-
2
-
-
35048841248
-
A condensation approach to privacy preserving data mining
-
Aggarwal CC, Yu PS (2004) A condensation approach to privacy preserving data mining. In: Lecture notes in computer science, vol 2992, pp 183-199
-
(2004)
Lecture Notes in Computer Science
, vol.2992
, pp. 183-199
-
-
Aggarwal, C.C.1
Yu, P.S.2
-
3
-
-
0041783510
-
Privacy-preserving data mining
-
In: ACM, Dallas, TX, [Online]. Available:
-
Agrawal R, Srikant R (2000) Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD conference on management of data, ACM, Dallas, TX, pp 439-450. [Online]. Available: http://doi.acm.org/ 10.1145/342009.335438
-
(2000)
Proceedings of the 2000 ACM SIGMOD Conference on Management of Data
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
4
-
-
85034837254
-
Secret sharing homomorphisms: Keeping shares of a secret secret
-
Springer-Verlag, Berlin [Online]. Available:
-
Benaloh JC (1986) Secret sharing homomorphisms: Keeping shares of a secret secret. In: Odlyzko A (ed) Advances in cryptography - CRYPTO86: proceedings, vol 263, Lecture notes in computer science, 1986, Springer-Verlag, Berlin, pp 251-260. [Online]. Available: http://springerlink.metapress.com/openurl.asp?genre=article&issn= 0302-9743&volume=263&spage=251
-
(1986)
Advances in Cryptography - CRYPTO86: Proceedings, Vol 263, Lecture Notes in Computer Science, 1986
, pp. 251-260
-
-
Benaloh, J.C.1
-
5
-
-
35048869172
-
An efficient probabilistic public-key encryption that hides all partial information
-
In: Blakely R (ed) Springer-Verlag, Berlin
-
Blum M, Goldwasser S (1984) An efficient probabilistic public-key encryption that hides all partial information. In: Blakely R (ed) Advances in cryptology - Crypto 84 proceedings. Springer-Verlag, Berlin
-
(1984)
Advances in Cryptology - Crypto 84 Proceedings
-
-
Blum, M.1
Goldwasser, S.2
-
6
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
Burges CJC (1998) A tutorial on support vector machines for pattern recognition. Data Min Knowl Discov 2:121-167
-
(1998)
Data Min Knowl Discov
, vol.2
, pp. 121-167
-
-
Burges, C.J.C.1
-
8
-
-
0003187764
-
Directive 95/46/EC of the European parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
Directive 95/46/EC of the European parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Off J Eur Communities I(281):31-50
-
Off J Eur Communities
, vol.1
, Issue.281
, pp. 31-50
-
-
-
10
-
-
1642302606
-
Building decision tree classifier on private data
-
In: Clifton C, Estivill-Castro V (eds) Australian Computer Society, Maebashi City, Japan [Online]. Available:
-
Du W, Zhan Z (2002) Building decision tree classifier on private data. In: Clifton C, Estivill-Castro V (eds) IEEE international conference on data mining workshop on privacy, security, and data mining, vol~14. Australian Computer Society, Maebashi City, Japan, pp 1-8. [Online]. Available: http://crpit.com/Vol14.html
-
(2002)
IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining
, vol.14
, pp. 1-8
-
-
Du, W.1
Zhan, Z.2
-
11
-
-
0242625281
-
Privacy preserving mining of association rules
-
In: Edmonton, Alberta, Canada [Online]. Available:
-
Evfimievski A, Srikant R, Agrawal R, Gehrke J (2002) Privacy preserving mining of association rules. In: The eighth ACM SIGKDD international conference on knowledge discovery and data mining, Edmonton, Alberta, Canada, pp 217-228. [Online]. Available: http://doi.acm.org/10.1145/ 775047.775080
-
(2002)
The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 217-228
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
13
-
-
24944523186
-
On secure scalar product computation for privacy-preserving data mining
-
In: Park C, Chee S (eds)
-
Goethals B, Laur S, Lipmaa H, Mielikäinen T (2004) On secure scalar product computation for privacy-preserving data mining. In: Park C, Chee S (eds) The 7th annual international conference in information security and cryptology (ICISC 2004), vol 3506, pp 104-120
