Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Agrawal R, Srikant R. Privacy-preserving data mining. In: Proceedings of the ACM SIGMOD International Conference on Management of Data; 2000. p. 439–50.
Atallah MJ, Elmongui HG, Deshpande V, Schwarz LB. Secure supply-chain protocols. In: Proceedings of the IEEE International Conference on E-commerce; 2003. p. 293–302.
Kaski S. Dimensionality reduction by random mapping. In: Proceedings of the International Joint Conference on Neural Networks; 1999. p. 413–8.
Lindell Y, Pinkas B. Privacy preserving data mining. In: Advances in cryptology -- CRYPTO 2000. Heidelberg: Springer; 2000. p. 36–54.
Oliveira SRM, Zaïane OR. Privacy preserving clustering by data transformation. In: Proceedings of the 18th Brazilian Symposium on Databases; 2003.
Vaidya J, Clifton C. Privacy-preserving outlier detection. In: Proceedings of the 4th IEEE International Conference on Data Mining; 2004. p. 233–40.
Vaidya J, Clifton C, Zhu M. Privacy preserving data mining. Berlin: Springer; 2006.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer Science+Business Media, LLC, part of Springer Nature
About this entry
Cite this entry
Clifton, C. (2018). Privacy-Preserving Data Mining. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_270
Download citation
DOI: https://doi.org/10.1007/978-1-4614-8265-9_270
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-8266-6
Online ISBN: 978-1-4614-8265-9
eBook Packages: Computer ScienceReference Module Computer Science and Engineering