메뉴 건너뛰기




Volumn 4890 LNCS, Issue , 2008, Pages 97-115

Privacy-preserving data mining through knowledge model sharing

Author keywords

[No Author keywords available]

Indexed keywords

KNOWLEDGE MODELS; SANITIZED VERSIONS;

EID: 41849136845     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-78478-4_6     Document Type: Article
Times cited : (12)

References (27)
  • 1
    • 84974555530 scopus 로고    scopus 로고
    • Privacy Preserving Data Mining
    • Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
    • Lindell, Y., Pinkas, B.: Privacy Preserving Data Mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 36-54. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 36-54
    • Lindell, Y.1    Pinkas, B.2
  • 2
    • 4544312695 scopus 로고    scopus 로고
    • Cryptographic techniques for privacy-preserving data mining
    • Pinkas, B.: Cryptographic techniques for privacy-preserving data mining. ACM SIGKDD Explorations 4(2), 12-19 (2003)
    • (2003) ACM SIGKDD Explorations , vol.4 , Issue.2 , pp. 12-19
    • Pinkas, B.1
  • 7
    • 34250661905 scopus 로고    scopus 로고
    • Aggarwal, G., Feder, T., Kenthapadi, K., Khuller, S., Panigrahy, R., Thomas, D., Zhu, A.: Achieving anonymity via clustering. In: Proceeding of the 25th ACM Symposium on Principles of Database Systems (June 2006)
    • Aggarwal, G., Feder, T., Kenthapadi, K., Khuller, S., Panigrahy, R., Thomas, D., Zhu, A.: Achieving anonymity via clustering. In: Proceeding of the 25th ACM Symposium on Principles of Database Systems (June 2006)
  • 9
    • 33749607006 scopus 로고    scopus 로고
    • Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: ℓ-diversity: Privacy beyond k-anonymity. In: IEEE International Conference on Data Engineering (2006)
    • Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: ℓ-diversity: Privacy beyond k-anonymity. In: IEEE International Conference on Data Engineering (2006)
  • 10
    • 4344559647 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
    • Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: Proc. of the IEEE Symposium on Research in Security and Privacy (1998)
    • (1998) Proc. of the IEEE Symposium on Research in Security and Privacy
    • Samarati, P.1    Sweeney, L.2
  • 22
    • 33749571958 scopus 로고    scopus 로고
    • Wong, R.C.-W., Li, J., Fu, A.W.-C., Wang, K. (α, k)-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing. In: International Conference on Knowledge Discovery and Data Mining (2006)
    • Wong, R.C.-W., Li, J., Fu, A.W.-C., Wang, K. (α, k)-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing. In: International Conference on Knowledge Discovery and Data Mining (2006)
  • 24
    • 0026860706 scopus 로고
    • Methods of combining multiple classifiers and their applications tohandwriting recognition
    • Xu, L., Krzyzak, A., Suen, C.Y.: Methods of combining multiple classifiers and their applications tohandwriting recognition. IEEE Transactions on Systems, Man and Cybernetics 22(3), 418-435 (1992)
    • (1992) IEEE Transactions on Systems, Man and Cybernetics , vol.22 , Issue.3 , pp. 418-435
    • Xu, L.1    Krzyzak, A.2    Suen, C.Y.3
  • 26
    • 7444225924 scopus 로고    scopus 로고
    • Secure Association Rule Sharing
    • Dai, H, Srikant, R, Zhang, C, eds, PAKDD 2004, Springer, Heidelberg
    • Oliveira, S., Zaane, O., Saygin, Y.: Secure Association Rule Sharing. In: Dai, H., Srikant, R., Zhang, C. (eds.) PAKDD 2004. LNCS (LNAI), vol. 3056, pp. 74-85. Springer, Heidelberg (2004)
    • (2004) LNCS (LNAI , vol.3056 , pp. 74-85
    • Oliveira, S.1    Zaane, O.2    Saygin, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.