메뉴 건너뛰기




Volumn 19, Issue , 2006, Pages 1-115

Privacy preserving data mining

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84882630942     PISSN: 15682633     EISSN: None     Source Type: Book Series    
DOI: None     Document Type: Article
Times cited : (30)

References (92)
  • 11
    • 0033280866 scopus 로고    scopus 로고
    • EflBcient private bidding and auctions with an oblivious third party
    • In, Kent Ridge Digital Labs, Singapore, ACM Press
    • C. Cachin. EflBcient private bidding and auctions with an oblivious third party. In Proceedings of the 6th ACM conference on Computer and communications security, pages 120-127, Kent Ridge Digital Labs, Singapore, 1999. ACM Press.
    • (1999) Proceedings of the 6th ACM conference on Computer and communications security , pp. 120-127
    • Cachin, C.1
  • 16
    • 34249832377 scopus 로고
    • A bayesian method for the induction of probabilistic networks from data
    • G. Cooper and E. Herskovits. A bayesian method for the induction of probabilistic networks from data. Machine Learning, 9(4):309-347, 1992.
    • (1992) Machine Learning , vol.9 , Issue.4 , pp. 309-347
    • Cooper, G.1    Herskovits, E.2
  • 18
    • 0034710980 scopus 로고    scopus 로고
    • Bounds for cell entries in contingency tables given marginal totals and decomposable graphs
    • In
    • A. Dobra and S. E. Fienberg. Bounds for cell entries in contingency tables given marginal totals and decomposable graphs. In Proceedings of the National Academy of Sciences, number 97, pages 11885-11892, 2000.
    • (2000) Proceedings of the National Academy of Sciences , Issue.97 , pp. 11885-11892
    • Dobra, A.1    Fienberg, S.E.2
  • 21
    • 33645584057 scopus 로고    scopus 로고
    • Privacy-preserving multivariate statistical analysis: Linear regression and classification
    • In, Lake Buena Vista, Florida, Apr. 22-24
    • W. Du, Y. S. Han, and S. Chen. Privacy-preserving multivariate statistical analysis: Linear regression and classification. In 2004 SI AM International Conference on Data Mining, Lake Buena Vista, Florida, Apr. 22-24 2004.
    • (2004) 2004 SI AM International Conference on Data Mining
    • Du, W.1    Han, Y.S.2    Chen, S.3
  • 22
    • 1642302606 scopus 로고    scopus 로고
    • Building decision tree classifier on private data
    • In C. Clifton and V. Estivill-Castro, editors, volume 14, Maebashi City, Japan, Dec. 9 AustraUan Computer Society
    • W. Du and Z. Zhan. Building decision tree classifier on private data. In C. Clifton and V. Estivill-Castro, editors, IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, volume 14, pages 1-8, Maebashi City, Japan, Dec. 9 2002. AustraUan Computer Society.
    • (2002) IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining , pp. 1-8
    • Du, W.1    Zhan, Z.2
  • 26
    • 0003187764 scopus 로고
    • Directive 95/46/EC of the European ParHament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data., Oct. 24
    • Directive 95/46/EC of the European ParHament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities, No I.(281):31-50, Oct. 24 1995.
    • (1995) Official Journal of the European Communities , vol.1 , Issue.281 , pp. 31-50
  • 29
    • 0030270830 scopus 로고    scopus 로고
    • Constructing bayesian networks to predict uncollectible telecommunications accounts
    • Oct
    • K. J. Ezawa and S. W. Norton. Constructing bayesian networks to predict uncollectible telecommunications accounts. IEEE Expert, 11(5):45-51, Oct. 1996.
    • (1996) IEEE Expert , vol.11 , Issue.5 , pp. 45-51
    • Ezawa, K.J.1    Norton, S.W.2
  • 30
    • 84882664371 scopus 로고    scopus 로고
    • Falcon fraud managerEA. http://www.fairisaac.com/Fairisaac/Solutions/Solutions+by+Function/Falcon+Fraud+Mcinager. htm, 2005.
    • (2005) Falcon fraud managerEA
  • 33
    • 12244263240 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • In, Interlaken, Switzerland, May 2-6 International Association for Cryptologic Research (lACR)
    • M. J. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In Eurocrypt 2004, Interlaken, Switzerland, May 2-6 2004. International Association for Cryptologic Research (lACR).
