메뉴 건너뛰기




Volumn , Issue , 2010, Pages 173-182

Reliable medical recommendation systems with patient privacy

Author keywords

framework; privacy; recommendation systems

Indexed keywords

FRAMEWORK; MEDICAL CONDITIONS; MEDICAL INFORMATION; PATIENT DATA; PRIVACY; PRIVACY CONCERNS; PROCESSING ARCHITECTURES; RECOMMENDATION SYSTEMS; SECURE MULTI-PARTY COMPUTATION;

EID: 78650964801     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1882992.1883018     Document Type: Conference Paper
Times cited : (20)

References (29)
  • 1
    • 78650959335 scopus 로고    scopus 로고
    • Anonymizer, Inc. http://www.anonymizer.com.
  • 2
    • 78650950658 scopus 로고    scopus 로고
    • Shadowsurf. http://www.shadowsurf.com/.
  • 4
    • 84958639277 scopus 로고    scopus 로고
    • Efficient generation of shared RSA keys
    • D. Boneh and M. K. Franklin. Efficient generation of shared RSA keys. In CRYPTO'97, pages 425-439, 1997.
    • (1997) CRYPTO'97 , pp. 425-439
    • Boneh, D.1    Franklin, M.K.2
  • 5
    • 74049103179 scopus 로고    scopus 로고
    • Secure two-party k-means clustering
    • P. Bunn and R. Ostrovsky. Secure two-party k-means clustering. In CCS'07, pages 486-497, 2007.
    • (2007) CCS'07 , pp. 486-497
    • Bunn, P.1    Ostrovsky, R.2
  • 6
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1):143-202, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 7
    • 0036082701 scopus 로고    scopus 로고
    • Collaborative filtering with privacy
    • J. F. Canny. Collaborative filtering with privacy. In SSP'02, pages 45-57, 2002.
    • (2002) SSP'02 , pp. 45-57
    • Canny, J.F.1
  • 8
    • 0036993076 scopus 로고    scopus 로고
    • Collaborative filtering with privacy via factor analysis
    • J. F. Canny. Collaborative filtering with privacy via factor analysis. In SIGIR'02, pages 238-245, 2002.
    • (2002) SIGIR'02 , pp. 238-245
    • Canny, J.F.1
  • 10
    • 84876544258 scopus 로고    scopus 로고
    • Preventing shilling attacks in online recommender systems
    • P.-A. Chirita, W. Nejdl, and C. Zamfir. Preventing shilling attacks in online recommender systems. In WIDM'05, pages 67-74, 2005.
    • (2005) WIDM'05 , pp. 67-74
    • Chirita, P.-A.1    Nejdl, W.2    Zamfir, C.3
  • 11
    • 84867553981 scopus 로고    scopus 로고
    • A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
    • I. Damgård and M. Jurik. A generalisation, a simplification and some applications of Paillier's probabilistic public-key system. In PKC'01, pages 119-136, 2001.
    • (2001) PKC'01 , pp. 119-136
    • Damgård, I.1    Jurik, M.2
  • 12
    • 84945127249 scopus 로고    scopus 로고
    • Practical threshold RSA signatures without a trusted dealer
    • I. Damgård and M. Koprowski. Practical threshold RSA signatures without a trusted dealer. In EUROCRYPT'01, pages 152-165, 2001.
    • (2001) EUROCRYPT'01 , pp. 152-165
    • Damgård, I.1    Koprowski, M.2
  • 13
    • 0003956839 scopus 로고    scopus 로고
    • Version 1.0. RFC 2246 (Proposed Standard), Jan.
    • T. Dierks and C. Allen. The TLS Protocol Version 1.0. RFC 2246 (Proposed Standard), Jan. 1999.
    • (1999) The TLS Protocol
    • Dierks, T.1    Allen, C.2
  • 16
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy
    • C. Dwork. Differential privacy. In ICALP'06, pages 1-12, 2006.
    • (2006) ICALP'06 , pp. 1-12
    • Dwork, C.1
  • 17
    • 70349305273 scopus 로고    scopus 로고
    • Differential privacy: A survey of results
    • C. Dwork. Differential privacy: A survey of results. In TAMC'08, pages 1-19, 2008.
    • (2008) TAMC'08 , pp. 1-19
    • Dwork, C.1
  • 18
