Advertisement

Informatik-Spektrum

, Volume 33, Issue 4, pp 380–383 | Cite as

Privacy-Preserving Data-Mining

  • Henrik Grosskreutz
  • Benedikt Lemmen
  • Stefan Rüping
AKTUELLES SCHLAGWORT PRIVACY-PRESERVING DATA-MINING

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Atzori M, Bonchi F, Giannotti F, Pedreschi D (2008) Anonymity preserving pattern discovery. VLDB J 17(4):703–727Google Scholar
  2. 2.
    Lemmen B (2009) Subgruppensuche auf verteilten und datenschutzsensiblen Daten. Diplomarbeit, Universität BonnGoogle Scholar
  3. 3.
    Pinkas B (2003) Cryptographic Techniques for Privacy-Preserving Data Mining. SIGKDD ExplorationsGoogle Scholar
  4. 4.
    Samarati P (2001) Protecting Respondents’ Identities in Microdata Release. IEEE Transact Knowl Data Eng 13(6):1010–1027Google Scholar
  5. 5.
    Schmidt J, Hapfelmeier A, Mueller M, Perneczky R, Kurz A, Drzezga A, Kramer S (2009) Interpreting PET scans by structured patient data: a data mining case study in dementia research. ICDM 2008:213–222Google Scholar
  6. 6.
    Wrobel S (1997) An algorithm for multi-relational discovery of subgroups. Proceedings of the First European Symposion on Principles of Data Mining and Knowledge DiscoveryGoogle Scholar
  7. 7.
    Yao AC (1982) Protocols for secure computations. Proceedings of the 23rd Annual Symposium on Foundations of Computer ScienceGoogle Scholar

Copyright information

© Springer-Verlag 2010

Authors and Affiliations

  • Henrik Grosskreutz
    • 1
  • Benedikt Lemmen
    • 1
  • Stefan Rüping
    • 1
  1. 1.Fraunhofer-Institut für Intelligente Analyse- und Informationssysteme IAISSankt AugustinDeutschland

Personalised recommendations