C4.5: programs for machine learning
C4.5: programs for machine learning
Mining association rules between sets of items in large databases
SIGMOD '93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data
The nature of statistical learning theory
The nature of statistical learning theory
Using sample size to limit exposure to data mining
Journal of Computer Security - Special issue on database security
Datafly: A System for Providing Anonymity in Medical Data
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
The Design and Implementation of a Data Level Database Inference Detection System
Proceedings of the IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security XII: Status and Prospects
The inference problem: a survey
ACM SIGKDD Explorations Newsletter
Tools for privacy preserving distributed data mining
ACM SIGKDD Explorations Newsletter
Privacy preserving mining of association rules
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Transforming data to satisfy privacy constraints
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
IEEE Transactions on Knowledge and Data Engineering
When do data mining results violate privacy?
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Bottom-Up Generalization: A Data Mining Solution to Privacy Protection
ICDM '04 Proceedings of the Fourth IEEE International Conference on Data Mining
Top-Down Specialization for Information and Privacy Preservation
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Data Privacy through Optimal k-Anonymization
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Template-Based Privacy Preservation in Classification Problems
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Personalized privacy preservation
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Anonymizing sequential releases
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymizing Classification Data for Privacy Preservation
IEEE Transactions on Knowledge and Data Engineering
Minimality attack in privacy preserving data publishing
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
A framework for condensation-based anonymization of string data
Data Mining and Knowledge Discovery
How Anonymous Is k-Anonymous? Look at Your Quasi-ID
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
Knowledge and Information Systems
Privacy-preserving data mashup
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Privacy protection for RFID data
Proceedings of the 2009 ACM symposium on Applied Computing
Privacy-preserving data publishing for cluster analysis
Data & Knowledge Engineering
Anonymization-based attacks in privacy-preserving data publishing
ACM Transactions on Database Systems (TODS)
Anonymizing healthcare data: a case study on the blood transfusion service
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymizing location-based RFID data
C3S2E '09 Proceedings of the 2nd Canadian Conference on Computer Science and Software Engineering
(α, k)-anonymous data publishing
Journal of Intelligent Information Systems
Walking in the crowd: anonymizing trajectory data for pattern analysis
Proceedings of the 18th ACM conference on Information and knowledge management
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
Practical issues on privacy-preserving health data mining
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Centralized and Distributed Anonymization for High-Dimensional Healthcare Data
ACM Transactions on Knowledge Discovery from Data (TKDD)
Relationships and data sanitization: a study in scarlet
Proceedings of the 2010 workshop on New security paradigms
ACM Transactions on Database Systems (TODS)
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Checking anonymity levels for anonymized data
ICDCIT'11 Proceedings of the 7th international conference on Distributed computing and internet technology
Differentially private data release for data mining
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymity meets game theory: secure data integration with malicious participants
The VLDB Journal — The International Journal on Very Large Data Bases
Limiting disclosure of sensitive data in sequential releases of databases
Information Sciences: an International Journal
Secure distributed framework for achieving ε-differential privacy
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Low Dimensional Data Privacy Preservation Using Multi Layer Artificial Neural Network
International Journal of Intelligent Information Technologies
Privacy-preserving trajectory data publishing by local suppression
Information Sciences: an International Journal
Preserving privacy and frequent sharing patterns for social network data publishing
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
A general framework for privacy preserving data publishing
Knowledge-Based Systems
Hi-index | 0.00 |
We present an approach of limiting the confidence of inferring sensitive properties to protect against the threats caused by data mining abilities. The problem has dual goals: preserve the information for a wanted data analysis request and limit the usefulness of unwanted sensitive inferences that may be derived from the release of data. Sensitive inferences are specified by a set of “privacy templates". Each template specifies the sensitive property to be protected, the attributes identifying a group of individuals, and a maximum threshold for the confidence of inferring the sensitive property given the identifying attributes. We show that suppressing the domain values monotonically decreases the maximum confidence of such sensitive inferences. Hence, we propose a data transformation that minimally suppresses the domain values in the data to satisfy the set of privacy templates. The transformed data is free of sensitive inferences even in the presence of data mining algorithms. The prior k-anonymization k has been italicized consistently throughout this article. focuses on personal identities. This work focuses on the association between personal identities and sensitive properties.