-
2
-
-
33745899910
-
-
A. Amirbekyan and V. Estivill-Castro, Privacy preserving bscan for vertically partitioned data. in IEEE International Conference on Intelligence and Security Informatics, ISI 2006, ser. Lecture Notes in Computer Science, S. Mehrotra, D. Zeng, H. Chen, B. Thuraisingham, and F.-Y. Wang, Eds., 3975. San Diego, CA, USA: Springer, May 23-24 2006, pp. 141-153.
-
A. Amirbekyan and V. Estivill-Castro, "Privacy preserving bscan for vertically partitioned data." in IEEE International Conference on Intelligence and Security Informatics, ISI 2006, ser. Lecture Notes in Computer Science, S. Mehrotra, D. Zeng, H. Chen, B. Thuraisingham, and F.-Y. Wang, Eds., vol. 3975. San Diego, CA, USA: Springer, May 23-24 2006, pp. 141-153.
-
-
-
-
3
-
-
33745884370
-
-
A. HajYasien, V. Estivill-Castro, and R. Topor, Sanitization of databases for refined privacy trade-offs. in IEEE International Conference on Intelligence and Security Informatics, ISI 2006, ser Lecture Notes in Computer Science, S. Mehrotra, D. Zeng, H. Chen, B. Thuraisingham, and F.-Y. Wang, Eds., 3975. San Diego, CA, USA: Springer, May 23-24 2006, pp. 522-528.
-
A. HajYasien, V. Estivill-Castro, and R. Topor, "Sanitization of databases for refined privacy trade-offs." in IEEE International Conference on Intelligence and Security Informatics, ISI 2006, ser Lecture Notes in Computer Science, S. Mehrotra, D. Zeng, H. Chen, B. Thuraisingham, and F.-Y. Wang, Eds., vol. 3975. San Diego, CA, USA: Springer, May 23-24 2006, pp. 522-528.
-
-
-
-
4
-
-
24944535795
-
-
J. Zhan, A. Matwin, and L. Chang, Private mining of association rules, in IEEE International Conference on Intelligence and Security Informatics, ISI 2005, ser. Lecture Notes in Computer Science, P. Kantor, G. Muresan, E Roberts, D. Zeng, F.-Y. Wang, H. Chen, and R. Merkle, Eds., 3495. Atlanta, GA, USA: Springer, May 19-20 2005, pp. 72-80.
-
J. Zhan, A. Matwin, and L. Chang, "Private mining of association rules," in IEEE International Conference on Intelligence and Security Informatics, ISI 2005, ser. Lecture Notes in Computer Science, P. Kantor, G. Muresan, E Roberts, D. Zeng, F.-Y. Wang, H. Chen, and R. Merkle, Eds., vol. 3495. Atlanta, GA, USA: Springer, May 19-20 2005, pp. 72-80.
-
-
-
-
5
-
-
26444613270
-
Privacy-preserving collaborative association rule mining
-
Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec, Storrs, CT, USA: Springer, August 7-10
-
_, "Privacy-preserving collaborative association rule mining." in Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec, ser. Lecture Notes in Computer Science, vol. 3654. Storrs, CT, USA: Springer, August 7-10 2005, pp. 153-165.
-
(2005)
ser. Lecture Notes in Computer Science
, vol.3654
, pp. 153-165
-
-
Mena, J.1
-
6
-
-
35048843897
-
-
N. Zhang, S. Wang, and W. Zhao, A new scheme on privacy preserving association rule mining. in PKDD 2004, 8th European Conference on Principles and Practice of Knowledge Discovery in Databases, Pisa, Italy, September 20-24, 2004, Proceedings, ser. Lecture Notes in Computer Science, J.-F. Boulicaut, F. Esposito, F. Giannotti, and D. Pedreschi, Eds., 3202. Pisa, Italy: Springer, September 20-24 2004, pp. 484-495.
-
N. Zhang, S. Wang, and W. Zhao, "A new scheme on privacy preserving association rule mining." in PKDD 2004, 8th European Conference on Principles and Practice of Knowledge Discovery in Databases, Pisa, Italy, September 20-24, 2004, Proceedings, ser. Lecture Notes in Computer Science, J.-F. Boulicaut, F. Esposito, F. Giannotti, and D. Pedreschi, Eds., vol. 3202. Pisa, Italy: Springer, September 20-24 2004, pp. 484-495.
