메뉴 건너뛰기




Volumn 17, Issue 4, 2008, Pages 789-804

Providing k-anonymity in data mining

Author keywords

[No Author keywords available]

Indexed keywords


EID: 45749151381     PISSN: 10668888     EISSN: 0949877X     Source Type: Journal    
DOI: 10.1007/s00778-006-0039-5     Document Type: Article
Times cited : (92)

References (42)
  • 1
    • 33745629638 scopus 로고    scopus 로고
    • On k-anonymity and the curse of dimensionality
    • Aggarwal, C.C.: On k-anonymity and the curse of dimensionality. In: VLDB, pp. 901-909 (2005)
    • (2005) VLDB , pp. 901-909
    • Aggarwal, C.C.1
  • 2
    • 35048841248 scopus 로고    scopus 로고
    • A condensation approach to privacy preserving data mining
    • Aggarwal, C.C., Yu, P.S.: A condensation approach to privacy preserving data mining. In: EDBT, pp. 183-199 (2004)
    • (2004) EDBT , pp. 183-199
    • Aggarwal, C.C.1    Yu, P.S.2
  • 5
    • 34548547007 scopus 로고    scopus 로고
    • Blocking anonymity threats raised by frequent itemset mining
    • Atzori, M., Bonchi, F., Giannotti, F., Pedreschi, D.: Blocking anonymity threats raised by frequent itemset mining. In: ICDM, pp. 561-564 (2005)
    • (2005) ICDM , pp. 561-564
    • Atzori, M.1    Bonchi, F.2    Giannotti, F.3    Pedreschi, D.4
  • 7
    • 28444449426 scopus 로고    scopus 로고
    • Data privacy through optimal k-anonymization
    • Bayardo, R.J.: Jr. Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE, pp. 217-228 (2005)
    • (2005) ICDE , pp. 217-228
    • Bayardo Jr., R.J.1    Agrawal, R.2
  • 8
    • 28444478342 scopus 로고    scopus 로고
    • Privacy and ownership preserving of outsourced medical data
    • Bertino, E., Chin Ooi, B., Yang, Y., Deng, R.H.: Privacy and ownership preserving of outsourced medical data. In: ICDE, pp. 521-532 (2005)
    • (2005) ICDE , pp. 521-532
    • Bertino, E.1    Chin Ooi, B.2    Yang, Y.3    Deng, R.H.4
  • 9
    • 33244468835 scopus 로고    scopus 로고
    • Practical privacy: The SuLQ framework
    • ACM Press, New York
    • Blum, A., Dwork, C., McSherry, F., Nissim, K.: Practical privacy: the SuLQ framework. In: Proceedings of PODS'05, pp. 128-138. ACM Press, New York (2005)
    • (2005) Proceedings of PODS'05 , pp. 128-138
    • Blum, A.1    Dwork, C.2    McSherry, F.3    Nissim, K.4
  • 10
  • 12
    • 1142275486 scopus 로고    scopus 로고
    • Revealing information while preserving privacy
    • Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: Proceedings of PODS'03, pp. 202-210 (2003)
    • (2003) Proceedings of PODS'03 , pp. 202-210
    • Dinur, I.1    Nissim, K.2
  • 14
    • 1642302606 scopus 로고    scopus 로고
    • Building decision tree classifier on private data
    • Australian Computer Society, Inc, Darlinghurst
    • Du, W., Zhan, Z.: Building decision tree classifier on private data. In: Proceedings of CRPITS'14, pp. 1-8. Australian Computer Society, Inc, Darlinghurst (2002)
    • (2002) Proceedings of CRPITS'14 , pp. 1-8
    • Du, W.1    Zhan, Z.2
  • 15
    • 33244461250 scopus 로고    scopus 로고
    • Privacy-preserving data mining on vertically partitioned databases
    • Dwork, C., Nissim, K.: Privacy-preserving data mining on vertically partitioned databases. In: Proceedings of CRYPTO'04 (2004)
    • (2004) Proceedings of CRYPTO'04
    • Dwork, C.1    Nissim, K.2
  • 16
    • 1142263341 scopus 로고    scopus 로고
    • Limiting privacy breaches in privacy preserving data mining
    • San Diego, California, USA, 9-12 June
    • Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: Proceedings of PODS'03, pp. 211-222. San Diego, California, USA, 9-12 June 2003
    • (2003) Proceedings of PODS'03 , pp. 211-222
    • Evfimievski, A.1    Gehrke, J.2    Srikant, R.3
  • 18
    • 28444499680 scopus 로고    scopus 로고
    • Top-down specialization for information and privacy preservation
    • Tokyo
    • Fung, B.C.M., Wang, K., Yu, P.S.: Top-down specialization for information and privacy preservation. In: Proceedings of ICDE'05, Tokyo (2005)
    • (2005) Proceedings of ICDE'05
    • Fung, B.C.M.1    Wang, K.2    Yu, P.S.3
  • 19
    • 12244293654 scopus 로고    scopus 로고
    • K-ttp: A new privacy model for large-scale distributed environments
    • Gilburd, B., Schuster, A., Wolff, R.: k-ttp: a new privacy model for large-scale distributed environments. In: Proceedings of ACM SIGKDD'04, pp. 563-568 (2004)
    • (2004) Proceedings of ACM SIGKDD'04 , pp. 563-568
    • Gilburd, B.1    Schuster, A.2    Wolff, R.3
  • 20
    • 29844458622 scopus 로고    scopus 로고
    • Deriving private information from randomized data
    • Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: Proc. of ACM SIGMOD'05 (2005)
