메뉴 건너뛰기




Volumn 36, Issue 3 PART 1, 2009, Pages 5711-5717

Privacy preserving itemset mining through noisy items

Author keywords

Association rules; Privacy preserving data mining

Indexed keywords

ASSOCIATION RULES; DATA MINING;

EID: 58349096040     PISSN: 09574174     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.eswa.2008.06.052     Document Type: Article
Times cited : (15)

References (22)
  • 1
    • 0034827009 scopus 로고    scopus 로고
    • Agrawal, D., & Aggarwal, C. C. (2001). On the design and quantification of privacy preserving data mining algorithms. In Proceedings of the 20th ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems: PODS 2001.
    • Agrawal, D., & Aggarwal, C. C. (2001). On the design and quantification of privacy preserving data mining algorithms. In Proceedings of the 20th ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems: PODS 2001.
  • 2
    • 58349120560 scopus 로고    scopus 로고
    • Agrawal, R., & Srikant, R. (1994). Fast algorithms for mining association rules. In Proceedings of the 20th international conference on very large data bases (VLDB).
    • Agrawal, R., & Srikant, R. (1994). Fast algorithms for mining association rules. In Proceedings of the 20th international conference on very large data bases (VLDB).
  • 3
    • 0041783510 scopus 로고    scopus 로고
    • Agrawal, R., & Srikant, R. (2000). Privacy-preserving data mining. In W. Chen, J. Naughton, & P. A. Bernstein (Eds.), Proceedings of the 2000 ACM SIGMOD international conference on management of data.
    • Agrawal, R., & Srikant, R. (2000). Privacy-preserving data mining. In W. Chen, J. Naughton, & P. A. Bernstein (Eds.), Proceedings of the 2000 ACM SIGMOD international conference on management of data.
  • 4
    • 0027621699 scopus 로고    scopus 로고
    • Agrawal, R., Imielinski, T., Swami, & A. N. (1993). Mining association rules between sets of items in large databases, In P. Buneman, & S. Jajodia (Eds.), Proceedings of the 1993 ACM SIGMOD international conference on management of data. .
    • Agrawal, R., Imielinski, T., Swami, & A. N. (1993). Mining association rules between sets of items in large databases, In P. Buneman, & S. Jajodia (Eds.), Proceedings of the 1993 ACM SIGMOD international conference on management of data. .
  • 6
    • 85032400475 scopus 로고    scopus 로고
    • Atallah, M., Bertino, E., Elmagarmid, A. K., Ibrahim, M., & Verykios, V.S. (1999). Disclosure limitation of sensitive rules. In Proceedings of IEEE knowledge and data engineering exchange workshop (KDEX).
    • Atallah, M., Bertino, E., Elmagarmid, A. K., Ibrahim, M., & Verykios, V.S. (1999). Disclosure limitation of sensitive rules. In Proceedings of IEEE knowledge and data engineering exchange workshop (KDEX).
  • 7
    • 58349105933 scopus 로고    scopus 로고
    • Dasseni, E., Verykios, V. S., Elmagarmid, A. K., & Bertino, E. (2001). Hiding association rules by using confidence and support. In Proceedings of the 4th international workshop on information hiding (IWIH).
    • Dasseni, E., Verykios, V. S., Elmagarmid, A. K., & Bertino, E. (2001). Hiding association rules by using confidence and support. In Proceedings of the 4th international workshop on information hiding (IWIH).
  • 8
    • 58349102126 scopus 로고    scopus 로고
    • Eisenberg, A. (2002). With false numbers, data crunchers try to mine the truth, The New York Times.
    • Eisenberg, A. (2002). With false numbers, data crunchers try to mine the truth, The New York Times.
  • 9
    • 0242625281 scopus 로고    scopus 로고
    • Evfimievski, A., Srikant, R., Agrawal, R., & Gehrke, J. (2002). Privacy preserving mining of association rules. In D. Hand, D. Keim, & R. Ng (Eds.), Proceedings of the 8th ACM SIGKDD international conference on knowledge discovery and data mining (KDD-02).
    • Evfimievski, A., Srikant, R., Agrawal, R., & Gehrke, J. (2002). Privacy preserving mining of association rules. In D. Hand, D. Keim, & R. Ng (Eds.), Proceedings of the 8th ACM SIGKDD international conference on knowledge discovery and data mining (KDD-02).
  • 10
    • 1142263341 scopus 로고    scopus 로고
    • Evfimievski, A., Gehrke, J., & Srikant, R. (2003). Limiting privacy breaches in privacy preserving data mining. In Proceedings of the 22nd ACM SIGACT-SIGMOD-SIGART symposium on principles of database systems: PODS 2003.
    • Evfimievski, A., Gehrke, J., & Srikant, R. (2003). Limiting privacy breaches in privacy preserving data mining. In Proceedings of the 22nd ACM SIGACT-SIGMOD-SIGART symposium on principles of database systems: PODS 2003.
  • 11
    • 58349093037 scopus 로고    scopus 로고
    • Goldreich, O. (1998). Secure multi-party computation. .
    • Goldreich, O. (1998). Secure multi-party computation. .
