Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Parsimonious downgrading and decision trees applied to the inference problem
Proceedings of the 1998 workshop on New security paradigms
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
A fast distributed algorithm for mining association rules
DIS '96 Proceedings of the fourth international conference on on Parallel and distributed information systems
Using unknowns to prevent discovery of association rules
ACM SIGMOD Record
An Integrated Framework for Database Privacy Protection
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Hiding Association Rules by Using Confidence and Support
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Tools for privacy preserving distributed data mining
ACM SIGKDD Explorations Newsletter
Privacy preserving mining of association rules
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy preserving association rule mining in vertically partitioned data
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Disclosure Limitation of Sensitive Rules
KDEX '99 Proceedings of the 1999 Workshop on Knowledge and Data Engineering Exchange
Preface: proceedings of the ICDM 2002 workshop on privacy, security, and data mining
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Privacy preserving frequent itemset mining
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
A Secure Protocol for Computing Dot-Products in Clustered and Distributed Environments
ICPP '02 Proceedings of the 2002 International Conference on Parallel Processing
Privacy Preserving Association Rule Mining
RIDE '02 Proceedings of the 12th International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems (RIDE'02)
IEEE Transactions on Knowledge and Data Engineering
Maintaining data privacy in association rule mining
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
IEEE Transactions on Knowledge and Data Engineering
A Border-Based Approach for Hiding Sensitive Frequent Itemsets
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Secure distributed data-mining and its application to large-scale network measurements
ACM SIGCOMM Computer Communication Review
A database security course on a shoestring
Proceedings of the 37th SIGCSE technical symposium on Computer science education
Towards low-perturbation anonymity preserving pattern discovery
Proceedings of the 2006 ACM symposium on Applied computing
Privacy-preserving demographic filtering
Proceedings of the 2006 ACM symposium on Applied computing
You are what you say: privacy risks of public mentions
SIGIR '06 Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval
A reconstruction-based algorithm for classification rules hiding
ADC '06 Proceedings of the 17th Australasian Database Conference - Volume 49
Privacy-preserving performance measurements
Proceedings of the 2006 SIGCOMM workshop on Mining network data
A privacy-preserving interdomain audit framework
Proceedings of the 5th ACM workshop on Privacy in electronic society
k nearest neighbor classification across multiple private databases
CIKM '06 Proceedings of the 15th ACM international conference on Information and knowledge management
Hiding Sensitive Association Rules with Limited Side Effects
IEEE Transactions on Knowledge and Data Engineering
A Bayesian Network Approach to Detecting Privacy Intrusion
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
Hiding informative association rule sets
Expert Systems with Applications: An International Journal
Data Mining and Knowledge Discovery
Mining multiple private databases using a kNN classifier
Proceedings of the 2007 ACM symposium on Applied computing
Maximizing Accuracy of Shared Databases when Concealing Sensitive Patterns
Information Systems Research
IEEE Pervasive Computing
Hiding collaborative recommendation association rules
Applied Intelligence
The motivation and proposition of a privacy-enhancing architecture for operational databases
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
Controlling inference: avoiding p-level reduction during analysis
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
Editorial: Some issues in privacy data management
Data & Knowledge Engineering
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Guest editorial: Recent advances in preserving privacy when mining data
Data & Knowledge Engineering
A novel data distortion approach via selective SSVD for privacy protection
International Journal of Information and Computer Security
Evaluation of a graduate level data mining course with industry participants
AusDM '07 Proceedings of the sixth Australasian conference on Data mining and analytics - Volume 70
Efficient sanitization of informative association rules
Expert Systems with Applications: An International Journal
Anonymity preserving pattern discovery
The VLDB Journal — The International Journal on Very Large Data Bases
Providing k-anonymity in data mining
The VLDB Journal — The International Journal on Very Large Data Bases
A privacy preserving technique for distance-based classification with worst case privacy guarantees
Data & Knowledge Engineering
Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing
EURASIP Journal on Information Security
