메뉴 건너뛰기




Volumn , Issue , 2007, Pages 696-705

Preservation of patterns and input-output privacy

Author keywords

[No Author keywords available]

Indexed keywords

DATA MINING; DECISION TREES; INPUT OUTPUT PROGRAMS; MATHEMATICAL TRANSFORMATIONS; PATTERN RECOGNITION; PERTURBATION TECHNIQUES;

EID: 34548772871     PISSN: 10844627     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDE.2007.367915     Document Type: Conference Paper
Times cited : (28)

References (10)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases
    • N.R. Adam and J. C. Wortman. Security-control methods for statistical databases. ACM Computing Surveys, 21, 4, pp515-556, 1989.
    • (1989) ACM Computing Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Wortman, J.C.2
  • 3
    • 3142716056 scopus 로고    scopus 로고
    • Order Preserving encryption for numeric data. Proc
    • R. Agrawal et al. Order Preserving encryption for numeric data. Proc. 2004 SIGMOD, pp. 563-574.
    • 2004 SIGMOD , pp. 563-574
    • Agrawal, R.1
  • 4
    • 34548811423 scopus 로고    scopus 로고
    • Preservation Of Patterns and Input-Output Privacy
    • S. Bu et al. Preservation Of Patterns and Input-Output Privacy. Full version of this submission: ftp://ftp.cs.ubc.ca/local/laks/papers/ decisionTreeIcde2007ExtendedVersion.pdf.
    • Full version of this submission
    • Bu, S.1
  • 5
    • 1142263341 scopus 로고    scopus 로고
    • Limiting privacy breaches in privacy preserving data mining. Proc
    • A. Evfimievski, J. Gehrke and R. Srikant. Limiting privacy breaches in privacy preserving data mining. Proc. 2003 PODS, pp. 211-222.
    • 2003 PODS , pp. 211-222
    • Evfimievski, A.1    Gehrke, J.2    Srikant, R.3
  • 6
    • 29844458622 scopus 로고    scopus 로고
    • Deriving private information from randomized data
    • Z. Huang, W. Du and B. Chen. Deriving private information from randomized data. Proc. 2005 SIGMOD, pp. 37-48.
    • Proc. 2005 SIGMOD , pp. 37-48
    • Huang, Z.1    Du, W.2    Chen, B.3
  • 7
    • 78149340011 scopus 로고    scopus 로고
    • On the privacy preserving properties of random data perturbation techniques
    • H. Kargupta et al. On the privacy preserving properties of random data perturbation techniques. Proc. 2003 ICDM, pp. 99-106.
    • Proc. 2003 ICDM , pp. 99-106
    • Kargupta, H.1
  • 8
    • 1142294784 scopus 로고    scopus 로고
    • Privacy-preserving association rule mining
    • S. Rizvi and J. Haritsa. Privacy-preserving association rule mining. Proc. 2002 VLDB, pp. 682-693.
    • Proc. 2002 VLDB , pp. 682-693
    • Rizvi, S.1    Haritsa, J.2
  • 10
    • 77952332120 scopus 로고    scopus 로고
    • Privacy-Preserving K-Means Clustering over Vertically Partitioned Data. Proc
    • J. Valdya and C. Clifton. Privacy-Preserving K-Means Clustering over Vertically Partitioned Data. Proc. 2003 SIGKDD, pp. 206-215.
    • 2003 SIGKDD , pp. 206-215
    • Valdya, J.1    Clifton, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.