugan, S.Charanyaa, " Certain Investigations on Securing  Moving Data Objects"International Journal of Innovative Research in  Computer and Communication Engineering, 2(2): 3033-3040, 2014.
 P.Andrew, J.Anish Kumar, R.Santhya,  Prof.S.Balamurugan, S.Charanyaa, " Survey on Approaches Developed for  Preserving Privacy of DataObjects" International Advanced Research Journal  in Science, Engineering and Technology Vol 1, Issue 2, October 2014
 S.Jeevitha, R.Santhya, Prof.S.Balamurugan,  S.Charanyaa, " Privacy Preserving Personal Health Care Data in Cloud"  International AdvancedResearch Journal in Science, Engineering and Technology  Vol 1, Issue 2, October 2014.
 K.Deepika, P.Andrew, R.Santhya, S.Balamurugan,  S.Charanyaa, "Investigations on Methods Evolved for Protecting Sensitive  Data",International Advanced Research Journal in Science, Engineering and  Technology Vol 1, Issue 4, Decermber 2014.
 K.Deepika, P.Andrew, R.Santhya, S.Balamurugan,  S.Charanyaa, "A Survey on Approaches Developed for Data  Anonymization",International Advanced Research Journal in Science,  Engineering and Technology Vol 1, Issue 4, Decermber 2014.
 S.Balamurugan, S.Charanyaa, "Principles of  Social Network Data Security" LAP Verlag, Germany, ISBN:  978-3-659-61207-7, 2014
 S.Balamurugan, S.Charanyaa, "Principles of  Scheduling in Cloud Computing" Scholars' Press, Germany,, ISBN:  978-3-639-66950-3, 2014
 S.Balamurugan, S.Charanyaa, "Principles of  Database Security" Scholars' Press, Germany, ISBN: 978-3-639-76030-9, 2014
 |