메뉴 건너뛰기




Volumn 22, Issue , 2003, Pages 211-222

Limiting Privacy Breaches in Privacy Preserving Data Mining

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; AMPLIFICATION; DATA MINING; DATA REDUCTION; FUNCTIONS; MATHEMATICAL MODELS; PROBABILITY; PROBLEM SOLVING; RANDOM PROCESSES; THEOREM PROVING;

EID: 1142263341     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/773153.773174     Document Type: Conference Paper
Times cited : (684)

References (21)
  • 7
    • 84958048324 scopus 로고    scopus 로고
    • Data swapping: Balancing privacy against precision in mining for logic rules
    • M. Mohania and A. Tjoa, editors. Springer-Verlag Lecture Notes in Computer Science 1676
    • V. Estivill-Castro and L. Brankovic. Data swapping: Balancing privacy against precision in mining for logic rules. In M. Mohania and A. Tjoa, editors, Data Warehousing and Knowledge Discovery DaWaK-99, pages 389-398. Springer-Verlag Lecture Notes in Computer Science 1676, 1999.
    • (1999) Data Warehousing and Knowledge Discovery DaWaK-99 , pp. 389-398
    • Estivill-Castro, V.1    Brankovic, L.2
  • 13
    • 84974555530 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Y. Lindell and B. Pinkas, Privacy preserving data mining. In CRYPTO, pages 36-54, 2000.
    • (2000) CRYPTO , pp. 36-54
    • Lindell, Y.1    Pinkas, B.2
  • 19
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon. Communication theory of secrecy systems. Bell System Technical journal, 28-4:656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 20
    • 0003585005 scopus 로고    scopus 로고
    • Data mining and privacy: A conflict in making
    • March
    • K. Thearling. Data mining and privacy: A conflict in making. DS*, March 1998.
    • (1998) DS*
    • Thearling, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.