-
-
-
-
7
-
-
4544302774
-
Privacy-preserving association rule mining in large-scale distributed systems
-
Chicago, Illinois, USA: IEEE Computer Society, April 19-22
-
A. Schuster, R. Wolff, and B. Gilburd, "Privacy-preserving association rule mining in large-scale distributed systems," in 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID). Chicago, Illinois, USA: IEEE Computer Society, April 19-22 2004, pp. 411-418.
-
(2004)
4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID)
, pp. 411-418
-
-
Schuster, A.1
Wolff, R.2
Gilburd, B.3
-
8
-
-
0242709355
-
Privacy preserving association rule mining in vertically partitioned data
-
Edmonton, Alberta, Canada: ACM, July 23-26
-
J. Vaidya and C. Clifton, "Privacy preserving association rule mining in vertically partitioned data." in Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Edmonton, Alberta, Canada: ACM, July 23-26 2002, pp. 639-644.
-
(2002)
Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 639-644
-
-
Vaidya, J.1
Clifton, C.2
-
10
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
_, "Privacy-preserving distributed mining of association rules on horizontally partitioned data." IEEE Trans. Knowl. Data Eng., vol. 16, no. 9, pp. 1026-1037, 2004.
-
(2004)
IEEE Trans. Knowl. Data Eng
, vol.16
, Issue.9
, pp. 1026-1037
-
-
Kantarcioglu, M.1
Clifton, C.2
-
11
-
-
33746056957
-
Protecting sensitive knowledge by data sanitization
-
Melbourne Florida, USA, November
-
S. Oliveira and O. Zaiane, "Protecting sensitive knowledge by data sanitization," in Proc. of the 3rd IEEE International Conference on Data Mining (ICDM'03), Melbourne Florida, USA, November 2003, pp. 613-616.
-
(2003)
Proc. of the 3rd IEEE International Conference on Data Mining (ICDM'03)
, pp. 613-616
-
-
Oliveira, S.1
Zaiane, O.2
-
12
-
-
34748891952
-
-
W Du and Z. Zhan, Building decision tree classifier on private data, in Privacy, Security and Data Mining, V. Estivill-Castro and C. Clifton, Eds., IEEE ICDM Workshop Proceedings, 14 in the Conferences in Research and Practice in Information Technology Series. Sydney Australia: Australian Computer Society December 2002, pp. 1-8.
-
W Du and Z. Zhan, "Building decision tree classifier on private data," in Privacy, Security and Data Mining, V. Estivill-Castro and C. Clifton, Eds., IEEE ICDM Workshop Proceedings, Volume 14 in the Conferences in Research and Practice in Information Technology Series. Sydney Australia: Australian Computer Society December 2002, pp. 1-8.
-
-
-
-
13
-
-
34748828734
-
-
M. Shaneck, Y. Kim, and V. Kumar, Privacy preserving nearest neighbor search, University of Minnesota, Department of Computer Science and Engineering, 4-192 EECS Building, 200 Union St SE, Minneapolis, MIN, USA, Tech. Rep. 06-0149, 2006, to appear in the 2006 IEEE International Workshop on Privacy Aspects of Data Mining, December 2006.
-
M. Shaneck, Y. Kim, and V. Kumar, "Privacy preserving nearest neighbor search," University of Minnesota, Department of Computer Science and Engineering, 4-192 EECS Building, 200 Union St SE, Minneapolis, MIN, USA, Tech. Rep. 06-0149, 2006, to appear in the 2006 IEEE International Workshop on Privacy Aspects of Data Mining, December 2006.
-
-
-
-
14
-
-
77952332120
-
Privacy-preserving k-means clustering over vertically partitioned data
-
Washington, D.C, US: ACM Press, August 24-27
-
J. Vaidya and C. C. Clifton, "Privacy-preserving k-means clustering over vertically partitioned data," in Proceedings of the SIGKDD-AMC Conference of Data Mining. Washington, D.C., US: ACM Press, August 24-27 2003, pp. 206-215.
-
(2003)
Proceedings of the SIGKDD-AMC Conference of Data Mining
, pp. 206-215
-
-
Vaidya, J.1
Clifton, C.C.2
-
15
-
-
14244267516
-
-
V. Estivill-Castro, Private representative-based clustering for vertically partitioned data, in Fifth Mexican International Conference on Computer science (ENC 04), R. Baeza-Yates, J. Marroquin, and E. Chávez, Eds., SMCC. Colima, Mexico: IEEE Computer Society Press, September 2004, pp. 160-167.
