메뉴 건너뛰기




Volumn 16, Issue 1, 2005, Pages 75-87

Privacy-preserving data mining: Developments and directions

Author keywords

Counter terrorism; Data mining; Privacy; Privacy constraint; Privacy controller; Privacy policy; Privacy problem; Privacy preserving data mining

Indexed keywords

DATABASE SYSTEMS; INFORMATION RETRIEVAL; QUERY LANGUAGES; SECURITY OF DATA; WORLD WIDE WEB; XML;

EID: 10444243345     PISSN: 10638016     EISSN: None     Source Type: Journal    
DOI: 10.4018/jdm.2005010106     Document Type: Review
Times cited : (21)

References (31)
  • 1
    • 0034827009 scopus 로고    scopus 로고
    • On the design and quantification of privacy-preserving data mining algorithms
    • Agrawal, D., & Aggrawal, C. (2001). On the design and quantification of privacy-preserving data mining algorithms. Proceedings ACM PODS.
    • (2001) Proceedings ACM PODS
    • Agrawal, D.1    Aggrawal, C.2
  • 4
    • 10444262311 scopus 로고
    • Multilevel secure database systems
    • Washington D.C
    • Air Force Science Board (1983). Multilevel secure database systems. Air Force Summer Study Report, Washington D.C.
    • (1983) Air Force Summer Study Report
  • 5
    • 0034497773 scopus 로고    scopus 로고
    • Using sample size to limit exposure to data mining
    • Clifton, C. (2000). Using sample size to limit exposure to data mining. Journal of Computer Security, 8, 120-142.
    • (2000) Journal of Computer Security , vol.8 , pp. 120-142
    • Clifton, C.1
  • 6
    • 10044273842 scopus 로고    scopus 로고
    • Tools for privacy-preserving distributed data mining
    • Clifton, C. (2003). Tools for privacy-preserving distributed data mining. SIGKDD Explorations, 4, 28-34.
    • (2003) SIGKDD Explorations , vol.4 , pp. 28-34
    • Clifton, C.1
  • 15
    • 10444253497 scopus 로고    scopus 로고
    • Privacy-preserving clustering with distributed EM mixture modeling
    • Lin, A., & Clifton, C. (2003). Privacy-preserving clustering with distributed EM mixture modeling. Purdue University Technical Report.
    • (2003) Purdue University Technical Report
    • Lin, A.1    Clifton, C.2
  • 17
    • 84976785631 scopus 로고
    • Security and inference in multilevel database and knowledge base systems
    • Morgenstern, M. (1987). Security and inference in multilevel database and knowledge base systems. Proceedings of the ACM SIGMOD Conference.
    • (1987) Proceedings of the ACM SIGMOD Conference
    • Morgenstern, M.1
  • 18
    • 10444274552 scopus 로고
    • Multilevel security for relational database systems augmented by an inference engine
    • Thuraisingham, B. (1987). Multilevel security for relational database systems augmented by an inference engine. Computers and Security, 6, 250-66.
    • (1987) Computers and Security , vol.6 , pp. 250-266
    • Thuraisingham, B.1
  • 19
    • 0025401329 scopus 로고
    • Towards the design of a secure data/knowledge base management system
    • Thuraisingham, B. (1990a). Towards the design of a secure data/knowledge base management system. Data and Knowledge Engineering, 5, 59-72.
    • (1990) Data and Knowledge Engineering , vol.5 , pp. 59-72
    • Thuraisingham, B.1
  • 20
    • 10444248483 scopus 로고
    • Recursion theoretic properties of the inference problem
    • Thuraisingham, B. (1990b). Recursion theoretic properties of the inference problem. MITRE Report MTP291.
    • (1990) MITRE Report , vol.MTP291
    • Thuraisingham, B.1
  • 24
    • 10444271317 scopus 로고    scopus 로고
    • Data mining, national security, privacy and civil liberties
    • Thuraisingham, B. (2002). Data mining, national security, privacy and civil liberties. SIGKDD Explorations, 4, 1-5.
    • (2002) SIGKDD Explorations , vol.4 , pp. 1-5
    • Thuraisingham, B.1
  • 26
    • 10444268481 scopus 로고    scopus 로고
    • Data mining for counter-terrorism
    • To appear in S. Sivakumar & H. Kargupta (Eds.). AAAI Press
    • Thuraisingham, B. (2003b). Data mining for counter-terrorism. To appear in S. Sivakumar & H. Kargupta (Eds.), Next generation data mining. AAAI Press.
    • (2003) Next Generation Data Mining
    • Thuraisingham, B.1
  • 27
    • 10044295781 scopus 로고    scopus 로고
    • Privacy constraint processing in a privacy enhanced database system
    • forthcoming
    • Thuraisingham, B. (2003c). Privacy constraint processing in a privacy enhanced database system. Data and Knowledge Engineering Journal (forthcoming).
    • (2003) Data and Knowledge Engineering Journal
    • Thuraisingham, B.1
  • 28
    • 0029290760 scopus 로고
    • Security constraint processing in a multilevel distributed database management system
    • Thuraisingham, B., & Ford, W. (1995). Security constraint processing in a multilevel distributed database management system. IEEE Transactions on Knowledge and Data Engineering, 7, 274-93.
    • (1995) IEEE Transactions on Knowledge and Data Engineering , vol.7 , pp. 274-293
    • Thuraisingham, B.1    Ford, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.