메뉴 건너뛰기




Volumn , Issue , 2007, Pages 654-660

Efficient privacy-preserving association rule mining: P4P style

Author keywords

[No Author keywords available]

Indexed keywords

ASSOCIATION RULES; CLIENT SERVER COMPUTER SYSTEMS; DATA PRIVACY; DIGITAL ARITHMETIC; INTEGER PROGRAMMING; NETWORK PROTOCOLS;

EID: 34548749964     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIDM.2007.368938     Document Type: Conference Paper
Times cited : (17)

References (31)
  • 1
    • 32344442645 scopus 로고    scopus 로고
    • A new scheme on privacy-preserving data classification
    • New York, NY, USA: ACM Press
    • N. Zhang, S. Wang, and W. Zhao, "A new scheme on privacy-preserving data classification," in KDD '05. New York, NY, USA: ACM Press, 2005, pp. 374-383.
    • (2005) KDD '05 , pp. 374-383
    • Zhang, N.1    Wang, S.2    Zhao, W.3
  • 2
    • 4544361334 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on. horizontally partitioned data
    • M. Kantarcioglu and C. Clifton, "Privacy-preserving distributed mining of association rules on. horizontally partitioned data," IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 9, pp. 1026-1037, 2004.
    • (2004) IEEE Transactions on Knowledge and Data Engineering , vol.16 , Issue.9 , pp. 1026-1037
    • Kantarcioglu, M.1    Clifton, C.2
  • 3
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Y. Lindell and B. Pinkas, "Privacy preserving data mining," Journal of cryptology, vol. 15, no. 3, pp. 177-206, 2002.
    • (2002) Journal of cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 4
    • 0242709355 scopus 로고    scopus 로고
    • Privacy preserving association rule mining in vertically partitioned data
    • New York, NY, USA: ACM Press
    • J. Vaidya and C. Clifton, "Privacy preserving association rule mining in vertically partitioned data," in KDD '02. New York, NY, USA: ACM Press, 2002, pp. 639-644.
    • (2002) KDD '02 , pp. 639-644
    • Vaidya, J.1    Clifton, C.2
  • 6
    • 2942529194 scopus 로고    scopus 로고
    • Privacy-preserving multivariate statistical analysis: Linear regression, and classification
    • W. Du, Y Han, and S. Chen, "Privacy-preserving multivariate statistical analysis: Linear regression, and classification," in SIAM International Conference on Data Mining, 2004, pp. 222-233.
    • (2004) SIAM International Conference on Data Mining , pp. 222-233
    • Du, W.1    Han, Y.2    Chen, S.3
  • 7
    • 34548780105 scopus 로고    scopus 로고
    • J. Canny and Y Duan, Practical private computation of vector additionbased functions or: Can privacy be for free? Submitted to 2007 IEEE Symposium on Security and Privacy, 2006.
    • J. Canny and Y Duan, "Practical private computation of vector additionbased functions or: Can privacy be for free?" Submitted to 2007 IEEE Symposium on Security and Privacy, 2006.
  • 8
    • 34548755981 scopus 로고    scopus 로고
    • J. F. Canny and Y Duan, Practical private computation of vector addition-based functions or: Can privacy be for free? EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2006-12, February 8 2006. [Online]. Available: http://www.eecs.berkeley.edu/Pubs/TechRpts/2006/EECS- 2006-12.html
    • J. F. Canny and Y Duan, "Practical private computation of vector addition-based functions or: Can privacy be for free?" EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2006-12, February 8 2006. [Online]. Available: http://www.eecs.berkeley.edu/Pubs/TechRpts/2006/EECS- 2006-12.html
  • 9
    • 84880121624 scopus 로고    scopus 로고
    • Privacy-preserving classification of customer data without loss of accuracy
    • Z. Yang, S. Zhong, and R. N. Wright, "Privacy-preserving classification of customer data without loss of accuracy," in SDM 2005, 2005.
    • (2005) SDM 2005
    • Yang, Z.1    Zhong, S.2    Wright, R.N.3
  • 10
    • 0036082701 scopus 로고    scopus 로고
    • Collaborative filtering with privacy
    • Oakland, CA, May, Online, Available
    • J. Canny, "Collaborative filtering with privacy," in IEEE Symposium on Security and Privacy, Oakland, CA, May 2002, pp. 45-57. [Online]. Available: http://citeseer.nj.nec.com/canny02collaborative.html
    • (2002) IEEE Symposium on Security and Privacy , pp. 45-57
    • Canny, J.1
  • 11
    • 8644267631 scopus 로고    scopus 로고
    • Gap: A factor model for discrete data
    • ACM Press
    • J. F. Canny, "Gap: a factor model for discrete data," in SIGIR '04. ACM Press, 2004, pp. 122-129.
    • (2004) SIGIR '04 , pp. 122-129
    • Canny, J.F.1
  • 13
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • ACM
    • M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation," in STOC'88. ACM, 1988, pp. 1-10.
    • (1988) STOC'88 , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 15
    • 84955564077 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • CRYPTO '90, Springer-Verlag
    • S. Goldwasser and L. Levin, "Fair computation of general functions in presence of immoral majority," in CRYPTO '90, ser. LNCS, vol. 537. Springer-Verlag, 1991, pp. 77-93.
    • (1991) ser. LNCS , vol.537 , pp. 77-93
    • Goldwasser, S.1    Levin, L.2
  • 16
    • 0031628398 scopus 로고    scopus 로고
    • Simplified vss and fast-track multiparty computations with applications to threshold cryptography
    • ACM Press
