메뉴 건너뛰기




Volumn 14, Issue 1, 2003, Pages 14-26

Protecting data through 'perturbation' techniques: The impact on knowledge discovery in databases

Author keywords

Confidentiality; Data mining; Data perturbation; Data security

Indexed keywords

ALGORITHMS; DATA MINING; DATABASE SYSTEMS; PERTURBATION TECHNIQUES;

EID: 0041379358     PISSN: 10638016     EISSN: None     Source Type: Journal    
DOI: 10.4018/jdm.2003040102     Document Type: Article
Times cited : (33)

References (12)
  • 2
    • 0002956175 scopus 로고
    • A method for limiting disclosure in microdata based on random noise and transformation
    • Kim, J. (1986). A Method for Limiting Disclosure in Microdata Based on Random Noise and Transformation. ASA Proceedings Survey Research Methods, 370-374.
    • (1986) ASA Proceedings Survey Research Methods , pp. 370-374
    • Kim, J.1
  • 3
    • 0034274591 scopus 로고    scopus 로고
    • A comparison of prediction accuracy, complexity, and training time of thirty-three old and new classification algorithms
    • Lim, T.-S., Low, W.-Y., & Shih, Y.-S. (2000). A Comparison of Prediction Accuracy, Complexity, and Training Time of Thirty-Three Old and New Classification Algorithms. Machine Learning, 40, 203-229.
    • (2000) Machine Learning , vol.40 , pp. 203-229
    • Lim, T.-S.1    Low, W.-Y.2    Shih, Y.-S.3
  • 4
    • 0031312210 scopus 로고    scopus 로고
    • Split selection methods for classification trees
    • Low, W.-Y. & Shih Y.-S. (1997). Split Selection Methods for Classification Trees. Statistica Sinica, 7, 815-840.
    • (1997) Statistica Sinica , vol.7 , pp. 815-840
    • Low, W.-Y.1    Shih, Y.-S.2
  • 5
    • 0031599142 scopus 로고    scopus 로고
    • Mersenne twister: A 623-dimensionally equidistributed uniform pseudorandom number generator
    • Matsumoto, M. & Nishimura, T. (1998). Mersenne Twister: A 623-Dimensionally Equidistributed Uniform Pseudorandom Number Generator. ACM Transactions on Modeling and Computer Simulation, 8(1), 3-30.
    • (1998) ACM Transactions on Modeling and Computer Simulation , vol.8 , Issue.1 , pp. 3-30
    • Matsumoto, M.1    Nishimura, T.2
  • 6
    • 0003408496 scopus 로고    scopus 로고
    • Department of Information and Computer Science, Irvine, CA
    • Merz, C.J. & Murphy, P.M. (1996). UCI Repository of Machine Learning Databases. Department of Information and Computer Science, University of California, Irvine, CA,. (http://www.ics.uci.edu/̃mlearn/MLRepository.html).
    • (1996) UCI Repository of Machine Learning Databases
    • Merz, C.J.1    Murphy, P.M.2
  • 7
    • 0000610330 scopus 로고
    • Accessibility, security and accuracy in statistical databases: The case for the multiplicative fixed data perturbation approach
    • Muralidhar, K., Batra, D., & Kirs. P. (1995). Accessibility, Security and Accuracy in Statistical Databases: The Case for the Multiplicative Fixed Data Perturbation Approach. Management Science, 41(9), 1549-1564.
    • (1995) Management Science , vol.41 , Issue.9 , pp. 1549-1564
    • Muralidhar, K.1    Batra, D.2    Kirs, P.3
  • 8
    • 0033207750 scopus 로고    scopus 로고
    • A general additive data perturbation method for database security
    • Muralidhar, K., Parsa, R. & Sarathy, R. (1999). A General Additive Data Perturbation Method for Database Security. Management Science, 45(10), 1399-1415.
    • (1999) Management Science , vol.45 , Issue.10 , pp. 1399-1415
    • Muralidhar, K.1    Parsa, R.2    Sarathy, R.3
  • 10
    • 44949285668 scopus 로고
    • Optimal noise addition for preserving confidentiality in multivariate data
    • Tendick, P. (1991). Optimal Noise Addition for Preserving Confidentiality in Multivariate Data. Journal of Statistics Planning and Inference, 27(2), 341-353.
    • (1991) Journal of Statistics Planning and Inference , vol.27 , Issue.2 , pp. 341-353
    • Tendick, P.1
  • 11
    • 0028393221 scopus 로고
    • A modified random perturbation method for database security
    • Tendick, P. & Matloff, N (1994). A Modified Random Perturbation Method for Database Security. ACM Transcations on Database Systems, 19(1), 47-63.
    • (1994) ACM Transcations on Database Systems , vol.19 , Issue.1 , pp. 47-63
    • Tendick, P.1    Matloff, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.