과제정보
연구 과제 주관 기관 : 한국연구재단
참고문헌
- Agrawal, Rakesh, Ramakrishnan Srikant, "Privacypreserving data mining," ACM Sigmod Record, Vol. 29, No. 2, pp. 439-450, 2000. https://doi.org/10.1145/335191.335438
- Evfimievski A., Srikant R., Agrawal R., Gehrke, J., "Privacy preserving mining of association rules," Proc. of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 217-228, 2002.
- Aggarwal, Charu C, and S. Yu Philip, "A condensation approach to privacy preserving data mining," Advances in Database Technology-EDBT, pp. 183-199, 2004.
- Chen Keke, and Ling Liu, "A random rotation perturbation approach to privacy preserving data classification," Proc. of the IEEE International Conference on Data Mining (ICDM), 2005.
- Oliveira, Stanley RM and Osmar R. Zaiane, "Privacy Preserving Clustering by Data Transformation," SBBD, pp. 304-318, 2003.
- Liu, Kun, Hillol Kargupta, and Jessica Ryan, "Random projection-based multiplicative data perturbation for privacy preserving distributed data mining," IEEE Knowledge and Data Engineering, Vol. 18, No. 1, pp. 92-106, 2006. https://doi.org/10.1109/TKDE.2006.14
- Hyvarinen, Aapo, Juha Karhunen, and Erkki Oja, "Independent Component Analysis," 2001.
- LeFevre, Kristen, David J. DeWitt, and Raghu Ramakrishnan, "Mondrian multidimensional k-anonymity," Proc. of the 22nd IEEE International Conference on Data Engineering (ICDE), pp. 25-25, 2006.
- Pub, NIST FIPS, "197: Advanced encryption standard (AES)," Federal Information Processing Standards Publication 197, pp. 441-0311, Nov. 2001.
- Chen, Keke, and Ling Liu, "Geometric data perturbation for privacy preserving outsourced data mining," Knowledge and information systems, Vol. 29, No. 3, pp. 657-695, 2011. https://doi.org/10.1007/s10115-010-0362-4
- Yiu, M. L., Ghinita, G., Jensen, C. S., Kalnis, P, "Enabling search services on outsourced private spatial data," The VLDB Journal, Vol. 19, No. 3, pp. 363-384, 2010. https://doi.org/10.1007/s00778-009-0169-7
- Hacigumus, H., Iyer, B., Li, C., & Mehrotra, S., "Executing SQL over encrypted data in the database-service-provider model," Proc. of the 2002 ACM SIGMOD International Conference on Management of data, pp. 216-227 2002.
- Hacigumus, Hakan, Bala Iyer, and Sharad Mehrotra, "Providing database as a service," Proc. of the 18th IEEE International Conference on Data Engineering (ICDE), 2002.
- Liew, Chong K., Uinam J. Choi, and Chung J. Liew, "A data distortion by probability distribution," ACM Transactions on Database Systems (TODS), Vol. 10, No. 3 pp. 395-411, 1985. https://doi.org/10.1145/3979.4017
- Lefons, Ezio, Alberto Silvestri, and Filippo Tangorra, "An Analytic Approach to Statistical Databases," Proc. of the 9th Very Large Data Bases International Conference, pp. 260-274, 1983.
- Dalenius, Tore, and Steven P. Reiss, "Data-swapping: A technique for disclosure control," Journal of statistical planning and inference, Vol. 6, No. 1, pp. 73-85, 1982. https://doi.org/10.1016/0378-3758(82)90058-1
- Oliveira, Stanley RM, and Osmar R. Zaiane, "Achieving privacy preservation when sharing data for clustering," Proc. of the International Workshop on Secure Data Management in a Connected World, pp. 67-82, 2004.
- Liu, Kun, Chris Giannella, and Hillol Kargupta, "An attacker's view of distance preserving maps for privacy preserving data mining," European Conference on Principles and Practice of Knowledge Discovery in Databases(PKDD), pp. 297-308, 2006.
- Chen, Keke, Gordon Sun, and Ling Liu, "Towards Attack-Resilient Geometric Data Perturbation," SIAM Data Mining Conference (SDM), pp. 78-89, 2007.
- Guo, Songtao, and Xintao Wu, "Deriving private information from arbitrarily projected data," Proc. of the 11th European Conference on Principles and Practice of Knowledge Discovery and Databases (PKDD07), pp. 84-95, 2007.
- Ku, W. S., Hu, L., Shahabi, C. and Wang, H., "Query integrity assurance of location-based services accessing outsourced spatial databases," Proc. of the 11th International Symposium on Advances in Spatial and Temporal Databases, pp. 80-97, 2009.
- Hsiao H-C, Lin Y-H, Studer A, et al., "A study of user-friendly hash comparison schemes," IEEE Computer Security Applications Conference, pp. 105-144, 2009.
- Yumerefendi, Aydan R., and Jeffrey S. Chase, "Strong accountability for network storage," ACM Transactions on Storage (TOS), Vol. 3, No. 3, 2007.
피인용 문헌
- Privacy Protection in Outsourced Spatial Databases vol.10, pp.03, 2016, https://doi.org/10.1142/S1793351X16400134