메뉴 건너뛰기




Volumn , Issue , 2004, Pages 19-26

Privacy-preserving data integration and sharing

Author keywords

H.2.5 DatabaseManagement : Heterogeneous Databases; H.2.7 Database Management : Database Administration Security, integrity, and protection; H.2.8 Database Management : Database Applications Data mining; Security

Indexed keywords

DATA INTEGRATION; DATA MINING COMMUNITY; DATABASE APPLICATIONS; DATABASE COMMUNITY; DATABASE MANAGEMENT; HETEROGENEOUS DATABASE; MULTIPLE SOURCE; PRIVACY PRESERVING; PRIVACY PRESERVING DATA MINING; SECURITY;

EID: 34748816024     PISSN: 07308078     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1008694.1008698     Document Type: Conference Paper
Times cited : (149)

References (28)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • Dec. [Online]. Available: http://doi.acm.org/10.1145/76894.76895
    • N. R. Adam and J. C. Wortmann, "Security-control methods for statistical databases: A comparative study," ACM Computing Surveys, vol. 21, no. 4, pp. 515-556, Dec. 1989. [Online]. Available: http://doi.acm.org/10. 1145/76894.76895
    • (1989) ACM Computing Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Wortmann, J.C.2
  • 7
    • 0344303378 scopus 로고    scopus 로고
    • Experience with a combined approach to attribute-matching across heterogeneous databases
    • Leysin, Switzerland: Chapman & Hall, Oct. 7-10
    • C. Clifton, E. Housman, and A. Rosenthal, "Experience with a combined approach to attribute-matching across heterogeneous databases," in 7th IFIP 2.6 Working Conference on Database Semantics. Leysin, Switzerland: Chapman & Hall, Oct. 7-10 1997, pp. 428-451.
    • (1997) 7th IFIP 2.6 Working Conference on Database Semantics , pp. 428-451
    • Clifton, C.1    Housman, E.2    Rosenthal, A.3
  • 8
    • 10044273842 scopus 로고    scopus 로고
    • Tools for privacy preserving distributed data mining
    • Jan. [Online]. Available
    • C. Clifton, M. Kantarcioglu, X. Lin, J. Vaidya, and M. Zhu, "Tools for privacy preserving distributed data mining," SIGKDD Explorations, vol. 4, no. 2, pp. 28-34, Jan. 2003. [Online]. Available: http://www.acm.org/sigs/ sigkdd/explorations/issue4-2/contents.htm
    • (2003) SIGKDD Explorations , vol.4 , Issue.2 , pp. 28-34
    • Clifton, C.1    Kantarcioglu, M.2    Lin, X.3    Vaidya, J.4    Zhu, M.5
  • 9
    • 0029792710 scopus 로고    scopus 로고
    • Protecting confidentiality in small population health and environmental statistics
    • L. H. Cox, "Protecting confidentiality in small population health and environmental statistics," Statistics in Medicine, vol. 15, pp. 1895-1905, 1996.
    • (1996) Statistics in Medicine , vol.15 , pp. 1895-1905
    • Cox, L.H.1
  • 11
    • 0019054751 scopus 로고
    • Secure statistical databases with random sample queries
    • Sept. [Online]. Available: http://doi.acm.org/10.1145/320613.320616
    • D. E. Denning, "Secure statistical databases with random sample queries," ACM Transactions on Database Systems, vol. 5, no. 3, pp. 291-315, Sept. 1980. [Online]. Available: http://doi.acm.org/10.1145/320613.320616
    • (1980) ACM Transactions on Database Systems , vol.5 , Issue.3 , pp. 291-315
    • Denning, D.E.1
  • 12
    • 0037365358 scopus 로고    scopus 로고
    • Learning to match the schemas of databases: A multistrategy approach
    • [Online]. Available
    • A. Doan, P. Domingos, and A. Halevy, "Learning to match the schemas of databases: A multistrategy approach," Machine Learning Journal, vol. 50, pp. 279-301, 2003. [Online]. Available: http://anhai.cs.uiuc.edu/home/papers/ lsd-mlj03.pdf
    • (2003) Machine Learning Journal , vol.50 , pp. 279-301
    • Doan, A.1    Domingos, P.2    Halevy, A.3
  • 13
    • 0018444418 scopus 로고
    • Secure databases: Protection against user influence
    • Mar. [Online]. Available: http://doi.acm.org/10.1145/320064.320068
    • D. Dobkin, A. K. Jones, and R. J. Lipton, "Secure databases: Protection against user influence," ACM Transactions on Database Systems, vol. 4, no. 1, pp. 97-106, Mar. 1979. [Online]. Available: http://doi.acm.org/ 10.1145/320064.320068
    • (1979) ACM Transactions on Database Systems , vol.4 , Issue.1 , pp. 97-106
    • Dobkin, D.1    Jones, A.K.2    Lipton, R.J.3
  • 16
    • 0013331361 scopus 로고    scopus 로고
    • Real world data is dirty: Data cleansing and the merge/purge problem
    • M. Hernandez and S. Stolfo, "Real world data is dirty: Data cleansing and the merge/purge problem," Journal of Data Mining and Knowledge Discovery, vol. 2, no. 1, pp. 9-37, 1998.
    • (1998) Journal of Data Mining and Knowledge Discovery , vol.2 , Issue.1 , pp. 9-37
    • Hernandez, M.1    Stolfo, S.2
  • 18
    • 77954004564 scopus 로고    scopus 로고
