메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1316-1324

Revisiting sequential pattern hiding to enhance utility

Author keywords

Data privacy; Knowledge hiding; Sequential pattern hiding

Indexed keywords

DATA MINING; UBIQUITOUS COMPUTING;

EID: 80052662844     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2020408.2020605     Document Type: Conference Paper
Times cited : (40)

References (29)
  • 2
    • 2942651840 scopus 로고    scopus 로고
    • R-tree portal, http://www.rtreeportal.org.
    • R-tree Portal
  • 4
    • 78149260852 scopus 로고    scopus 로고
    • Hiding sequential and spatiotemporal patterns
    • O. Abul, F. Bonchi, and F. Giannotti. Hiding sequential and spatiotemporal patterns. IEEE TKDE, 22(12):1709-1723, 2010.
    • (2010) IEEE TKDE , vol.22 , Issue.12 , pp. 1709-1723
    • Abul, O.1    Bonchi, F.2    Giannotti, F.3
  • 6
    • 0029212693 scopus 로고
    • Mining sequential patterns
    • R. Agrawal and R. Srikant. Mining sequential patterns. In ICDE, pages 3-14, 1995.
    • (1995) ICDE , pp. 3-14
    • Agrawal, R.1    Srikant, R.2
  • 8
    • 45749101998 scopus 로고    scopus 로고
    • Anonymity preserving pattern discovery
    • M. Atzori, F. Bonchi, F. Giannotti, and D. Pedreschi. Anonymity preserving pattern discovery. VLDBJ, 17(4):703-727, 2008.
    • (2008) VLDBJ , vol.17 , Issue.4 , pp. 703-727
    • Atzori, M.1    Bonchi, F.2    Giannotti, F.3    Pedreschi, D.4
  • 9
    • 0242540443 scopus 로고    scopus 로고
    • Sequential pattern mining using a bitmap representation
    • J. Ayres, J. Flannick, J. Gehrke, and T. Yiu. Sequential pattern mining using a bitmap representation. In KDD, pages 429-435, 2002.
    • (2002) KDD , pp. 429-435
    • Ayres, J.1    Flannick, J.2    Gehrke, J.3    Yiu, T.4
  • 10
    • 79956041471 scopus 로고    scopus 로고
    • ρ-uncertainty: Inference-proof transaction anonymization
    • J. Cao, P. Karras, C. Räissi, and K. Tan. ρ-uncertainty: Inference-proof transaction anonymization. PVLDB, 3(1):1033-1044, 2010.
    • (2010) PVLDB , vol.3 , Issue.1 , pp. 1033-1044
    • Cao, J.1    Karras, P.2    Räissi, C.3    Tan, K.4
  • 11
    • 33750283449 scopus 로고    scopus 로고
    • Privacy preserving data classification with rotation perturbation
    • DOI 10.1109/ICDM.2005.121, 1565733, Proceedings - Fifth IEEE International Conference on Data Mining, ICDM 2005
    • K. Chen and L. Liu. Privacy preserving data classification with rotation perturbation. In ICDM, pages 589-592, 2005. (Pubitemid 47385747)
    • (2005) Proceedings - IEEE International Conference on Data Mining, ICDM , pp. 589-592
    • Chen, K.1    Liu, L.2
  • 12
    • 0003504808 scopus 로고    scopus 로고
    • Security and privacy implications of data mining
    • C. W. Clifton and D. Marks. Security and privacy implications of data mining. In SIGMOD, pages 15-19, 1996.
    • (1996) SIGMOD , pp. 15-19
    • Clifton, C.W.1    Marks, D.2
  • 13
    • 80052648210 scopus 로고    scopus 로고
    • Privacy risks in health databases from aggregate disclosure
    • G. Das and N. Zhang. Privacy risks in health databases from aggregate disclosure. In PETRA, pages 1-4, 2009.
    • (2009) PETRA , pp. 1-4
    • Das, G.1    Zhang, N.2
  • 14
    • 0032108328 scopus 로고    scopus 로고
    • A Threshold of ln n for Approximating Set Cover
