메뉴 건너뛰기




Volumn , Issue , 2007, Pages 146-156

Hiding sequences

Author keywords

[No Author keywords available]

Indexed keywords

ASSOCIATIVE PROCESSING; CHLORINE COMPOUNDS; DATABASE SYSTEMS; NUCLEAR PROPULSION; TECHNOLOGY;

EID: 48349102436     PISSN: 10844627     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDEW.2007.4400985     Document Type: Conference Paper
Times cited : (29)

References (28)
  • 1
    • 0034827009 scopus 로고    scopus 로고
    • On the design and quantification of privacy preserving data mining algorithms
    • D. Agrawal and C. C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In Proceedings of the 20th ACM PODS, pages 247 255, 2001.
    • (2001) Proceedings of the 20th ACM PODS , pp. 247-255
    • Agrawal, D.1    Aggarwal, C.C.2
  • 2
    • 0029212693 scopus 로고
    • Mining sequential patterns
    • Taipei, Taiwan
    • R. Agrawal and R. Srikant. Mining sequential patterns. In Eleventh ICDE'95, pages 3-14, Taipei, Taiwan, 1995.
    • (1995) Eleventh ICDE'95 , pp. 3-14
    • Agrawal, R.1    Srikant, R.2
  • 8
    • 0003504808 scopus 로고    scopus 로고
    • Security and privacy implications of data mining
    • Feb
    • C. Clifton and D. Marks. Security and privacy implications of data mining. In Proceedings of the 1996 ACM SIGMOD, pages 15 19, Feb. 1996.
    • (1996) Proceedings of the 1996 ACM SIGMOD , pp. 15-19
    • Clifton, C.1    Marks, D.2
  • 10
    • 77952334884 scopus 로고    scopus 로고
    • Using randomized response techniques for privacy-preserving data mining
    • W. Du and Z. Zhan. Using randomized response techniques for privacy-preserving data mining. In Proceedings of the Ninth ACM KDD, pages 505-510, 2003.
    • (2003) Proceedings of the Ninth ACM KDD , pp. 505-510
    • Du, W.1    Zhan, Z.2
  • 13
    • 33750296048 scopus 로고    scopus 로고
    • A. Friedman, A. Schuster, and R. Wolff, k-anonymous decision tree induction. In Proc. of PKDD '06, pages 151 162, Berlin, Germany, 2006. Springer-Verlag.
    • A. Friedman, A. Schuster, and R. Wolff, k-anonymous decision tree induction. In Proc. of PKDD '06, pages 151 162, Berlin, Germany, 2006. Springer-Verlag.
  • 17
    • 18744393736 scopus 로고    scopus 로고
    • G. Lee, C.-Y. Chang, and A. L. P. Chen. Hiding sensitive patterns in association rules mining. In 28th Annual International Computer Software and Applications Conference COMPSAC 2004, pages 424 429, 2004
    • G. Lee, C.-Y. Chang, and A. L. P. Chen. Hiding sensitive patterns in association rules mining. In 28th Annual International Computer Software and Applications Conference (COMPSAC 2004), pages 424 429, 2004.
  • 19
    • 25844456648 scopus 로고    scopus 로고
    • Maximizing accuracy of shared databases when concealing sensitive patterns
    • S. Menon, S. Sarkar, and S. Mukherjee. Maximizing accuracy of shared databases when concealing sensitive patterns. Information Systems Research. 16(3):256 270. 2005.
    • (2005) Information Systems Research , vol.16 , Issue.3 , pp. 256-270
    • Menon, S.1    Sarkar, S.2    Mukherjee, S.3
  • 20
    • 0040871512 scopus 로고
    • Knowledge discovery as a threat to database security
    • G. Piatetsky-Shapiro and W. J. Frawley, editors, AAAI/MIT Press
    • D. E. O'Leary. Knowledge discovery as a threat to database security. In G. Piatetsky-Shapiro and W. J. Frawley, editors, Knowledge Discovery in Databases, pages 507 516. AAAI/MIT Press, 1991.
    • (1991) Knowledge Discovery in Databases , pp. 507-516
    • O'Leary, D.E.1
  • 24
    • 0344990562 scopus 로고    scopus 로고
    • Using unknowns to prevent discovery of association rules
    • Y. Saygin, V. S. Verykios, and C. Clifton. Using unknowns to prevent discovery of association rules. ACM SIGMOD Record, 30(4):45 54, 2001.
    • (2001) ACM SIGMOD Record , vol.30 , Issue.4 , pp. 45-54
    • Saygin, Y.1    Verykios, V.S.2    Clifton, C.3
  • 26
    • 34548591826 scopus 로고    scopus 로고
    • A border-based approach for hiding sensitive frequent itemsets
    • X. Sun and P. S. Yu. A border-based approach for hiding sensitive frequent itemsets. In Proceedings of the Fifth IEEE ICDM, pages 426 433, 2005.
    • (2005) Proceedings of the Fifth IEEE ICDM , vol.433 , pp. 426
    • Sun, X.1    Yu, P.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.