    • July 17, title VIII section 8120. Enacted as Public Law 108-87 [Online]. Available
    • M. Lewis, "Department of defense appropriations act, 2004," July 17 2003, title VIII section 8120. Enacted as Public Law 108-87. [Online]. Available: http://thomas.loc.gov/cgi-bin/bdquery/z?d108:h.r.02658:
    • (2003) Department of Defense Appropriations Act, 2004
    • Lewis, M.1
  • 19
    • 0034173996 scopus 로고    scopus 로고
    • SEMINT: A tool for identifying attribute correspondences in heterogeneous databases using neural networks
    • Apr. [Online]. Available: http://dx.doi.org/10.1016/S0169-023X(99)00044-0
    • W.-S. Li and C. Clifton, "SEMINT: A tool for identifying attribute correspondences in heterogeneous databases using neural networks," Data and Knowledge Engineering, vol. 33, no. 1, pp. 49-84, Apr. 2000. [Online]. Available: http://dx.doi.org/10.1016/S0169-023X(99)00044-0
    • (2000) Data and Knowledge Engineering , vol.33 , Issue.1 , pp. 49-84
    • Li, W.-S.1    Clifton, C.2
  • 20
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • [Online]. Available
    • Y. Lindell and B. Pinkas, "Privacy preserving data mining," Journal of Cryptology, vol. 15, no. 3, pp. 177-206, 2002. [Online]. Available: http://www.research.ibm.com/people/l/lindell//id3 abs.html
    • (2002) Journal of Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 21
    • 0030084794 scopus 로고    scopus 로고
    • Inference in MLS database systems
    • Feb.
    • D. G. Marks, "Inference in MLS database systems," IEEE Trans. Knowledge Data Eng., vol. 8, no. 1, Feb. 1996.
    • (1996) IEEE Trans. Knowledge Data Eng. , vol.8 , Issue.1
    • Marks, D.G.1
  • 22
    • 85009120801 scopus 로고    scopus 로고
    • Controlling access to published data using cryptography
    • Berlin, Germany: Morgan-Kaufmann, Sept. 9-12 [Online]. Available
    • G. Miklau and D. Suciu, "Controlling access to published data using cryptography," in Proceedings of 29th International Conference on Very Large Data Bases (VLDB 2003). Berlin, Germany: Morgan-Kaufmann, Sept. 9-12 2003, pp. 898-909. [Online]. Available: http://www.vldb.org/conf/2003/papers/S27P01. pdf
    • (2003) Proceedings of 29th International Conference on Very Large Data Bases (VLDB 2003) , pp. 898-909
    • Miklau, G.1    Suciu, D.2
  • 23
    • 0035657983 scopus 로고    scopus 로고
    • On matching schemas automatically
    • E. Rahm and P. Bernstein, "On matching schemas automatically," VLDB Journal, vol. 10, no. 4, 2001.
    • (2001) VLDB Journal , vol.10 , Issue.4
    • Rahm, E.1    Bernstein, P.2
  • 24
    • 36048933310 scopus 로고    scopus 로고
    • Privacy-preserving distributed queries for a clinical case research network
    • C. Clifton and V. Estivill-Castro, Eds., Maebashi City, Japan: Australian Computer Society, Dec. 9 [Online]. Available
    • G. Schadow, S. J. Grannis, and C. J. McDonald, "Privacy-preserving distributed queries for a clinical case research network," in IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, C. Clifton and V. Estivill-Castro, Eds., vol. 14. Maebashi City, Japan: Australian Computer Society, Dec. 9 2002, pp. 55-65. [Online]. Available: http://crpit.com/Vol14.html
    • (2002) IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining , vol.14 , pp. 55-65
    • Schadow, G.1    Grannis, S.J.2    McDonald, C.J.3
  • 25
    • 10944273551 scopus 로고    scopus 로고
    • Don't store my data, Japanese tell government
    • Aug. 24-25
    • D. Struck, "Don't store my data, Japanese tell government," International Herald Tribune, p. 1, Aug. 24-25 2002.
    • (2002) International Herald Tribune , pp. 1
    • Struck, D.1
  • 26
    • 0043029204 scopus 로고    scopus 로고
    • Technical description of RODS: A real-time public health surveillance system
    • Sept.
    • F.-C. Tsui, J. U. Espino, V. M. Dato, P. H. Gesteland, J. Hutman, and M. M. Wagner, "Technical description of RODS: A real-time public health surveillance system," J Am Med Inform Assoc, vol. 10, no. 5, pp. 399-408, Sept. 2003.
    • (2003) J Am Med Inform Assoc , vol.10 , Issue.5 , pp. 399-408
    • Tsui, F.-C.1    Espino, J.U.2    Dato, V.M.3    Gesteland, P.H.4    Hutman, J.5    Wagner, M.M.6
  • 28
    • 0038208065 scopus 로고    scopus 로고
    • A bayesian decision model for cost optimal record matching
    • May
    • V. Verykios, G. Moustakides, and M. Elfeky, "A bayesian decision model for cost optimal record matching," The Very Large Data Bases Journal, vol. 12, no. 1, pp. 28-40, May 2003.
    • (2003) The Very Large Data Bases Journal , vol.12 , Issue.1 , pp. 28-40
    • Verykios, V.1    Moustakides, G.2    Elfeky, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.