-
(2004)
The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004)
, vol.3506
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikäinen, T.4
-
14
-
-
0023545076
-
How to play any mental game - A completeness theorem for protocols with honest majority
-
In: [Online]. Available:
-
Goldreich O, Micali S, Wigderson A (1987) How to play any mental game - a completeness theorem for protocols with honest majority. In: 19th ACM Symposium on the Theory of Computing, pp 218-229. [Online]. Available: http://doi.acm.org/10.1145/28395.28420
-
(1987)
19th ACM Symposium on the Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
16
-
-
84948451182
-
A secure protocol for computing dot-products in clustered and distributed environments
-
In: Vancouver, British Columbia, Canada
-
Ioannidis I, Grama A, Atallah M (2002) A secure protocol for computing dot-products in clustered and distributed environments. In: The 2002 international conference on parallel processing, Vancouver, British Columbia, Canada
-
(2002)
The 2002 International Conference on Parallel Processing
-
-
Ioannidis, I.1
Grama, A.2
Atallah, M.3
-
18
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
[Online]. Available:
-
Kantarcioglu M, Clifton C (2004) Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans Knowl Data Eng 16(9):1026-1037.H[Online]. Available: http://csdl.computer.org/ comp/trans/tk/2004/09/k1026abs.htm
-
(2004)
IEEE Trans Knowl Data Eng
, vol.16
, Issue.9
, pp. 1026-1037
-
-
Kantarcioglu, M.1
Clifton, C.2
-
19
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
In: Melbourne, FL
-
Kargupta H, Datta S, Wang Q, Sivakumar K (2003) On the privacy preserving properties of random data perturbation techniques. In: Proceedings of the third IEEE international conference on data mining (ICDM'03), Melbourne, FL
-
(2003)
Proceedings of the Third IEEE International Conference on Data Mining (ICDM'03)
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
20
-
-
23844515436
-
Random-data perturbation techniques and privacy-preserving data mining
-
[Online]. Available
-
Kargupta H, Datta S, Wang Q, Sivakumar K (2005) Random-data perturbation techniques and privacy-preserving data mining. Knowl Inf Syst 7(4):387-414. [Online].HAvailable: http://www.springerlink.com/content/ va0409rm86aqv9um
-
(2005)
Knowl Inf Syst
, vol.7
, Issue.4
, pp. 387-414
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
22
-
-
19744365747
-
Privacy preserving clustering with distributed EM mixture modeling
-
Lin X, Clifton C, Zhu M (2005) Privacy preserving clustering with distributed EM mixture modeling. Knowl Inf Syst 8(1):68-81
-
(2005)
Knowl Inf Syst
, vol.8
, Issue.1
, pp. 68-81
-
-
Lin, X.1
Clifton, C.2
Zhu, M.3
-
23
-
-
33746437508
-
Privacy preserving data mining
-
Lindell Y, Pinkas B (2002) Privacy preserving data mining. J Cryptol 15(3):177-206
-
(2002)
J Cryptol
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
24
-
-
34548628909
-
Privacy problems with anonymized transaction databases
-
In: Springer-Verlag, Berlin, January
-
Mielikainen T (2004) Privacy problems with anonymized transaction databases. In: Discovery science: 7th international conference proceedings, Lecture notes in computer science, vol 3245, Springer-Verlag, Berlin, January, pp 219-229
-
(2004)
Discovery Science: 7th International Conference Proceedings, Lecture Notes in Computer Science
, vol.3245
, pp. 219-229
-
-
Mielikainen, T.1
-
25
-
-
0032218237
-
A new public key cryptosystem based on higher residues
-
In: ACM, San Francisco, CA
-
Naccache D, Stern J (1998) A new public key cryptosystem based on higher residues. In: Proceedings of the 5th ACM conference on computer and communications security, ACM, San Francisco, CA, pp 59-66
