메뉴 건너뛰기




Volumn 17, Issue 3, 2006, Pages 254-270

Privacy protection in data mining: A perturbation approach for categorical data

Author keywords

Bayesian estimation; Data confidentiality; Data mining; Data swapping; Linear programming; Privacy

Indexed keywords

BAYESIAN NETWORKS; CLASSIFICATION (OF INFORMATION); DATA MINING; LINEAR PROGRAMMING; PERTURBATION TECHNIQUES; SOCIETIES AND INSTITUTIONS; VIRTUAL REALITY;

EID: 33748519577     PISSN: 10477047     EISSN: 15265536     Source Type: Journal    
DOI: 10.1287/isre.1060.0095     Document Type: Article
Times cited : (51)

References (39)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • Adam, N. R., J. C. Wortmann. 1989. Security-control methods for statistical databases: A comparative study. ACM Comput. Surveys 21(4) 515-556.
    • (1989) ACM Comput. Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Wortmann, J.C.2
  • 4
    • 0003408496 scopus 로고    scopus 로고
    • Department of Information and Computer Science, University of California, Irvine, CA
    • Blake, C., E. Keogh, C. J. Merz. 1998. UCI repository of machine learning databases. Department of Information and Computer Science, University of California, Irvine, CA. http://www.ics.uci.edu/~mlearn/MLRepository.html.
    • (1998) UCI Repository of Machine Learning Databases
    • Blake, C.1    Keogh, E.2    Merz, C.J.3
  • 6
    • 0033349024 scopus 로고    scopus 로고
    • Disclosure detection in multivariate categorical databases: Auditing confidentiality protection through two new matrix operators
    • Chowdhury, D. S., G. T. Duncan, R. Krishnan, S. F. Roehrig, S. Mukherjee. 1999. Disclosure detection in multivariate categorical databases: Auditing confidentiality protection through two new matrix operators. Management Sci. 45(12) 1710-1723.
    • (1999) Management Sci. , vol.45 , Issue.12 , pp. 1710-1723
    • Chowdhury, D.S.1    Duncan, G.T.2    Krishnan, R.3    Roehrig, S.F.4    Mukherjee, S.5
  • 7
    • 84924515134 scopus 로고
    • Network models for complementary cell suppression
    • Cox, L. H. 1995. Network models for complementary cell suppression. J. Amer. Statist. Assoc. 90(432) 1453-1462.
    • (1995) J. Amer. Statist. Assoc. , vol.90 , Issue.432 , pp. 1453-1462
    • Cox, L.H.1
  • 8
    • 0001501223 scopus 로고
    • "How did they get my name?": An exploratory investigation of consumer attitudes toward secondary information use
    • Culnan, M. 1993. "How did they get my name?": An exploratory investigation of consumer attitudes toward secondary information use. MIS Quart. 17(3) 341-363.
    • (1993) MIS Quart. , vol.17 , Issue.3 , pp. 341-363
    • Culnan, M.1
  • 9
    • 0011702229 scopus 로고
    • Data swapping: A technique for disclosure control
    • Dalenius, T., S. P. Reiss. 1982. Data swapping: A technique for disclosure control. J. Statist. Planning Inference 6(1) 73-85.
    • (1982) J. Statist. Planning Inference , vol.6 , Issue.1 , pp. 73-85
    • Dalenius, T.1    Reiss, S.P.2
  • 10
    • 0020779363 scopus 로고
    • Inference control for statistical databases
    • Denning, D. E., J. Schlörer. 1983. Inference control for statistical databases. Computer 16(7) 69-82.
    • (1983) Computer , vol.16 , Issue.7 , pp. 69-82
    • Denning, D.E.1    Schlörer, J.2
  • 13
    • 84952535404 scopus 로고
    • The risk of disclosure for microdata
    • Duncan, G. T., D. Lambert. 1989. The risk of disclosure for microdata. J. Bus. Econom. Statist. 7(2) 201-217.
    • (1989) J. Bus. Econom. Statist. , vol.7 , Issue.2 , pp. 201-217
    • Duncan, G.T.1    Lambert, D.2
  • 14
    • 2242464139 scopus 로고    scopus 로고
    • Optimal disclosure limitation strategy in statistical databases: Deterring tracker attacks through additive noise
