메뉴 건너뛰기




Volumn 2, Issue 3, 2008, Pages

Privacy-preserving decision trees over vertically partitioned data

Author keywords

Decision tree classification; Privacy

Indexed keywords

DATA DISTRIBUTED; DATA-MINING; DISTRIBUTED KNOWLEDGE DISCOVERIES; PRIVACY; PRIVACY AND SECURITIES; SECURE MULTIPARTY COMPUTATIONS;

EID: 55149091380     PISSN: 15564681     EISSN: 1556472X     Source Type: Journal    
DOI: 10.1145/1409620.1409624     Document Type: Article
Times cited : (129)

References (41)
  • 2
    • 55149108919 scopus 로고    scopus 로고
    • AGRAWAL, R., EVFIMIEVSKI, A., AND SRIKANT, R. 2008. Information sharing across private databases. In Proceedings of the ACM SIGMOD InternationalConference on Management of Data, San Diego, CA. ACM Press, New York.
    • AGRAWAL, R., EVFIMIEVSKI, A., AND SRIKANT, R. 2008. Information sharing across private databases. In Proceedings of the ACM SIGMOD InternationalConference on Management of Data, San Diego, CA. ACM Press, New York.
  • 8
    • 84945124606 scopus 로고    scopus 로고
    • CRAMER, R., DAMGARD, I., AND NIELSEN, J. B. 2001. Multiparty computation from threshold homomorphic encryption. In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT). Springer-Verlag, London, UK, 280-299.
    • CRAMER, R., DAMGARD, I., AND NIELSEN, J. B. 2001. Multiparty computation from threshold homomorphic encryption. In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT). Springer-Verlag, London, UK, 280-299.
  • 10
    • 0242496951 scopus 로고    scopus 로고
    • Secure multi-party computation problems and their applications: A review and open problems
    • ACM, New York
    • DU, W. AND ATALLAH, M. J. 2001. Secure multi-party computation problems and their applications: A review and open problems. In Proceedings of the New Security Paradigms Workshop. ACM, New York, 11-20.
    • (2001) Proceedings of the New Security Paradigms Workshop , pp. 11-20
    • DU, W.1    ATALLAH, M.J.2
  • 14
    • 0026775637 scopus 로고    scopus 로고
    • EVIDENCE-BASED MEDICINE WORKING GROUP. 1992. Evidence-Based medicine. A new approach to teaching the practice of medicine. J. Amer. Medical Assoc. 268, 17 (Nov.), 2420-2425.
    • EVIDENCE-BASED MEDICINE WORKING GROUP. 1992. Evidence-Based medicine. A new approach to teaching the practice of medicine. J. Amer. Medical Assoc. 268, 17 (Nov.), 2420-2425.
  • 15
    • 35048820609 scopus 로고    scopus 로고
    • FREEDMAN, M. J., NISSIM, K., AND PINKAS, B. 2004. Efficient private matching and set intersec-tion. In Proceedings of the 23rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, International Association for Cryptologic Research (IACR), Interlaken, Switzerland. Springer, 1-19.
    • FREEDMAN, M. J., NISSIM, K., AND PINKAS, B. 2004. Efficient private matching and set intersec-tion. In Proceedings of the 23rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, International Association for Cryptologic Research (IACR), Interlaken, Switzerland. Springer, 1-19.
  • 16
    • 24944523186 scopus 로고    scopus 로고
    • GOETHALS, B., LAUR, S., LIPMAA, H., AND MIELIKÄINEN, T. 2004. On secure scalar product computation for privacy-preserving data mining. In Proceedings of the 7th Annual International Conference in Information Security and Cryptology (ICISC), New York, C. Park and S. Chee, Eds. 3506, Springer, 104-120.
    • GOETHALS, B., LAUR, S., LIPMAA, H., AND MIELIKÄINEN, T. 2004. On secure scalar product computation for privacy-preserving data mining. In Proceedings of the 7th Annual International Conference in Information Security and Cryptology (ICISC), New York, C. Park and S. Chee, Eds. vol. 3506, Springer, 104-120.
  • 17
    • 26444497804 scopus 로고    scopus 로고
    • General Cryptographic Protocols
    • 2. Cambridge University Press, Cambridge, UK
    • GOLDREICH, O. 2004. General Cryptographic Protocols, Vol. 2. In The Foundations of Cryptography, vol. 2. Cambridge University Press, Cambridge, UK, 599-764.
    • (2004) In The Foundations of Cryptography , vol.2 , pp. 599-764
    • GOLDREICH, O.1
  • 21
    • 55149097566 scopus 로고    scopus 로고
    • KANTARCIOGLU, M. AND CLIFTON, C. 2002. Privacy-Preserving distributed mining of association rules on horizontally partitioned data. In Praceedings of the ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery (DMKD), Madison, WI. ACM Press, New York, 24-31.
