期刊文献+

基于隐私保持的分布式数据挖掘技术研究 被引量:2

Study of Distributed Data Mining Based on Privacy-preserving
在线阅读 下载PDF
导出
摘要 分析了基于隐私保持的分布式数据挖掘的特点,对现有的保持隐私的分布式数据挖掘技术进行了分类和总结,最后详细讨论了评价指标。 This paper researches the features of the privacy-preserving distributed data mining,summaries the classification of the privacy-preserving distributed data mining techniques,discusses the evaluations in detail.
作者 崔春英 乔蕊
出处 《电脑编程技巧与维护》 2012年第16期52-53,共2页 Computer Programming Skills & Maintenance
基金 周口师范学院青年科研基金(ZKNUQN201033A)
关键词 隐私保持 分布式 数据挖掘 privacy-preserving distributed data data mining
  • 相关文献

参考文献6

  • 1R. Agrawal and R. Srikant. Privacy-preserving data mining [C]. In Proceedings of the 2000 ACM SIGMOD Conference on Management of Data, pages 439-450, Dallas, TX, May 14-19 2000. ACM.
  • 2马进,李锋,李建华.分布式数据挖掘中基于扰乱的隐私保护方法[J].浙江大学学报(工学版),2010,44(2):276-282. 被引量:10
  • 3Lindell. Y, Pinkas.B.Privacy preserving data mining [A] . In: Advances in Cryptology-CRYPTO 2000, Proceedings of the 20th Annual International Cryptology Conference, LNCS1880 [C] .2000: 36-54.
  • 4Du W, et al. A Practical Approach to Solve Secure Multi-Party Computation Problems [M] . New Security Paradigms Work- shop 2002. Virginia Beach, Virginia, USA, 2002. 9: 127-135.
  • 5黄毅群,卢正鼎,胡和平,李瑞轩.分布式异常检测中隐私保持问题研究[J].电子学报,2006,34(5):796-799. 被引量:8
  • 6Vaidya J, et al. Privacy-Preserving Outlier Detection [M] The Fourth IEEE International Conference on Data Mining Brighton, UK, 2004. 9: 1-4.

二级参考文献24

  • 1CRANOR L F. Web privacy with P3P [M]. Sebastopol: O'Reilly, 2002:3 - 11.
  • 2O'HERRIN J K, FOST N, KUDSK K A. Health insurance portability accountability act (HIPAA) regulations: effect on medical record research [J]. Annals of Surgery, 2004, 239(6): 772.
  • 3CAN/CSA-Q830-96. Privacy code[S]. Canada: [s.n.] , 1997.
  • 4AGRAWAL R, SRIKANT R. Privacy-preserving data mining [J]. ACM Sigmod Record, 2000, 29(2): 439-450.
  • 5EVFIMIEVSKI A, SRIKANT R, AGRAWAL R, et al. Privacy preserving mining of association rules [J]. Information Systems, 2002, 29(4) :343 - 364.
  • 6FIENBERG S. E, MCINTYRE J. Data swapping: variations on a theme by Dalenius and Reiss [J3. Privacy in Statistical Databases, 2004, 3050: 14 - 29.
  • 7SWEENEY L. Achieving k-anonymity privacy protection using generalization and suppression[J]. International Journal on Uncertainty, Fuzziness and Knowledgebased Systems, 2002, 10(5) : 571 - 588.
  • 8CHAWLA S, DWORK C, MCSHERRY F, et al. Toward privacy in public databases [C]//The 2rid Theory of Cryptography Conference. Cambridge: Springer, 2005 :363 - 385.
  • 9YAO A C C. How to generate and exchange secrets [C]// Proceedings of the 27th Annual Symposium on Foundations of Computer Science. Toronto: IEEE, 1986: 162 - 167.
  • 10BEAVER D, Foundations of secure interactive computing [C]// Advances in Cryptology. Santa Barbara: Springer, 1991:377 - 391.

共引文献16

同被引文献4

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部