메뉴 건너뛰기




Volumn 17, Issue 1, 2008, Pages 99-120

Protecting business intelligence and customer privacy while outsourcing data mining tasks

Author keywords

[No Author keywords available]

Indexed keywords

DECISION MAKING; DIGITAL STORAGE; FILTRATION; PRIVACY BY DESIGN; SALES;

EID: 54049092431     PISSN: 02191377     EISSN: 02193116     Source Type: Journal    
DOI: 10.1007/s10115-007-0113-3     Document Type: Article
Times cited : (35)

References (41)
  • 7
    • 0042414012 scopus 로고    scopus 로고
    • Business applications of data mining
    • Apte C, Liu B, Pednault E and Smyth P (2002). Business applications of data mining. Commun ACM 45(8): 49-53
    • (2002) Commun ACM , vol.45 , Issue.8 , pp. 49-53
    • Apte, C.1    Liu, B.2    Pednault, E.3    Smyth, P.4
  • 10
    • 0014814325 scopus 로고
    • Space time tradeoffs in hash coding with allowable errors
    • Bloom B (1970). Space time tradeoffs in hash coding with allowable errors. Commun ACM 7(13): 422-426
    • (1970) Commun ACM , vol.7 , Issue.13 , pp. 422-426
    • Bloom, B.1
  • 24
    • 23844515436 scopus 로고    scopus 로고
    • Random-data perturbation techniques and privacy-preserving data mining
    • Kargupta H, Datta S, Wang Q and Sivakumar K (2005). Random-data perturbation techniques and privacy-preserving data mining. Knowledge Inf Syst Int J 7(4): 387-414
    • (2005) Knowledge Inf Syst Int J , vol.7 , Issue.4 , pp. 387-414
    • Kargupta, H.1    Datta, S.2    Wang, Q.3    Sivakumar, K.4
  • 25
    • 0037408609 scopus 로고    scopus 로고
    • Mining inter-organizational retailing knowledge for an alliance formed by competitive firms
    • Lin Q-Y, Chen Y-L, Chen J-S and Chen Y-C (2003). Mining inter-organizational retailing knowledge for an alliance formed by competitive firms. Inf Manage 40(5): 431-442
    • (2003) Inf Manage , vol.40 , Issue.5 , pp. 431-442
    • Lin, Q.-Y.1    Chen, Y.-L.2    Chen, J.-S.3    Chen, Y.-C.4
  • 26
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Lindell Y and Pinkas B (2002). Privacy preserving data mining. J Cryptol 15(3): 177-206
    • (2002) J Cryptol , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 28
    • 0034394384 scopus 로고    scopus 로고
    • Privacy and ethical issues in database/interactive marketing and public policy: A research framework and overview of the special issue
    • Milne G-R (2000). Privacy and ethical issues in database/interactive marketing and public policy: A research framework and overview of the special issue. J Public Policy Marketing 19: 1-6
    • (2000) J Public Policy Marketing , vol.19 , pp. 1-6
    • Milne, G.-R.1
  • 32
    • 33645538917 scopus 로고    scopus 로고
    • Constraining and summarizing association rules in medical data
    • Ordones C, Ezquerra N and Santana CA (2006). Constraining and summarizing association rules in medical data. Knowledge Inf Syst Int J 9(3): 259-283
    • (2006) Knowledge Inf Syst Int J , vol.9 , Issue.3 , pp. 259-283
    • Ordones, C.1    Ezquerra, N.2    Santana, C.A.3
  • 33
    • 4544312695 scopus 로고    scopus 로고
    • Cryptographic techniques for privacy preserving data mining
    • Pinkas B (2002). Cryptographic techniques for privacy preserving data mining. ACM SIGKDD Explor 4(2): 12-19
    • (2002) ACM SIGKDD Explor , vol.4 , Issue.2 , pp. 12-19
    • Pinkas, B.1
  • 34
    • 44649093146 scopus 로고    scopus 로고
    • An approach to outsourcing data mining tasks while protecting business intelligence and customer privacy
    • In: Hong Kong, China, December 18-22
    • Qiu L, Li Y, Wu X (2006) An approach to outsourcing data mining tasks while protecting business intelligence and customer privacy. In: Workshops proceedings of the 6th IEEE international conference on data mining (ICDM 2006), Hong Kong, China, December 18-22, pp 551-558
    • (2006) Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006) , pp. 551-558
    • Qiu, L.1    Li, Y.2    Wu, X.3
  • 36
    • 1142294784 scopus 로고    scopus 로고
    • Maintaining data privacy in association rule mining
    • Rizvi S, Haritsa J (2002) Maintaining data privacy in association rule mining. In: Proceedings of VLDB'02, pp 682-693
    • (2002) Proceedings of VLDB'02 , pp. 682-693
    • Rizvi, S.1    Haritsa, J.2
  • 37
    • 0344990562 scopus 로고    scopus 로고
    • Using unknowns to prevent discovery of association rules
    • Saygin Y, Verykios VS and Clifton C (2001). Using unknowns to prevent discovery of association rules. Sigmod Rec 30(4): 45-54
    • (2001) Sigmod Rec , vol.30 , Issue.4 , pp. 45-54
    • Saygin, Y.1    Verykios, V.S.2    Clifton, C.3
  • 38
    • 10944270172 scopus 로고    scopus 로고
    • Privacy-preserving data mining: Why, how and when
    • Vaidya J and Clifton C (2004). Privacy-preserving data mining: Why, how and when. IEEE Security Privacy 2(6): 19-27
    • (2004) IEEE Security Privacy , vol.2 , Issue.6 , pp. 19-27
    • Vaidya, J.1    Clifton, C.2
  • 39
    • 33749339031 scopus 로고    scopus 로고
    • A singular value decomposition based data distortion strategy for privacy protection
    • Xu S, Zhang J, Han D and Wang J (2006). A singular value decomposition based data distortion strategy for privacy protection. Knowledge Inf Syst Int J 10(3): 383-397
    • (2006) Knowledge Inf Syst Int J , vol.10 , Issue.3 , pp. 383-397
    • Xu, S.1    Zhang, J.2    Han, D.3    Wang, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.