    • U. Feige. A threshold of ln n for approximating set cover. J. ACM, 45(4):634-652, 1998. (Pubitemid 128488790)
    • (1998) Journal of the ACM , vol.45 , Issue.4 , pp. 634-652
    • Feige, U.1
  • 15
    • 78650584378 scopus 로고    scopus 로고
    • Anonymous publication of sensitive transactional data
    • G. Ghinita, P. Kalnis, and Y. Tao. Anonymous publication of sensitive transactional data. IEEE TDKE, 23:161-174, 2011.
    • (2011) IEEE TDKE , vol.23 , pp. 161-174
    • Ghinita, G.1    Kalnis, P.2    Tao, Y.3
  • 21
    • 77952390550 scopus 로고    scopus 로고
    • Anonymization of electronic medical records for validating genome-wide association studies
    • G. Loukides, A. Gkoulalas-Divanis, and B. Malin. Anonymization of electronic medical records for validating genome-wide association studies. PNAS, 107(17):7898-7903, 2010.
    • (2010) PNAS , vol.107 , Issue.17 , pp. 7898-7903
    • Loukides, G.1    Gkoulalas-Divanis, A.2    Malin, B.3
  • 22
    • 25844456648 scopus 로고    scopus 로고
    • Maximizing accuracy of shared databases when concealing sensitive patterns
    • DOI 10.1287/isre.1050.0056
    • S. Menon, S. Sarkar, and S. Mukherjee. Maximizing accuracy of shared databases when concealing sensitive patterns. Information Systems Research, 16(3):256-270, 2005. (Pubitemid 41395566)
    • (2005) Information Systems Research , vol.16 , Issue.3 , pp. 256-270
    • Menon, S.1    Sarkar, S.2    Mukherjee, S.3
  • 23
    • 26844519208 scopus 로고    scopus 로고
    • Hiding classification rules for data sharing with privacy preservation
    • Data Warehousing and Knowledge Discovery: 7th International Conference, DaWaK 2005. Proceedings
    • J. Natwichai, X. Li, and M. Orlowska. Hiding classification rules for data sharing with privacy preservation. In DAWAK, pages 468-477, 2005. (Pubitemid 41450427)
    • (2005) Lecture Notes in Computer Science , vol.3589 , pp. 468-477
    • Natwichai, J.1    Li, X.2    Orlowska, M.3
  • 24
    • 0040871512 scopus 로고
    • Knowledge discovery as a threat to database security
    • D. E. O'Leary. Knowledge discovery as a threat to database security. In KDD, pages 507-516, 1991.
    • (1991) KDD , pp. 507-516
    • O'Leary, D.E.1
  • 25
    • 49549095928 scopus 로고    scopus 로고
    • Protecting sensitive knowledge by data sanitization
    • S. R. M. Oliveira and O. R. Zaïane. Protecting sensitive knowledge by data sanitization. In ICDM, pages 211-218, 2003.
    • (2003) ICDM , pp. 211-218
    • Oliveira, S.R.M.1    Zaïane, O.R.2
  • 27
    • 63449101050 scopus 로고    scopus 로고
    • Hiding sensitive frequent itemsets by a border-based approach
    • X. Sun and P. S. Yu. Hiding sensitive frequent itemsets by a border-based approach. Computing Science and Engineering, 1(1):74-94, 2007.
    • (2007) Computing Science and Engineering , vol.1 , Issue.1 , pp. 74-94
    • Sun, X.1    Yu, P.S.2
  • 28
    • 84859177489 scopus 로고    scopus 로고
    • Privacy-preserving anonymization of set-valued data
    • M. Terrovitis, N. Mamoulis, and P. Kalnis. Privacy-preserving anonymization of set-valued data. PVLDB, 1(1):115-125, 2008.
    • (2008) PVLDB , vol.1 , Issue.1 , pp. 115-125
    • Terrovitis, M.1    Mamoulis, N.2    Kalnis, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.