    • KANTARCIOGLU, M. AND CLIFTON, C. 2002. Privacy-Preserving distributed mining of association rules on horizontally partitioned data. In Praceedings of the ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery (DMKD), Madison, WI. ACM Press, New York, 24-31.
  • 23
    • 4544361334 scopus 로고    scopus 로고
    • KANTARCIOǦLU, M. AND CLIFTON, C. 2004. Privacy-Preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng. 16, 9 (Sept.), 1026-1037.
    • KANTARCIOǦLU, M. AND CLIFTON, C. 2004. Privacy-Preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng. 16, 9 (Sept.), 1026-1037.
  • 25
    • 55149121505 scopus 로고    scopus 로고
    • LEWIS, M. 2003. Department of defense appropriations act, 2004. Title VIII Section 8120. Enacted as Public Law 108-87.
    • LEWIS, M. 2003. Department of defense appropriations act, 2004. Title VIII Section 8120. Enacted as Public Law 108-87.
  • 26
    • 19744365747 scopus 로고    scopus 로고
    • LIN, X., CLIFTON, C., AND ZHU, M. 2005. Privacy preserving clustering with distributed EM mixture modeling. Knowl. Inf. Syst. 8, 1 (Jul.), 68-81.
    • LIN, X., CLIFTON, C., AND ZHU, M. 2005. Privacy preserving clustering with distributed EM mixture modeling. Knowl. Inf. Syst. 8, 1 (Jul.), 68-81.
  • 27
    • 84974555530 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Springer-Verlag, New York, NY
    • LINDELL, Y. AND PINKAS, B. 2000. Privacy preserving data mining. In Advances in Cryptology (CRYPTO). Springer-Verlag, New York, NY, 36-54.
    • (2000) Advances in Cryptology (CRYPTO) , pp. 36-54
    • LINDELL, Y.1    PINKAS, B.2
  • 28
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • LINDELL, Y. AND PINKAS, B. 2002. Privacy preserving data mining. J. Cryptol. 15, 3, 177-206.
    • (2002) J. Cryptol , vol.15 , Issue.3 , pp. 177-206
    • LINDELL, Y.1    PINKAS, B.2
  • 29
    • 33744584654 scopus 로고
    • Induction of decision trees
    • QUINLAN, J. R. 1986. Induction of decision trees. Mach. Learn. 1, 1, 81-106.
    • (1986) Mach. Learn , vol.1 , Issue.1 , pp. 81-106
    • QUINLAN, J.R.1
  • 31
    • 0003855464 scopus 로고
    • 2nd ed. John Wiley & Sons, Hoboken, NJ
    • SCHNEIER, B. 1995. Applied Cryptography, 2nd ed. John Wiley & Sons, Hoboken, NJ.
    • (1995) Applied Cryptography
    • SCHNEIER, B.1
  • 32
    • 4444243813 scopus 로고    scopus 로고
    • SHIRAO, K., HOFF, P., OHTSU, A., LOEHRER, P., HYODO, I., WADLER, S., WADLEIGH, R., O'DWYER, P., MURO, K., YAMADA, Y., BOKU, N., NAGASHIMA, F., AND ABBRUZZESE, J. 2004. Comparison of the efficacy, toxicity, and pharmacokinetics of a uracil/tegafur (UFT) plus oral leucovorin (LV) regimen between Japanese and American patients with advanced colorectal cancer: Joint United States and Japan study of UFT/LV. J. Clinical Oncol. 22, 17 (Sept. 1), 3466-3474.
    • SHIRAO, K., HOFF, P., OHTSU, A., LOEHRER, P., HYODO, I., WADLER, S., WADLEIGH, R., O'DWYER, P., MURO, K., YAMADA, Y., BOKU, N., NAGASHIMA, F., AND ABBRUZZESE, J. 2004. Comparison of the efficacy, toxicity, and pharmacokinetics of a uracil/tegafur (UFT) plus oral leucovorin (LV) regimen between Japanese and American patients with advanced colorectal cancer: Joint United States and Japan study of UFT/LV. J. Clinical Oncol. 22, 17 (Sept. 1), 3466-3474.
  • 35
    • 2942536415 scopus 로고    scopus 로고
    • VAIDYA, J. AND CLIFTON, C. 2004. Privacy preserving naïve Bayes classifier for vertically partitioned data. In Proceedings of the SIAM International Conference on Data Mining, SIAM, Philadelphia, PA, 522-526.
    • VAIDYA, J. AND CLIFTON, C. 2004. Privacy preserving naïve Bayes classifier for vertically partitioned data. In Proceedings of the SIAM International Conference on Data Mining, SIAM, Philadelphia, PA, 522-526.
  • 37
    • 10944227231 scopus 로고    scopus 로고
    • VAIDYA, J. AND CLIFTON, C. 2005b. Secure set intersection cardinality with application to association rule mining. J. Comput. Security 13, 4 (Nov.), 593-622.
    • VAIDYA, J. AND CLIFTON, C. 2005b. Secure set intersection cardinality with application to association rule mining. J. Comput. Security 13, 4 (Nov.), 593-622.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.