메뉴 건너뛰기




Volumn 17, Issue 4, 2008, Pages 879-898

Privacy-preserving Naïve Bayes classification

Author keywords

Data mining; Distributed computing; Na ve Bayes; Privacy; Security

Indexed keywords


EID: 45749132089     PISSN: 10668888     EISSN: 0949877X     Source Type: Journal    
DOI: 10.1007/s00778-006-0041-y     Document Type: Article
Times cited : (165)

References (44)
  • 3
    • 85034837254 scopus 로고
    • Secret sharing homomorphisms: Keeping shares of a secret secret
    • A. Odlyzko (ed.) Lecture Notes in Computer Science, Springer Heidelberg
    • Benaloh, J.C.: Secret sharing homomorphisms: Keeping shares of a secret secret. In: A. Odlyzko (ed.) Advances in Cryptography-CRYPTO86: Proceedings, vol. 263, pp. 251-260. Lecture Notes in Computer Science, Springer Heidelberg (1986). http://springerlink.metapress.com/openurl.asp? genre=article&issn= 0302-9743&volume=263&spage=251
    • (1986) Advances in Cryptography-CRYPTO86: Proceedings , vol.263 , pp. 251-260
    • Benaloh, J.C.1
  • 4
    • 35048869172 scopus 로고
    • An efficient probabilistic public-key encryption that hides all partial information
    • R. (ed.) Springer, Heidelberg
    • Blum, M., Goldwasser, S.: An efficient probabilistic public-key encryption that hides all partial information. In: R. (ed.) Advances in Cryptology-Crypto 84 Proceedings. Springer, Heidelberg (1984)
    • (1984) Advances in Cryptology-Crypto 84 Proceedings
    • Blum, M.1    Goldwasser, S.2
  • 5
    • 84946847417 scopus 로고    scopus 로고
    • Oblivious polynomial evaluation and oblivious neural learning
    • citeseer.nj.nec. com/531490.html
    • Chang, Y.C., Lu, C.J.: Oblivious polynomial evaluation and oblivious neural learning. Lecture Notes in Computer Science, vol. 2248, pp. 369+ (2001). citeseer.nj.nec. com/531490.html
    • (2001) Lecture Notes in Computer Science , vol.2248
    • Chang, Y.C.1    Lu, C.J.2
  • 6
    • 0040655149 scopus 로고
    • A communication-privacy tradeoff for modular addition
    • Chor B. and Kushilevitz E (1993). A communication-privacy tradeoff for modular addition. Inf. Process. Lett. 45: 205-210
    • (1993) Inf. Process. Lett. , vol.45 , pp. 205-210
    • Chor, B.1    Kushilevitz, E.2
  • 9
    • 0242496951 scopus 로고    scopus 로고
    • Secure multi-party computation problems and their applications: A review and open problems
    • Cloudcroft, New Mexico, USA
    • Du, W., Atallah, M.J.: Secure multi-party computation problems and their applications: A review and open problems. In: New Security Paradigms Workshop, pp. 11-20. Cloudcroft, New Mexico, USA (2001). http://www.cerias. purdue.edu/homes/duw/research/paper/nspw2001.ps
    • (2001) New Security Paradigms Workshop , pp. 11-20
    • Du, W.1    Atallah, M.J.2
  • 10
    • 1642302606 scopus 로고    scopus 로고
    • Building decision tree classifier on private data
    • C. Clifton, V. Estivill-Castro (eds.) Australian Computer Society, Maebashi City, Japan
    • Du, W., Zhan, Z.: Building decision tree classifier on private data. In: C. Clifton, V. Estivill-Castro (eds.) IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, vol. 14, pp. 1-8. Australian Computer Society, Maebashi City, Japan (2002). http://crpit.com/ Vol14.html
    • (2002) IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining , vol.14 , pp. 1-8
    • Du, W.1    Zhan, Z.2
  • 11
    • 0003187764 scopus 로고
    • Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
    • Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official J. Eur. Communities I(281), 31-50 (1995) http://europa.eu.int/comm/internal_market/ privacy
    • (1995) Official J. Eur. Communities , vol.1 , Issue.281 , pp. 31-50
  • 12
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • 6
    • Even S., Goldreich O. and Lempel A (1985). A randomized protocol for signing contracts. Commun. ACM 28(6): 637-647
    • (1985) Commun. ACM , vol.28 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 15
  • 16
    • 0003979335 scopus 로고    scopus 로고
