메뉴 건너뛰기




Volumn , Issue , 2006, Pages 91-

PRIVATE-IYE: A framework for privacy preserving data integration

Author keywords

[No Author keywords available]

Indexed keywords

DATA MINING; DATA PRIVACY; DATA SHARING; HISTORIC PRESERVATION; TECHNICAL PRESENTATIONS;

EID: 84990975367     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDEW.2006.117     Document Type: Conference Paper
Times cited : (26)

References (41)
  • 1
    • 84991006430 scopus 로고    scopus 로고
    • Lee kwan yew's speech at national day rally
    • April 20, 1987, cited in Christophen Tremewan
    • "Lee Kwan Yew's Speech at National Day Rally." The Straits Times, April 20, 1987, cited in Christophen Tremewan, http://www.privacyinternational.org/survey/phr2003/countries/singapore.htm.
    • The Straits Times
  • 2
    • 84990879845 scopus 로고    scopus 로고
    • PHC4 Pittsburg Healthcare Cost Containment Council (2002)., Pittsburg, November
    • PHC4 Pittsburg Healthcare Cost Containment Council (2002). Diabetes Hospitilization Report 2001 Data, Pittsburg, November 2002. http://www.phc4.org/adobe/Diab01.pdf.
    • (2002) Diabetes Hospitilization Report 2001 Data
  • 3
    • 0242698195 scopus 로고    scopus 로고
    • On the design and quantification of privacy preserving data mining algorithms
    • D. AGRAWAL AND C. C. AGGARWAL. On the Design and Quantification of Privacy Preserving Data Mining Algorithms. In Proc. of PODS, 2001.
    • (2001) Proc. of PODS
    • Agrawal, D.1    Aggarwal, C.C.2
  • 4
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • N. R. ADAMS AND J. C. WORTMAN. Security-control methods for statistical databases: A Comparative Study. ACM Comuting Surveys, 21(4), 1989.
    • (1989) ACM Comuting Surveys , vol.21 , Issue.4
    • Adams, N.R.1    Wortman, J.C.2
  • 10
    • 0019056889 scopus 로고
    • A security mechanism for statistical databases
    • I. I. BECK. A Security Mechanism for Statistical Databases. ACM TODS, 5(3), 1980.
    • (1980) ACM TODS , vol.5 , Issue.3
    • Beck, I.I.1
  • 11
    • 12344313039 scopus 로고    scopus 로고
    • On privacy- Preserving access to distributed heterogeneous healthcare information
    • C. BOYENS, R. KRISHNAN, R. PADMAN. On Privacy- Preserving Access to Distributed Heterogeneous Healthcare Information. In Proc. of HICSS, 2004.
    • (2004) Proc. of HICSS
    • Boyens, C.1    Krishnan, R.2    Padman, R.3
  • 13
    • 0020205885 scopus 로고
    • Auditing and inference control in statistical databases
    • F. CHIN, G. OZSOYOGLU. Auditing and Inference Control in Statistical Databases. IEEE TSE, 8(6), 1982.
    • (1982) IEEE TSE , vol.8 , Issue.6
    • Chin, F.1    Ozsoyoglu, G.2
  • 15
    • 0003504808 scopus 로고    scopus 로고
    • Security and privacy implications of data mining
    • C. CLIFTON, D.MARKS. Security and Privacy Implications of Data Mining. In Proc. of DMKD, 1996.
    • (1996) Proc. of DMKD
    • Clifton, C.1    Marks, D.2
  • 18
    • 0242496951 scopus 로고    scopus 로고
    • Secure multi-party computation problems and their applications: A review and open problems
    • W. DU, M. J. ATALLAH. Secure multi-party computation problems and their applications: A review and open problems. In New Security Paradigms Workshop, pages 11-20, 2001.
    • (2001) New Security Paradigms Workshop , pp. 11-20
    • Du, W.1    Atallah, M.J.2
  • 19
    • 77952334884 scopus 로고    scopus 로고
    • Using randomized response techniques for privacy-preserving data mining
    • W. DU, Z. ZHAN. Using Randomized Response Techniques for Privacy-Preserving Data Mining. In Proc. of ACM SIGKDD, 2003.
    • (2003) Proc. of ACM SIGKDD
    • Du, W.1    Zhan, Z.2
  • 20
    • 0019054751 scopus 로고
    • Secure statistical databases with random sample queries
    • D. DENNING. Secure Statistical Databases with Random Sample Queries. ACM TODS, 5(3), 1980.
    • (1980) ACM TODS , vol.5 , Issue.3
    • Denning, D.1
  • 21
    • 0018444418 scopus 로고
    • Secure databases: Protection against user influence
    • D. DOBKIN, A. JONES, R. LIPTON. Secure Databases: Protection Against User Influence. ACM TODS, 4(1), 1979.
    • (1979) ACM TODS , vol.4 , Issue.1
