Database Reference
In-Depth Information
17. X. Chen, M. Orlowska, and X. Li. A new framework of privacy preserving data sharing. In
Proceedings of the 4th IEEE International Workshop on Privacy and Security Aspects of Data
Mining, pages 47-56, 2004.
18. C. W. Clifton and D. Marks. Security and privacy implications of data mining. In Proceedings
of the 1996 ACM SIGMOD International Conference on Management of Data, pages 15-19,
Feb. 1996.
19. J. C. da Silva and M. Klusch. Inference on distributed data clustering. In Proceedings of the
4th International Conference on Machine Learning and Data Mining in Pattern Recognition,
pages 610-619, 2005.
20. E. Dasseni, V. S. Verykios, A. K. Elmagarmid, and E. Bertino. Hiding association rules by us-
ing confidence and support. In Proceedings of the 4th International Workshop on Information
Hiding, pages 369-383, 2001.
21. C. Farkas and S. Jajodia. The inference problem: A survey. SIGKDD Explorations, 4(2):6-11,
2002.
22. M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of
NP-Completeness (Series of Books in the Mathematical Sciences). W. H. Freeman, January
1979.
23. A. Gkoulalas-Divanis and V. S. Verykios. An integer programming approach for frequent
itemset hiding. In Proceedings of the 15th ACM International Conference on Information and
Knowledge Management (CIKM), pages 748-757, 2006.
24. A. Gkoulalas-Divanis and V. S. Verykios. A hybrid approach to frequent itemset hiding. In
Proceedings of the 19th IEEE International Conference on Tools with Artificial Intelligence
(ICTAI), pages 297-304, 2007.
25. A. Gkoulalas-Divanis and V. S. Verykios. A parallelization framework for exact knowledge
hiding in transactional databases. In Proceedings of the 23rd International Information Secu-
rity Conference (SEC), pages 349-363, 2008.
26. A. Gkoulalas-Divanis and V. S. Verykios. Exact knowledge hiding through database extension.
IEEE Transactions on Knowledge and Data Engineering, 21(5):699-713, 2009.
27. A. Gkoulalas-Divanis and V. S. Verykios. Hiding sensitive knowledge without side effects.
Knowledge and Information Systems, 20(3):263-299, 2009.
28. A. Gkoulalas-Divanis and V. S. Verykios. Privacy Preserving Data Mining: How far can
we go?, pages 1-21. Handbook of Research on Data Mining in Public and Private Sectors:
Organizational and Governmental Applications. IGI Global, 2009. Accepted.
29. GLPK. GNU GLPK 4.32 User's Manual. Free Software Foundation, Inc., Boston, MA, 2008.
Available at http://www.gnu.org/software/glpk/glpk.html/ .
30. B. Goethals. The fimi repository, 2003. Available at http://fimi.cs.helsinki.fi/ .
31. M. Grean and M. J. Shaw. Supply-Chain Partnership between P&G and Wal-Mart, chapter 8,
pages 155-171. Integrated Series in Information Systems. Springer-Verlag, 2002.
32. C. Gueret, C. Prins, and M. Sevaux.
Applications of Optimization with Xpress-MP.
Dash
Optimization Ltd., 2002.
33. Y. Guo, Y. Tong, S. Tang, and D. Yang. A fp-tree-based method for inverse frequent set
mining. In Proceedings of the 23rd British National Conference on Databases (BNCOD),
pages 152-163, 2006.
34. E. H. Han, G. Karypis, and V. Kumar. Scalable parallel data mining for association rules. In
Proceedings of the ACM SIGMOD International Conference on Management of Data, pages
277-288, 2007.
35. C. T. Heun. Wal-Mart and Other Companies Reassess their Data-Sharing Strategies. Infor-
mation Week, May 2001.
36. I. ILOG.
CPLEX 9.0 User's Manual.
Mountain View, CA, Oct. 2005.
Available at
http://www.ilog.com/ .
37. G. Jagannathan, K. Pillaipakkamnatt, and R. N. Wright. A new privacy-preserving distributed
k-clustering algorithm. In Proceedings of the 2006 SIAM International Conference on Data
Mining (SDM), 2006.
38. S. Jha, L. Kruger, and P. McDaniel. Privacy preserving clustering. In Proceedings of the 10th
European Symposium on Research in Computer Security (ESORICS), pages 397-417, 2005.
Search WWH ::




Custom Search