-
2
-
-
35048841248
-
A condensation based approach to privacy preserving data mining
-
C. C. Aggarwal, and P. S. Yu, A Condensation Based Approach to Privacy Preserving Data Mining, Proceedings of the EDBT Conference, (2004), pp. 183-199.
-
(2004)
Proceedings of the EDBT Conference
, pp. 183-199
-
-
Aggarwal, C.C.1
Yu, P.S.2
-
5
-
-
0002587094
-
Truste: An online privacy seal program
-
P. Benassi, Truste: An online privacy seal program, Communications of the ACM, 42(2), (1999), pp. 56-59.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 56-59
-
-
Benassi, P.1
-
7
-
-
0242709355
-
Privacy preserving association rule mining in vertically partitioned data
-
J. Vaidya, and C. Clifton, Privacy Preserving Association Rule Mining in Vertically Partitioned Data, ACM KDD Conference, (2002).
-
(2002)
ACM KDD Conference
-
-
Vaidya, J.1
Clifton, C.2
-
8
-
-
0004188848
-
-
John Wiley & Sons, Inc., New York
-
T. M. Cover, J. A. Thomas, Elements of Information Theory, John Wiley & Sons, Inc., New York, (1991).
-
(1991)
Elements of Information Theory
-
-
Cover, T.M.1
Thomas, J.A.2
-
9
-
-
0002976555
-
Special issue on internet privacy
-
Cranor L. F. (Ed.) Special Issue on Internet Privacy, Communications of the ACM, 42(2), (1999).
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
-
-
Cranor, L.F.1
-
10
-
-
0003501701
-
-
The Economist
-
The Economist, The End of Privacy, (1999).
-
(1999)
The end of Privacy
-
-
-
11
-
-
84958048324
-
Data swapping: Balancing privacy against precision in mining for logic rules
-
Springer-Verlag, Lecture Notes in Computer Science 1676
-
V. Estivill-Castro, and L. Brankovic, Data Swapping: Balancing privacy against precision in mining for logic rules, Data Warehousing and Knowledge Discovery, Springer-Verlag, Lecture Notes in Computer Science 1676, (1999), pp. 389-398.
-
(1999)
Data Warehousing and Knowledge Discovery
, pp. 389-398
-
-
Estivill-Castro, V.1
Brankovic, L.2
-
12
-
-
0242625281
-
Privacy preserving mining of association rules
-
A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, Privacy Preserving Mining Of Association Rules, ACM KDD Conference, (2002).
-
(2002)
ACM KDD Conference
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
13
-
-
85140527321
-
An efficient approach to clustering in large multimedia databases with noise
-
A. Hinneburg, and D. A. Keim, An Efficient Approach to Clustering in Large Multimedia Databases with Noise, ACM KDD Conference, (1998).
-
(1998)
ACM KDD Conference
-
-
Hinneburg, A.1
Keim, D.A.2
-
14
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
V. S. Iyengar, Transforming Data To Satisfy Privacy Constraints, ACM KDD Conference, (2002).
-
(2002)
ACM KDD Conference
-
-
Iyengar, V.S.1
-
15
-
-
0022130080
-
A data distortion by probability distribution
-
C. K. Liew, U. J. Choi, and C. J. Liew, A data distortion by probability distribution, ACM TODS Journal, (1985), 10(3) pp. 395-411.
-
(1985)
ACM TODS Journal
, vol.10
, Issue.3
, pp. 395-411
-
-
Liew, C.K.1
Choi, U.J.2
Liew, C.J.3
-
16
-
-
0002654263
-
Privacy interfaces for information management
-
T. Lau, O. Etzioni, and D. S. Weld, Privacy Interfaces for Information Management, Communications of the ACM, 42(10), (1999), pp. 89-94.
-
(1999)
Communications of the ACM
, vol.42
, Issue.10
, pp. 89-94
-
-
Lau, T.1
Etzioni, O.2
Weld, D.S.3
-
17
-
-
0002431740
-
Automatic construction of decision trees from data: A multi-disciplinary survey
-
S. Murthy, Automatic Construction of Decision Trees from Data: A Multi-Disciplinary Survey, Data Mining and Knowledge Discovery, 2, (1998), pp. 345-389.
-
(1998)
Data Mining and Knowledge Discovery
, vol.2
, pp. 345-389
-
-
Murthy, S.1
-
19
-
-
0013776710
-
Randomized response: A survey technique for eliminating evasive answer bias
-
S. L. Warner, Randomized Response: A survey technique for eliminating evasive answer bias, Journal of the American Statistical Association, 60(309), (1965), pp. 63-69.
-
(1965)
Journal of the American Statistical Association
, vol.60
, Issue.309
, pp. 63-69
-
-
Warner, S.L.1
|