메뉴 건너뛰기




Volumn 53, Issue 1, 2007, Pages 101-116

Minimizing information loss and preserving privacy

Author keywords

Hiding patterns; Itemset mining; Sanitization; Sensitive itemsets

Indexed keywords

DATA GENERATOR; HIDING PATTERNS; ITEMSET MINING; SANITIZATION; SENSITIVE ITEMSETS;

EID: 33847045247     PISSN: 00251909     EISSN: 15265501     Source Type: Journal    
DOI: 10.1287/mnsc.1060.0603     Document Type: Article
Times cited : (40)

References (22)
  • 1
    • 0001882616 scopus 로고
    • Fast algorithms for mining association rules in large databases
    • Morgan Kaufmann, San Francisco, CA
    • Agrawal, R., R. Srikant. 1994. Fast algorithms for mining association rules in large databases. Proc. 20th Internat. Conf. Very Large Databases, Morgan Kaufmann, San Francisco, CA, 487-499.
    • (1994) Proc. 20th Internat. Conf. Very Large Databases , pp. 487-499
    • Agrawal, R.1    Srikant, R.2
  • 3
    • 28244432179 scopus 로고    scopus 로고
    • Integer programming software systems
    • Atamtürk, A., M. Savelsbergh. 2005. Integer programming software systems. Ann. Oper. Res. 140 67-124.
    • (2005) Ann. Oper. Res , vol.140 , pp. 67-124
    • Atamtürk, A.1    Savelsbergh, M.2
  • 6
    • 0033349024 scopus 로고    scopus 로고
    • Disclosure detection in multivariate categorical databases: Auditing confidentiality protection through two new matrix operators
    • Choudhury, S., G. Duncan, R. Krishnan, S. Roehrig, S. Mukherjee. 1999. Disclosure detection in multivariate categorical databases: Auditing confidentiality protection through two new matrix operators. Management Sci. 45(12) 1710-1723.
    • (1999) Management Sci , vol.45 , Issue.12 , pp. 1710-1723
    • Choudhury, S.1    Duncan, G.2    Krishnan, R.3    Roehrig, S.4    Mukherjee, S.5
  • 8
    • 2242464139 scopus 로고    scopus 로고
    • Optimal disclosure limitation strategy in statistical databases: Deterring tracker attacks through additive noise
    • Duncan, G., S. Mukherjee. 2000. Optimal disclosure limitation strategy in statistical databases: Deterring tracker attacks through additive noise. J. Amer. Statist. Assoc. 95(451) 720-729.
    • (2000) J. Amer. Statist. Assoc , vol.95 , Issue.451 , pp. 720-729
    • Duncan, G.1    Mukherjee, S.2
  • 9
    • 4444235806 scopus 로고    scopus 로고
    • A local branching heuristic for mixed-integer programs with 2-level variables, with an application to a telecommunication network design problem
    • Fischetti, M., C. Polo, M. Scantamburlo. 2004. A local branching heuristic for mixed-integer programs with 2-level variables, with an application to a telecommunication network design problem. Networks 44(2) 61-72.
    • (2004) Networks , vol.44 , Issue.2 , pp. 61-72
    • Fischetti, M.1    Polo, C.2    Scantamburlo, M.3
  • 10
    • 0036602405 scopus 로고    scopus 로고
    • Privacy protection of binary confidential data against deterministic, stochastic, and insider threat
    • Garfinkel, R., R. Gopal, P. Goes. 2002. Privacy protection of binary confidential data against deterministic, stochastic, and insider threat. Management Sci. 48(6) 749-764.
    • (2002) Management Sci , vol.48 , Issue.6 , pp. 749-764
    • Garfinkel, R.1    Gopal, R.2    Goes, P.3
  • 11
    • 2442465323 scopus 로고    scopus 로고
    • Ph.D. thesis, Universiteit Limburg, Diepenbeek, Belgium
    • Goethals, B. 2002. Efficient frequent pattern mining. Ph.D. thesis, Universiteit Limburg, Diepenbeek, Belgium.
    • (2002) Efficient frequent pattern mining
    • Goethals, B.1
  • 14
    • 33847019833 scopus 로고    scopus 로고
    • When to share: Wal-Mart and other companies reassess their data-sharing strategies
    • Heun, C. 2001. When to share: Wal-Mart and other companies reassess their data-sharing strategies. InformationWeek.com. http://www. informationweek.com/838/data.htm.
    • (2001) InformationWeek.com
    • Heun, C.1
  • 15
    • 33847011611 scopus 로고    scopus 로고
    • ILOG. 2003. ILOG CPLEX 9.0 User's Manual. ILOG Inc., Gentilly, France.
    • ILOG. 2003. ILOG CPLEX 9.0 User's Manual. ILOG Inc., Gentilly, France.
  • 16
    • 78149313084 scopus 로고    scopus 로고
    • CMAR: Accurate and efficient classification based on multiple class-association rules
    • IEEE Computer Society, Washington, D.C
    • Li, W., J. Man, J. Pei. 2001. CMAR: Accurate and efficient classification based on multiple class-association rules. ICDM '01: Proc. First IEEE Internat. Conf. Data Mining (ICDM '01), IEEE Computer Society, Washington, D.C., 369-376.
    • (2001) ICDM '01: Proc. First IEEE Internat. Conf. Data Mining (ICDM '01) , pp. 369-376
    • Li, W.1    Man, J.2    Pei, J.3
  • 17
    • 33847010448 scopus 로고    scopus 로고
    • Collaborative business: Companies that dare to share information are cashing in on new opportunities
    • McDougall, P. 2001. Collaborative business: Companies that dare to share information are cashing in on new opportunities. InformationWeek.com. http://informationweek.com/836/collaborate.htm.
    • (2001) InformationWeek.com
    • McDougall, P.1
  • 18
    • 25844456648 scopus 로고    scopus 로고
    • Maximizing accuracy of shared databases when concealing sensitive patterns
    • Menon, S., S. Sarkar, S. Mukherjee. 2005. Maximizing accuracy of shared databases when concealing sensitive patterns. Inform. Systems Res. 16(3) 256-270.
    • (2005) Inform. Systems Res , vol.16 , Issue.3 , pp. 256-270
    • Menon, S.1    Sarkar, S.2    Mukherjee, S.3
  • 19
  • 20
    • 0036909696 scopus 로고    scopus 로고
    • The security of confidential numerical data in databases
    • Sarathy, R., K. Muralidhar. 2002. The security of confidential numerical data in databases. Inform. Systems Res. 13(4) 389-403.
    • (2002) Inform. Systems Res , vol.13 , Issue.4 , pp. 389-403
    • Sarathy, R.1    Muralidhar, K.2
  • 22
    • 33847018674 scopus 로고    scopus 로고
    • GHIC: A hierarchical pattern-based clustering algorithm for grouping web transactions
    • Yang, Y., B. Padmanabhan. 2005. GHIC: A hierarchical pattern-based clustering algorithm for grouping web transactions. IEEE Trans. Knowledge Data Engrg. 17(9) 1300-1304.
    • (2005) IEEE Trans. Knowledge Data Engrg , vol.17 , Issue.9 , pp. 1300-1304
    • Yang, Y.1    Padmanabhan, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.