Collaborative clustering with the use of Fuzzy C-Means and its quantification
Fuzzy Sets and Systems
Privacy-preserving cox regression for survival analysis
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Data privacy protection in multi-party clustering
Data & Knowledge Engineering
Privacy Preserving Data Mining Research: Current Status and Key Issues
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part III: ICCS 2007
MLDM '07 Proceedings of the 5th international conference on Machine Learning and Data Mining in Pattern Recognition
Optimization for MASK Scheme in Privacy Preserving Data Mining for Association Rules
RSEISP '07 Proceedings of the international conference on Rough Sets and Intelligent Systems Paradigms
Hiding Sensitive Associative Classification Rule by Data Reduction
ADMA '07 Proceedings of the 3rd international conference on Advanced Data Mining and Applications
Engineering Privacy Requirements in Business Intelligence Applications
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
Personalized search using identity-based hashing
Proceedings of the 4th ACM workshop on Digital identity management
Privacy: preserving trajectory collection
Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems
A maximum entropy approach to feature selection in knowledge-based authentication
Decision Support Systems
Maintenance of sanitizing informative association rules
Expert Systems with Applications: An International Journal
Secure Multi-party Protocols for Privacy Preserving Data Mining
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
A Privacy-Protecting Business-Analytics Service for On-Line Transactions
International Journal of Electronic Commerce
IDEAL '08 Proceedings of the 9th International Conference on Intelligent Data Engineering and Automated Learning
Algorithms for clustering clickstream data
Information Processing Letters
Privately detecting bursts in streaming, distributed time series data
Data & Knowledge Engineering
A tree-based approach to preserve the privacy of software engineering data and predictive models
PROMISE '09 Proceedings of the 5th International Conference on Predictor Models in Software Engineering
International Journal of Data Analysis Techniques and Strategies
Classification of symbolic objects: A lazy learning approach
Intelligent Data Analysis - Analysis of Symbolic and Spatial Data
Providing predictions on distributed HMMs with privacy
Artificial Intelligence Review
Accurate and large-scale privacy-preserving data mining using the election paradigm
Data & Knowledge Engineering
Proceedings of the first international workshop on Model driven service engineering and data quality and security
Employing PRBAC for privacy preserving data publishing
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Research challenges for digital archives of 3D cultural heritage models
Journal on Computing and Cultural Heritage (JOCCH)
Publishing naive Bayesian classifiers: privacy without accuracy loss
Proceedings of the VLDB Endowment
Query privacy in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
FM '09 Proceedings of the 2nd World Congress on Formal Methods
Hiding co-occurring frequent itemsets
Proceedings of the 2009 EDBT/ICDT Workshops
Opportunistic sensing: security challenges for the new paradigm
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Distributed data mining and agents
Engineering Applications of Artificial Intelligence
Hiding collaborative recommendation association rules on horizontally partitioned data
Intelligent Data Analysis
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Proceedings of the 2010 EDBT/ICDT Workshops
Hiding co-occurring sensitive patterns in progressive databases
Proceedings of the 2010 EDBT/ICDT Workshops
HHUIF and MSICF: Novel algorithms for privacy preserving utility mining
Expert Systems with Applications: An International Journal
Hide-and-Lie: enhancing application-level privacy in opportunistic networks
MobiOpp '10 Proceedings of the Second International Workshop on Mobile Opportunistic Networking
A data perturbation approach to sensitive classification rule hiding
Proceedings of the 2010 ACM Symposium on Applied Computing
Intrusion detection and identification system using data mining and forensic techniques
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Protecting individual information against inference attacks in data publishing
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Multiple target localisation in sensor networks with location privacy
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Website privacy preservation for query log publishing
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Privacy-preserving data mining: A feature set partitioning approach
Information Sciences: an International Journal
Privacy-preserving query log mining for business confidentiality protection
ACM Transactions on the Web (TWEB)
Privacy issues in scientific workflow provenance
Proceedings of the 1st International Workshop on Workflow Approaches to New Data-centric Science
Monitoring, analysis, and testing of deployed software
Proceedings of the FSE/SDP workshop on Future of software engineering research
