Anonymizing transaction databases for publication
- 24 August 2008
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 767-775
- https://doi.org/10.1145/1401890.1401982
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- On anonymizing query logs via token-based hashingPublished by Association for Computing Machinery (ACM) ,2007
- A large-scale evaluation and analysis of personalized search strategiesPublished by Association for Computing Machinery (ACM) ,2007
- Wherefore art thou r3579x?Published by Association for Computing Machinery (ACM) ,2007
- L-diversity: privacy beyond k-anonymityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Approximate inverse frequent itemset mining: privacy, complexity, and approximationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Association rule hidingIEEE Transactions on Knowledge and Data Engineering, 2004
- ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSIONInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002
- Privacy preserving mining of association rulesPublished by Association for Computing Machinery (ACM) ,2002
- Probabilistic query expansion using query logsPublished by Association for Computing Machinery (ACM) ,2002
- Mining association rules between sets of items in large databasesPublished by Association for Computing Machinery (ACM) ,1993