- Shaoxu Song, Lei Chen, "Efficient discovery of similarity constraints for matching dependencies", Data & Knowledge Engineering, Elsevier, 2013.
- Pado Atzgeni, Valeria D. Antonellis, Relational Database Theory, The Benjamin/Cummings Publishing Company, Inc., 1993
- Stavros S. Cosmadakis, Paris C. Kanellakis, Nicolas Spyratos, Partition semantics for relations, PODS, 1985, pp. 261–275.
- Jeremy T. Engle, Edward L. Robertson, Depth first algorithms and inferencing for AFD mining, IDEAS, 2009, pp. 54–65.
- Wenfei Fan, Floris Geerts, Xibei Jia, Anastasios Kementsietsidis, Conditional functional dependencies for capturing data inconsistencies, TODS 33(2) (6) (2008) 1–48.
- Wenfei Fan, Floris Geerts, Jianzhong Li, Ming Xiong, Discovering conditional functional dependencies, TKDE, 2010.
- Sergio Flesca, Filippo Furfaro, Sergio Greco, Ester Zumpano, Repairing inconsistent xml data with functional dependencies, Encyclopedia of Database Technologies and Applications (2005) 542–547.
- Chris Giannella, Edward Robertson, On approximation measures for functional dependencies, Information Systems 29 (6) (2004) 483–507.
- Yka Huhtala, Juha Karkkainen, Pasi Porkka, Hannu Toivonen, Efficient discovery of functional and approximate dependencies using partitions, ICDE, 1998.
- Yka Huhtala, Juha Karkkainen, Pasi Porkka, Hannu Toivonen, Tane: an efficient algorithm for discovering functional and approximate dependencies, The Computer Journal 42 (2) (1999) 100–111.
- Ronald S. King, James Oil, Discovery of functional and approximate functional dependencies in relational databases, Journal of Applied Mathematics and Decision Sciences 7 (1) (2003) 49–59.
- Jyrki Kivinen, Heikki Mannila, Approximate dependency inference from relations, LNCS 646 — Database Theory ICDT '92, 1992, pp. 86 98.
- Tony T. Lee, Tong Ye, A relational approach to functional decomposition of logic circuits, TODS 36(2) (13) (2011) 1–13, (30).
- Jiuyong Li, Jixue Liu, Hannu Toivonen, Jianming Yong, Effective pruning for the discovery of conditional functional dependencies, The Computer Journal (2012).
- Jixue Liu, Chengfei Liu, Jiuyong Li, Yongfeng Chen, Discover dependencies from data — a review, TKDE 24 (2) (2012) 251–264, (http://www.computer.org/ portal/web/csdl/doi/10.1109/TKDE.2010.197).
- Stephane Lopes, Jean-Marc Petit, Lotfi Lakhal, Efficient discovery of functional dependencies and Armstrong relations, LNCS 1777 — 7th International Conference on Extending Database Technology (EDBT): Advances in Database Technology, 1777, 2000, pp. 350–364.
- David Maier, The Theory of Relational Databases, Computer Science Press, 1983. (http://web.cecs.pdx.edu/~maier/TheoryBook/TRD.html).
- Heikki Mannila, Kari-Jouko Rhi, On the complexity of inferring functional dependencies, Discrete Applied Mathematics 40 (1992) 237–243.
- Heikki Mannila, Kari-Jouko Rih, Algorithms for inferring functional dependencies from relations, Data and Knowledge Engineering 12 (1) (1994) 83–99.
- Victor Matos, Becky Grasser, Sql-based discovery of exact and approximate functional dependencies, Proceeding ITiCSE-WGR '04 Working Group Reports from ITiCSE on Innovation and Technology in Computer Science Education, 2004, pp. 58–63.
- Cristian Molinaro, Sergio Greco, Polynomial time queries over inconsistent databases with functional dependencies and foreign keys, DKE 69 (7) (2010) 709–722.
- Noel Novelli, Rosine Cicchetti, Fun: an efficient algorithm for mining functional and embedded dependencies, ICDT, 2001, pp. 189–203.
- Noel Novelli, Rosine Cicchetti, Functional and embedded dependency inference: a data mining point of view, Information Systems 26 (7) (2001) 477–506.
- Iztok Savnik, Peter A. Flach, Bottom-up induction of functional dependencies from relations, AAAI Workshop of KDD, 1993, pp. 174–185.
- Hui Wang, Ruilin Liu, Privacy-preserving publishing microdata with full functional dependencies, DKE 70 (3) (2011).
- Catharine Wyss, Chris Giannella, Edward Robertson, Fastfds: a heuristic-driven, depth-first algorithm for mining functional dependencies from relation instances — extended abstract, DaWaK, 2001, pp. 101–110.
- Hong Yao, Howard J. Hamilton, Mining functional dependencies from data, Journal of Data Mining and Knowledge Discovery 16 (2) (2008) 197–219.
