메뉴 건너뛰기




Volumn 2, Issue 6, 2004, Pages 19-27

Privacy-preserving data mining: Why, how, and when

Author keywords

[No Author keywords available]

Indexed keywords

CUSTOMER PRIVACY; DATA PERTURBATIONS; EXPLORATORY DATA ANALYSIS (EDA); SECURE MULTIPARTY COMPUTATION (SMC);

EID: 10944270172     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2004.108     Document Type: Review
Times cited : (99)

References (17)
  • 1
    • 10944273551 scopus 로고    scopus 로고
    • Don't store my data, japanese tell government
    • 25 Aug.
    • D. Struck, "Don't Store My Data, Japanese Tell Government," Int'l Herald Tribune, 25 Aug. 2002, p. 1.
    • (2002) Int'l Herald Tribune , pp. 1
    • Struck, D.1
  • 8
    • 0023545076 scopus 로고
    • How to play any mental game: A completeness theorem for protocols with honest majority
    • ACM Press
    • O. Goldreich, S. Micali, and A. Wigderson, "How to Play any Mental Game: A Completeness Theorem for Protocols with Honest Majority," Proc. 19th ACM Symp. Theory of Computing, ACM Press, 1987, pp. 218-229; http://doi.acm.org/10.1145/28395.28420.
    • (1987) Proc. 19th ACM Symp. Theory of Computing , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 10
    • 4544361334 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • M. Kantarcioǧlu and C. Clifton, "Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data," IEEE Trans. Knowledge Data Eng., vol. 16, no. 9, 2004, pp. 1026-1037; http://csdl.computer.org/comp/trans/tk/2004/09/k1026abs.htm.
    • (2004) IEEE Trans. Knowledge Data Eng. , vol.16 , Issue.9 , pp. 1026-1037
    • Kantarcioǧlu, M.1    Clifton, C.2
  • 11
    • 10944227231 scopus 로고    scopus 로고
    • Secure set intersection cardinality with application to association rule mining
    • to be published
    • J. Vaidya and C. Clifton, "Secure Set Intersection Cardinality with Application to Association Rule Mining," to be published in J. Computer Security, 2005.
    • (2005) J. Computer Security
    • Vaidya, J.1    Clifton, C.2
  • 12
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Y. Lindell and B. Pinkas, "Privacy Preserving Data Mining," J. Cryptology, vol. 15, no. 3, 2002, pp. 177-206; http://www.cs.biu.ac.il/~lindell/abstracts/id3_abs.html.
    • (2002) J. Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 13
    • 10044273842 scopus 로고    scopus 로고
    • Tools for privacy preserving distributed data mining
    • C. Clifton et al., "Tools for Privacy Preserving Distributed Data Mining," SICKDD Explorations, vol. 4, no. 2, 2003, pp. 28-34; www.acm.org/sigs/sigkdd/explorations/issue4-2/contents.htm.
    • (2003) SICKDD Explorations , vol.4 , Issue.2 , pp. 28-34
    • Clifton, C.1
  • 14
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • N.R. Adam and J.C. Wortmann, "Security-Control Methods for Statistical Databases: A Comparative Study," ACM Computing Surveys, vol. 21, no. 4, 1989, pp. 515-556; http://doi.acm.org/10.1145/76894.76895.
    • (1989) ACM Computing Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Wortmann, J.C.2
  • 15
    • 0031362884 scopus 로고    scopus 로고
    • Protecting databases from inference attacks
    • T.H. Hinke, H.S. Delugach, and R.P. Wolf, "Protecting Databases from Inference Attacks," Computers and Security, vol. 16, no. 8, 1997, pp. 687-708.
    • (1997) Computers and Security , vol.16 , Issue.8 , pp. 687-708
    • Hinke, T.H.1    Delugach, H.S.2    Wolf, R.P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.