-
V. Estivill-Castro, "Private representative-based clustering for vertically partitioned data," in Fifth Mexican International Conference on Computer science (ENC 04), R. Baeza-Yates, J. Marroquin, and E. Chávez, Eds., SMCC. Colima, Mexico: IEEE Computer Society Press, September 2004, pp. 160-167.
-
-
-
-
16
-
-
7444225924
-
Secure association rule sharing
-
Proceedings of the 8th PAKDD Conference. Sydney Australia:, May
-
S. Oliveira, O. Zaïiane, and Y. Saygin, "Secure association rule sharing," in Proceedings of the 8th PAKDD Conference. Sydney Australia: Springer Verlag Lecture Notes in Artificial Intelligence 3056, May 2004, pp. 74-85.
-
(2004)
Springer Verlag Lecture Notes in Artificial Intelligence
, vol.3056
, pp. 74-85
-
-
Oliveira, S.1
Zaïiane, O.2
Saygin, Y.3
-
17
-
-
84947271833
-
Hiding association rules by using confidence and support
-
Pittsburg,PA, April
-
E. Dasseni, V. S. Verykios, A. K. Elmagarmid, and E. Bertino, "Hiding association rules by using confidence and support," in Proc. of the 4th Information Hiding Workshop, Pittsburg,PA, April 2001, pp. 369-383.
-
(2001)
Proc. of the 4th Information Hiding Workshop
, pp. 369-383
-
-
Dasseni, E.1
Verykios, V.S.2
Elmagarmid, A.K.3
Bertino, E.4
-
18
-
-
11844280758
-
Privacy preserving frequent itemset mining
-
Maebashi City Japan, December
-
S. Oliveira and O. Zaïane, "Privacy preserving frequent itemset mining," in Proc. of the IEEE ICDM Workshop on Privacy, Security, and Data Mining, Maebashi City Japan, December 2002, pp. 43-54.
-
(2002)
Proc. of the IEEE ICDM Workshop on Privacy, Security, and Data Mining
, pp. 43-54
-
-
Oliveira, S.1
Zaïane, O.2
-
19
-
-
84879121553
-
Algorithms for balancing privacy and knowledge discovery in association rule mining
-
Hong Kong, China, July
-
S. R. M. Oliveira and O. R. Zaiane, "Algorithms for balancing privacy and knowledge discovery in association rule mining," in proc. of the 7th International Database Engineering and Applications Symposium (IDEAS 2003), Hong Kong, China, July 2003, pp. 54-63.
-
(2003)
proc. of the 7th International Database Engineering and Applications Symposium (IDEAS 2003)
, pp. 54-63
-
-
Oliveira, S.R.M.1
Zaiane, O.R.2
-
20
-
-
33751363543
-
Two new techniques for hiding sensitive itemsets and their empirical evaluation
-
Data Warehousing and Knowledge Discovery, 8th International Conference, DaWaK 2006, Krakow, Poland: Springer, September 4-8
-
A. HajYasien and V. Estivill-Castro, "Two new techniques for hiding sensitive itemsets and their empirical evaluation." in Data Warehousing and Knowledge Discovery, 8th International Conference, DaWaK 2006, ser. Lecture Notes in Computer Science, vol. 4081. Krakow, Poland: Springer, September 4-8 2006, pp. 302-311.
-
(2006)
ser. Lecture Notes in Computer Science
, vol.4081
, pp. 302-311
-
-
HajYasien, A.1
Estivill-Castro, V.2
-
21
-
-
0344990562
-
Using unknowns to prevent discovery of association rules
-
December
-
Y. Saygin, V. S. Verykios, and C. Clifton, "Using unknowns to prevent discovery of association rules," SIGMOD Record, vol. 30(4), pp. 45-54, December 2001.
-
(2001)
SIGMOD Record
, vol.30
, Issue.4
, pp. 45-54
-
-
Saygin, Y.1
Verykios, V.S.2
Clifton, C.3
-
22
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
R. Adam and J. Wortmann, "Security-control methods for statistical databases: A comparative study" ACM Computing Surveys, vol. 21, 1989.
