-
5
-
-
0041783510
-
Privacy preserving data mining
-
In: Texas, USA, May 16-18
-
Agrawal R, Srikant R (2000) Privacy preserving data mining. In: Proceedings of the 2000 ACM SIGMOD international conference on management of database, Texas, USA, May 16-18, pp 439-450
-
(2000)
Proceedings of the 2000 ACM SIGMOD International Conference on Management of Database
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
8
-
-
85032400475
-
Disclosure limitation of sensitive rules
-
Atallah M, Bertino E, Elmagarmid AK, Ibrahim M, Verykios VS (1999) Disclosure limitation of sensitive rules. In: Proceedings of the IEEE KDEE, pp 45-52
-
(1999)
Proceedings of the IEEE KDEE
, pp. 45-52
-
-
Atallah, M.1
Bertino, E.2
Elmagarmid, A.K.3
Ibrahim, M.4
Verykios, V.S.5
-
9
-
-
10444267476
-
How to sanitize data
-
In: Modena, Italy, June 14-16
-
Bishop M, Bhumiratana B, Crawford R, Levitt K (2004) How to sanitize data. In: Proceedings of the 13th IEEE international workshops on enabling technologies: Infrastructure for collaborative enterprises (WETICE'04), Modena, Italy, June 14-16, pp 217-222
-
(2004)
Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'04)
, pp. 217-222
-
-
Bishop, M.1
Bhumiratana, B.2
Crawford, R.3
Levitt, K.4
-
10
-
-
0014814325
-
Space time tradeoffs in hash coding with allowable errors
-
Bloom B (1970). Space time tradeoffs in hash coding with allowable errors. Commun ACM 7(13): 422-426
-
(1970)
Commun ACM
, vol.7
, Issue.13
, pp. 422-426
-
-
Bloom, B.1
-
13
-
-
1642302606
-
Building decision tree classifier on private data
-
Du W, Zhan Z (2002) Building decision tree classifier on private data. In: Proceedings of IEEE ICDM'02 workshop on privacy, security, and data mining, vol 14, pp 1-8
-
(2002)
Proceedings of IEEE ICDM'02 Workshop on Privacy, Security, and Data Mining
, vol.14
, pp. 1-8
-
-
Du, W.1
Zhan, Z.2
-
19
-
-
29844458622
-
Deriving private information from randomized data
-
In: Baltimore, MA, USA, June 14-16
-
Huang Z, Du W, Chen B (2005) Deriving private information from randomized data. In: Proceedings of the ACM SIGMOD international conference on management of data, Baltimore, MA, USA, June 14-16, pp 37-48
-
(2005)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 37-48
-
-
Huang, Z.1
Du, W.2
Chen, B.3
-
20
-
-
26444538232
-
A framework for efficient storage security in RDBMS
-
Iyer B, Mehrotra S, Mykletun E, Tsudik G, Wu Y (2004) A framework for efficient storage security in RDBMS. In: Proceedings of international conference on EDBT, pp 147-164
-
(2004)
Proceedings of International Conference on EDBT
, pp. 147-164
-
-
Iyer, B.1
Mehrotra, S.2
Mykletun, E.3
Tsudik, G.4
Wu, Y.5
-
24
-
-
23844515436
-
Random-data perturbation techniques and privacy-preserving data mining
-
Kargupta H, Datta S, Wang Q and Sivakumar K (2005). Random-data perturbation techniques and privacy-preserving data mining. Knowledge Inf Syst Int J 7(4): 387-414
-
(2005)
Knowledge Inf Syst Int J
, vol.7
, Issue.4
, pp. 387-414
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
25
-
-
0037408609
-
Mining inter-organizational retailing knowledge for an alliance formed by competitive firms
-
Lin Q-Y, Chen Y-L, Chen J-S and Chen Y-C (2003). Mining inter-organizational retailing knowledge for an alliance formed by competitive firms. Inf Manage 40(5): 431-442
-
(2003)
Inf Manage
, vol.40
, Issue.5
, pp. 431-442
-
-
Lin, Q.-Y.1
Chen, Y.-L.2
Chen, J.-S.3
Chen, Y.-C.4
-
26
-
-
33746437508
-