    • chap. General Cryptographic Protocols. Cambridge University Press, Cambridge
    • Goldreich, O.: The Foundations of Cryptography, vol. 2, chap. General Cryptographic Protocols. Cambridge University Press, Cambridge (2004). http://www.wisdom. weizmann.ac.il/~oded/PSBookFrag/prot.ps
    • (2004) The Foundations of Cryptography , vol.2
    • Goldreich, O.1
  • 17
    • 0023545076 scopus 로고
    • How to play any mental game-a completeness theorem for protocols with honest majority
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game-a completeness theorem for protocols with honest majority. In: 19th ACM Symposium on the Theory of Computing, pp. 218-229 (1987). http://doi.acm.org/10.1145/ 28395.28420
    • (1987) 19th ACM Symposium on the Theory of Computing , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 18
    • 0037077422 scopus 로고    scopus 로고
    • Standard for privacy of individually identifiable health information
    • Standard for privacy of individually identifiable health information. Fed. Regist. 67(157), 53,181-53,273 (2002). http://www.hhs.gov/ocr/hipaa/ finalreg.html
    • (2002) Fed. Regist. , vol.67 , Issue.157 , pp. 53181-53273
  • 20
    • 84948451182 scopus 로고    scopus 로고
    • A secure protocol for computing dot-products in clustered and distributed environments
    • Vancouver, British Columbia
    • Ioannidis, I., Grama, A., Atallah, M.: A secure protocol for computing dot-products in clustered and distributed environments. In: The 2002 International Conference on Parallel Processing, Vancouver, British Columbia (2002)
    • (2002) The 2002 International Conference on Parallel Processing
    • Ioannidis, I.1    Grama, A.2    Atallah, M.3
  • 22
    • 1642335029 scopus 로고    scopus 로고
    • An architecture for privacy- preserving mining of client information
    • C. Clifton V. Estivill-Castro (eds.) Australian Computer Society, Maebashi City, Japan
    • Kantarcioglu, M., Vaidya, J.: An architecture for privacy- preserving mining of client information. In: C. Clifton V. Estivill-Castro (eds.) IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, vol. 14, pp. 37-42. Australian Computer Society, Maebashi City, Japan (2002). http://crpit.com/Vol14.html
    • (2002) IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining , vol.14 , pp. 37-42
    • Kantarcioglu, M.1    Vaidya, J.2
  • 23
    • 1142282764 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • Madison, Wisconsin
    • KantarcIoǧlu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. In: The ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery (DMKD'02), Madison, Wisconsin, pp. 24-31 (2002) http://www.bell-labs.com/ user/minos/DMKD02/Papers/kantarcioglu.pdf
    • (2002) The ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery (DMKD'02) , pp. 24-31
    • Kantarcioǧlu, M.1
  • 24
    • 4544361334 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • KantarcIoǧlu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng. 16(9), 1026-1037 (2004) http://doi.ieeecomputersociety.org/10.1109/ TKDE. 2004.45
    • (2004) IEEE Trans. Knowl. Data Eng. , vol.16 , Issue.9 , pp. 1026-1037
    • Kantarcioǧlu, M.1
  • 26
    • 19744365747 scopus 로고    scopus 로고
    • Privacy preserving clustering with distributed em mixture modeling
    • Lin, X., Clifton, C., Zhu, M.: Privacy preserving clustering with distributed EM mixture modeling. Knowl. Inf. Syst. 8(1), 68-81 (2005) http://dx.doi.org/10.1007/s10115-004-0148-7
    • (2005) Knowl. Inf. Syst. , vol.8 , Issue.1 , pp. 68-81
    • Lin, X.1    Clifton, C.2    Zhu, M.3
  • 28
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Lindell, Y., Pinkas, B.: Privacy preserving data mining. J. Cryptol. 15(3), 177-206 (2002) http://www.research. ibm.com/people/l/lindell//id3_abs. html
    • (2002) J. Cryptol. , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 29
    • 0004255908 scopus 로고    scopus 로고
    • McGraw-Hill Science/Engineering/Math, New York
