期刊文献+

面向隐私保护的数据挖掘技术研究 被引量:9

Study of Data Mining Technique in Presence of Privacy Preserving
下载PDF
导出
摘要 隐私与安全是数据挖掘中一个越来越重要的问题。隐私与安全问题的解决能破坏图谋不轨的挖掘工程。文中研究了数据挖掘中隐私保护技术的发展现状,总结出了隐私保护技术的分类,详细讨论了隐私保护技术中最重要的隐私保持技术,最后得出了隐私保护技术算法的评估指标。 Privacy and security concerns have become an increasingly important issue in data mining. Privacy and security concerns can constra/n such access, threatening to derail data mining projects, This paper researches the data mining situations where these privacy and security issues arise, summaries the classification of privacy preserving techniques, discusses the most technique of privacy preservation among the privacy preserving techniques in detail,and addresses the evaluation of privacy preserving algorithms.
出处 《计算机技术与发展》 2006年第7期147-149,共3页 Computer Technology and Development
基金 湖北省自然科学基金资助项目(2004ADA023)
关键词 隐私保持 探索技术 数据实用 不确定性水平 privacy preservation heuristic - based techniques data utility uncertainty level
  • 相关文献

参考文献12

  • 1Verykios V S,Bertino E,Fovino I N,et al.State-of-the-art in Privacy Preserving data mining[J].ACM SIGMOD Record,2004,33:50-57.
  • 2Atallah M,Elmagarmid A,Ibrahim M,et al.Disclosure Limitation of SensitiveRules[A].Proceedings of the 1999 Workshop on Knowledge and Data Engineering Exchange.IEEE Conference Proceeding[C].Chicago,Illinois:[s.n.],1999.45-52.
  • 3Chang LiWu,Moskowitz I S.Parsimonious downgrading and decision trees applied to the inference problem[A].Proceedings of the 1998 workshop on New security paradigms[C].Charlottesville,Virginia,United States:ACM Press,1998.82-89.
  • 4Saygin Y,Verykios V S,Elmagarmid A K.Privacy Preserving Association Rule Mining[A].Proceedings of the 12th International Workshop on Research Issues inData Engineering (RIDE'2002)[C].San Jose,USA:IEEE Computer Society Press,2002.151-158.
  • 5Du Wenliang,Attalah M J.Secure multiproblem computation problems and their applications:A review and open problems[R].CERIAS Tech Report 2001-51,Center for Education and Research in Information Assurance and Security and Department of Computer Sciences,Purdue University,West Lafayette,IN,2001.
  • 6Pinkas B.Cryptographic techniques for privacy-preserving data mining[J].ACM SIGKDD Explorations Newsletter,2002,4(2):12-19.
  • 7Cliffton C,Kantarcioglu M,Vaidya J,et al.Tools for privacy preservingdistributed data mining[J].ACM SIGKDD Explorations Newsletter,2002,4(2):28-34.
  • 8Kantarcioglu M,Clifton C.Privacy-preserving distributed mining of association rules on horizontally partitioned data[A].The ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery (DMKD'02).ACM SIGMOD'2002[C].Madison,Wisconsin:[s.n.],2002.24-31.
  • 9Agrawal R,Srikant R.Privacy-preserving data mining[A].Proceedings of the 2000 ACM SIGMOD international conference on Management of data[C].Dallas,Texas,United States:ACM,2000.439-450.
  • 10Agrawal D,Aggarwal C C.On the design and quantification of privacy preserving data mining algorithms[A].Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems[C].Santa Barbara,California,United States:ACM Press,2001.247-255.

同被引文献58

引证文献9

二级引证文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部