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security
, pp. 59-66
-
-
Naccache, D.1
Stern, J.2
-
26
-
-
84956852274
-
A new public-key cryptosystem as secure as factoring
-
In: Springer-Verlag, Berlin
-
Okamoto T, Uchiyama S (1998) A new public-key cryptosystem as secure as factoring. In: Advances in cryptology-Eurocrypt '98, Lecture notes in computer science, vol 1403. Springer-Verlag, Berlin, pp 308-318
-
(1998)
Advances in Cryptology - Eurocrypt '98, Lecture Notes in Computer Science
, vol.1403
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
27
-
-
14244260513
-
Privacy preserving clustering by data transformation
-
In: [Online]. Available:
-
Oliveira S, Zaiane O (2003) Privacy preserving clustering by data transformation. In: Proceedings of the 18th Brazilian symposium on databases, pp 304-318. [Online]. Available: Citeseer.ifi.unizh.ch/ oliveira03privacy.html
-
(2003)
Proceedings of the 18th Brazilian Symposium on Databases
, pp. 304-318
-
-
Oliveira, S.1
Zaiane, O.2
-
28
-
-
84942550998
-
Public key cryptosystems based on composite degree residuosity classes
-
In: Springer-Verlag, Berlin
-
Paillier P (1999) Public key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology - Eurocrypt '99 Proceedings, Lecture notes in computer science, vol 1592, Springer-Verlag, Berlin, pp 223-238 pp 223-238
-
(1999)
Advances in Cryptology - Eurocrypt '99 Proceedings, Lecture Notes in Computer Science
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
30
-
-
1142294784
-
Maintaining data privacy in association rule mining
-
In: [Online]. Available:
-
Rizvi SJ, Haritsa JR (2002) Maintaining data privacy in association rule mining. In: Proceedings of 28th international conference on very large data bases, VLDB, Hong Kong, pp 682-693. [Online]. Available: http://www.vldb.org/conf/2002/S19P03.pdf
-
(2002)
Proceedings of 28th International Conference on Very Large Data Bases, VLDB, Hong Kong,
, pp. 682-693
-
-
Rizvi, S.J.1
Haritsa, J.R.2
-
31
-
-
12244286332
-
Privacy preserving regression modelling via distributed computation
-
In: New York
-
Sanil AP, Karr AF, Lin X, Reiter JP (2004) Privacy preserving regression modelling via distributed computation. In: KDD '04: Proceedings of the tenth ACM SIGKDD international conference on knowledge discovery and data mining, ACM, New York, pp 677-682
-
(2004)
KDD '04: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM
, pp. 677-682
-
-
Sanil, A.P.1
Karr, A.F.2
Lin, X.3
Reiter, J.P.4
-
32
-
-
33745798451
-
Standard for privacy of individually identifiable health information
-
[Online]. Available
-
Standard for privacy of individually identifiable health information. Fed Regist 66(40), 2001. [Online]. Available: http://www.hhs.gov/ocr/ hipaa/finalreg.html
-
(2001)
Fed Regist
, vol.66
, Issue.40
-
-
-
34
-
-
0242709355
-
Privacy preserving association rule mining in vertically partitioned data
-
In: Edmonton, Alberta, Canada [Online]. Available:
-
Vaidya J, Clifton C (2002) Privacy preserving association rule mining in vertically partitioned data. In: The Eighth ACM SIGKDD international conference on knowledge discovery and data mining, Edmonton, Alberta, Canada, pp 639-644. [Online]. Available: http://doi.acm.org/10.1145/ 775047.775142
-
(2002)
The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 639-644
-
-
Vaidya, J.1
Clifton, C.2
-
36
-
-
2942536415
-
Privacy preserving naïve bayes classifier for vertically partitioned data
-
In: Lake Buena Vista, FL
-
Vaidya J, Clifton C (2004) Privacy preserving naïve bayes classifier for vertically partitioned data. In: 2004 SIAM international conference on data mining, Lake Buena Vista, FL, pp 522-526
-
(2004)
2004 SIAM International Conference on Data Mining
, pp. 522-526
-
-
Vaidya, J.1
Clifton, C.2
-
38
-
-
26444604855
