메뉴 건너뛰기




Volumn 16, Issue 9, 2004, Pages 1026-1037

Privacy-preserving distributed mining of association rules on horizontally partitioned data

Author keywords

Data mining; Privacy; Security

Indexed keywords

ASSOCIATION RULES; DATA SHARING; HORIZONTALLY PARTITIONED DATA; PRIVACY;

EID: 4544361334     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2004.45     Document Type: Article
Times cited : (585)

References (24)
  • 1
    • 0001882616 scopus 로고
    • Fast algorithms for mining association rules
    • R. Agrawal and R. Srikant, "Fast Algorithms for Mining Association Rules," Proc. 20th Int'l Conf. Very large Data Bases, pp. 487-499, 1994, available: http://www.vldb.org/dblp/db/ conf/vldb/vldb94-487.html.
    • (1994) Proc. 20th Int'l Conf. Very Large Data Bases , pp. 487-499
    • Agrawal, R.1    Srikant, R.2
  • 3
    • 0030379749 scopus 로고    scopus 로고
    • Efficient mining of association rules in distributed databases
    • Dec.
    • D.W.-L. Cheung, V. Ng, A.W.-C. Fu, and Y. Fu, "Efficient Mining of Association Rules in Distributed Databases," IEEE Trans. Knowledge and Data Eng., vol. 8, no. 6, pp. 911-922, Dec. 1996.
    • (1996) IEEE Trans. Knowledge and Data Eng. , vol.8 , Issue.6 , pp. 911-922
    • Cheung, D.W.-L.1    Ng, V.2    Fu, A.W.-C.3    Fu, Y.4
  • 7
    • 1142294784 scopus 로고    scopus 로고
    • Maintaining data privacy in association rule mining
    • S.J. Rizvi and J.R. Haritsa, "Maintaining Data Privacy in Association Rule Mining," Proc. 28th Int'l Conf. Very Large Data Bases, pp. 682-693, 2002, available: http://www.vldb.org/conf/ 2002/S19P03.pdf.
    • (2002) Proc. 28th Int'l Conf. Very Large Data Bases , pp. 682-693
    • Rizvi, S.J.1    Haritsa, J.R.2
  • 8
    • 84974555530 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Y. Lindell and B. Pinkas, "Privacy Preserving Data Mining," Advances in Cryptology (CRYPTO 2000), pp. 36-54, 2000, available: http://link.springer.de/link/service/series/0558/bibs/1880/ 18800036.htm.
    • (2000) Advances in Cryptology (CRYPTO 2000) , pp. 36-54
    • Lindell, Y.1    Pinkas, B.2
  • 9
    • 0003839182 scopus 로고    scopus 로고
    • Secure multiparty computation
    • Sept.
    • O. Goldreich, "Secure Multiparty Computation," (working draft), Sept. 1998, available: http://www.wisdom.weizmann.ac.il/~oded/pp.html.
    • (1998) Working Draft
    • Goldreich, O.1
  • 13
    • 84862427089 scopus 로고    scopus 로고
    • Encryption schemes
    • Mar.
    • O. Goldreich, "Encryption Schemes," (working draft), Mar. 2003, available: http://www.wisdom.weizmann.ac.il/~oded/PSBook Frag/enc.ps.
    • (2003) Working Draft
    • Goldreich, O.1
  • 14
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R.L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978, available: http://doi.acm.org/ 10.1145/359340.359342.
    • (1978) Comm. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 15
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
    • S.C. Pohlig and M.E. Hellman, "An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance," IEEE Trans. Information Theory, vol. IT-24, pp. 106-110, 1978.
    • (1978) IEEE Trans. Information Theory , vol.IT-24 , pp. 106-110
    • Pohlig, S.C.1    Hellman, M.E.2
  • 16
    • 0002054934 scopus 로고    scopus 로고
    • Crowds: Anonymity for web transactions
    • Nov.
    • M.K. Reiter and A.D. Rubin, "Crowds: Anonymity for Web Transactions," ACM Trans. Information and System Security, vol. 1, no. 1, pp. 66-92, Nov. 1998, available: http://doi.acm.org/ 10.1145/290163.290168.
    • (1998) ACM Trans. Information and System Security , vol.1 , Issue.1 , pp. 66-92
    • Reiter, M.K.1    Rubin, A.D.2
  • 17
    • 85034837254 scopus 로고
    • Secret sharing homomorphisms: Keeping shares of a secret secret
    • A. Odlyzko, ed.
    • J.C. Benaloh, "Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret," Advances in Cryptography (CKYPTO86): Proc., A. Odlyzko, ed., pp. 251-260, 1986, available: http://spring erlink.metapress.com/openurl. asp?genre=article&issn=0302-9%743&volume=263&spage=251.
    • (1986) Advances in Cryptography (CKYPTO86): Proc. , pp. 251-260
    • Benaloh, J.C.1
  • 18
    • 0040655149 scopus 로고
    • A communication-privacy tradeoff for modular addition
    • B. Chor and E. Kushilevitz, "A Communication-Privacy Tradeoff for Modular Addition," Information Processing Letters, vol. 45, no. 4, pp. 205-210, 1993.
    • (1993) Information Processing Letters , vol.45 , Issue.4 , pp. 205-210
    • Chor, B.1    Kushilevitz, E.2
  • 22
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov.
    • W. Diffie and M. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Information Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 23
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • July
    • T. ElGamal, "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," IEEE Trans. Information Theory, vol. IT-31, no. 4, pp. 469-472, July 1985.
    • (1985) IEEE Trans. Information Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 24
    • 4544336448 scopus 로고
    • Mental poker
    • Laboratory for Computer Science, MIT, Feb.
    • A. Shamir, R.L. Rivest, and L.M. Adleman, "Mental Poker," Technical Memo MIT-LCS-TM-125, Laboratory for Computer Science, MIT, Feb. 1979.
    • (1979) Technical Memo , vol.MIT-LCS-TM-125
    • Shamir, A.1    Rivest, R.L.2    Adleman, L.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.