STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Commodity-based cryptography (extended abstract)
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
Multi party computations: past and present
PODC '97 Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing
Universal service-providers for database private information retrieval (extended abstract)
PODC '98 Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing
Proceedings of the 1998 workshop on New security paradigms
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
PUBLIC: A Decision Tree Classifier that Integrates Building and Pruning
Data Mining and Knowledge Discovery
Privacy preserving association rule mining in vertically partitioned data
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
A practical approach to solve Secure Multi-party Computation problems
Proceedings of the 2002 workshop on New security paradigms
A study of several specific secure two-party computation problems
A study of several specific secure two-party computation problems
Using randomized response techniques for privacy-preserving data mining
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
A framework for privacy preserving classification in data mining
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Analysis of privacy preserving random perturbation techniques: further explorations
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Leveraging the "Multi" in secure multi-party computation
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
When do data mining results violate privacy?
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Building predictors from vertically distributed data
CASCON '04 Proceedings of the 2004 conference of the Centre for Advanced Studies on Collaborative research
A new scheme on privacy-preserving data classification
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Distributed privacy preserving information sharing
VLDB '05 Proceedings of the 31st international conference on Very large data bases
IEEE Transactions on Knowledge and Data Engineering
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Proceedings of the 2006 ACM symposium on Applied computing
Classification spanning correlated data streams
CIKM '06 Proceedings of the 15th ACM international conference on Information and knowledge management
Association rules mining in vertically partitioned databases
Data & Knowledge Engineering - Special issue: WIDM 2004
Secure set intersection cardinality with application to association rule mining
Journal of Computer Security
Maximizing Accuracy of Shared Databases when Concealing Sensitive Patterns
Information Systems Research
The privacy of k-NN retrieval for horizontal partitioned data: new methods and applications
ADC '07 Proceedings of the eighteenth conference on Australasian database - Volume 63
Privacy preserving decision tree learning over multiple parties
Data & Knowledge Engineering
Privacy-preservation for gradient descent methods
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Two methods for privacy preserving data mining with malicious participants
Information Sciences: an International Journal
Privacy preserving clustering on horizontally partitioned data
Data & Knowledge Engineering
Preserving privacy in association rule mining with bloom filters
Journal of Intelligent Information Systems
Privacy-preserving regression algorithms
SMO'07 Proceedings of the 7th WSEAS International Conference on Simulation, Modelling and Optimization
Privacy-preserving multi-party decision tree induction
International Journal of Business Intelligence and Data Mining
Privacy Aware Data Management and Chase
Fundamenta Informaticae - Special issue ISMIS'05
Parity-based inference control for multi-dimensional range sum queries
Journal of Computer Security
A new efficient privacy-preserving scalar product protocol
AusDM '07 Proceedings of the sixth Australasian conference on Data mining and analytics - Volume 70
Anonymity preserving pattern discovery
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-preserving Naïve Bayes classification
The VLDB Journal — The International Journal on Very Large Data Bases
Providing k-anonymity in data mining
The VLDB Journal — The International Journal on Very Large Data Bases
A privacy preserving technique for distance-based classification with worst case privacy guarantees
Data & Knowledge Engineering
Privacy-preserving decision trees over vertically partitioned data
ACM Transactions on Knowledge Discovery from Data (TKDD)
Privacy Preserving Data Mining Research: Current Status and Key Issues
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part III: ICCS 2007
A Single Initialization Server for Multi-party Cryptography
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
Protecting business intelligence and customer privacy while outsourcing data mining tasks
Knowledge and Information Systems
Secure Multi-party Protocols for Privacy Preserving Data Mining
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
Privacy-preserving data mining in the malicious model
International Journal of Information and Computer Security
Privacy-preserving data mashup
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
International Journal of Computer Applications in Technology
Data Confidentiality Versus Chase