-
Privacy-preserving decision trees over vertically partitioned data
-
In: Storrs, CT, 7-10 August. Springer, Berlin Heidelberg New York [Online]. Available
-
Vaidya J, Clifton C (2005) Privacy-preserving decision trees over vertically partitioned data. In: The 19th annual IFIP WG 11.3 working conference on data and applications security, Storrs, CT, 7-10 August. Springer, Berlin Heidelberg New York [Online]. Available: http://dx.doi.org/10.1007/11535706_11
-
(2005)
The 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security
-
-
Vaidya, J.1
Clifton, C.2
-
39
-
-
10944227231
-
Secure set intersection cardinality with application to association rule mining
-
Vaidya J, Clifton C (2005) Secure set intersection cardinality with application to association rule mining. J Comput Secur 13(4):593-622
-
(2005)
J Comput Secur
, vol.13
, Issue.4
, pp. 593-622
-
-
Vaidya, J.1
Clifton, C.2
-
40
-
-
38649096788
-
-
1st edn., Advances in information security, Springer-Verlag, Berlin. [Online]. Available:
-
Vaidya J, Clifton C, Zhu M (2005) Privacy-preserving data mining, 1st~edn., Advances in information security, vol~19, Springer-Verlag, Berlin. [Online]. Available: http://www.springeronline.com/sgw/cda/ frontpage/0,11855,4-40356-72-52496494-0,00.html
-
(2005)
Privacy-preserving Data Mining
, vol.19
-
-
Vaidya, J.1
Clifton, C.2
Zhu, M.3
-
42
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
[Online]. Available:
-
Verykios VS, Bertino E, Fovino IN, Provenza LP, Saygin Y (2004) State-of-the-art in privacy preserving data mining. SIGMOD Rec 33(1):50-57. [Online]H Available: http://www.acm.org/sigmod/record/ issues/0403/B1.bertion-sigmod-record2.pdf
-
(2004)
SIGMOD Rec
, vol.33
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
-
44
-
-
33749339031
-
Singular value decomposition based data distortion strategy for privacy protection
-
[Online]. Available:
-
Xu S, Zhang J, Han D, Wang J (2006) Singular value decomposition based data distortion strategy for privacy protection. Knowl Inf Syst 10(3):383-397. [Online]H Available: http://www.springerlink.com/content/ r5778lt2q3763213
-
(2006)
Knowl Inf Syst
, vol.10
, Issue.3
, pp. 383-397
-
-
Xu, S.1
Zhang, J.2
Han, D.3
Wang, J.4
-
46
-
-
33751023839
-
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
-
In: ACM, New York
-
Yu H, Jiang X, Vaidya J (2006) Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data. In: SAC '06: Proceedings of the 2006 ACM symposium on applied computing, ACM, New York, pp 603-610
-
(2006)
SAC '06: Proceedings of the 2006 ACM Symposium on Applied Computing
, pp. 603-610
-
-
Yu, H.1
Jiang, X.2
Vaidya, J.3
-
47
-
-
33745794723
-
Secure matrix addition
-
Available: Tech. Rep
-
Yu H, Vaidya J (2004) Secure matrix addition. UIOWA Tech Rep UIOWA-CS-04-04. Available: http://hwanjoyu.org/paper/ techreport04-04.pdf, Tech. Rep.
-
(2004)
UIOWA Tech Rep UIOWA-CS-04-04
-
-
Yu, H.1
Vaidya, J.2
-
48
-
-
33745799070
-
Privacy-preserving SVM classification on vertically partitioned data
-
In: Springer-Verlag, Berlin [Online]. Available
-
Yu H, Vaidya J, Jiang X (2006) Privacy-preserving SVM classification on vertically partitioned data. In: Proceedings of PAKDD '06, Lecture notes in computer science, vol 3918. Springer-Verlag, Berlin, pp 647-656. [Online]. Available: http://dx.doi.org/10.1007/11731139_74
-
(2006)
Proceedings of PAKDD '06, Lecture Notes in Computer Science
, vol.3918
, pp. 647-656
-
-
Yu, H.1
Vaidya, J.2
Jiang, X.3
-
49
-
-
38649091238
-
-
(in press) Submitted for publication to Data & Knowledge Engineering, Elsevier, Science, Amsterdam
-
Yu H, Vaidya J (in press) Privacy preserving linear SVM classification. Submitted for publication to Data & Knowledge Engineering, Elsevier, Science, Amsterdam
-
Privacy Preserving Linear SVM Classification
-
-
Yu, H.1
Vaidya, J.2
|