-
(1989)
ACM Computing Surveys
, vol.21
-
-
Adam, R.1
Wortmann, J.2
-
23
-
-
0041379358
-
Protecting data through 'perturbation' techniques: Impact on the knowledge discovery process, ournal of Database
-
April-June
-
R. Wilson and P. P. A. Rosen, "Protecting data through 'perturbation' techniques: Impact on the knowledge discovery process," ournal of Database Management, vol. 14, no. 2, pp. 14-26, April-June 2003.
-
(2003)
Management
, vol.14
, Issue.2
, pp. 14-26
-
-
Wilson, R.1
Rosen, P.P.A.2
-
24
-
-
84958048324
-
Data swapping: Balancing privacy against precision in mining for logic rules
-
Data Warehousing and Knowledge Discovery DaWaK-99, M. Mohania and A. Tjoa, Eds. Florence, Italy
-
V. Estivill-Castro and L. Brankovic, "Data swapping: Balancing privacy against precision in mining for logic rules," in Data Warehousing and Knowledge Discovery DaWaK-99, M. Mohania and A. Tjoa, Eds. Florence, Italy: Springer-Verlag Lecture Notes in Computer Science 1676, 1999, pp. 389-398.
-
(1999)
Springer-Verlag Lecture Notes in Computer Science
, vol.1676
, pp. 389-398
-
-
Estivill-Castro, V.1
Brankovic, L.2
-
25
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
H. Kargupta, S. Datta, A. Wang, and K. Sivakumar, "On the privacy preserving properties of random data perturbation techniques," in Proc. of the Third IEEE International Conference on Data Mining (ICDM'03), 2003.
-
(2003)
Proc. of the Third IEEE International Conference on Data Mining (ICDM'03)
-
-
Kargupta, H.1
Datta, S.2
Wang, A.3
Sivakumar, K.4
-
29
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
San Diego: ACM Press
-
A. Evfimievski, J. Gehrke, and R. Srikant, "Limiting privacy breaches in privacy preserving data mining," in Proc. of the 22nd ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems. San Diego: ACM Press, 2003, pp. 211-222.
-
(2003)
Proc. of the 22nd ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
, pp. 211-222
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
30
-
-
0242625281
-
Privacy preserving mining of association rules
-
ACM Press
-
A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, "Privacy preserving mining of association rules," in Proc. of 8th ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining (KDD), July. ACM Press, 2002, pp. 217-228.
-
(2002)
Proc. of 8th ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining (KDD), July
, pp. 217-228
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
32
-
-
4544312695
-
Cryptographic techniques for privacy-preserving data mining
-
B. Pinkas, "Cryptographic techniques for privacy-preserving data mining," in Proc. of the ACM SIGKDD Explorations, vol. 4, no. 2, 2002, pp. 12-19.
-
(2002)
Proc. of the ACM SIGKDD Explorations
, vol.4
, Issue.2
, pp. 12-19
-
-
Pinkas, B.1
-
33
-
-
35048857810
-
Cryptographic randomized response techniques
-
Singapore: Springer-Verlag, March
-
A. Ambainis, M. Jakobsson, and H. Lipmaa, "Cryptographic randomized response techniques," in Proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography, vol. 2947. Singapore: Springer-Verlag, March 2004, pp. 425-438.
-
(2004)
Proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography
, vol.2947
, pp. 425-438
-
-
Ambainis, A.1
Jakobsson, M.2
Lipmaa, H.3
-
34
-
-
1142303699
-
Information sharing across private databases
-
San Diego, CA: ACM Press, June
-
R. Agrawal, A. Evfimievski, and R. Srikant, "Information sharing across private databases," in Proc. of ACM SIGMOD. San Diego, CA: ACM Press, June 2003.
-
(2003)
Proc. of ACM SIGMOD
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
35
-
-
84974555530
-
Privacy preserving data mining
-
Proceedings of CRYPTO-00 Advances in Cyptology, M. Bellare, Ed. Santa Barbara, California, USA:, August 20-24
-
Y. Lindell and P. B., "Privacy preserving data mining," in Proceedings of CRYPTO-00 Advances in Cyptology, M. Bellare, Ed. Santa Barbara, California, USA: Springer-Verlag Lecture Notes in Computer Science 1880, August 20-24 2000, pp. 36-54.