    • 84944328129 scopus 로고    scopus 로고
    • Sharing decryption in the context of voting or lotteries
    • P.-A. Fouque, G. Poupard, and J. Stern. Sharing decryption in the context of voting or lotteries. In FC'00, pages 90-104, 2000.
    • (2000) FC'00 , pp. 90-104
    • Fouque, P.-A.1    Poupard, G.2    Stern, J.3
  • 20
    • 70350656351 scopus 로고    scopus 로고
    • TrustWalker: A random walk model for combining trust-based and item-based recommendation
    • M. Jamali and M. Ester. TrustWalker: a random walk model for combining trust-based and item-based recommendation. In KDD'09, pages 397-406, 2009.
    • (2009) KDD'09 , pp. 397-406
    • Jamali, M.1    Ester, M.2
  • 21
    • 78149340011 scopus 로고    scopus 로고
    • On the privacy preserving properties of random data perturbation techniques
    • H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. On the privacy preserving properties of random data perturbation techniques. In ICDM'03, pages 99-106, 2003.
    • (2003) ICDM'03 , pp. 99-106
    • Kargupta, H.1    Datta, S.2    Wang, Q.3    Sivakumar, K.4
  • 22
    • 49049091204 scopus 로고    scopus 로고
    • Privacy-preserving recommendation systems for consumer healthcare services
    • S. Katzenbeisser and M. Petkovic. Privacy-preserving recommendation systems for consumer healthcare services. In ARES'08, pages 889-895, 2008.
    • (2008) ARES'08 , pp. 889-895
    • Katzenbeisser, S.1    Petkovic, M.2
  • 23
    • 19944368437 scopus 로고    scopus 로고
    • Shilling recommender systems for fun and profit
    • S. K. Lam. and J. Riedl. Shilling recommender systems for fun and profit. In WWW'04, pages 393-402, 2004.
    • (2004) WWW'04 , pp. 393-402
    • Lam, S.K.1    Riedl, J.2
  • 24
    • 32844472646 scopus 로고    scopus 로고
    • Trust-aware collaborative filtering for recommender systems
    • P. Massa and P. Avesani. Trust-aware collaborative filtering for recommender systems. In CoopIS'04, pages 492-508, 2004.
    • (2004) CoopIS'04 , pp. 492-508
    • Massa, P.1    Avesani, P.2
  • 25
    • 70350678967 scopus 로고    scopus 로고
    • Differentially private recommender systems: Building privacy into the Netflix prize contenders
    • F. McSherry and I. Mironov. Differentially private recommender systems: Building privacy into the Netflix prize contenders. In KDD'09, pages 627-636, 2009.
    • (2009) KDD'09 , pp. 627-636
    • McSherry, F.1    Mironov, I.2
  • 26
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT'99, pages 223-238, 1999.
    • (1999) EUROCRYPT'99 , pp. 223-238
    • Paillier, P.1
  • 27
    • 33644514610 scopus 로고    scopus 로고
    • SVD-based collaborative filtering with privacy
    • H. Polat and W. Du. SVD-based collaborative filtering with privacy. In SAC'05, pages 791-795, 2005.
    • (2005) SAC'05 , pp. 791-795
    • Polat, H.1    Du, W.2
  • 28
    • 33746092442 scopus 로고    scopus 로고
    • Efficient binary conversion for Paillier encrypted values
    • B. Schoenmakers and P. Tuyls. Efficient binary conversion for Paillier encrypted values. In EUROCRYPT'06, pages 522-537, 2006.
    • (2006) EUROCRYPT'06 , pp. 522-537
    • Schoenmakers, B.1    Tuyls, P.2
  • 29
    • 33748679129 scopus 로고    scopus 로고
    • A privacy-preserving collaborative filtering scheme with two-way communication
    • S. Zhang, J. Ford, and F. Makedon. A privacy-preserving collaborative filtering scheme with two-way communication. In EC'06, pages 316-323, 2006.
    • (2006) EC'06 , pp. 316-323
    • Zhang, S.1    Ford, J.2    Makedon, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.