메뉴 건너뛰기




Volumn 43, Issue 1, 2007, Pages 181-191

Dare to share: Protecting sensitive knowledge with data sanitization

Author keywords

Data mining; Data sanitization; Data utility; Sensitive knowledge protection

Indexed keywords

DATA MINING; HEURISTIC METHODS; INFORMATION RETRIEVAL; KNOWLEDGE BASED SYSTEMS; SECURITY OF DATA;

EID: 33846040793     PISSN: 01679236     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dss.2006.08.007     Document Type: Article
Times cited : (112)

References (27)
  • 3
    • 0032108252 scopus 로고    scopus 로고
    • A study of the effect of communication channel and authority on group decision processes and outcomes
    • Barkhi R., Jacob V.S., Pipino L., and Pirkul H. A study of the effect of communication channel and authority on group decision processes and outcomes. Decision Support Systems 23 3 (1998) 205-226
    • (1998) Decision Support Systems , vol.23 , Issue.3 , pp. 205-226
    • Barkhi, R.1    Jacob, V.S.2    Pipino, L.3    Pirkul, H.4
  • 4
    • 2342570943 scopus 로고    scopus 로고
    • The influence of communication mode and incentive structure on GDSS process and outcomes
    • Barkhi R., Jacob V.S., and Pirkul H. The influence of communication mode and incentive structure on GDSS process and outcomes. Decision Support Systems 37 2 (2004) 287-305
    • (2004) Decision Support Systems , vol.37 , Issue.2 , pp. 287-305
    • Barkhi, R.1    Jacob, V.S.2    Pirkul, H.3
  • 9
    • 33846051044 scopus 로고    scopus 로고
    • CPLEX 9.0 User's Manual, ILOG Inc., http://www.ilog.com, Mountain View, CA, 2005.
  • 11
    • 33846055053 scopus 로고    scopus 로고
    • M. Limayem, Probir Banerjee, Louis Ma, Impact of GDSS: Opening the black box Decision Support Systems, Available online December 20, 2005 (in press).
  • 12
    • 33846104594 scopus 로고    scopus 로고
    • The true lift model-a novel data mining approach to response modeling in database marketing
    • Lo V.S.Y. The true lift model-a novel data mining approach to response modeling in database marketing. SIGKDD Explorations 4 2 (2002) 78-86
    • (2002) SIGKDD Explorations , vol.4 , Issue.2 , pp. 78-86
    • Lo, V.S.Y.1
  • 13
    • 0036133050 scopus 로고    scopus 로고
    • A methodology for controlled empirical investigation of membership continuity and change in GDSS groups
    • Mathiyalakan S. A methodology for controlled empirical investigation of membership continuity and change in GDSS groups. Decision Support Systems 32 3 (2002) 279-295
    • (2002) Decision Support Systems , vol.32 , Issue.3 , pp. 279-295
    • Mathiyalakan, S.1
  • 14
    • 25844456648 scopus 로고    scopus 로고
    • Maximizing accuracy of shared databases when concealing sensitive patterns
    • Menon S., Mukherjee S., and Sarkar S. Maximizing accuracy of shared databases when concealing sensitive patterns. Information Systems Research 16 3 (2005) 256-270
    • (2005) Information Systems Research , vol.16 , Issue.3 , pp. 256-270
    • Menon, S.1    Mukherjee, S.2    Sarkar, S.3
  • 15
    • 0000610330 scopus 로고    scopus 로고
    • A general additive data perturbation accuracy in statistical databases: The case for the multiplicative data perturbation approach
    • Muralidhar K., Parsa R., and Sarathy R. A general additive data perturbation accuracy in statistical databases: The case for the multiplicative data perturbation approach. Management Science 41 9 (1999) 1549-1564
    • (1999) Management Science , vol.41 , Issue.9 , pp. 1549-1564
    • Muralidhar, K.1    Parsa, R.2    Sarathy, R.3
  • 18
    • 0034501463 scopus 로고    scopus 로고
    • Leadership and group search in group decision support systems
    • Rees J., and Koehler G.J. Leadership and group search in group decision support systems. Decision Support Systems 30 1 (2000) 73-82
    • (2000) Decision Support Systems , vol.30 , Issue.1 , pp. 73-82
    • Rees, J.1    Koehler, G.J.2
  • 21
    • 0036909696 scopus 로고    scopus 로고
    • The security of confidential numerical data in databases
    • Sarathy R., and Muralidhar K. The security of confidential numerical data in databases. Information Systems Research 13 4 (2002) 389-403
    • (2002) Information Systems Research , vol.13 , Issue.4 , pp. 389-403
    • Sarathy, R.1    Muralidhar, K.2
  • 22
    • 0036971583 scopus 로고    scopus 로고
    • Perturbing nonnormal confidential attributes: the copula approach
    • Sarathy R., Muralidhar K., and Parsa R. Perturbing nonnormal confidential attributes: the copula approach. Management Science 48 12 (2002) 1613-1627
    • (2002) Management Science , vol.48 , Issue.12 , pp. 1613-1627
    • Sarathy, R.1    Muralidhar, K.2    Parsa, R.3
  • 23
    • 0344990562 scopus 로고    scopus 로고
    • Using unknowns to prevent discovery of association rules
    • Saygin Y., Veykios V.S., and Clifton C. Using unknowns to prevent discovery of association rules. SIGMOD Record 30 4 (2001) 45-54
    • (2001) SIGMOD Record , vol.30 , Issue.4 , pp. 45-54
    • Saygin, Y.1    Veykios, V.S.2    Clifton, C.3
  • 27
    • 33846047996 scopus 로고    scopus 로고
    • http://www.stanford.edu/group/security/securecomputing/files/data_destruction_guidelines_v102.pdf.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.