메뉴 건너뛰기




Volumn 21, Issue 2, 2006, Pages 143-154

Privacy and confidentiality in an e-commerce world: Data mining, data warehousing, matching and disclosure limitation

Author keywords

Encryption; Multiparty computation; Privacy preserving data mining; R U confidentiality map; Record linkage; Selective revelation

Indexed keywords


EID: 33748542906     PISSN: 08834237     EISSN: None     Source Type: Journal    
DOI: 10.1214/088342306000000240     Document Type: Conference Paper
Times cited : (45)

References (40)
  • 4
    • 0024011426 scopus 로고
    • Information technology and dataveillance
    • CLARKE, R. (1988). Information technology and dataveillance. Comm. ACM 31 498-512.
    • (1988) Comm. ACM , vol.31 , pp. 498-512
    • Clarke, R.1
  • 5
    • 0035694218 scopus 로고    scopus 로고
    • Bounds for cell entries in contingency tables induced by fixed marginal totals
    • DOBRA, A. and FIENBERG, S. E. (2001). Bounds for cell entries in contingency tables induced by fixed marginal totals. Statist. J. United Nations ECE 18 363-371.
    • (2001) Statist. J. United Nations ECE , vol.18 , pp. 363-371
    • Dobra, A.1    Fienberg, S.E.2
  • 6
    • 26944436059 scopus 로고    scopus 로고
    • Bounding entries in multi-way contingency tables given a set of marginal totals
    • (Y. Haitovsky, H. R. Lerche and Y. Ritov, eds.). Physica, Heidelberg. MR2017809
    • DOBRA, A. and FIENBERG, S. E. (2003). Bounding entries in multi-way contingency tables given a set of marginal totals. In Foundations of Statistical Inference (Y. Haitovsky, H. R. Lerche and Y. Ritov, eds.) 3-16. Physica, Heidelberg. MR2017809
    • (2003) Foundations of Statistical Inference , pp. 3-16
    • Dobra, A.1    Fienberg, S.E.2
  • 8
    • 0348062787 scopus 로고    scopus 로고
    • Disclosure risk assessment in statistical microdata protection via advanced record linkage
    • MR2005437
    • DOMINGO-FERRER, J. and TORRA, V. (2003). Disclosure risk assessment in statistical microdata protection via advanced record linkage. Stat. Comput. 13 343-354. MR2005437
    • (2003) Stat. Comput. , vol.13 , pp. 343-354
    • Domingo-Ferrer, J.1    Torra, V.2
  • 11
    • 33748566653 scopus 로고    scopus 로고
    • Database security and confidentiality: Examining disclosure risk vs. data utility through the R-U confidentiality map
    • National Institute of Statistical Sciences
    • DUNCAN, G. T., KELLER-MCNULTY, S. A. and STOKES, S. L. (2004). Database security and confidentiality: Examining disclosure risk vs. data utility through the R-U confidentiality map. Technical Report 142, National Institute of Statistical Sciences.
    • (2004) Technical Report , vol.142
    • Duncan, G.T.1    Keller-McNulty, S.A.2    Stokes, S.L.3
  • 12
    • 20744438219 scopus 로고    scopus 로고
    • Disclosure risk vs. data utility: The R-U confidentiality map as applied to topcoding
    • MR2061932
    • DUNCAN, G. T. and STOKES, S. L. (2004). Disclosure risk vs. data utility: The R-U confidentiality map as applied to topcoding. Chance 17(3) 16-20. MR2061932
    • (2004) Chance , vol.17 , Issue.3 , pp. 16-20
    • Duncan, G.T.1    Stokes, S.L.2
  • 13
    • 35048856104 scopus 로고    scopus 로고
    • Privacy-preserving data mining on vertically partitioned databases
    • Univ. California, Santa Barbara
    • DWORK, C. and NISSIM, K. (2004). Privacy-preserving data mining on vertically partitioned databases. In Proc. CRYPTO 2004, 24th International Conference on Cryptology 528-544. Univ. California, Santa Barbara.
    • (2004) Proc. CRYPTO 2004, 24th International Conference on Cryptology , pp. 528-544
    • Dwork, C.1    Nissim, K.2
  • 15
    • 33748533643 scopus 로고    scopus 로고
    • Confidentiality and disclosure limitation
    • North-Holland, Amsterdam
    • FIENBERG, S. E. (2005). Confidentiality and disclosure limitation. Encyclopedia of Social Measurement 463-469. North-Holland, Amsterdam.
    • (2005) Encyclopedia of Social Measurement , pp. 463-469
    • Fienberg, S.E.1
  • 16
    • 83255177748 scopus 로고    scopus 로고
    • Homeland insecurity: Datamining, terrorism detection, and confidentiality
    • 55th Session. Sydney
    • FIENBERG, S. E. (2005). Homeland insecurity: Datamining, terrorism detection, and confidentiality. Bull. Internat. Stat. Inst., 55th Session. Sydney.
