|
[1].M. Atallah, E. Bertino, A. Elmagarmid, M. Ibrahim, and V. S. Verykios, “Disclosure limitation of sensitive rules”, In Proceedings of the 1999 IEEE Knowledge and Data Engineering Exchange Workshop (KDEX’99). [2].R. Agrawal and R. Srikant, “Privacy-Preserving Data Mining”, Proc. of ACM SIGMOD Intl. Conf. on Management of Data, May 2000. [3].Rakesh Agrawal, Ramakrishnan Srikant, ”Fast algorithms for mining association rules”, VLDB 1994 :487-499. [4].A. Gkoulalas-Divanis and V. S. Verykios, “An Integer Programming Approach for Frequent Itemset Hiding”, In Proceedings of the 2006 ACM Conference on Information and Knowledge Management (CIKM 2006). [5].Yuhoung Guo “Reconstruction-Based Association Rule Hiding”, SIGMOD2007 Ph.D. Workshop on Innovative Database Research 2007(IDAR2007). [6].Ya-Ping Kuo, Pai-Yu Lin, and Bi-Ru Dai, “Hiding Frequent Patterns under Multiple Sensitive Thresholds”, Database and Expert Systems Applications, 19th International Conference, DEXA 2008. [7].Nikos Mamoulis, David W. Cheung, and Wang Lian, “Similarity Search in Sets and Categorical Data Using the Signature Tree”, Proceedings of the 19th International Conference on Data Engineering (ICDE’03). [8].S. Menon, S. Sarkar, and S. Mukherjee, “Maximizing accuracy of shared databases when concealing sensitive patterns”, Information Systems Research, 16(3):256–270, 2005. [9].Vassilios S. Verykios, Ahmed K. Elmagarmid, Elisa Bertino and Yucel Saygin, M, “Association Rule Hiding”, IEEE Transaction on Knowledge and Data Engineering (TKDE 2004). [10].Vassilios S. Verykios and Aris Gkoulalas-Divanis, “A Survey of Association Rule Hiding Methods for Privacy”, Privacy-Preserving Data Mining, Chapter11. [11].Y. Saygin, V.S. Verykios, and A.K. Elmagarmid, “Privacy Preserving Association Rule Mining”, Proc. IEEE Workshop Research Issues in Data Engineering, 2002. [12].Xingzhi Sun, Philip S. Yu, “Hiding Sensitive Frequent Itemsets by a Border-Based Approach”, Journal of Computing Science and Engineering (JCSE 2007). [13].George V.Moustakides, Vassilios S.Verykios, “A Max-Min Approach for Hiding Frequent Itemsets”, In Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), pages 502-506. [14].Y.-H.Wu, C.-M. Chiang, and A. L. P. Chen, “Hiding Sensitive Association Rules with Limited Side Effects”, IEEE Transactions on Knowledge and Data Engineering(TKDE 2007). [15].http://www.almaden.ibm.com/software/quest/Resources/index.shtml, 2003.
|