    • Dobkin, D.1    Jones, A.2    Lipton, R.3
  • 22
    • 0040293741 scopus 로고    scopus 로고
    • An overview and classification of mediated query systems
    • R. DOMENIG, K. DITTRICH. An Overview and Classification of Mediated Query Systems. SIGMOD Record, 28(3), 1999.
    • (1999) SIGMOD Record , vol.28 , Issue.3
    • Domenig, R.1    Dittrich, K.2
  • 26
    • 0030679824 scopus 로고    scopus 로고
    • Managing semantic heterogeneity in databases: A theoretical perspective
    • Tucson
    • R. HULL. Managing Semantic Heterogeneity in Databases: A Theoretical Perspective. In Proc. of PODS, Tucson, 1997.
    • (1997) Proc. of PODS
    • Hull, R.1
  • 29
    • 78149340011 scopus 로고    scopus 로고
    • On the privacy preserving properties of random data perturbation techniques
    • H. KARGUPTA, S. DATTA, Q. WANG, AND K. SIVAKUMAR. On the Privacy Preserving Properties of Random Data Perturbation Techniques. In Proc of ICDM, 2003.
    • (2003) Proc of ICDM
    • Kargupta, H.1    Datta, S.2    Wang, Q.3    Sivakumar, K.4
  • 32
    • 0022130080 scopus 로고
    • A data distortion by probability distribution
    • C. K. LIEW, U. J. CHOI, C. J. LIEW. A Data Distortion by Probability Distribution. ACM TODS, 10(3), 1985.
    • (1985) ACM TODS , vol.10 , Issue.3
    • Liew, C.K.1    Choi, U.J.2    Liew, C.J.3
  • 34
    • 46749122242 scopus 로고    scopus 로고
    • Privacy-preserving collaborative filtering using randomized perturbation techniques
    • H. POLAT, W. DU. Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques. In Proc. of ICDM, 2003.
    • (2003) Proc. of ICDM
    • Polat, H.1    Du, W.2
  • 35
    • 0026119329 scopus 로고
    • A model of authorization for next-generation database systems
    • F. RABITTI, E. BERTINO, W. KIM, AND D. WOELK. A Model of Authorization for Next-generation Database Systems. ACM TODS, 16(1), 1991.
    • (1991) ACM TODS , vol.16 , Issue.1
    • Rabitti, F.1    Bertino, E.2    Kim, W.3    Woelk, D.4
  • 36
    • 0035657983 scopus 로고    scopus 로고
    • On matching schemas automatically
    • E. RAHM, P. BERNSTEIN. On Matching Schemas Automatically. VLDB Journal, 10(4), 2001.
    • (2001) VLDB Journal , vol.10 , Issue.4
    • Rahm, E.1    Bernstein, P.2
  • 37
    • 0003483188 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-Anonymity and its enforcement through generalization and suppression
    • Oakland
    • P. SAMARATI, L. SWEENEY. Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement Through Generalization and Suppression. In Proc of IEEE Research in Security and Privacy, Oakland, 1998.
    • (1998) Proc of IEEE Research in Security and Privacy
    • Samarati, P.1    Sweeney, L.2
  • 38
    • 0021622802 scopus 로고
    • The statistical security of a statistical database
    • J. TRAUB, Y. YEMINI, H. WOZNAIKOWSKI. The Statistical Security of a Statistical Database. ACM TODS, 9(4), 1984.
    • (1984) ACM TODS , vol.9 , Issue.4
    • Traub, J.1    Yemini, Y.2    Woznaikowski, H.3
  • 39
    • 0043029204 scopus 로고    scopus 로고
    • Technical description of RODS: A real-Time public health surveillance system
    • Sept
    • F. -C. TSUI, J. ESPINO, V. M. DATO, P. GESTELAND et al. Technical Description of RODS: A Real-Time Public Health Surveillance System. J Am Med Inform Assoc, 10(5), pp. 399-308, Sept 2003.
    • (2003) J Am Med Inform Assoc , vol.10 , Issue.5 , pp. 308-399
    • Tsui, F.-C.1    Espino, J.2    Dato, V.M.3    Gesteland, P.4
  • 40
    • 19544380211 scopus 로고    scopus 로고
    • Bottom-up generalization: A data mining solution to privacy protection
    • K. WANG, P. S. YU, S. CHAKRABORTY. Bottom-Up Generalization: A Data Mining Solution to Privacy Protection. In Proc. of ICDM, 2004.
    • (2004) Proc. of ICDM
    • Wang, K.1    Yu, P.S.2    Chakraborty, S.3
  • 41
    • 32344442645 scopus 로고    scopus 로고
    • A new scheme on privacy-preserving data classification
    • N. ZHANG, S. WANG, W. ZHAO. A New Scheme on Privacy-Preserving Data Classification. In Proc. of SIGKDD, 2005.
    • (2005) Proc. of SIGKDD
    • Zhang, N.1    Wang, S.2    Zhao, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.