2015 conference paper

Determining query readiness for structured data

Big data analytics and knowledge discovery, 9263, 3–14.

By: F. Alborzi, R. Chirkova, J. Doyle & Y. Fathi

Source: NC State University Libraries
Added: August 6, 2018

2015 article

Exact Detection of Information Leakage in Database Access Control


By: F. Alborzi n, R. Chirkova n & T. Yu*

author keywords: Privacy and security in cloud intelligence; Data exchange
TL;DR: Managing fine-grained access control in software is rather challenging and if access is not configured carefully, information leakage may happen: Users may infer sensitive information through the data explicitly accessible to them in centralized systems or in the cloud. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2015 journal article

Investigating replenishment policies for centralised and decentralised supply chains using stochastic programming approach

International Journal of Production Research, 53(1), 41–69.

By: M. Fattahi, M. Mahootchi, S. Husseini, E. Keyvanshokooh & F. Alborzi

Source: NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.