    • (2004) Eurocrypt 2004
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 36
    • 0003979335 scopus 로고    scopus 로고
    • chapter General Cryptographic Protocols. Cambridge University Press
    • O. Goldreich. The Foundations of Cryptography, volume 2, chapter General Cryptographic Protocols. Cambridge University Press, 2004.
    • (2004) The Foundations of Cryptography , vol.2
    • Goldreich, O.1
  • 40
    • 0037077422 scopus 로고    scopus 로고
    • Standard for privacy of individually identifiable health information
    • Aug. 14
    • Standard for privacy of individually identifiable health information. Federal Register, 67(157):53181-53273, Aug. 14 2002.
    • (2002) Federal Register , vol.67 , Issue.157 , pp. 53181-53273
  • 41
    • 0003895755 scopus 로고    scopus 로고
    • Technical report, U.S. Department of Health and Human Services Office for Civil Rights, Aug
    • Standard for privacy of individually identifiable health information. Technical report, U.S. Department of Health and Human Services Office for Civil Rights, Aug. 2003.
    • (2003) Standard for privacy of individually identifiable health information
  • 43
    • 84948451182 scopus 로고    scopus 로고
    • A secure protocol for computing dotproducts in clustered and distributed environments
    • In, Vancouver, British Columbia, Aug. 18-21
    • I. loannidis, A. Grama, and M. Atallah. A secure protocol for computing dotproducts in clustered and distributed environments. In The 2002 International Conference on Parallel Processing, Vancouver, British Columbia, Aug. 18-21 2002.
    • (2002) The 2002 International Conference on Parallel Processing
    • Loannidis, I.1    Grama, A.2    Atallah, M.3
  • 47
    • 4544361334 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • Sept
    • M. Kantarcioglu and C. Clifton. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowledge Data Eng., 16(9):1026-1037, Sept. 2004.
    • (2004) IEEE Trans. Knowledge Data Eng , vol.16 , Issue.9 , pp. 1026-1037
    • Kantarcioglu, M.1    Clifton, C.2
  • 52
    • 0034133513 scopus 로고    scopus 로고
    • Distance-based outliers: Algorithms and apphcations
    • E. M. Knorr, R. T. Ng, and V. Tucakov. Distance-based outliers: algorithms and apphcations. The VLDB Journal, 8(3-4):237-253, 2000.
    • (2000) The VLDB Journal , vol.8 , Issue.3-4 , pp. 237-253
    • Knorr, E.M.1    Ng, R.T.2    Tucakov, V.3
  • 54
    • 77954004564 scopus 로고    scopus 로고
    • July 17 2003, 8120, Title VIII section. Enacted as Pubhc Law 108-87
    • M. Lewis. Department of defense appropriations act, 2004, July 17 2003. Title VIII section 8120. Enacted as Pubhc Law 108-87.
    • (2004) Department of defense appropriations act
    • Lewis, M.1
  • 55
    • 12244313201 scopus 로고    scopus 로고
    • Privacy preserving clustering with distributed EM mixture modeling
    • to appear
    • X. Lin, C. Clifton, and M. Zhu. Privacy preserving clustering with distributed EM mixture modeling. Knowledge and Information Systems, to appear 2004.
    • (2004) Knowledge and Information Systems
    • Lin, X.1    Clifton, C.2    Zhu, M.3
  • 56
    • 84974555530 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • In,. Springer-Verlag, Aug. 20-24
    • Y. Lindell and B. Pinkas. Privacy preserving data mining. In Advances in Cryptology-CRYPTO 2000, pages 36-54. Springer-Verlag, Aug. 20-24 2000.
    • (2000) Advances in Cryptology-CRYPTO 2000 , pp. 36-54
    • Lindell, Y.1    Pinkas, B.2
  • 57
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Y. Lindell and B. Pinkas. Privacy preserving data mining. Journal of Cryptology, 15(3):177-206, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 59
    • 0004255908 scopus 로고    scopus 로고
    • McGraw-Hill Science/Engineering/Math, 1st edition
    • T. Mitchell. Machine Learning. McGraw-Hill Science/Engineering/Math, 1st edition, 1997.
    • (1997) Machine Learning
    • Mitchell, T.1
  • 68
    • 84942550998 scopus 로고    scopus 로고
    • PubHc key cryptosystems based on composite degree residuosity classes
    • In,. Springer-Verlag
    • P. Paillier. PubHc key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology-Eurocrypt '99 Proceedings, LNCS 1592, pages 223-238. Springer-Verlag, 1999.