  • 12
    • 0039253846 scopus 로고    scopus 로고
    • Han, J., Pei, J., & Yin, Y. (2000). Mining frequent patterns without candidate generation. In W. Chen, J. Naughton, & P. A. Bernstein (Eds.), Proceedings of the 2000 ACM SIGMOD international conference on management of data.
    • Han, J., Pei, J., & Yin, Y. (2000). Mining frequent patterns without candidate generation. In W. Chen, J. Naughton, & P. A. Bernstein (Eds.), Proceedings of the 2000 ACM SIGMOD international conference on management of data.
  • 13
    • 58349085263 scopus 로고    scopus 로고
    • Kantarcioglu, M., & Clifton, C. (2002). Privacy-preserving distributed mining of association rules on horizontally partitioned data. In Proceedings of the ACM SIGMOD workshop on research issues in data mining and knowledge discovery (DMKD).
    • Kantarcioglu, M., & Clifton, C. (2002). Privacy-preserving distributed mining of association rules on horizontally partitioned data. In Proceedings of the ACM SIGMOD workshop on research issues in data mining and knowledge discovery (DMKD).
  • 14
    • 35248858272 scopus 로고    scopus 로고
    • Lin, J.-L., & Liu, J. Y.-C. (2007). Privacy preserving itemset mining through fake transactions. In Proceedings of the 22nd Annual ACM Symposium on Applied Computing (SAC'07).
    • Lin, J.-L., & Liu, J. Y.-C. (2007). Privacy preserving itemset mining through fake transactions. In Proceedings of the 22nd Annual ACM Symposium on Applied Computing (SAC'07).
  • 15
    • 84974555530 scopus 로고    scopus 로고
    • Lindell, Y., & Pinkas, B. (2000). Privacy preserving data mining. In Advances in Cryptology - CRYPTO 2000, LNCS 1880. Springer-Verlag.
    • Lindell, Y., & Pinkas, B. (2000). Privacy preserving data mining. In Advances in Cryptology - CRYPTO 2000, LNCS 1880. Springer-Verlag.
  • 16
    • 58349085037 scopus 로고    scopus 로고
    • Oliveira, S. R. M., & Zaiane, O. R. (2002). Privacy preserving frequent itemset mining. In Proceedings of the workshop on privacy, security, and data mining, in conjunction with the IEEE international conference on data mining.
    • Oliveira, S. R. M., & Zaiane, O. R. (2002). Privacy preserving frequent itemset mining. In Proceedings of the workshop on privacy, security, and data mining, in conjunction with the IEEE international conference on data mining.
  • 17
    • 58349105932 scopus 로고    scopus 로고
    • Rizvi, S. J., & Haritsa, J. R. (2002). Maintaining data privacy in association rule mining. In Proceedings of the 28th conference on very large data bases (VLDB'02).
    • Rizvi, S. J., & Haritsa, J. R. (2002). Maintaining data privacy in association rule mining. In Proceedings of the 28th conference on very large data bases (VLDB'02).
  • 18
    • 0344990562 scopus 로고    scopus 로고
    • Saygin, Y., Verykios, V. S., & Clifton, C. (2001). Using unknown to prevent discovery of association rules. SIGMOD record (ACM special interest group on management of data) 30 (4).
    • Saygin, Y., Verykios, V. S., & Clifton, C. (2001). Using unknown to prevent discovery of association rules. SIGMOD record (ACM special interest group on management of data) 30 (4).
  • 19
    • 33746083334 scopus 로고    scopus 로고
    • Saygin, Y., Verykios, V. S., & Elmagarmid, A. K. (2002). Privacy preserving association rule mining. In Proceedings of the 12th international workshop on research issues in data engineering (RIDE'02).
    • Saygin, Y., Verykios, V. S., & Elmagarmid, A. K. (2002). Privacy preserving association rule mining. In Proceedings of the 12th international workshop on research issues in data engineering (RIDE'02).
  • 20
    • 0242709355 scopus 로고    scopus 로고
    • Vaidya, J., & Clifton, C. (2002). Privacy preserving association rule mining in vertically partitioned data. In D. Hand, D. Keim, & R. Ng (Eds.), Proceedings of the 8th ACM SIGKDD international conference on knowledge discovery and data mining (KDD-02).
    • Vaidya, J., & Clifton, C. (2002). Privacy preserving association rule mining in vertically partitioned data. In D. Hand, D. Keim, & R. Ng (Eds.), Proceedings of the 8th ACM SIGKDD international conference on knowledge discovery and data mining (KDD-02).
  • 22
    • 0035788918 scopus 로고    scopus 로고
    • Zheng, Z., Kohavi, R., & Mason, L. (2001). Real world performance of association rule algorithms. In F. Provost, & R. Srikant (Eds.), Proceedings of the 17th ACM SIGKDD international conference on knowledge discovery and data mining. .
    • Zheng, Z., Kohavi, R., & Mason, L. (2001). Real world performance of association rule algorithms. In F. Provost, & R. Srikant (Eds.), Proceedings of the 17th ACM SIGKDD international conference on knowledge discovery and data mining. .


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.