    • (2005) Bull. Internat. Stat. Inst.
    • Fienberg, S.E.1
  • 17
    • 13844277022 scopus 로고    scopus 로고
    • Statistical issues and challenges associated with rapid detection of bio-terrorist attacks
    • MR2134521
    • FIENBERG, S. E. and SHMUELI, G. (2005). Statistical issues and challenges associated with rapid detection of bio-terrorist attacks. Stat. Med. 24 513-529. MR2134521
    • (2005) Stat. Med. , vol.24 , pp. 513-529
    • Fienberg, S.E.1    Shmueli, G.2
  • 18
    • 26944483284 scopus 로고    scopus 로고
    • Making the release of confidential data from multi-way tables count
    • MR2061930
    • FIENBERG, S. E. and SLAVKOVIC, A. B. (2004). Making the release of confidential data from multi-way tables count. Chance 17(3) 5-10. MR2061930
    • (2004) Chance , vol.17 , Issue.3 , pp. 5-10
    • Fienberg, S.E.1    Slavkovic, A.B.2
  • 19
    • 26944471098 scopus 로고    scopus 로고
    • Preserving the confidentiality of categorical statistical data bases when releasing information for association rules
    • FIENBERG, S. E. and SLAVKOVIC, A. B. (2005). Preserving the confidentiality of categorical statistical data bases when releasing information for association rules. Data Mining and Knowledge Discovery 11 155-180.
    • (2005) Data Mining and Knowledge Discovery , vol.11 , pp. 155-180
    • Fienberg, S.E.1    Slavkovic, A.B.2
  • 20
    • 0036563104 scopus 로고    scopus 로고
    • Confidentiality via camouflage: The CVC approach to disclosure limitation when answering queries to databases
    • MR1910286
    • GOPAL, R., GARFINKEL, R. and GOES, P. (2002). Confidentiality via camouflage: The CVC approach to disclosure limitation when answering queries to databases. Oper. Res. 50 501-516. MR1910286
    • (2002) Oper. Res. , vol.50 , pp. 501-516
    • Gopal, R.1    Garfinkel, R.2    Goes, P.3
  • 21
    • 33748563765 scopus 로고    scopus 로고
    • (chair: J. D. Tygar) Briefing
    • INFORMATION SCIENCE AND TECHNOLOGY STUDY GROUP ON SECURITY AND PRIVACY (chair: J. D. Tygar) (2002). Security With Privacy. Briefing.
    • (2002) Security with Privacy
  • 22
    • 0028950887 scopus 로고
    • Probabilistic linkage of large public health data files
    • JARO, M. A. (1995). Probabilistic linkage of large public health data files. Stat. Med. 14 491-498.
    • (1995) Stat. Med. , vol.14 , pp. 491-498
    • Jaro, M.A.1
  • 23
    • 78049354221 scopus 로고    scopus 로고
    • Secure statistical analysis of distributed databases
    • (A. Wilson, G. Wilson and D. H. Olwell, eds.). Springer, New York
    • KARR, A. F., LIN, X., SANIL, A. P. and REITER, J. P. (2006). Secure statistical analysis of distributed databases. In Statistical Methods in Counterterrorism (A. Wilson, G. Wilson and D. H. Olwell, eds.). Springer, New York.
    • (2006) Statistical Methods in Counterterrorism
    • Karr, A.F.1    Lin, X.2    Sanil, A.P.3    Reiter, J.P.4
  • 24
    • 33744771767 scopus 로고    scopus 로고
    • Watching the watchers: Surveillance, transparency, and political freedom in the war on terror
    • KREIMER, S. F. (2004). Watching the watchers: Surveillance, transparency, and political freedom in the war on terror. J. Constitutional Law 7 133-181.
    • (2004) J. Constitutional Law , vol.7 , pp. 133-181
    • Kreimer, S.F.1
  • 25
    • 1842816411 scopus 로고    scopus 로고
    • Iterative automated record linkage using mixture models
    • LARSEN, M. D. and RUBIN, D. B. (2001). Iterative automated record linkage using mixture models. J. Amer. Statist. Assoc. 96 32-41.
    • (2001) J. Amer. Statist. Assoc. , vol.96 , pp. 32-41
    • Larsen, M.D.1    Rubin, D.B.2
  • 26
    • 84891471665 scopus 로고    scopus 로고
    • Private matching
    • (D. T. Lee, S. P. Shieh and J. D. Tygar, eds.). Springer, New York
    • LI, Y., TYGAR, J. D. and HELLERSTEIN, J. M. (2005). Private matching. In Computer Security in the 21st Century (D. T. Lee, S. P. Shieh and J. D. Tygar, eds.) 25-50. Springer, New York.
    • (2005) Computer Security in the 21st Century , pp. 25-50
    • Li, Y.1    Tygar, J.D.2    Hellerstein, J.M.3
  • 27
    • 33748530478 scopus 로고    scopus 로고
