Krish Muralidhar
Krish Muralidhar
Verified email at ou.edu
TitleCited byYear
An empirical investigation of the relationship between change in corporate social performance and financial performance: A stakeholder theory perspective
BM Ruf, K Muralidhar, RM Brown, JJ Janney, K Paul
Journal of business ethics 32 (2), 143-156, 2001
11992001
The development of a systematic, aggregate measure of corporate social performance
BM Ruf, K Muralidhar, K Paul
Journal of Management 24 (1), 119-133, 1998
2481998
A general additive data perturbation method for database security
K Muralidhar, R Parsa, R Sarathy
management science 45 (10), 1399-1415, 1999
2101999
Data shuffling—a new masking approach for numerical data
K Muralidhar, R Sarathy
Management Science 52 (5), 658-670, 2006
1652006
Using the analytic hierarchy process for information system project selection
K Muralidhar, R Santhanam, RL Wilson
Information & Management 18 (2), 87-95, 1990
1591990
Evaluating Laplace noise addition to satisfy differential privacy for numeric data.
R Sarathy, K Muralidhar
Trans. Data Privacy 4 (1), 1-17, 2011
1272011
Security of random data perturbation methods
K Muralidhar, R Sarathy
ACM Transactions on Database Systems (TODS) 24 (4), 487-493, 1999
991999
Accessibility, security, and accuracy in statistical databases: The case for the multiplicative fixed data perturbation approach
K Muralidhar, D Batra, PJ Kirs
Management Science 41 (9), 1549-1564, 1995
861995
A theoretical basis for perturbation methods
K Muralidhar, R Sarathy
Statistics and Computing 13 (4), 329-335, 2003
642003
The security of confidential numerical data in databases
R Sarathy, K Muralidhar
information systems research 13 (4), 389-403, 2002
632002
A zero-one goal programming approach for information system project selection
R Santhanam, K Muralidhar, M Schniederjans
Omega 17 (6), 583-593, 1989
561989
Perturbing nonnormal confidential attributes: The copula approach
R Sarathy, K Muralidhar, R Parsa
Management Science 48 (12), 1613-1627, 2002
552002
Fool's gold: an illustrated critique of differential privacy
J Bambauer, K Muralidhar, R Sarathy
Vand. J. Ent. & Tech. L. 16, 701, 2013
512013
Secure and useful data sharing
R Sarathy, K Muralidhar
Decision Support Systems 42 (1), 204-220, 2006
462006
New directions in anonymization: permutation paradigm, verifiability by subjects and intruders, transparency to users
J Domingo-Ferrer, K Muralidhar
Information Sciences 337, 11-24, 2016
452016
An improved security requirement for data perturbation with implications for e‐commerce
K Muralidhar, R Sarathy, R Parsa
Decision Sciences 32 (4), 683-698, 2001
442001
Describing processing time when simulating JIT environments
K Muralidhar, SR SWENSETHJ, RL WILSON
THE INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH 30 (1), 1-11, 1992
441992
Generating Sufficiency-based Non-Synthetic Perturbed Data.
K Muralidhar, R Sarathy
Trans. Data Privacy 1 (1), 17-33, 2008
432008
Some additional insights on applying differential privacy for numeric data
R Sarathy, K Muralidhar
International Conference on Privacy in Statistical Databases, 210-219, 2010
372010
Does differential privacy protect terry gross’ privacy?
K Muralidhar, R Sarathy
International Conference on Privacy in Statistical Databases, 200-209, 2010
362010
The system can't perform the operation now. Try again later.
Articles 1–20