[1] Han Jiawei, Kamber M. 数据挖掘概念与技术[M]. 范 明, 孟小峰, 译. 北京: 机械工业出版社, 2007. [2] Du Wenliang, Zhan Zhijun. Using Randomized Response Techniques for Privacy-preserving Data Mining[C]//Proc. of the 9th ACM SIGKDD International Conference on Knowledge Discovery in Databases and Data Mining. Washington D. C., USA: [s. n.], 2003. [3] Clifton C, Kantarcioglou M, Lin Xiaodong. Tools for Privacy Preserving Distributed Data Mining[J]. ACM SIGKDD Explorations, 2002, 4(2): 28-34. [4] Saygin Y, Verykios V S. Privacy Preserving Association Rule Mining[C]//Proc. of the 12th International Workshop on Research Issues in Data Engineering. [S. l.]: IEEE Computer Society Press, 2002: 151-158. [5] 张 瑞, 郑 诚, 陈娟娟. 关联规则挖掘中的隐私保护研究[J]. 计算机技术与发展, 2008, 18(10): 13-15. [6] Chiew K, Qin Shaowen. Analysis of Privacy-preserving Mechanisms for Outsourcing Data Mining Tasks[C]//Proc. of International Conference on Wireless Communications, Networking and Mobile Computing. [S. l.]: IEEE Press, 2008: 1-5. [7] 刘 松. 基于隐私保护的企业间资源共享挖掘研究[J]. 现代情报, 2007, 27(7): 190-192. [8] Srikant R, Agrawal R. Mining Quantitative Association Rules in Large Relational Tables[C]//Proc. of ACM SIGMOD International Conference on Management Data. Montreal, Canada: [s. n.], 1996: 1-12. [9] Wong W K, Cheung D W, Hung E, et al. Security in Outsourcing of Association Rule Mining[C]//Proc. of the 33rd International Conference on Very Large Data Bases. [S. l.]: ACM Press, 2007. [10] Giannotti F, Lakshmanan L V S, Monreale A, et al. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases[C]//Proc. of Workshop on Secuity and Privacy in Cloud Computing. Brussels, Belgium: [s. n.], 2010. [11] Tai C H, Yu P S, Chen M S. k-Support Anonymity Based on Pseudo Taxonomy for Outsourcing of Frequent Itemset Mining[C]//Proc. of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. [S. l.]: ACM Press, 2010. [12] Qiu Ling, Li Yingjiu, Wu Xintao. An Approach to Outsourcing Data Mining Tasks While Protecting Business Intelligence and Customer Privacy[C]//Proc. of the 6th IEEE International Conference on Data Mining. Hong Kong, China: [s. n.], 2006: 551-558. [13] Bloom B. Space/Time Trade-offs in Hash Coding with Allowable Errors[J]. Communications of the ACM, 1970, 13(7): 422-426. [14] Broder A, Mitzenmacher M. Network Applications of Bloom Filters: A Survey[J]. Internet Mathematics, 2003, 1(4): 485-509. [15] 谢 鲲. 布鲁姆过滤器查询算法及其应用研究[D]. 长沙: 湖南大学, 2009. [16] Agrawal R, Srikant R. Fast Algorithms for Mining Association Rules in Large Databases[C]//Proc. of the 20th International Conference on Very Large Databases. San Francisco, USA: Morgan Kaufmann Publishers Inc., 1994: 487-499.
|