Privacy preserving data mining
-
Lindell Y and Pinkas B (2002). Privacy preserving data mining. J Cryptol 15(3): 177-206
-
(2002)
J Cryptol
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
28
-
-
0034394384
-
Privacy and ethical issues in database/interactive marketing and public policy: A research framework and overview of the special issue
-
Milne G-R (2000). Privacy and ethical issues in database/interactive marketing and public policy: A research framework and overview of the special issue. J Public Policy Marketing 19: 1-6
-
(2000)
J Public Policy Marketing
, vol.19
, pp. 1-6
-
-
Milne, G.-R.1
-
32
-
-
33645538917
-
Constraining and summarizing association rules in medical data
-
Ordones C, Ezquerra N and Santana CA (2006). Constraining and summarizing association rules in medical data. Knowledge Inf Syst Int J 9(3): 259-283
-
(2006)
Knowledge Inf Syst Int J
, vol.9
, Issue.3
, pp. 259-283
-
-
Ordones, C.1
Ezquerra, N.2
Santana, C.A.3
-
33
-
-
4544312695
-
Cryptographic techniques for privacy preserving data mining
-
Pinkas B (2002). Cryptographic techniques for privacy preserving data mining. ACM SIGKDD Explor 4(2): 12-19
-
(2002)
ACM SIGKDD Explor
, vol.4
, Issue.2
, pp. 12-19
-
-
Pinkas, B.1
-
34
-
-
44649093146
-
An approach to outsourcing data mining tasks while protecting business intelligence and customer privacy
-
In: Hong Kong, China, December 18-22
-
Qiu L, Li Y, Wu X (2006) An approach to outsourcing data mining tasks while protecting business intelligence and customer privacy. In: Workshops proceedings of the 6th IEEE international conference on data mining (ICDM 2006), Hong Kong, China, December 18-22, pp 551-558
-
(2006)
Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006)
, pp. 551-558
-
-
Qiu, L.1
Li, Y.2
Wu, X.3
-
35
-
-
38049077921
-
Data confidentiality versus chase
-
In: Toronto, Canada, May 14-16. Springer LNAI
-
Raś ZW, Gürdal O, Im S, Tzacheva A (2007) Data confidentiality versus chase. In: Proceedings of the joint rough sets symposium (JRS07), Toronto, Canada, May 14-16. Springer LNAI vol 4482, pp 330-337
-
(2007)
Proceedings of the Joint Rough Sets Symposium (JRS07)
, vol.4482
, pp. 330-337
-
-
Raś, Z.W.1
Gürdal, O.2
Im, S.3
Tzacheva, A.4
-
36
-
-
1142294784
-
Maintaining data privacy in association rule mining
-
Rizvi S, Haritsa J (2002) Maintaining data privacy in association rule mining. In: Proceedings of VLDB'02, pp 682-693
-
(2002)
Proceedings of VLDB'02
, pp. 682-693
-
-
Rizvi, S.1
Haritsa, J.2
-
37
-
-
0344990562
-
Using unknowns to prevent discovery of association rules
-
Saygin Y, Verykios VS and Clifton C (2001). Using unknowns to prevent discovery of association rules. Sigmod Rec 30(4): 45-54
-
(2001)
Sigmod Rec
, vol.30
, Issue.4
, pp. 45-54
-
-
Saygin, Y.1
Verykios, V.S.2
Clifton, C.3
-
38
-
-
10944270172
-
Privacy-preserving data mining: Why, how and when
-
Vaidya J and Clifton C (2004). Privacy-preserving data mining: Why, how and when. IEEE Security Privacy 2(6): 19-27
-
(2004)
IEEE Security Privacy
, vol.2
, Issue.6
, pp. 19-27
-
-
Vaidya, J.1
Clifton, C.2
-
39
-
-
33749339031
-
A singular value decomposition based data distortion strategy for privacy protection
-
Xu S, Zhang J, Han D and Wang J (2006). A singular value decomposition based data distortion strategy for privacy protection. Knowledge Inf Syst Int J 10(3): 383-397
-
(2006)
Knowledge Inf Syst Int J
, vol.10
, Issue.3
, pp. 383-397
-
-
Xu, S.1
Zhang, J.2
Han, D.3
Wang, J.4
|