RSFDGrC '07 Proceedings of the 11th International Conference on Rough Sets, Fuzzy Sets, Data Mining and Granular Computing
Classification spanning private databases
AAAI'06 Proceedings of the 21st national conference on Artificial intelligence - Volume 1
Accurate and large-scale privacy-preserving data mining using the election paradigm
Data & Knowledge Engineering
A novel approach for privacy mining of generic basic association rules
Proceedings of the ACM first international workshop on Privacy and anonymity for very large databases
ACML '09 Proceedings of the 1st Asian Conference on Machine Learning: Advances in Machine Learning
Distributed data mining and agents
Engineering Applications of Artificial Intelligence
An approach of private classification on vertically partitioned data
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
Communication-Efficient Privacy-Preserving Clustering
Transactions on Data Privacy
A hybrid multi-group privacy-preserving approach for building decision trees
PAKDD'07 Proceedings of the 11th Pacific-Asia conference on Advances in knowledge discovery and data mining
Privacy-preserving discovery of frequent patterns in time series
ICDM'07 Proceedings of the 7th industrial conference on Advances in data mining: theoretical aspects and applications
Using cryptography for privacy protection in data mining systems
WImBI'06 Proceedings of the 1st WICI international conference on Web intelligence meets brain informatics
APHID: An architecture for private, high-performance integrated data mining
Future Generation Computer Systems
Centralized and Distributed Anonymization for High-Dimensional Healthcare Data
ACM Transactions on Knowledge Discovery from Data (TKDD)
A secure protocol for point-segment position problem
WISM'10 Proceedings of the 2010 international conference on Web information systems and mining
An efficient cacheable secure scalar product protocol for privacy-preserving data mining
DaWaK'11 Proceedings of the 13th international conference on Data warehousing and knowledge discovery
Anonymity meets game theory: secure data integration with malicious participants
The VLDB Journal — The International Journal on Very Large Data Bases
k-Anonymous Decision Tree Induction
PKDD'06 Proceedings of the 10th European conference on Principle and Practice of Knowledge Discovery in Databases
Privacy preserving decision tree in multi party environment
AIRS'05 Proceedings of the Second Asia conference on Asia Information Retrieval Technology
Privacy preserving DBSCAN for vertically partitioned data
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
More on shared-scalar-product protocols
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Ensuring data security against knowledge discovery in distributed information systems
RSFDGrC'05 Proceedings of the 10th international conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing - Volume Part II
Privacy preserving naive bayes classification
ADMA'05 Proceedings of the First international conference on Advanced Data Mining and Applications
Privacy-Preserving decision trees over vertically partitioned data
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Privacy-preserving distributed k-anonymity
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Secure computation of the mean and related statistics
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Private mining of association rules
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Oblivious scalar-product protocols
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
A classification based framework for privacy preserving data mining
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Privacy-preserving subgraph discovery
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Privacy Aware Data Management and Chase
Fundamenta Informaticae - Special issue ISMIS'05
Computing join aggregates over private tables
DaWaK'07 Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery
Privacy-preserving self-organizing map
DaWaK'07 Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery
Enhancing the efficiency in privacy preserving learning of decision trees in partitioned databases
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
Generation of sufficient cut points to discretize network traffic data sets
SEMCCO'12 Proceedings of the Third international conference on Swarm, Evolutionary, and Memetic Computing
A survey of multiple classifier systems as hybrid systems
Information Fusion
Distributed and Parallel Databases
Hi-index | 0.00 |
This paper studies how to build a decision tree classifier under the following scenario: a database is vertically partitioned into two pieces, with one piece owned by Alice and the other piece owned by Bob. Alice and Bob want to build a decision tree classifier based on such a database, but due to the privacy constraints, neither of them wants to disclose their private pieces to the other party or to any third party.We present a protocol that allows Alice and Bob to conduct such a classifier building without having to compromise their privacy. Our protocol uses an untrusted third-party server, and is built upon a useful building block, the scalar product protocol. Our solution to the scalar product protocol is more efficient than any existing solutions.