    • (2005) Proc. of ACM SIGMOD'05
    • Huang, Z.1    Du, W.2    Chen, B.3
  • 21
    • 0242625276 scopus 로고    scopus 로고
    • Transforming data to satisfy privacy constraints
    • Iyengar, V.S.: Transforming data to satisfy privacy constraints. In: Proceedings of ACM SIGKDD'02, pp. 279-288 (2002)
    • (2002) Proceedings of ACM SIGKDD'02 , pp. 279-288
    • Iyengar, V.S.1
  • 22
    • 1142282764 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • Kantarcioglu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. In: Proceedings of DKMD'02, (2002)
    • (2002) Proceedings of DKMD'02
    • Kantarcioglu, M.1    Clifton, C.2
  • 23
    • 12244296735 scopus 로고    scopus 로고
    • When do data mining results violate privacy?
    • ACM Press, New York
    • Kantarcioǧlu, M., Jin, J., Clifton, C.: When do data mining results violate privacy? In: Proceedings of ACM SIGKDD'04, pp. 599-604. ACM Press, New York (2004)
    • (2004) Proceedings of ACM SIGKDD'04 , pp. 599-604
    • Kantarcioǧlu, M.1
  • 24
    • 78149340011 scopus 로고    scopus 로고
    • On the privacy preserving properties of random data perturbation techniques
    • IEEE Computer Society, Washington
    • Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: Proceddings of ICDM'03, pp. 99. IEEE Computer Society, Washington (2003)
    • (2003) Proceddings of ICDM'03 , pp. 99
    • Kargupta, H.1    Datta, S.2    Wang, Q.3    Sivakumar, K.4
  • 25
    • 29844444250 scopus 로고    scopus 로고
    • Incognito: efficient full-domain k-anonymity
    • ACM Press, New York
    • LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: Proceedings of SIGMOD'05, pp. 49-60. ACM Press, New York (2005)
    • (2005) Proceedings of SIGMOD'05 , pp. 49-60
    • LeFevre, K.1    DeWitt, D.J.2    Ramakrishnan, R.3
  • 27
    • 84974555530 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Springer
    • Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Proceedings of CRYPTO'04, pp. 36-54. Springer (2000)
    • (2000) Proceedings of CRYPTO'04 , pp. 36-54
    • Lindell, Y.1    Pinkas, B.2
  • 30
    • 33744584654 scopus 로고
    • Induction of decision trees. Mach
    • 1
    • Ross Quinlan J. (1986). Induction of decision trees. Mach. Learn. 1(1): 81-106
    • (1986) Learn. , vol.1 , pp. 81-106
    • Ross Quinlan, J.1
  • 31
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • DOI 10.1109/69.971193
    • Samarati, P.: Protecting respondents' identities in microdata release. IEEE Trans Know Data Eng. 13(6), (2001), 1041-4347. DOI 10.1109/69.971193
    • (2001) IEEE Trans Know Data Eng , vol.13 , Issue.6 , pp. 1041-4347
    • Samarati, P.1
  • 33
    • 0036811143 scopus 로고    scopus 로고
    • Achieving k-anonymity privacy protection using generalization and suppression. Int
    • 5
    • Sweeney L. (2002). Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5): 571-588
    • (2002) J. Uncertain. Fuzziness Knowl. Based Syst. , vol.10 , pp. 571-588
    • Sweeney, L.1
  • 34
    • 0036811662 scopus 로고    scopus 로고
    • K-anonymity: A model for protecting privacy. Int
    • 5
    • Sweeney L. (2002). k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5): 557-570
    • (2002) J. Uncertain. Fuzziness Knowl. Based Syst. , vol.10 , pp. 557-570
    • Sweeney, L.1
  • 35
    • 0014976008 scopus 로고
    • Graph-theoretical methods for detecting and describing gestalt clusters
    • Zahn C.T. (1971). Graph-theoretical methods for detecting and describing gestalt clusters. IEEE Trans. Comput. C- 20: 68-86
    • (1971) IEEE Trans. Comput. C , vol.20 , pp. 68-86
    • Zahn, C.T.1
  • 37
    • 0242709355 scopus 로고    scopus 로고
    • Privacy preserving association rule mining in vertically partitioned data
    • Edmonton
    • Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: Proceedings of ACM SIGKDD '02, Edmonton, (2002)
    • (2002) Proceedings of ACM SIGKDD '02
    • Vaidya, J.1    Clifton, C.2
  • 39
    • 33749546201 scopus 로고    scopus 로고
    • Template-based privacy preservation in classification problems
    • Wang, K., Fung, B.C.M., Yu, P.S.: Template-based privacy preservation in classification problems. In: ICDM, pp. 466-473 (2005)
    • (2005) ICDM , pp. 466-473
    • Wang, K.1    Fung, B.C.M.2    Yu, P.S.3
  • 40
    • 19544380211 scopus 로고    scopus 로고
    • Bottom-up generalization: A data mining solution to privacy protection
    • Wang, K., Yu, P.S., Chakraborty, S.: Bottom-up generalization: a data mining solution to privacy protection. In: ICDM, pp. 249-256 (2004)
    • (2004) ICDM , pp. 249-256
    • Wang, K.1    Yu, P.S.2    Chakraborty, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.