|
[1]C. Clifton and D. Marks, “Security and Privacy Implications of Data Mining,” Proceedings of the 1996 ACM SIGMOD Workshop Data Mining and Knowledge Discovery, pp.15-19, 1996. [2]M. Atallah, E. Bertino, A. Elmagarmid, M. Ibrahim, and V.Verykios, “Disclosure Limitation Of Sensitive Rules,” Proceedings of Knowledge and Data Exchange Workshop, pp. 45-52,1999. [3]R. Agrawal and R. Srikant, “Fast Algorithms for Mining Association Rules,” Proceedings of the 20th VLDB Conference,Santiago,Chile, pp. 487-499, 1994. [4]R. Agrawal and R. Srikant, “Mining Sequential Patterns,” Proceedings of the 11th International Conference on Data Engineering, pp. 3-14, 1995. [5]S. R. M. Oliveira, O. R. Za¨ıane, and Y. Saygin, “Secure Association Rule Sharing,” Lecture Notes in Artificial Intelligence3056 - Advances in Knowledge Discovery and Data Mining, 8th Pacific-Asia Conference (PAKDD 2004), Springer, pp. 74-85, 2004. [6]V. S. Verykios, A. K. Elmagarmid, E. Bertino, Y. Saygin, and E. Dasseni, “Association Rule Hiding,” IEEE Transactions on Knowledge and Data Engineering , vol.16, no. 4, pp. 434-447, April 2004. [7]Y. Saygin, V. S. Verykios, and C. Clifton, “Using Unknowns to Prevent Discovery of Association Rules,” SIGMOD Record, vol.30, no. 4, pp. 45-54, 2001. [8]S. R. M. Oliveira and O. R. Zane, “A Framework for Enforcing Privacy in Mining Frequent Patterns,” Technical Report, TR02-13, Computer Science Department, University of Alberta, Canada, June 2000. [9]S. R. M. Oliveira and O. R. Zaane, “Protecting Sensitive Knowledge By Data Sanitization,” In Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM''03), pp. 613-616, Melbourne, Florida, USA, November 2003.
|