Secure multiparty computation for privacy preserving data mining
Y Lindell - Encyclopedia of Data Warehousing and Mining, 2005 - igi-global.com
The increasing use of data-mining tools in both the public and private sectors raises
concerns regarding the potentially sensitive nature of much of the data being mined. The …
concerns regarding the potentially sensitive nature of much of the data being mined. The …
When do data mining results violate privacy?
Privacy-preserving data mining has concentrated on obtaining valid results when the input
data is private. An extreme example is Secure Multiparty Computation-based methods …
data is private. An extreme example is Secure Multiparty Computation-based methods …
Privacy preserving data mining
In this paper we introduce the concept of privacy preserving data mining. In our model, two
parties owning confidential databases wish to run a data mining algorithm on the union of …
parties owning confidential databases wish to run a data mining algorithm on the union of …
State-of-the-art in privacy preserving data mining
We provide here an overview of the new and rapidly emerging research area of privacy
preserving data mining. We also propose a classification hierarchy that sets the basis for …
preserving data mining. We also propose a classification hierarchy that sets the basis for …
Privacy-preserving data mining systems
N Zhang, W Zhao - Computer, 2007 - ieeexplore.ieee.org
Although successful in many applications, data mining poses special concerns for private
data. An integrated architecture takes a systemic view of the problem, implementing …
data. An integrated architecture takes a systemic view of the problem, implementing …
Tools for privacy preserving distributed data mining
Privacy preserving mining of distributed data has numerous applications. Each application
poses different constraints: What is meant by privacy, what are the desired results, how is the …
poses different constraints: What is meant by privacy, what are the desired results, how is the …
Privacy-preserving data mining: Why, how, and when
Data mining is under attack from privacy advocates because of a misunderstanding about
what it actually is and a valid concern about how it is generally done. This article shows how …
what it actually is and a valid concern about how it is generally done. This article shows how …
[PDF][PDF] Defining privacy for data mining
Privacy preserving data mining–getting valid data mining results without learning the
underlying data values–has been receiving attention in the research community and …
underlying data values–has been receiving attention in the research community and …
[图书][B] A general survey of privacy-preserving data mining models and algorithms
CC Aggarwal, PS Yu - 2008 - Springer
In recent years, privacy-preserving data mining has been studied extensively, because of
the wide proliferation of sensitive information on the internet. A number of algorithmic …
the wide proliferation of sensitive information on the internet. A number of algorithmic …