    • Duncan, G. T., S. Mukherjee. 2000. Optimal disclosure limitation strategy in statistical databases: Deterring tracker attacks through additive noise. J. Amer. Statist. Assoc. 95(451) 720-729.
    • (2000) J. Amer. Statist. Assoc. , vol.95 , Issue.451 , pp. 720-729
    • Duncan, G.T.1    Mukherjee, S.2
  • 15
    • 84958048324 scopus 로고    scopus 로고
    • Data swapping: Balancing privacy against precision in mining for logic rules
    • M. Mukesh, A. M. Tjoa, eds. Springer-Verlag, Berlin, Germany
    • Estivill-Castro, V., L. Brankovic. 1999. Data swapping: Balancing privacy against precision in mining for logic rules. M. Mukesh, A. M. Tjoa, eds. Data Warehousing and Knowledge Discovery (DaWak'99). Springer-Verlag, Berlin, Germany, 389-398.
    • (1999) Data Warehousing and Knowledge Discovery (DaWak'99) , pp. 389-398
    • Estivill-Castro, V.1    Brankovic, L.2
  • 17
    • 35048813475 scopus 로고    scopus 로고
    • Data swapping: Variations on a theme by Dalenius and Reiss
    • J. Domingo-Ferrer, V. Torra, eds. Springer-Verlag, Berlin, Germany
    • Fienberg, S. E., J. McIntyre. 2004. Data swapping: Variations on a theme by Dalenius and Reiss. J. Domingo-Ferrer, V. Torra, eds. Privacy in Statistical Databases. Springer-Verlag, Berlin, Germany, 14-29.
    • (2004) Privacy in Statistical Databases , pp. 14-29
    • Fienberg, S.E.1    McIntyre, J.2
  • 18
    • 0000432739 scopus 로고    scopus 로고
    • Disclosure limitation using perturbation and related methods for categorical data
    • Fienberg, S. E., U. E. Makov, R. J. Steele. 1998. Disclosure limitation using perturbation and related methods for categorical data. J. Official Statist. 14(4) 485-502.
    • (1998) J. Official Statist. , vol.14 , Issue.4 , pp. 485-502
    • Fienberg, S.E.1    Makov, U.E.2    Steele, R.J.3
  • 20
    • 0036602405 scopus 로고    scopus 로고
    • Privacy protection of binary confidential data against deterministic, stochastic, and insider threat
    • Garfinkel, R., R. Gopal, P. Goes. 2002. Privacy protection of binary confidential data against deterministic, stochastic, and insider threat. Management Sci. 48(6) 749-764.
    • (2002) Management Sci. , vol.48 , Issue.6 , pp. 749-764
    • Garfinkel, R.1    Gopal, R.2    Goes, P.3
  • 21
    • 0002263606 scopus 로고    scopus 로고
    • Privacy: Entitlement or illusion?
    • Greengard, S. 1996. Privacy: Entitlement or illusion? Personnel J. 75(5) 74-88.
    • (1996) Personnel J. , vol.75 , Issue.5 , pp. 74-88
    • Greengard, S.1
  • 22
    • 0001582302 scopus 로고    scopus 로고
    • Post randomization for statistical disclosure control: Theory and implementation
    • Gouweleeuw, J. M., P. Kooiman, L. C. R. J. Willenborg, P.-P. de Wolf. 1998. Post randomization for statistical disclosure control: Theory and implementation. J. Official Statist. 14(4) 463-478.
    • (1998) J. Official Statist. , vol.14 , Issue.4 , pp. 463-478
    • Gouweleeuw, J.M.1    Kooiman, P.2    Willenborg, L.C.R.J.3    De Wolf, P.-P.4
  • 25
    • 0343506473 scopus 로고
    • The determinants of contraceptive method and service point choice
    • Secondary Analysis of the 1987 National Indonesia Contra ceptive Prevalence Survey. East-West Population Institute, Jakarta, Indonesia
    • Lerman, C., J. W. Molyneaux, S. Pangemanan Iswarati. 1991. The determinants of contraceptive method and service point choice. Secondary Analysis of the 1987 National Indonesia Contra ceptive Prevalence Survey, Vol. 1. Fertility and Family Planning. East-West Population Institute, Jakarta, Indonesia.
    • (1991) Fertility and Family Planning , vol.1
    • Lerman, C.1    Molyneaux, J.W.2    Iswarati, S.P.3
  • 26
    • 85041804889 scopus 로고    scopus 로고
    • Adaptive data reduction for large-scale transaction data
