-
2
-
-
85032400475
-
Disclosure limitation of sensitive rules
-
M. Atallah, E. Bertino, A. Elmagarmid, M. Ibrahim, and V. S. Verykios. Disclosure limitation of sensitive rules. In Proceedings of the IEEE KDEX99, pp. 45-52.
-
Proceedings of the IEEE
, vol.KDEX99
, pp. 45-52
-
-
Atallah, M.1
Bertino, E.2
Elmagarmid, A.3
Ibrahim, M.4
Verykios, V.S.5
-
4
-
-
33646407813
-
-
M. Atzori, F. Bonchi, F. Giannotti, and D. Pedreschi. k-anonymous patterns. In Proceedings of the PKDD 2005, Springer, pp. 10-21.
-
M. Atzori, F. Bonchi, F. Giannotti, and D. Pedreschi. k-anonymous patterns. In Proceedings of the PKDD 2005, Springer, pp. 10-21.
-
-
-
-
5
-
-
45749101998
-
Anonymity preserving pattern discovery
-
Springer, To Appear
-
M. Atzori, F. Bonchi, F. Giannotti, and D. Pedreschi. Anonymity preserving pattern discovery. VLDB Journal, Springer, 2007. To Appear.
-
(2007)
VLDB Journal
-
-
Atzori, M.1
Bonchi, F.2
Giannotti, F.3
Pedreschi, D.4
-
7
-
-
84947271833
-
Hiding association rules by using confidence and support
-
E. Dasseni, V. S. Verykios, A. K. Elmagarmid, and E. Bertino. Hiding association rules by using confidence and support. In Proceedings of the 4th International Workshop on Information Hiding, pp. 369-383, 2001.
-
(2001)
Proceedings of the 4th International Workshop on Information Hiding
, pp. 369-383
-
-
Dasseni, E.1
Verykios, V.S.2
Elmagarmid, A.K.3
Bertino, E.4
-
8
-
-
27944454864
-
Location privacy in mobile systems: A personalized anonymization model
-
B. Gedik and L. Liu. Location privacy in mobile systems: A personalized anonymization model. In Proceedings of the IEEE ICDCS 2005, pp. 620-629, 2005.
-
(2005)
Proceedings of the IEEE ICDCS 2005
, pp. 620-629
-
-
Gedik, B.1
Liu, L.2
-
11
-
-
18744393736
-
Hiding sensitive patterns in association rules mining
-
G. Lee, C.-Y. Chang, and A. L. P. Chen. Hiding sensitive patterns in association rules mining. In COMPSAC 2004, pp. 424-429.
-
COMPSAC 2004
, pp. 424-429
-
-
Lee, G.1
Chang, C.-Y.2
Chen, A.L.P.3
-
13
-
-
25844456648
-
Maximizing accuracy of shared databases when concealing sensitive patterns
-
S. Menon, S. Sarkar, and S. Mukherjee. Maximizing accuracy of shared databases when concealing sensitive patterns. Information Systems Research, 16(3):256-270, 2005.
-
(2005)
Information Systems Research
, vol.16
, Issue.3
, pp. 256-270
-
-
Menon, S.1
Sarkar, S.2
Mukherjee, S.3
-
14
-
-
0040871512
-
Knowledge discovery as a threat to database security
-
AAAI/MIT Press
-
D. E. O'Leary. Knowledge discovery as a threat to database security. In Knowledge Discovery in Databases, pages 507-516. AAAI/MIT Press, 1991.
-
(1991)
Knowledge Discovery in Databases
, pp. 507-516
-
-
O'Leary, D.E.1
-
16
-
-
84880954718
-
An experimental study of distortion-based techniques for association rule hiding
-
E. D. Pontikakis, A. A. Tsitsonis, and V. S. Verykios. An experimental study of distortion-based techniques for association rule hiding. In DBSEC 2004, pp. 325-339.
-
DBSEC 2004
, pp. 325-339
-
-
Pontikakis, E.D.1
Tsitsonis, A.A.2
Verykios, V.S.3
-
17
-
-
70349118745
-
Generalizing data to provide anonymity when disclosing information (Extended Abstract)
-
P. Samarati and L. Sweeney. Generalizing data to provide anonymity when disclosing information (Extended Abstract). In PODS 1998.
-
PODS 1998
-
-
Samarati, P.1
Sweeney, L.2
-
18
-
-
0344990562
-
Using unknowns to prevent discovery of association rules
-
Y. Saygin, V. S. Verykios, and C. Clifton. Using unknowns to prevent discovery of association rules. ACM SIGMOD Record, 30(4):45-54, 2001.
-
(2001)
ACM SIGMOD Record
, vol.30
, Issue.4
, pp. 45-54
-
-
Saygin, Y.1
Verykios, V.S.2
Clifton, C.3
-
20
-
-
34548591826
-
A border-based approach for hiding sensitive frequent itemsets
-
X. Sun and P. S. Yu. A border-based approach for hiding sensitive frequent itemsets. In Proceedings of the IEEE ICDM 2005, pp. 426-433.
-
(2005)
Proceedings of the IEEE ICDM
, pp. 426-433
-
-
Sun, X.1
Yu, P.S.2
-
22
-
-
2142754478
-
Association rule hiding
-
V. S. Verykios, A. K. Emagarmid, E. Bertino, Y. Saygin, and E. Dasseni. Association rule hiding. IEEE Transactions on Knowledge and Data Engineering, 16(4):434-447, 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.4
, pp. 434-447
-
-
Verykios, V.S.1
Emagarmid, A.K.2
Bertino, E.3
Saygin, Y.4
Dasseni, E.5
|