- B.Powmeya , Nikita Mary Ablett ,V.Mohanapriya,S.Balamurugan,?An Object Oriented approach to Model the secure Health care Database systems,?In proceedings of International conference on computer , communication & signal processing(IC3SP)in association with IETE students forum and the society of digital information and wireless communication,SDIWC,2011,pp.2-3
- Balamurugan Shanmugam, Visalakshi Palaniswami, ?Modified Partitioning Algorithm for Privacy Preservation in Microdata Publishing with Full Functional Dependencies?, Australian Journal of Basic and Applied Sciences, 7(8): pp.316-323, July 2013
- Balamurugan Shanmugam, Visalakshi Palaniswami, R.Santhya, R.S.Venkatesh ?Strategies for Privacy Preserving Publishing of Functionally Dependent Sensitive Data: A State-of-the-Art-Survey?, Australian Journal of Basic and Applied Sciences, 8(15) September 2014.
- S.Balamurugan, P.Visalakshi, V.M.Prabhakaran, S.Chranyaa, S.Sankaranarayanan, "Strategies for Solving the NP-Hard Workflow Scheduling Problems in Cloud Computing Environments", Australian Journal of Basic and Applied Sciences, 8(15) October 2014.
- Charanyaa, S., et. al., , A Survey on Attack Prevention and Handling Strategies in Graph Based Data Anonymization. International Journal of Advanced Research in Computer and Communication Engineering, 2(10): 5722-5728, 2013.
- Charanyaa, S., et. al., Certain Investigations on Approaches forProtecting Graph Privacy in Data Anonymization. International Journal of Advanced Research in Computer and Communication Engineering, 1(8): 5722-5728, 2013.
- Charanyaa, S., et. al., Proposing a Novel Synergized K-Degree L-Diversity T-Closeness Model for Graph Based Data Anonymization. International Journal of Innovative Research in Computer and Communication Engineering, 2(3): 3554-3561, 2014.
- Charanyaa, S., et. al., , Strategies for Knowledge Based Attack Detection in Graphical Data Anonymization. International Journal of Advanced Research in Computer and Communication Engineering, 3(2): 5722-5728, 2014.
- Charanyaa, S., et. al., Term Frequency Based Sequence Generation Algorithm for Graph Based Data Anonymization International Journal of Innovative Research in Computer and Communication Engineering, 2(2): 3033-3040, 2014.
- V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa," Certain Investigations on Strategies for Protecting Medical Data in Cloud", International Journal of Innovative Research in Computer and Communication Engineering Vol 2, Issue 10, October 2014
- V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa," Investigations on Remote Virtual Machine to Secure Lifetime PHR in Cloud ", International Journal of Innovative Research in Computer and Communication Engineering Vol 2, Issue 10, October 2014
- V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa," Privacy Preserving Personal Health Care Data in Cloud" , International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 2, October 2014
- P.Andrew, J.Anish Kumar, R.Santhya, Prof.S.Balamurugan, S.Charanyaa, "Investigations on Evolution of Strategies to Preserve Privacy of Moving Data Objects" International Journal of Innovative Research in Computer and Communication Engineering, 2(2): 3033-3040, 2014.
- P.Andrew, J.Anish Kumar, R.Santhya, Prof.S.Balamurugan, S.Charanyaa, " Certain Investigations on Securing Moving Data Objects" International Journal of Innovative Research in Computer and Communication Engineering, 2(2): 3033-3040, 2014.
- P.Andrew, J.Anish Kumar, R.Santhya, Prof.S.Balamurugan, S.Charanyaa, " Survey on Approaches Developed for Preserving Privacy of Data Objects" International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 2, October 2014
- S.Jeevitha, R.Santhya, Prof.S.Balamurugan, S.Charanyaa, " Privacy Preserving Personal Health Care Data in Cloud" International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 2, October 2014.
- K.Deepika, P.Andrew, R.Santhya, S.Balamurugan, S.Charanyaa, "Investigations on Methods Evolved for Protecting Sensitive Data", International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 4, Decermber 2014.
- K.Deepika, P.Andrew, R.Santhya, S.Balamurugan, S.Charanyaa, "A Survey on Approaches Developed for Data Anonymization", International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 4, Decermber 2014.
- S.Balamurugan, S.Charanyaa, "Principles of Social Network Data Security" LAP Verlag, Germany, ISBN: 978-3-659-61207-7, 2014
- S.Balamurugan, S.Charanyaa, "Principles of Scheduling in Cloud Computing" Scholars' Press, Germany,, ISBN: 978-3-639-66950-3, 2014
- S.Balamurugan, S.Charanyaa, "Principles of Database Security" Scholars' Press, Germany, ISBN: 978-3-639-76030-9, 2014
|