    • (1999) Advances in Cryptology-Eurocrypt '99 Proceedings, LNCS 1592 , pp. 223-238
    • Paillier, P.1
  • 69
    • 0041294393 scopus 로고    scopus 로고
    • Believe in yourself, believe in the merchandise
    • Sept.8
    • C. Palmeri. Believe in yourself, believe in the merchandise. Forbes Magazine, 160(5):118-124, Sept.8 1997.
    • (1997) Forbes Magazine , vol.160 , Issue.5 , pp. 118-124
    • Palmeri, C.1
  • 70
    • 0001820920 scopus 로고    scopus 로고
    • X-means: Extending k-means with efficient estimation of the number of clusters
    • In, San Francisco, Morgan Kaufmann
    • D. Pelleg and A. Moore. X-means: Extending k-means with efficient estimation of the number of clusters. In Proceedings of the Seventeenth International Conference on Machine Learning, pages 727-734, San Francisco, 2000. Morgan Kaufmann.
    • (2000) Proceedings of the Seventeenth International Conference on Machine Learning , pp. 727-734
    • Pelleg, D.1    Moore, A.2
  • 71
    • 84882565877 scopus 로고    scopus 로고
    • July 21., perry, president and ceo, cardsystems solutions, inc. before the united states house of representatives subcommittee on oversight and investigations of the committee on financial services
    • J. M. Perry. Statement of John m. perry, president and ceo, cardsystems solutions, inc. before the united states house of representatives subcommittee on oversight and investigations of the committee on financial services. http://f inancialservices. house. gov/hearings. asp?f orinmode= detail&hearing=407&comm=4, July 21 2005.
    • (2005) Statement of John m
    • Perry, J.M.1
  • 72
    • 33744584654 scopus 로고
    • Induction of decision trees
    • J. R. Quinlan. Induction of decision trees. Machine Learning, 1(1):81-106, 1986.
    • (1986) Machine Learning , vol.1 , Issue.1 , pp. 81-106
    • Quinlan, J.R.1
  • 76
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondent's privacy in microdata release
    • Nov./Dec
    • P. Samarati. Protecting respondent's privacy in microdata release. IEEE Trans. Knowledge Data Eng., 13(6): 1010-1027, Nov./Dec. 2001.
    • (2001) IEEE Trans. Knowledge Data Eng , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 78
    • 0344990562 scopus 로고    scopus 로고
    • Using unknowns to prevent discovery of association rules
    • Dec
    • Y. Saygm, V. S. Verykios, and C. Clifton. Using unknowns to prevent discovery of association rules. SIGMOD Record, 30(4):45-54, Dec. 2001.
    • (2001) SIGMOD Record , vol.30 , Issue.4 , pp. 45-54
    • Saygm, Y.1    Verykios, V.S.2    Clifton, C.3
  • 82
    • 2942536415 scopus 로고    scopus 로고
    • Privacy preserving naiVe bayes classifier for vertically partitioned data
    • In, Lake Buena Vista, Florida, Apr. 22-24
    • J. Vaidya and C. Clifton. Privacy preserving naiVe bayes classifier for vertically partitioned data. In 2004 SLAM International Conference on Data Mining, pages 522-526, Lake Buena Vista, Florida, Apr. 22-24 2004.
    • (2004) 2004 SLAM International Conference on Data Mining , pp. 522-526
    • Vaidya, J.1    Clifton, C.2
  • 84
    • 10944227231 scopus 로고    scopus 로고
    • Secure set intersection cardinality with application to association rule mining
    • Nov
    • J. Vaidya and C. Clifton. Secure set intersection cardinality with application to association rule mining. Journal of Computer Security, 13(4), Nov. 2005.
    • (2005) Journal of Computer Security , vol.13 , Issue.4
    • Vaidya, J.1    Clifton, C.2
  • 86
  • 87
    • 0013776710 scopus 로고
    • Randomized response: A survey technique for eliminating evasive answer bias
    • Mar
    • S. L. Warner. Randomized response: a survey technique for eliminating evasive answer bias. Journal of the American Statistical Association, 60(309):63-69, Mar. 1965.
    • (1965) Journal of the American Statistical Association , vol.60 , Issue.309 , pp. 63-69
    • Warner, S.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.