Secret sharing homomorphisms: keeping shares of a secret secret
Proceedings on Advances in cryptology---CRYPTO '86
A communication-privacy tradeoff for modular addition
Information Processing Letters
One-way accumulators: a decentralized alternative to digital signatures
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Enhancing privacy and trust in electronic communities
Proceedings of the 1st ACM conference on Electronic commerce
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
A fast distributed algorithm for mining association rules
DIS '96 Proceedings of the fourth international conference on on Parallel and distributed information systems
Efficient Mining of Association Rules in Distributed Databases
IEEE Transactions on Knowledge and Data Engineering
Fast Algorithms for Mining Association Rules in Large Databases
VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases
Privacy preserving mining of association rules
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy preserving association rule mining in vertically partitioned data
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Maintaining data privacy in association rule mining
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Leveraging the "Multi" in secure multi-party computation
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
When do data mining results violate privacy?
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-Preserving Data Mining: Why, How, and When
IEEE Security and Privacy
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Privacy-Preserving Top-k Queries
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Privacy-preserving clustering with distributed EM mixture modeling
Knowledge and Information Systems
To do or not to do: the dilemma of disclosing anonymized data
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Distributed privacy preserving information sharing
VLDB '05 Proceedings of the 31st international conference on Very large data bases
The Indiana Center for Database Systems at Purdue University
ACM SIGMOD Record
Privacy-preserving semantic interoperation and access control of heterogeneous databases
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Proceedings of the 2006 ACM symposium on Applied computing
Data Mining and Knowledge Discovery
Privacy-preserving collaborative association rule mining
Journal of Network and Computer Applications
Secure set intersection cardinality with application to association rule mining
Journal of Computer Security
Mining multiple private databases using a kNN classifier
Proceedings of the 2007 ACM symposium on Applied computing
The motivation and proposition of a privacy-enhancing architecture for operational databases
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining
Advanced Engineering Informatics
Preserving data privacy in outsourcing data aggregation services
ACM Transactions on Internet Technology (TOIT) - Special Issue on the Internet and Outsourcing
Privacy preserving decision tree learning over multiple parties
Data & Knowledge Engineering
Privacy-preserving distributed association rule mining via semi-trusted mixer
Data & Knowledge Engineering
Two methods for privacy preserving data mining with malicious participants
Information Sciences: an International Journal
Privacy preserving clustering on horizontally partitioned data
Data & Knowledge Engineering
Enabling access-privacy for random walk based data analysis applications
Data & Knowledge Engineering
A high collusion-resistant approach to distributed privacy-preserving data mining
PDCN'07 Proceedings of the 25th conference on Proceedings of the 25th IASTED International Multi-Conference: parallel and distributed computing and networks
Domain-Driven, Actionable Knowledge Discovery
IEEE Intelligent Systems
The implication problem for measure-based constraints
Information Systems
Security in outsourcing of association rule mining
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Ensuring correctness over untrusted private database
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Privacy-preserving statistical quantitative rules mining
Proceedings of the 2nd international conference on Scalable information systems
Distributed privacy preserving k-means clustering with additive secret sharing
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
Privacy-preserving Naïve Bayes classification
The VLDB Journal — The International Journal on Very Large Data Bases
A privacy preserving technique for distance-based classification with worst case privacy guarantees
Data & Knowledge Engineering
On disclosure risk analysis of anonymized itemsets in the presence of prior knowledge
ACM Transactions on Knowledge Discovery from Data (TKDD)
Privacy-preserving decision trees over vertically partitioned data
ACM Transactions on Knowledge Discovery from Data (TKDD)
Data privacy protection in multi-party clustering
Data & Knowledge Engineering
ACM SIGKDD Explorations Newsletter
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Hiding Sensitive Associative Classification Rule by Data Reduction
ADMA '07 Proceedings of the 3rd international conference on Advanced Data Mining and Applications
Providing Naïve Bayesian Classifier-Based Private Recommendations on Partitioned Data
PKDD 2007 Proceedings of the 11th European conference on Principles and Practice of Knowledge Discovery in Databases
Disclosure Risks of Distance Preserving Data Transformations
SSDBM '08 Proceedings of the 20th international conference on Scientific and Statistical Database Management
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part II
Privacy-preserving data mining in the malicious model
International Journal of Information and Computer Security
An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining
PAKDD '09 Proceedings of the 13th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining
International Journal of Computer Applications in Technology
Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Preserving Privacy in Time Series Data Classification by Discretization
MLDM '09 Proceedings of the 6th International Conference on Machine Learning and Data Mining in Pattern Recognition
Providing predictions on distributed HMMs with privacy
Artificial Intelligence Review
ADMA '09 Proceedings of the 5th International Conference on Advanced Data Mining and Applications
Reconstructing Data Perturbed by Random Projections When the Mixing Matrix Is Known
ECML PKDD '09 Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases: Part II
Accurate and large-scale privacy-preserving data mining using the election paradigm
Data & Knowledge Engineering
Proceedings of the first international workshop on Model driven service engineering and data quality and security
A novel approach for privacy mining of generic basic association rules
Proceedings of the ACM first international workshop on Privacy and anonymity for very large databases
