Database Reference
In-Depth Information
35. J. Natwichai, X. Li, and M. Orlowska. Hiding classification rules for data sharing with privacy
preservation. In Proceedings of the 7th International Conference on Data Warehousing and
Knowledge Discovery , DaWaK, pages 468-477, 2005.
36. J. Natwichai, X. Li, and M. Orlowska. A reconstruction-based algorithm for classification rules
hiding. In Proceedings of the 17th Australasian Database Conference , ADC, pages 49-58,
2006.
37. R. Nix, M. Kantarcioglu, and K. Han. Approximate privacy-preserving data mining on
vertically partitioned data. In DBSec , pages 129-144, 2012.
38. D. O'Leary. Knowledge discovery as a threat to database security. In Proceedings of the 1st
International Conference on Knowledge Discovery in Databases , KDD, pages 507-516, 1991.
39. S. Oliveira and O. Zaïane. Privacy preserving frequent itemset mining. In Proceedings of the
IEEE international Conference on Privacy, Security and Data Mining , CRPIT, pages 43-54,
2002.
40. S. Oliveira and O. Zaïane. Protecting sensitive knowledge by data sanitization. In Proceedings
of the 3rd IEEE International Conference on Data Mining , ICDM, pages 613-616, 2003.
41. S. Oliveira and O. Zaïane. A unified framework for protecting sensitive association rules
in business collaboration. International Journal of Business Intelligence and Data Mining ,
1(3):247-287, Mar. 2006.
42. P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Pro-
ceedings of the 17th International Conference on Theory and Application of Cryptographic
Techniques , EUROCRYPT, pages 223-238, 1999.
43. E. Pontikakis, A. Tsitsonis, and V. Verykios. An experimental study of distortion-based tech-
niques for association rule hiding. In Proceedings of the 18th International Conference on
Database Security , volume 144 of DBSEC , pages 325-339, 2004.
44. E. Pontikakis, Y. Theodoridis, A. Tsitsonis, L. Chang, and V. Verykios. A quantitative and
qualitative ANALYSIS of blocking in association rule hiding. In Proceedings of the 2004 ACM
Workshop on Privacy in the Electronic Society , WPES, pages 29-30, 2004.
45. S. Rizvi and J. Haritsa. Maintaining data privacy in association rule mining. In Proceed-
ings of the 28th International Conference on Very Large Data Bases , VLDB, pages 682-693,
Aug. 2002.
46. P. Samarati and L. Sweeney. Generalizing data to provide anonymity when disclosing informa-
tion. In Proceedings of the 17th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of
Database Systems , PODS, page 188, 1998.
47. Y. Saygin, V. Verykios, and C. Clifton. Using unknowns to prevent discovery of association
rules. ACM SIGMOD Record , 30(4):45-54, Dec. 2001.
48. Y. Saygin, V. Verykios, and A. Elmagarmid. Privacy preserving association rule mining. In
Proceedings of the 12th International Workshop on Research Issues in Data Engineering ,
RIDE, pages 151-158, Feb. 2002.
49. A. Shoshani. Statistical databases: Characteristics, problems, and some solutions. In Proceed-
ings of the 8th International Conference on Very Large Data Bases , VLDB, pages 208-222,
Sept. 1982.
50. X. Sun and P. Yu. A border-based approach for hiding sensitive frequent itemsets.
In
Proceedings of the 5th IEEE International Conference on Data Mining , ICDM, 2005.
51. T. Tassa. Secure mining of association rules in horizontally distributed databases. CoRR ,
abs/1106.5113, 2011.
52. J. Vaidya and C. Clifton. Privacy preserving association rule mining in vertically partitioned
data. In Proceedings of the 8th ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining , KDD, pages 639-644, 2002.
53. V. Verykios, A. Elmagarmid, E. Bertino, Y. Saygin, and E. Dasseni. Association rule hiding.
IEEE Transactions on Knowledge and Data Engineering , 16(4):434-447, 2004.
54. S.-L. Wang and A. Jafari. Using unknowns for hiding sensitive predictive association rules. In
Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration ,
IRI, pages 223-228, 2005.
Search WWH ::




Custom Search