Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Secure databases: protection against user influence
ACM Transactions on Database Systems (TODS)
Secure statistical databases with random sample queries
ACM Transactions on Database Systems (TODS)
Data & Knowledge Engineering
Real-world Data is Dirty: Data Cleansing and The Merge/Purge Problem
Data Mining and Knowledge Discovery
Inference in MLS Database Systems
IEEE Transactions on Knowledge and Data Engineering
A survey of approaches to automatic schema matching
The VLDB Journal — The International Journal on Very Large Data Bases
Tools for privacy preserving distributed data mining
ACM SIGKDD Explorations Newsletter
A Bayesian decision model for cost optimal record matching
The VLDB Journal — The International Journal on Very Large Data Bases
Logical vs Numerical Inference on Statistical Databases
HICSS '96 Proceedings of the 29th Hawaii International Conference on System Sciences Volume 2: Decision Support and Knowledge-Based Systems
Discussion paper: privacy-preserving distributed queries for a clinical case research network
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
A Schema Analysis and Reconciliation Tool Environment for Heterogeneous Databases
IDEAS '99 Proceedings of the 1999 International Symposium on Database Engineering & Applications
Information sharing across private databases
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
TAILOR: A Record Linkage Tool Box
ICDE '02 Proceedings of the 18th International Conference on Data Engineering
Assuring privacy when big brother is watching
DMKD '03 Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Controlling access to published data using cryptography
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
Query execution assurance for outsourced databases
VLDB '05 Proceedings of the 31st international conference on Very large data bases
The Indiana Center for Database Systems at Purdue University
ACM SIGMOD Record
Distributed higher order association rule mining using information extracted from textual data
ACM SIGKDD Explorations Newsletter - Natural language processing and text mining
Engineering Privacy Requirements in Business Intelligence Applications
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
Online pairing of VoIP conversations
The VLDB Journal — The International Journal on Very Large Data Bases
Providing predictions on distributed HMMs with privacy
Artificial Intelligence Review
Formal anonymity models for efficient privacy-preserving joins
Data & Knowledge Engineering
Record linkage performance for large data sets
Proceedings of the ACM first international workshop on Privacy and anonymity for very large databases
Privacy-preserving schema matching using mutual information
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Phoenix: privacy preserving biclustering on horizontally partitioned data
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Privacy-preserving query checking in query middleware
FSKD'09 Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 1
Joining privately on outsourced data
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
A semantic privacy-preserving model for data sharing and integration
Proceedings of the International Conference on Web Intelligence, Mining and Semantics
A constraint satisfaction cryptanalysis of bloom filters in private record linkage
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Privacy-aware DaaS services composition
DEXA'11 Proceedings of the 22nd international conference on Database and expert systems applications - Volume Part I
Semantics-enabled policies for information sharing and protection in the cloud
SocInfo'11 Proceedings of the Third international conference on Social informatics
Performance-oriented privacy-preserving data integration
DILS'05 Proceedings of the Second international conference on Data Integration in the Life Sciences
Fake injection strategies for private phonetic matching
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Privacy-preserving SOM-based recommendations on horizontally distributed data
Knowledge-Based Systems
Reference table based k-anonymous private blocking
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Towards law-aware semantic cloud policies with exceptions for data integration and protection
Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics
Data exchange in datalog is mainly a matter of choice
Datalog 2.0'12 Proceedings of the Second international conference on Datalog in Academia and Industry
An SOA-Based Architecture to Share Medical Data with Privacy Preservation
International Journal of Organizational and Collective Intelligence
Efficient privacy-aware record integration
Proceedings of the 16th International Conference on Extending Database Technology
Crafting a balance between big data utility and protection in the semantic data cloud
Proceedings of the 3rd International Conference on Web Intelligence, Mining and Semantics
A taxonomy of privacy-preserving record linkage techniques
Information Systems
Efficient two-party private blocking based on sorted nearest neighborhood clustering
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
An iterative two-party protocol for scalable privacy-preserving record linkage
AusDM '12 Proceedings of the Tenth Australasian Data Mining Conference - Volume 134
Hi-index | 0.00 |
Integrating data from multiple sources has been a longstanding challenge in the database community. Techniques such as privacy-preserving data mining promises privacy, but assume data has integration has been accomplished. Data integration methods are seriously hampered by inability to share the data to be integrated. This paper lays out a privacy framework for data integration. Challenges for data integration in the context of this framework are discussed, in the context of existing accomplishments in data integration. Many of these challenges are opportunities for the data mining community.