Skip to main content

Data Security, Privacy and Data Mining

  • Chapter
Book cover Data Mining

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agarwal, R., and Srikant, R. 2000. Privacy-preserving data mining. In Proceedings. of the ACM SIGMOD Conference on Management of Data, ACM Press, 439–450

    Google Scholar 

  2. Claerhout, B., and DeMoor, G.J.E. 2005. Privacy protection for clinical and genomic data: The use of privacy-enhancing techniques in medicine. International Journal of Medical Informatics, 74(2–4): 257–265

    Article  Google Scholar 

  3. Clifton, C. 2000. Using sample size to limit exposure to data mining. Journal of Computer Security 8(4): 281–307

    Google Scholar 

  4. Clifton, C., and Marks, D. 1996. Security and privacy implications of data mining. In Workshop on Data Mining and Knowledge Discovery, 15–19, Montreal, Canada

    Google Scholar 

  5. Clifton, C., and Thuraisingham, B. 2001. Emerging standards for data mining. Computer Standards & Interfaces, 23(3): 187–193

    Article  Google Scholar 

  6. Da Silva, J.C., Giannella, C., Bhargava, R., Kargupta, H., and Klusch, M. 2005. Distributed data mining and agents, Engineering Applications of Artificial Intelligence, 18(7): 791–807

    Article  Google Scholar 

  7. Du, W., and Zhan, Z. 2002. Building decision tree classifier on private data. In Clifton, C., Estivill-Castro, V. (Eds.), IEEE ICDM Workshop on Privacy, Security and Data Mining, Conferences in Research and Practice in Information Technology, 14, 1–8, Maebashi City, Japan, ACS

    Google Scholar 

  8. Evfimievski, A., Srikant, R., Agrawal, R., and Gehrke, J. 2004. Privacy preserving mining of association rules, Information Systems, 29(4): 343–364

    Article  Google Scholar 

  9. Johnsten, T., and Raghavan, V.V. 2002. A methodology for hiding knowledge in databases. In Clifton, C., Estivill-Castro, C. (Eds.), IEEE ICDM Workshop on Privacy, Security and Data Mining, Conferences in Research and Practice in Information Technology, 14, 9–17, Maebashi City, Japan, ACS

    Google Scholar 

  10. Kargupta, H., Kun, L., Datta, S., Ryan, J., and Sivakumar, K. 2003. Homeland security and privacy sensitive data mining from multi-party distributed resources, Proceedings 12th IEEE International Conference on Fuzzy Systems, FUZZ ’03, 2: 1257–1260

    Google Scholar 

  11. Lindell, Y., and Pinkas, B. 2000. Privacy preserving data mining. In Lecture Notes in Computer Science, 1880: 36–54

    Google Scholar 

  12. Merugu, S., and Ghosh, J. 2005. A privacy-sensitive approach to distributed clustering, Pattern Recognition Letters, 26(4): 399–410

    Google Scholar 

  13. Park, B., and Kargupta, H. 2003. Distributed data mining: algorithms, systems, and applications. In Ye, N. (Ed.), The Handbook of Data Mining, Lawrence Erlbaum Associates, 341–358

    Google Scholar 

  14. Pedrycz, W. 2005. Knowledge-Based Clustering: From Data to Information Granules, John Wiley, Hoboken, NJ

    Google Scholar 

  15. Pedrycz, W. 2002. Collaborative fuzzy clustering, Pattern Recognition Letters, 23(14): 1675–1686

    Google Scholar 

  16. Pinkas, B. 2002. Cryptographic techniques for privacy-preserving data mining. ACM SIGKDD Explorations Newsletter, 4(2): 12–19

    Google Scholar 

  17. Strehl, A., and Ghosh, J. 2002. Cluster ensembles—a knowledge reuse framework for combining multiple partitions. Journal of Machine Learning Research, 3: 583–617

    Google Scholar 

  18. Tsoumakas, G., Angelis, L., and Vlahavas, I. 2004. Clustering classifiers for knowledge discovery from physically distributed databases, Data & Knowledge Engineering, 49(3): 223–242

    Google Scholar 

  19. Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., and Theodoridis, Y. 2004. State-of-the-art in privacy preserving data mining. SIGMOD Record, 33(1): 50–57

    Google Scholar 

  20. Wang, S.L., and Jafari, A. 2005. Using unknowns for hiding sensitive predictive association rules. Proceedings 2005 IEEE International Conference on Information Reuse and Integration, 223–228

    Google Scholar 

  21. Wang, E.T., Lee, G., and Lin, Y.T. 2005. A novel method for protecting sensitive knowledge in association rules mining, Proceedings of the 29th Annual International Computer Software and Applications Conference (COMPSAC 2005), 2: 511–516

    Google Scholar 

  22. Wang, K., Yu, P.S., and Chakraborty, S. 2004. Bottom-up generalization: a data mining solution to privacy protection, Proceedings of the 4th IEEE International Conference on Data Mining, ICDM 2004, 249–256

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Cios, K.J., Swiniarski, R.W., Pedrycz, W., Kurgan, L.A. (2007). Data Security, Privacy and Data Mining. In: Data Mining. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-36795-8_16

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-36795-8_16

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-33333-5

  • Online ISBN: 978-0-387-36795-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics