-
1
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
California, USA, pp:, DOI:10.1145/375551.375602
-
Agrawal, D. and C.C. Aggarwal, 2001. On the design and quantification of privacy preserving data mining algorithms, In: Proceedings of ACM SIGMOD/ PODS, California, USA, pp: 247-255. DOI:10.1145/375551.375602
-
(2001)
Proceedings of ACM SIGMOD/ PODS
, pp. 247-255
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
2
-
-
0041783510
-
Privacy preserving data mining
-
New York, USA, pp
-
Agrawal, R. and R. Srikant, 2000, Privacy preserving data mining. In: Proceedings of ACM SIGMOD Conference on Management of Data, New York, USA, pp: 439-450.
-
(2000)
Proceedings of ACM SIGMOD Conference on Management of Data
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
3
-
-
15744376538
-
Privacy issues in knowledge discovery and data mining
-
Melbourne, Victoria, Australia
-
Brankovic, V. and V. Estivill-Castro, 1999. Privacy issues in knowledge discovery and data mining, In: Proceeding of Australian Institute of Computer Ethics Conference, Melbourne, Victoria, Australia.
-
(1999)
Proceeding of Australian Institute of Computer Ethics Conference
-
-
Brankovic, V.1
Estivill-Castro, V.2
-
4
-
-
33750283449
-
Privacy preserving data classification with rotation perturbation
-
IEEE Computer Society, USA, pp:, DOI:10.1109/ICDM.2005.121
-
Chen, K. and L. Liu, 2005. Privacy preserving data classification with rotation perturbation, In: Proceedings of the 5th IEEE International Conference on Data Mining, IEEE Computer Society, USA, pp: 589-592. DOI:10.1109/ICDM.2005.121
-
(2005)
Proceedings of the 5th IEEE International Conference on Data Mining
, pp. 589-592
-
-
Chen, K.1
Liu, L.2
-
5
-
-
54449095973
-
How did they get my name? An exploratory investigation of consumer attitudes toward secondary information
-
Culnan, M.J., 1993. How did they get my name? An exploratory investigation of consumer attitudes toward secondary information. MIS Q., 17: 41-363.
-
(1993)
MIS Q
, vol.17
, pp. 41-363
-
-
Culnan, M.J.1
-
6
-
-
19944380112
-
Database security-concepts, approaches and challenges
-
DOI:10.1109/TDSC.2005.9
-
Elisa Bertino and Ravi Sandhu, 2005. Database security-concepts, approaches and challenges. IEEE Trans. Dependable Secure Computing.,Vol 2, No.1, pp:2-19. DOI:10.1109/TDSC.2005.9
-
(2005)
IEEE Trans. Dependable Secure Computing
, vol.2
, Issue.1
, pp. 2-19
-
-
Bertino, E.1
Sandhu, R.2
-
7
-
-
84958048324
-
Data swapping: Balancing privacy against precision in mining for logic rules
-
Aug.30-Sept.1, Florence, Italy, pp
-
Estivill-Castro, V. and L. Brankovic, 1999. Data swapping: Balancing privacy against precision in mining for logic rules. In: Proceedings of Data Warehousing and Knowledge Discovery Dawak-99, Aug.30-Sept.1, Florence, Italy, pp: 389-398.
-
(1999)
Proceedings of Data Warehousing and Knowledge Discovery Dawak-99
, pp. 389-398
-
-
Estivill-Castro, V.1
Brankovic, L.2
-
8
-
-
0242625281
-
Privacy preserving mining of association rules
-
Edmonton, AB, Canada, pp:, DOI:10.1145/775047.775080
-
Evfimievski, A., R. Srikant, R. Agrawal and J. Gehrke, 2002. Privacy preserving mining of association rules. In: Proceedings of the 8th ACM SIGKDD Italian Conference on Knowledge Discovery And Data Mining, Edmonton, AB, Canada, pp: 217-228. DOI:10.1145/775047.775080
-
(2002)
Proceedings of the 8th ACM SIGKDD Italian Conference on Knowledge Discovery And Data Mining
, pp. 217-228
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
10
-
-
35548970553
-
Multimedia, cyberspace and ethics
-
England, London, pp
-
Jefferies. V, 2000. Multimedia, cyberspace and ethics. In: Proceedings of International Conference on Information Visualization (Iv2000), IEEE, England, London, pp: 99-104.