Fuzzy based clustering algorithm for privacy preserving data mining
International Journal of Business Information Systems
Proceedings of the 14th International Conference on Database Theory
Towards knowledge intensive data privacy
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Privacy and security in ubiquitous knowledge discovery
Ubiquitous knowledge discovery
Associative classification rules hiding for privacy preservation
International Journal of Intelligent Information and Database Systems
Camouflage: automated anonymization of field data
Proceedings of the 33rd International Conference on Software Engineering
Privacy and security in ubiquitous knowledge discovery
Ubiquitous knowledge discovery
Provenance views for module privacy
Proceedings of the thirtieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Afterword: data, knowledge, and e-discovery
Artificial Intelligence and Law
Privacy preserving group linkage
SSDBM'11 Proceedings of the 23rd international conference on Scientific and statistical database management
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Privacy-Preserving SVM classification on vertically partitioned data
PAKDD'06 Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
Hierarchical infrastructure for large-scale distributed privacy-preserving data mining
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part III
Privacy-Preserving graph algorithms in the semi-honest model
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
PKDD'05 Proceedings of the 9th European conference on Principles and Practice of Knowledge Discovery in Databases
Suppressing microdata to prevent probabilistic classification based inference
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Data anonymization using an improved utility measurement
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
More on shared-scalar-product protocols
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Information driven evaluation of data hiding algorithms
DaWaK'05 Proceedings of the 7th international conference on Data Warehousing and Knowledge Discovery
Hiding classification rules for data sharing with privacy preservation
DaWaK'05 Proceedings of the 7th international conference on Data Warehousing and Knowledge Discovery
Privacy preserving naive bayes classification
ADMA'05 Proceedings of the First international conference on Advanced Data Mining and Applications
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Mining association rules from distorted data for privacy preservation
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Efficient privacy preserving k-means clustering
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
Viewpoints on emergent semantics
Journal on Data Semantics VI
GPC'11 Proceedings of the 6th international conference on Grid and Pervasive Computing
More than modelling and hiding: towards a comprehensive view of Web mining and privacy
Data Mining and Knowledge Discovery
A rigorous and customizable framework for privacy
PODS '12 Proceedings of the 31st symposium on Principles of Database Systems
Privacy-preserving ranking over vertically partitioned data
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Privacy and utility for defect prediction: experiments with MORPH
Proceedings of the 34th International Conference on Software Engineering
Reconstruction attack through classifier analysis
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
An enhanced secure preserving for pre-processed data using DMI and PCRBAC algorithm
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Privacy preserving neural networks in iris signature feature extraction
Proceedings of the 5th International Conference on PErvasive Technologies Related to Assistive Environments
An Enhanced Utility-Driven Data Anonymization Method
Transactions on Data Privacy
Collusion-Free Privacy Preserving Data Mining
International Journal of Intelligent Information Technologies
International Journal of Agent Technologies and Systems
A propagation model for provenance views of public/private workflows
Proceedings of the 16th International Conference on Database Theory
Bands of privacy preserving objectives: classification of PPDM strategies
AusDM '11 Proceedings of the Ninth Australasian Data Mining Conference - Volume 121
On the protection of social networks user's information
Knowledge-Based Systems
Pufferfish: A framework for mathematical privacy definitions
ACM Transactions on Database Systems (TODS)
Trends and research directions for privacy preserving approaches on the cloud
Proceedings of the 6th ACM India Computing Convention
Effective sanitization approaches to hide sensitive utility and frequent itemsets
Intelligent Data Analysis
Hi-index | 0.01 |
We provide here an overview of the new and rapidly emerging research area of privacy preserving data mining. We also propose a classification hierarchy that sets the basis for analyzing the work which has been performed in this context. A detailed review of the work accomplished in this area is also given, along with the coordinates of each work to the classification hierarchy. A brief evaluation is performed, and some initial conclusions are made.