    • School of Management, University of Texas at Dallas, Richardson, TX
    • Li, X.-B., V. S. Jacob. 2005. Adaptive data reduction for large-scale transaction data. Working paper, School of Management, University of Texas at Dallas, Richardson, TX.
    • (2005) Working Paper
    • Li, X.-B.1    Jacob, V.S.2
  • 27
    • 85041801507 scopus 로고    scopus 로고
    • A data perturbation approach to privacy protection in data mining
    • School of Management, University of Texas at Dallas, Richardson, TX
    • Li, X.-B., S. Sarkar. 2005. A data perturbation approach to privacy protection in data mining. Working paper, School of Management, University of Texas at Dallas, Richardson, TX.
    • (2005) Working Paper
    • Li, X.-B.1    Sarkar, S.2
  • 28
    • 0022130080 scopus 로고
    • A data distortion by probability distribution
    • Liew, C. K., U. J. Choi, C. J. Liew. 1985. A data distortion by probability distribution. ACM Trans. Database Systems 10(3) 395-411.
    • (1985) ACM Trans. Database Systems , vol.10 , Issue.3 , pp. 395-411
    • Liew, C.K.1    Choi, U.J.2    Liew, C.J.3
  • 29
    • 0033207750 scopus 로고    scopus 로고
    • A general additive data perturbation method for database security
    • Muralidhar, K., R. Parsa, R. Sarathy. 1999. A general additive data perturbation method for database security. Management Sci. 45(10) 1399-1415.
    • (1999) Management Sci. , vol.45 , Issue.10 , pp. 1399-1415
    • Muralidhar, K.1    Parsa, R.2    Sarathy, R.3
  • 31
    • 0021389555 scopus 로고
    • Practical data-swapping: The first steps
    • Reiss, S. P. 1984. Practical data-swapping: The first steps. ACM Trims. Database Systems 9(1) 20-37.
    • (1984) ACM Trims. Database Systems , vol.9 , Issue.1 , pp. 20-37
    • Reiss, S.P.1
  • 32
    • 84976841925 scopus 로고
    • Protecting privacy
    • Rotenberg, M. 1992. Protecting privacy. Comm. ACM 35(4) 164.
    • (1992) Comm. ACM , vol.35 , Issue.4 , pp. 164
    • Rotenberg, M.1
  • 33
    • 0036909696 scopus 로고    scopus 로고
    • The security of confidential numerical data in databases
    • Sarathy, R., K. Muralidhar. 2002. The security of confidential numerical data in databases. Inform. Systems Res. 13(4) 389-403.
    • (2002) Inform. Systems Res. , vol.13 , Issue.4 , pp. 389-403
    • Sarathy, R.1    Muralidhar, K.2
  • 34
    • 0019546487 scopus 로고
    • Security of statistical databases: Multidimensional transformation
    • Schlorer, J. 1981. Security of statistical databases: Multidimensional transformation. ACM Trans. Database Systems 6(1) 95-112.
    • (1981) ACM Trans. Database Systems , vol.6 , Issue.1 , pp. 95-112
    • Schlorer, J.1
  • 35
    • 33748519734 scopus 로고    scopus 로고
    • A study of student privacy issues at Stanford University
    • Stanford Student Computer and Network Privacy Project. 2002. A study of student privacy issues at Stanford University. Comm. ACM 45(3) 23-25.
    • (2002) Comm. ACM , vol.45 , Issue.3 , pp. 23-25
  • 36
    • 33748571655 scopus 로고
    • Construction of masking error for categorical variables
    • American Statistical Association, Alexandria, VA
    • Sullivan, G., W. A. Fuller. 1990. Construction of masking error for categorical variables. Proc. Section Survey Res. Methods, American Statistical Association, Alexandria, VA, 435-439.
    • (1990) Proc. Section Survey Res. Methods , pp. 435-439
    • Sullivan, G.1    Fuller, W.A.2
  • 38
    • 0032010369 scopus 로고    scopus 로고
    • Consumer privacy concerns about Internet marketing
    • Wang, H., M. K. O. Lee, C. Wang. 1998. Consumer privacy concerns about Internet marketing. Comm. ACM 41(3) 63-70.
    • (1998) Comm. ACM , vol.41 , Issue.3 , pp. 63-70
    • Wang, H.1    Lee, M.K.O.2    Wang, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.