An approach for prevention of privacy breach and information leakage in sensitive data mining
- 1 July 2015
- journal article
- Published by Elsevier BV in Computers and Electrical Engineering
- Vol. 45, 134-140
- https://doi.org/10.1016/j.compeleceng.2015.01.016
Abstract
No abstract availableKeywords
This publication has 20 references indexed in Scilit:
- Privacy Preserving Data Sharing With Anonymous ID AssignmentIEEE Transactions on Information Forensics and Security, 2012
- A new model for privacy preserving sensitive Data MiningPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- A hybrid data anonymization integrated with suppression for preserving privacy in mining multi party dataPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Modeling and Integrating Background Knowledge in Data AnonymizationInternational Conference on Data Engineering, 2009
- Personalized privacy preservationPublished by Association for Computing Machinery (ACM) ,2006
- A Framework for Evaluating Privacy Preserving Data Mining Algorithms*Data Mining and Knowledge Discovery, 2005
- On the privacy preserving properties of random data perturbation techniquesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- State-of-the-art in privacy preserving data miningACM SIGMOD Record, 2004
- Privacy-Preserving Datamining on Vertically Partitioned DatabasesLecture Notes in Computer Science, 2004
- Cryptographic techniques for privacy-preserving data miningACM SIGKDD Explorations Newsletter, 2002