[1] Agrawal R,Srikant R.Privacy-preserving data mining[C]//Proc.of the ACM SIGMOD Conference on Management of Data.Dallas,Texas,2000:439-450. [2] Lindell Y,Pinkas B.Privacy preserving data mining[C]//Proc.of Advances in Cryptology-CRYPTO,Lecture Notes in Computer Science,Springer-Verlag,2000,1880:36-53. [3] Kantarcioglu M,Clifton C.Privacy-preserving distributed mining of association rules on horizontally partitioned data[J].IEEE Trans.on Krartoedge & Data Engineering,2004,16(9):24-31. [4] Vaidya J,Clifton C.Privacy preserving association rule mining in vertically partitioned data[C]//Proc.of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,2002:639-644. [5] Vaidya J,Clifton C.Privacy-preserving k-means clustering over vertically partitioned data[C]//Proc.of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,Washington,DC,USA,2003:206-215. [6] Jha S,Kruger L,McDaniel P.Privacy preserving clustering[C]//Proc.of 10th European Symposium on Research in Computer Security,Milan,Italy,2005:397-417. [7] Inan Ali,Kaya SV,Saygin Y.Privacy preserving clustering on horizontally partitioned data[J].Data & Knowledge Engineering,2007,63(3):646-666. [8] Jagannathan G,Pillaipakkaamnatt K,Wright R.A new privacypreserving distributed k-clustering algorithm[C]//Proc.of SIAM International Conference on Data Mining,2006:492-496. [9] Trottini M,Feinberg SE.Modelling user uncertainty for disclosure risk and data utility[J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10(5):511-527. [10] Goldreich O.Foundations of cryptography:basic applications[M].London:Cambridge University Press,2004. [11] Clifton C,Vaidya J.Tools for privacy preserving distributed data mining[J].SIGKDD Explorations,2003,4(2):28-34. [12] Hettich S,Bay S D.The UCI KDD archive[DB/OL].Irvine,CA:University of California,Department of Information and Computer Science,1999.http://kdd.ics.uci.edu. |