-
(2000)
Proceedings of International Conference on Information Visualization (Iv2000), IEEE
, pp. 99-104
-
-
Jefferies, V.1
-
11
-
-
20844447439
-
Behind-the-scenes data mining. Newsletter
-
DOI:10.1145/846170.846176
-
John, G.H., 1999. Behind-the-scenes data mining. Newsletter, ACM SIGKDDM, 1: 9-11. DOI:10.1145/846170.846176.
-
(1999)
ACM SIGKDDM
, vol.1
, pp. 9-11
-
-
John, G.H.1
-
12
-
-
0033207750
-
A general additive data perturbation method for database security
-
Muralidhar, K., R. Parsa and R. Sarathy, 1999. A general additive data perturbation method for database security, J. Mgmt. science, Vol:45,pp: 1399-1415.
-
(1999)
J. Mgmt. science
, vol.45
, pp. 1399-1415
-
-
Muralidhar, K.1
Parsa, R.2
Sarathy, R.3
-
13
-
-
80053083131
-
A Hybrid Data Transformation Approach for Privacy Preserving Clustering of categorical Data
-
Natarajan, A.M., Rajalaxmi R.R, Uma N and Kirubakar G, 2007. A Hybrid Data Transformation Approach for Privacy Preserving Clustering of categorical Data, In: Proceedings of International Conference on Systems, Computing Sciences and Software Engineering (SCSS), Vol 1:pp 403-408
-
(2007)
Proceedings of International Conference on Systems, Computing Sciences and Software Engineering (SCSS)
, vol.1
, pp. 403-408
-
-
Natarajan, A.M.1
Rajalaxmi, R.R.2
Uma, N.3
Kirubakar, G.4
-
14
-
-
54449095762
-
-
Stanley R. M. Oliveira, Osmar and R. Zaiyane, 2003. Privacy preserving clustering by data transformation. In: Proceedings of 18th Brazilian Conference on Databases, October 2003, Manaus, Brazil, pp 304-318.
-
Stanley R. M. Oliveira, Osmar and R. Zaiyane, 2003. Privacy preserving clustering by data transformation. In: Proceedings of 18th Brazilian Conference on Databases, October 2003, Manaus, Brazil, pp 304-318.
-
-
-
-
15
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
DOI:10.1145/974121.974131
-
Verykios, V.S., E. Bertino, I.N. Fovino, L.P. Provenza, Y. Saygin and Y. Theodoridis, 2004, State-of-the-art in privacy preserving data mining, ACM SIGMOD Rec., 3: 50-57. DOI:10.1145/974121.974131.
-
(2004)
ACM SIGMOD Rec
, vol.3
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
-
16
-
-
84990886783
-
Privacy Preserving Clustering on Horizontally Partitioned Data
-
DOI:10.1109/ICDEW.2006.115
-
A. Inan, Y. Saygyn, E. Savas, A.A. Hintoglu, A. Levi, 2006, Privacy Preserving Clustering on Horizontally Partitioned Data, In: Proceedings of the 22nd International Conference on Data Engineering Workshops, pp: 95-98. DOI:10.1109/ICDEW.2006.115
-
(2006)
Proceedings of the 22nd International Conference on Data Engineering Workshops
, pp. 95-98
-
-
Inan, A.1
Saygyn, Y.2
Savas, E.3
Hintoglu, A.A.4
Levi, A.5
-
17
-
-
33745439412
-
-
Geetha Jagannathan_ Krishnan Pillaipakkamnatt Rebecca N. Wright, 2006, A New Privacy-Preserving Distributed k-Clustering Algorithm. In: Proceedings.of the SIAM International Conference on Data Mining, pp:494-498.
-
Geetha Jagannathan_ Krishnan Pillaipakkamnatt Rebecca N. Wright, 2006, A New Privacy-Preserving Distributed k-Clustering Algorithm. In: Proceedings.of the SIAM International Conference on Data Mining, pp:494-498.
-
-
-
-
18
-
-
54449092408
-
-
Stanley R.M. Oliveira, Osmar R Zaiane, 2004. Privacy-preserving clustering by object similarity-based representation and dimensionality reduction transformation, In: Proceedings of the ICDM Workshop on Privacy and Security Aspects of Data Mining, pp: 40-46.
-
Stanley R.M. Oliveira, Osmar R Zaiane, 2004. Privacy-preserving clustering by object similarity-based representation and dimensionality reduction transformation, In: Proceedings of the ICDM Workshop on Privacy and Security Aspects of Data Mining, pp: 40-46.
-
-
-
|