Privacy-preserving data mining: methods, metrics, and applications

R Mendes, JP Vilela - IEEe Access, 2017 - ieeexplore.ieee.org
The collection and analysis of data are continuously growing due to the pervasiveness of
computing devices. The analysis of such information is fostering businesses and …

Electrical properties of the grain boundaries of oxygen ion conductors: acceptor-doped zirconia and ceria

X Guo, R Waser - Progress in Materials Science, 2006 - Elsevier
This article reviews the current understanding of the electrical properties of the grain
boundaries of acceptor-doped zirconia and ceria, however, with an emphasis on the grain …

Differential privacy: A survey of results

C Dwork - International conference on theory and applications of …, 2008 - Springer
Over the past five years a new approach to privacy-preserving data analysis has born fruit
[13, 18, 7, 19, 5, 37, 35, 8, 32]. This approach differs from much (but not all!) of the related …

Privacy-preserving data mining

R Agrawal, R Srikant - Proceedings of the 2000 ACM SIGMOD …, 2000 - dl.acm.org
A fruitful direction for future data mining research will be the development of techniques that
incorporate privacy concerns. Specifically, we address the following question. Since the …

Revealing information while preserving privacy

I Dinur, K Nissim - Proceedings of the twenty-second ACM SIGMOD …, 2003 - dl.acm.org
We examine the tradeoff between privacy and usability of statistical databases. We model a
statistical database by an n-bit string d 1,.., dn, with a query being a subset q⊆[n] to be …

Privacy preserving mining of association rules

A Evfimievski, R Srikant, R Agrawal… - Proceedings of the eighth …, 2002 - dl.acm.org
We present a framework for mining association rules from transactions consisting of
categorical items where the data has been randomized to preserve privacy of individual …

Query optimization in database systems

M Jarke, J Koch - ACM Computing surveys (CsUR), 1984 - dl.acm.org
These methods are presented in the framework of a general query evaluation procedure
using the relational calculus representation of queries. In addition, nonstandard query …

Information sharing across private databases

R Agrawal, A Evfimievski, R Srikant - Proceedings of the 2003 ACM …, 2003 - dl.acm.org
Literature on information integration across databases tacitly assumes that the data in each
database can be revealed to the other databases. However, there is an increasing need for …

Hippocratic databases

R Agrawal, J Kiernan, R Srikant, Y Xu - VLDB'02: Proceedings of the 28th …, 2002 - Elsevier
Publisher Summary The Hippocratic Oath has guided the conduct of physicians for
centuries. Inspired by its tenet of preserving privacy, it has been argued that future database …

Semantic database modeling: Survey, applications, and research issues

R Hull, R King - ACM Computing Surveys (CSUR), 1987 - dl.acm.org
Most common database management systems represent information in a simple record-
based format. Semantic modeling provides richer data structuring capabilities for database …