    • Presentation to the Department of Defense Technology and Privacy Advisory Committee, September 29, 2003
    • LUNT, T. (2003). Protecting privacy in terrorist tracking applications. Presentation to the Department of Defense Technology and Privacy Advisory Committee, September 29, 2003.
    • (2003) Protecting Privacy in Terrorist Tracking Applications
    • Lunt, T.1
  • 29
    • 0035565671 scopus 로고    scopus 로고
    • An improved security requirement for data perturbation with implications for e-commerce
    • MURALIDHAR, K., SARATHY, R. and PARSA, R. (2001). An improved security requirement for data perturbation with implications for e-commerce. Decision Sci. 32 683-698.
    • (2001) Decision Sci. , vol.32 , pp. 683-698
    • Muralidhar, K.1    Sarathy, R.2    Parsa, R.3
  • 31
    • 33748562987 scopus 로고    scopus 로고
    • Presented to the Transportation Security Administration, September 19, 2005
    • SECURE FLIGHT WORKING GROUP (2005). Report of the secure flight working group. Presented to the Transportation Security Administration, September 19, 2005. Available at www.epic.org/privacy/airtravel/sfwg_report_091905.pdf.
    • (2005) Report of the Secure Flight Working Group
  • 32
    • 84858420537 scopus 로고    scopus 로고
    • Privacy-preserving bio-terrorism surveillance
    • AI Technologies for Homeland Security, Stanford Univ.
    • SWEENEY, L. (2005). Privacy-preserving bio-terrorism surveillance. Presentation at AAAI Spring Symposium, AI Technologies for Homeland Security, Stanford Univ.
    • (2005) AAAI Spring Symposium
    • Sweeney, L.1
  • 33
    • 33748582457 scopus 로고    scopus 로고
    • Privacy-preserving surveillance using selective revelation
    • School Computer Science, Carnegie Mellon Univ.
    • SWEENEY, L. (2005). Privacy-preserving surveillance using selective revelation. LIDAP Working Paper 15, School Computer Science, Carnegie Mellon Univ.
    • (2005) LIDAP Working Paper , vol.15
    • Sweeney, L.1
  • 34
    • 33748568636 scopus 로고    scopus 로고
    • Presentation at Microsoft Research, June 18, 2003. Available at research.microsoft.com/projects/SWSecInstitute/slides/Tygar. pdf
    • TYGAR, J. D. (2003). Privacy architectures. Presentation at Microsoft Research, June 18, 2003. Available at research.microsoft.com/projects/ SWSecInstitute/slides/Tygar. pdf.
    • (2003) Privacy Architectures
    • Tygar, J.D.1
  • 35
    • 35248894946 scopus 로고    scopus 로고
    • Privacy in sensor webs and distributed information systems
    • (M. Okada, B. Pierce, A. Scedrov, H. Tokuda and A. Yonezawa, eds.) Springer. New York
    • TYGAR, J. D. (2003). Privacy in sensor webs and distributed information systems. In Software Security Theories and Systems (M. Okada, B. Pierce, A. Scedrov, H. Tokuda and A. Yonezawa, eds.) 84-95. Springer. New York.
    • (2003) Software Security Theories and Systems , pp. 84-95
    • Tygar, J.D.1
  • 36
    • 10844295309 scopus 로고    scopus 로고
    • Department of Defense, Washington
    • U.S. DEPARTMENT OF DEFENSE TECHNOLOGY AND PRIVACY ADVISORY COMMITTEE (TAPAC) (2004). Safeguarding Privacy in the Fight Against Terrorism. Department of Defense, Washington.
    • (2004) Safeguarding Privacy in the Fight Against Terrorism
  • 37
    • 26844471597 scopus 로고    scopus 로고
    • GAO-04-548, Report to the Ranking Minority Member, Subcommittee on Financial Management, the Budget and International Security. Committee on Governmental Affairs, U.S. Senate, Washington
    • U.S. GENERAL ACCOUNTING OFFICE (2004). Data Mining: Federal Efforts Cover a Wide Range of Uses. GAO-04-548, Report to the Ranking Minority Member, Subcommittee on Financial Management, the Budget and International Security. Committee on Governmental Affairs, U.S. Senate, Washington.
    • (2004) Data Mining: Federal Efforts Cover a Wide Range of Uses
  • 38
    • 2942741943 scopus 로고    scopus 로고
    • Methods for record linkage and Bayesian networks
    • Amer. Statist. Assoc., Alexandria, VA
    • WINKLER, W. E. (2002). Methods for record linkage and Bayesian networks. Proc. Section Survey Research Methods 3743-3748. Amer. Statist. Assoc., Alexandria, VA.
    • (2002) Proc. Section Survey Research Methods , pp. 3743-3748
    • Winkler, W.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.