Legal and Technical Issues of Privacy Preservation in Data Mining
暂无分享,去创建一个
[1] S. Fienberg. Privacy and Confidentiality in an e-Commerce World: Data Mining, Data Warehousing, Matching and Disclosure Limitation , 2006, math/0609288.
[2] Ljiljana Brankovic,et al. Data Swapping: Balancing Privacy against Precision in Mining for Logic Rules , 1999, DaWaK.
[3] Pamela Samuelson,et al. Liability for defective electronic information , 1993, CACM.
[4] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[5] Jayant R. Haritsa,et al. On Addressing Efficiency Concerns in Privacy Preserving Data Mining , 2003, ArXiv.
[6] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[7] F RoddickJohn,et al. Exploratory medical knowledge discovery , 2003 .
[8] Willi Klösgen,et al. KDD: Public and Private Concerns , 1995, IEEE Expert.
[9] Alexandre V. Evfimievski,et al. Privacy preserving mining of association rules , 2002, Inf. Syst..
[10] Felix FX Lindner. Software security is software reliability , 2006, Commun. ACM.
[11] Kenneth C. Laudon,et al. Markets and privacy , 1993, CACM.
[12] Yasmin H. Said,et al. Data Mining in Electronic Commerce , 2006 .
[13] Chris Clifton,et al. When do data mining results violate privacy? , 2004, KDD.
[14] John F. Roddick,et al. Detecting Privacy and Ethical Sensitivity in Data Mining Results , 2004, ACSC.
[15] Benny Pinkas,et al. Cryptographic techniques for privacy-preserving data mining , 2002, SKDD.
[16] Brian Subirana,et al. Legal programming , 2004, CACM.
[17] Jayant R. Haritsa,et al. On Addressing Efficiency Concerns in Privacy-Preserving Mining , 2003, DASFAA.
[18] Mathias Klang,et al. Spyware – the ethics of covert software , 2004, Ethics and Information Technology.
[19] Michael J. A. Berry,et al. Data mining techniques - for marketing, sales, and customer support , 1997, Wiley computer publishing.
[20] Roger Clarke,et al. Person location and person tracking - Technologies, risks and policy implications , 2001, Inf. Technol. People.
[21] Jayant R. Haritsa,et al. A Framework for High-Accuracy Privacy-Preserving Mining , 2005, ICDE.
[22] Josep Domingo-Ferrer,et al. Privacy in Data Mining , 2005, Data Mining and Knowledge Discovery.
[23] Chris Clifton,et al. Protecting Against Data Mining through Samples , 1999, DBSec.
[24] H JohnGeorge. Behind-the-scenes data mining , 1999 .
[25] Herman T. Tavani,et al. Genomic Research and Data-Mining Technology: Implications for Personal Privacy and Informed Consent , 2004, Ethics and Information Technology.
[26] Mirka Miller,et al. Relative Compromise of Statistical Databases , 1990, Aust. Comput. J..
[27] Gregory Piatetsky-Shapiro,et al. Knowledge Discovery in Personal Data vs. Privacy: A mini-symposium , 1995, IEEE Expert.
[28] John G. Gammack,et al. Ethical Responsibility and the Management of Knowledge , 1999, Aust. Comput. J..
[29] Norman Mooradian,et al. A Gift of Fire: Social, Legal, and Ethical Issues in Computing , 1998 .
[30] Alex Alves Freitas,et al. Understanding the crucial differences between classification and discovery of association rules: a position paper , 2000, SKDD.
[31] John F. Roddick,et al. Exploratory medical knowledge discovery: experiences and issues , 2003, SKDD.
[32] Chris Clifton,et al. SECURITY AND PRIVACY IMPLICATIONS OF DATA MINING , 1996 .
[33] George H. John. Behind-the-scenes data mining: a report on the KDD-98 panel , 1999, SKDD.