Sciweavers

5344 search results - page 5 / 1069
» Privacy-Preserving Set Operations
Sort
View
ISDA
2008
IEEE
14 years 3 months ago
Novel Algorithms for Privacy Preserving Utility Mining
Privacy Preserving Data Mining (PPDM) has become a popular topic in the research community. How to strike a balance between privacy protection and knowledge discovery in the shari...
Jieh-Shan Yeh, Po-Chiang Hsu, Ming-Hsun Wen
CIDM
2007
IEEE
14 years 2 months ago
Privacy Preserving Burst Detection of Distributed Time Series Data Using Linear Transforms
— In this paper, we consider burst detection within the context of privacy. In our scenario, multiple parties want to detect a burst in aggregated time series data, but none of t...
Lisa Singh, Mehmet Sayal
ICDE
2006
IEEE
275views Database» more  ICDE 2006»
14 years 10 months ago
Privacy Preserving Query Processing Using Third Parties
Data integration from multiple autonomous data sources has emerged as an important practical problem. The key requirement for such data integration is that owners of such data nee...
Amr El Abbadi, Aziz Gulbeden, Divyakant Agrawal, F...
KDD
2002
ACM
128views Data Mining» more  KDD 2002»
14 years 9 months ago
Privacy preserving mining of association rules
We present a framework for mining association rules from transactions consisting of categorical items where the data has been randomized to preserve privacy of individual transact...
Alexandre V. Evfimievski, Ramakrishnan Srikant, Ra...
AUSDM
2007
Springer
165views Data Mining» more  AUSDM 2007»
14 years 17 days ago
A New Efficient Privacy-Preserving Scalar Product Protocol
Recently, privacy issues have become important in data analysis, especially when data is horizontally partitioned over several parties. In data mining, the data is typically repre...
Artak Amirbekyan, Vladimir Estivill-Castro