Employing PRBAC for privacy preserving data publishing
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Secure construction of k-unlinkable patient records from distributed providers
Artificial Intelligence in Medicine
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Proceedings of the 2010 EDBT/ICDT Workshops
HHUIF and MSICF: Novel algorithms for privacy preserving utility mining
Expert Systems with Applications: An International Journal
Efficient privacy preserving distributed clustering based on secret sharing
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Privacy preserving clustering for multi-party
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Protecting privacy in incremental maintenance for distributed association rule mining
PAKDD'08 Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining
On privacy in time series data mining
PAKDD'08 Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining
Phoenix: privacy preserving biclustering on horizontally partitioned data
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
APHID: An architecture for private, high-performance integrated data mining
Future Generation Computer Systems
Privacy-preserving outsourcing support vector machines with random transformation
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
A new class of attacks on time series data mining\m{1}
Intelligent Data Analysis
Toward boosting distributed association rule mining by data de-clustering
Information Sciences: an International Journal
Learning latent variable models from distributed and abstracted data
Information Sciences: an International Journal
REBIVE: a reliable private data aggregation scheme for wireless sensor networks
Proceedings of the 2011 ACM Symposium on Applied Computing
Target-based privacy preserving association rule mining
Proceedings of the 2011 ACM Symposium on Applied Computing
PDA: Privacy-Preserving Data Aggregation for Information Collection
ACM Transactions on Sensor Networks (TOSN)
Secure top-k subgroup discovery
PSDML'10 Proceedings of the international ECML/PKDD conference on Privacy and security issues in data mining and machine learning
Journal of Computer and System Sciences
Preserving privacy in wireless sensor networks using reliable data aggregation
ACM SIGAPP Applied Computing Review
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part I
Optimized two party privacy preserving association rule mining using fully homomorphic encryption
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part I
Information theoretical analysis of two-party secret computation
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Efficient classification from multiple heterogeneous databases
PKDD'05 Proceedings of the 9th European conference on Principles and Practice of Knowledge Discovery in Databases
Suppressing microdata to prevent probabilistic classification based inference
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Arbitrarily distributed data-based recommendations with privacy
Data & Knowledge Engineering
Secrecy of two-party secure computation
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Privacy-Preserving decision trees over vertically partitioned data
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Privacy-Preserving collaborative association rule mining
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Mining association rules from distorted data for privacy preservation
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Privacy-Preserving data set union
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
“Secure” log-linear and logistic regression analysis of distributed databases
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Privacy-Preserving network aggregation
PAKDD'10 Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Secure distributed computation of anonymized views of shared databases
ACM Transactions on Database Systems (TODS)
A Semantics-based Approach to Large-Scale Mobile Social Networking
Mobile Networks and Applications
Secure Distributed Subgroup Discovery in Horizontally Partitioned Data
Transactions on Data Privacy
Fully homomorphic encryption based two-party association rule mining
Data & Knowledge Engineering
Privacy-preserving SOM-based recommendations on horizontally distributed data
Knowledge-Based Systems
Privacy-preserving frequent itemsets mining via secure collaborative framework
Security and Communication Networks
A universal toolkit for cryptographically secure privacy-preserving data mining
PAISI'12 Proceedings of the 2012 Pacific Asia conference on Intelligence and Security Informatics
Privacy-preserving back-propagation and extreme learning machine algorithms
Data & Knowledge Engineering
Approximate privacy-preserving data mining on vertically partitioned data
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
A distributed recommender system architecture
International Journal of Web Engineering and Technology
Privacy-preserving self-organizing map
DaWaK'07 Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery
Estimating NBC-based recommendations on arbitrarily partitioned data with privacy
Knowledge-Based Systems
A Knowledge Model Sharing Based Approach to Privacy-Preserving Data Mining
Transactions on Data Privacy
Preserving Privacy in Time Series Data Mining
International Journal of Data Warehousing and Mining
Collusion-Free Privacy Preserving Data Mining
International Journal of Intelligent Information Technologies
International Journal of Data Warehousing and Mining
Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree
International Journal of Information Security and Privacy
Lightweight privacy-preserving peer-to-peer data integration
Proceedings of the VLDB Endowment
Distributed association rule mining with minimum communication overhead
AusDM '09 Proceedings of the Eighth Australasian Data Mining Conference - Volume 101
Secure two-party association rule mining
AISC '11 Proceedings of the Ninth Australasian Information Security Conference - Volume 116
A Privacy Preserving Markov Model for Sequence Classification
Proceedings of the International Conference on Bioinformatics, Computational Biology and Biomedical Informatics
Privacy-preserving Kruskal-Wallis test
Computer Methods and Programs in Biomedicine
Towards practical private processing of database queries over public data
Distributed and Parallel Databases
Distributed and Parallel Databases
Hi-index | 0.00 |
Data mining can extract important knowledge from large data collections驴but sometimes these collections are split among various parties. Privacy concerns may prevent the parties from directly sharing the data and some types of information about the data. This paper addresses secure mining of association rules over horizontally partitioned data. The methods incorporate cryptographic techniques to minimize the information shared, while adding little overhead to the mining task.