When do data mining results violate privacy?
- 22 August 2004
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 599-604
- https://doi.org/10.1145/1014052.1014126
Abstract
No abstract availableThis publication has 10 references indexed in Scilit:
- Privacy-preserving clustering with distributed EM mixture modelingKnowledge and Information Systems, 2005
- Privacy-preserving distributed mining of association rules on horizontally partitioned dataIEEE Transactions on Knowledge and Data Engineering, 2004
- Privacy-preserving k -means clustering over vertically partitioned dataPublished by Association for Computing Machinery (ACM) ,2003
- Assuring privacy when big brother is watchingPublished by Association for Computing Machinery (ACM) ,2003
- The inference problemACM SIGKDD Explorations Newsletter, 2002
- Privacy preserving mining of association rulesPublished by Association for Computing Machinery (ACM) ,2002
- Privacy Preserving Data MiningJournal of Cryptology, 2002
- On the design and quantification of privacy preserving data mining algorithmsPublished by Association for Computing Machinery (ACM) ,2001
- Privacy-preserving data miningPublished by Association for Computing Machinery (ACM) ,2000
- Security-control methods for statistical databases: a comparative studyACM Computing Surveys, 1989