메뉴 건너뛰기




Volumn 16, Issue 3, 2008, Pages 251-275

A framework for condensation-based anonymization of string data

Author keywords

Condensation; Privacy; Strings

Indexed keywords

CONDENSATION; DATA STRUCTURES; PROBLEM SOLVING; STATISTICS;

EID: 42749091916     PISSN: 13845810     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10618-008-0088-z     Document Type: Article
Times cited : (19)

References (23)
  • 1
    • 0242540465 scopus 로고    scopus 로고
    • On effective classification of strings with wavelets
    • Aggarwal CC (2002) On effective classification of strings with wavelets. In: ACM KDD conference
    • (2002) ACM KDD Conference
    • Aggarwal, C.C.1
  • 3
    • 33749557573 scopus 로고    scopus 로고
    • On the design and quantification of privacy preserving data mining algorithms
    • Agrawal D, Aggarwal CC (2002) On the design and quantification of privacy preserving data mining algorithms. In: ACM PODS conference
    • (2002) ACM PODS Conference
    • Agrawal, D.1    Aggarwal, C.C.2
  • 6
    • 29844432932 scopus 로고    scopus 로고
    • A condensation based approach to privacy preserving data mining
    • Aggarwal CC, Yu PS (2004) A condensation based approach to privacy preserving data mining. In: EDBT conference
    • (2004) EDBT Conference
    • Aggarwal, C.C.1    Yu, P.S.2
  • 9
    • 33749035690 scopus 로고    scopus 로고
    • Scalable clustering with balancing constraints
    • Banerjee A and Ghosh J (2006). Scalable clustering with balancing constraints. Data Min Knowl Discov J 13: 365-395
    • (2006) Data Min Knowl Discov J , vol.13 , pp. 365-395
    • Banerjee, A.1    Ghosh, J.2
  • 10
    • 28444449426 scopus 로고    scopus 로고
    • Data privacy through optimal k-anonymization
    • Bayardo RJ, Agrawal R (2005) Data privacy through optimal k-anonymization. In: ICDE conference
    • (2005) ICDE Conference
    • Bayardo, R.J.1    Agrawal, R.2
  • 12
    • 42749084197 scopus 로고    scopus 로고
    • Transforming data to satisfy privacy constraints
    • Iyengar V (2000) Transforming data to satisfy privacy constraints. In: ACM KDD conference
    • (2000) ACM KDD Conference
    • Iyengar, V.1
  • 16
    • 42749092224 scopus 로고    scopus 로고
    • Why methods for genomic data privacy fail and what we can do to fix it
    • Seattle, WA
    • Malin B (2004) Why methods for genomic data privacy fail and what we can do to fix it. In: AAAS Annual Meeting, Seattle, WA
    • (2004) AAAS Annual Meeting
    • Malin, B.1
  • 17
  • 19
    • 0014757386 scopus 로고
    • A general method applicable to the search for similarities in the amino acid sequence of two proteins
    • 3
    • Needleman S and Wunsch C (1970). A general method applicable to the search for similarities in the amino acid sequence of two proteins. J Mol Biol 48(3): 443-453
    • (1970) J Mol Biol , vol.48 , pp. 443-453
    • Needleman, S.1    Wunsch, C.2
  • 20
    • 1142294784 scopus 로고    scopus 로고
    • Maintaining data privacy in association rule mining
    • Rizvi S, Haritsa J (2002) Maintaining data privacy in association rule mining. In: VLDB conference
    • (2002) VLDB Conference
    • Rizvi, S.1    Haritsa, J.2
  • 22
    • 0030333205 scopus 로고    scopus 로고
    • Replacing personally identifying information in medical records: The scrub system
    • Sweeney L (1996) Replacing personally identifying information in medical records: the scrub system. In: Proceedings of the AMIA symposium
    • (1996) Proceedings of the AMIA Symposium
    • Sweeney, L.1
  • 23
    • 33749566523 scopus 로고    scopus 로고
    • Handicapping attacker's confidence: An alternative to k-anonymization
    • Wang K, Fung BCM, Yu PS (2006) Handicapping attacker's confidence: an alternative to k-anonymization. Knowledge Inform Sys Int J
    • (2006) Knowledge Inform Sys Int J
    • Wang, K.1    Fung, B.C.M.2    Yu, P.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.