메뉴 건너뛰기




Volumn , Issue , 2014, Pages 1-8

Darm: A privacy-preserving approach for distributed association rules mining on horizontally-partitioned data

Author keywords

Association rules; Data mining; Differential privacy

Indexed keywords

ASSOCIATION RULES; DATABASE SYSTEMS; QUERY PROCESSING;

EID: 84906813523     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2628194.2628206     Document Type: Conference Paper
Times cited : (12)

References (25)
  • 5
    • 2942735553 scopus 로고    scopus 로고
    • Odam: An optimized distributed association rule mining algorithm
    • Online
    • M. Z. Ashrafi, D. Taniar, and K. Smith. Odam: an optimized distributed association rule mining algorithm. IEEE Distributed Systems Online, 5, 2004.
    • (2004) IEEE Distributed Systems , vol.5
    • Ashrafi, M.Z.1    Taniar, D.2    Smith, K.3
  • 11
    • 84880569901 scopus 로고    scopus 로고
    • Privacy-preserving mining of association rules from outsourced transaction databases
    • F. Giannotti, L. Lakshmanan, A. Monreale, D. Pedreschi, and H. Wang. Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Systems Journal, 7(3):385-395, Sept 2013.
    • (2013) IEEE Systems Journal , vol.7 , Issue.3 , pp. 385-395
    • Giannotti, F.1    Lakshmanan, L.2    Monreale, A.3    Pedreschi, D.4    Wang, H.5
  • 14
    • 4544361334 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • Sept.
    • M. Kantarcioglu and C. Clifton. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering, 16(9):1026-1037, Sept. 2004.
    • (2004) IEEE Transactions on Knowledge and Data Engineering , vol.16 , Issue.9 , pp. 1026-1037
    • Kantarcioglu, M.1    Clifton, C.2
  • 23
    • 10944270172 scopus 로고    scopus 로고
    • Privacy-preserving data mining: Why, how, and when
    • Nov
    • J. Vaidya and C. Clifton. Privacy-preserving data mining: why, how, and when. IEEE Security Privacy, 2(6): 19-27, Nov 2004.
    • (2004) IEEE Security Privacy , vol.2 , Issue.6 , pp. 19-27
    • Vaidya, J.1    Clifton, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.