    • Mitchell, T.: Machine Learning, 1st edn. McGraw-Hill Science/Engineering/ Math, New York (1997)
    • (1997) Machine Learning, 1st Edn.
    • Mitchell, T.1
  • 30
    • 0032218237 scopus 로고    scopus 로고
    • A new public key cryptosystem based on higher residues
    • ACM Press, San Francisco, California, United States doi: http://doi.acm.org/10.1145/288090.288106
    • Naccache, D., Stern, J.: A new public key cryptosystem based on higher residues. In: Proceedings of the 5th ACM conference on Computer and communications security, pp. 59-66. ACM Press, San Francisco, California, United States (1998). doi: http://doi.acm.org/10.1145/288090.288106
    • (1998) Proceedings of the 5th ACM Conference on Computer and Communications Security , pp. 59-66
    • Naccache, D.1    Stern, J.2
  • 31
    • 0032669864 scopus 로고    scopus 로고
    • Oblivious transfer and polynomial evaluation
    • ACM Press, Atlanta, Georgia, United States doi: http://doi.acm.org/10. 1145/301250.301312
    • Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: Proceedings of the 31st annual ACM symposium on Theory of computing, pp. 245-254. ACM Press, Atlanta, Georgia, United States (1999). doi: http://doi.acm.org/10.1145/301250.301312
    • (1999) Proceedings of the 31st Annual ACM Symposium on Theory of Computing , pp. 245-254
    • Naor, M.1    Pinkas, B.2
  • 33
    • 84956852274 scopus 로고    scopus 로고
    • A new public-key cryptosystem as secure as factoring. In: Advances in Cryptology-Eurocrypt '98
    • Springer, Heidelberg
    • Okamoto, T., Uchiyama, S.: A new public-key cryptosystem as secure as factoring. In: Advances in Cryptology-Eurocrypt '98, LNCS 1403, pp. 308-318. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1403 , pp. 308-318
    • Okamoto, T.1    Uchiyama, S.2
  • 34
    • 84942550998 scopus 로고    scopus 로고
    • Public key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology-Eurocrypt '99 Proceedings
    • Springer, Heidelberg
    • Paillier, P.: Public key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology-Eurocrypt '99 Proceedings, LNCS 1592, pp. 223-238. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 35
    • 45749109450 scopus 로고    scopus 로고
    • Perry J.M.: Statement of John M. Perry, President and CEO, Cardsystems Solutions, Inc. before the United States House of Representatives Subcommittee on Oversight and Investigations of the Committee on Financial services. http://financialservices.house.gov/hearings.asp? formmode=detail&hearing =407&comm=4(2005). http: //financialservices.house.gov/hearings.asp? formmode=deta il&hearing=407&comm=4
    • Perry, J.M.: Statement of John M. Perry, President and CEO, Cardsystems Solutions, Inc. before the United States House of Representatives Subcommittee on Oversight and Investigations of the Committee on Financial services. http://financialservices.house.gov/hearings.asp? formmode=detail&hearing =407&comm=4(2005). http: //financialservices.house.gov/hearings.asp? formmode=deta il&hearing=407&comm=4
  • 40
    • 2942536415 scopus 로고    scopus 로고
    • Privacy preserving naïve bayes classifier for vertically partitioned data
    • Lake Buena Vista, Florida
    • Vaidya, J., Clifton, C.: Privacy preserving naïve bayes classifier for vertically partitioned data. In: 2004 SIAM International Conference on Data Mining, Lake Buena Vista, Florida, pp. 522-526 (2004) http://www.siam.org/ meetings/sdm04/proceedings/sdm04_059.pdf
    • (2004) 2004 SIAM International Conference on Data Mining , pp. 522-526
    • Vaidya, J.1    Clifton, C.2
  • 42
    • 10944227231 scopus 로고    scopus 로고
    • Secure set intersection cardinality with application to association rule mining
    • Vaidya J., Clifton C.: Secure set intersection cardinality with application to association rule mining. J. Comput. Secur. 13(4) (2005).
    • (2005) J. Comput. Secur. , vol.13 , Issue.4
    • Vaidya, J.1    Clifton, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.