    • R. Gennaro, M. O. Rabin, and T. Rabin, "Simplified vss and fast-track multiparty computations with applications to threshold cryptography," in PODC '98. ACM Press, 1998, pp. 101-111.
    • (1998) PODC '98 , pp. 101-111
    • Gennaro, R.1    Rabin, M.O.2    Rabin, T.3
  • 17
  • 18
    • 0027621699 scopus 로고
    • Mining association rules between sets of items in large databases
    • P. Buneman and S. Jajodia, Eds, Washington D.C, May
    • R. Agrawal, T. Imielinski, and A. Swami, "Mining association rules between sets of items in large databases," in Proceedings of ACM SIGMOD Conference on Management of Data, P. Buneman and S. Jajodia, Eds., Washington D.C., May 1993, pp. 207-216.
    • (1993) Proceedings of ACM SIGMOD Conference on Management of Data , pp. 207-216
    • Agrawal, R.1    Imielinski, T.2    Swami, A.3
  • 19
    • 34548740622 scopus 로고    scopus 로고
    • Privacy preserving collaborative data mining,
    • Ph.D. dissertation, University of Ottawa
    • J. Zhan, "Privacy preserving collaborative data mining," Ph.D. dissertation, University of Ottawa, 2006.
    • (2006)
    • Zhan, J.1
  • 21
    • 84948973732 scopus 로고    scopus 로고
    • Efficient proofs that a committed number lies in an interval
    • Advances in Cryptology, EUROCRYPT 2000, Springer-Verlag
    • F. Boudot, "Efficient proofs that a committed number lies in an interval," in Advances in Cryptology - EUROCRYPT 2000, ser. Lecture Notes in Computer Science, vol. 1807. Springer-Verlag, 2000, pp. 431-444.
    • (2000) ser. Lecture Notes in Computer Science , vol.1807 , pp. 431-444
    • Boudot, F.1
  • 23
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • IEEE
    • A. C-C. Yao, "Protocols for secure computations," in FOCS '82. IEEE, 1982, pp. 160-164.
    • (1982) FOCS '82 , pp. 160-164
    • Yao, A.C.-C.1
  • 24
    • 0023545076 scopus 로고
    • How to play any mental game -a completeness theorem for protocols with honest majority
    • O. Goldreich, S. Micali, and A. Wigderson, "How to play any mental game -a completeness theorem for protocols with honest majority," in STOC '87, 1987, pp. 218-229.
    • (1987) STOC '87 , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 25
    • 84945124606 scopus 로고    scopus 로고
    • Multiparty computation from, threshold homomorphic encryption
    • Springer-Verlag
    • R. Cramer, I. Damgård, and J. B. Nielsen, "Multiparty computation from, threshold homomorphic encryption," in EUROCRYPT '01. Springer-Verlag, 2001, pp. 280-299.
    • (2001) EUROCRYPT '01 , pp. 280-299
    • Cramer, R.1    Damgård, I.2    Nielsen, J.B.3
  • 26
    • 35248844164 scopus 로고    scopus 로고
    • Universally composable efficient multiparty computation from threshold homomorphic encryption
    • CRYPTO 2003, Springer-Verlag
    • I. Damgård and J. B. Nielsen, "Universally composable efficient multiparty computation from threshold homomorphic encryption," in CRYPTO 2003, ser. Lecture Notes in Computer Science. Springer-Verlag, 2003, pp. 247-264.
    • (2003) ser. Lecture Notes in Computer Science , pp. 247-264
    • Damgård, I.1    Nielsen, J.B.2
  • 27
    • 0026839969 scopus 로고
    • Modular construction of a byzantine agreement protocol with optimal message bit complexity
    • B. A. Coan and J. L. Welch, "Modular construction of a byzantine agreement protocol with optimal message bit complexity," Information and Computation, vol. 97, no. 1, pp. 61-85, 1992.
    • (1992) Information and Computation , vol.97 , Issue.1 , pp. 61-85
    • Coan, B.A.1    Welch, J.L.2
  • 28
    • 1142263341 scopus 로고    scopus 로고
    • Limiting privacy breaches in privacy preserving data mining
    • New York, NY, USA: ACM Press
    • A. Evfimievski, J. Gehrke, and R. Srikant, "Limiting privacy breaches in privacy preserving data mining," in PODS '03. New York, NY, USA: ACM Press, 2003, pp. 211-222.
    • (2003) PODS '03 , pp. 211-222
    • Evfimievski, A.1    Gehrke, J.2    Srikant, R.3
  • 29
    • 77952334884 scopus 로고    scopus 로고
    • Using randomized response techniques for privacy-preserving data mining
    • New York, NY, USA: ACM Press
    • W. Du and Z. Zhan, "Using randomized response techniques for privacy-preserving data mining," in KDD '03. New York, NY, USA: ACM Press, 2003, pp. 505-510.
    • (2003) KDD '03 , pp. 505-510
    • Du, W.1    Zhan, Z.2
  • 30
    • 12244255356 scopus 로고    scopus 로고
    • Privacy-preserving bayesian network structure computation on distributed heterogeneous data
    • New York, NY, USA: ACM Press
    • R. Wright and Z. Yang, "Privacy-preserving bayesian network structure computation on distributed heterogeneous data," in KDD '04. New York, NY, USA: ACM Press, 2004, pp. 713-718.
    • (2004) KDD '04 , pp. 713-718
    • Wright, R.1    Yang, Z.2
  • 31
    • 78149340011 scopus 로고    scopus 로고
    • On the privacy preserving properties of random data perturbation techniques
    • Washington, DC, USA: IEEE Computer Society
    • H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, "On the privacy preserving properties of random data perturbation techniques," in ICDM '03. Washington, DC, USA: IEEE Computer Society, 2003, p. 99.
    • (2003) ICDM '03 , pp. 99
    • Kargupta, H.1    Datta, S.2    Wang, Q.3    Sivakumar, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.