-
(2000)
Springer-Verlag Lecture Notes in Computer Science
, vol.1880
, pp. 36-54
-
-
Lindell, Y.1
B., P.2
-
36
-
-
77952332120
-
Privacy-preserving k-means clustering over vertically partitioned data
-
Washington, D.C, ACM Press
-
J. Vaidya and C. Clifton, "Privacy-preserving k-means clustering over vertically partitioned data," in Ninth ACM SIGKDD international conference on Knowledge discovery and data mining. Washington, D.C.: ACM Press, 2003, pp. 206-215.
-
(2003)
Ninth ACM SIGKDD international conference on Knowledge discovery and data mining
, pp. 206-215
-
-
Vaidya, J.1
Clifton, C.2
-
38
-
-
0003839182
-
Secure multi-party computation
-
O. Goldreich, "Secure multi-party computation," Working Draft, 1998.
-
(1998)
Working Draft
-
-
Goldreich, O.1
-
41
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
February
-
R. Rivest, A. Shamir, and L. Adelman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, February 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adelman, L.3
-
42
-
-
34748867354
-
Performance comparisons of public-key cryptosystems
-
San Francisco, USA, January
-
M. Wiener, "Performance comparisons of public-key cryptosystems," in Proc. of the RSA Data Security Conference, San Francisco, USA, January 1998.
-
(1998)
Proc. of the RSA Data Security Conference
-
-
Wiener, M.1
-
43
-
-
34748821935
-
Rsa laboratories web site
-
Online, Available: url=http
-
"Rsa laboratories web site." [Online]. Available: url=http://www.devx.com/security/Link/8206
-
-
-
-
44
-
-
0027621699
-
Mining association rules between sets of items in large databases
-
Washington D.C, USA, May
-
R. Agrawal, T. Imielinski, and A. Swami, "Mining association rules between sets of items in large databases," in Proc. of the ACM SIGMOD Conference on Management of Data, Washington D.C., USA, May 1993, pp. 207-216.
-
(1993)
Proc. of the ACM SIGMOD Conference on Management of Data
, pp. 207-216
-
-
Agrawal, R.1
Imielinski, T.2
Swami, A.3
-
45
-
-
0030387678
-
-
D.-L. Cheung, J. Han, V. Ng, A.-C. Fu, and Y. Fu, "A fast distributed algorithm for mining associaiton rales," 1996, pp. 31-42.
-
(1996)
A fast distributed algorithm for mining associaiton rales
, pp. 31-42
-
-
Cheung, D.-L.1
Han, J.2
Ng, V.3
Fu, A.-C.4
Fu, Y.5
-
46
-
-
34748829316
-
Openssl
-
Online, Available: url=http
-
"Openssl." [Online]. Available: url=http://www.openssl.org/
-
-
-
-
48
-
-
0004141908
-
-
3rd ed. New York, NY: Prentice Hall, March
-
A. S. Tanenbaum, Computer Networks, 3rd ed. New York, NY: Prentice Hall, March 1996.
-
(1996)
Computer Networks
-
-
Tanenbaum, A.S.1
-
49
-
-
0030379749
-
Efficient mining of association rules of distributed databases
-
December
-
D. W.-L. Cheung, V. Ng, W.-C. Fu, and Y. Fu, "Efficient mining of association rules of distributed databases," IEEE Transactions Knowledge Data Engineering, vol. 8, no. 6, pp. 911-922, December 1996.
-
(1996)
IEEE Transactions Knowledge Data Engineering
, vol.8
, Issue.6
, pp. 911-922
-
-
Cheung, D.W.-L.1
Ng, V.2
Fu, W.-C.3
Fu, Y.4
-
50
-
-
34748860516
-
-
I.-H. Harm, K.-L. Hui, T. Lee, and P. I.P.L., Online information privacy: Measuring the cost-benefit trade-off, in Proc. of the Twenty-Third International Conference on Information Systems(ICIS), Barcelona, Spain, December 2002.
-
I.-H. Harm, K.-L. Hui, T. Lee, and P. I.P.L., "Online information privacy: Measuring the cost-benefit trade-off," in Proc. of the Twenty-Third International Conference on Information Systems(ICIS), Barcelona, Spain, December 2002.
-
-
-
-
51
-
-
0008715899
-
Freebies and privacy: What net users think
-
Technical report, Opinion Research Corporation, no. 3, p, July
-
A. Westin, "Freebies and privacy: What net users think," Technical report, Opinion Research Corporation, vol. 4, no. 3, p. 26, July 1999.
-
(1999)
, vol.4
, pp. 26
-
-
Westin, A.1
|