Privacy-Preserving Data-Mining
AKTUELLES SCHLAGWORT PRIVACY-PRESERVING DATA-MINING
First Online:
Preview
Unable to display preview. Download preview PDF.
References
- 1.Atzori M, Bonchi F, Giannotti F, Pedreschi D (2008) Anonymity preserving pattern discovery. VLDB J 17(4):703–727Google Scholar
- 2.Lemmen B (2009) Subgruppensuche auf verteilten und datenschutzsensiblen Daten. Diplomarbeit, Universität BonnGoogle Scholar
- 3.Pinkas B (2003) Cryptographic Techniques for Privacy-Preserving Data Mining. SIGKDD ExplorationsGoogle Scholar
- 4.Samarati P (2001) Protecting Respondents’ Identities in Microdata Release. IEEE Transact Knowl Data Eng 13(6):1010–1027Google Scholar
- 5.Schmidt J, Hapfelmeier A, Mueller M, Perneczky R, Kurz A, Drzezga A, Kramer S (2009) Interpreting PET scans by structured patient data: a data mining case study in dementia research. ICDM 2008:213–222Google Scholar
- 6.Wrobel S (1997) An algorithm for multi-relational discovery of subgroups. Proceedings of the First European Symposion on Principles of Data Mining and Knowledge DiscoveryGoogle Scholar
- 7.Yao AC (1982) Protocols for secure computations. Proceedings of the 23rd Annual Symposium on Foundations of Computer ScienceGoogle Scholar
Copyright information
© Springer-Verlag 2010