
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
Zhiqiang Yang, Rebecca N. Wright, "PrivacyPreserving Computation of Bayesian Networks on Vertically Partitioned Data," IEEE Transactions on Knowledge and Data Engineering, vol. 18, no. 9, pp. 12531264, September, 2006.  
BibTex  x  
@article{ 10.1109/TKDE.2006.147, author = {Zhiqiang Yang and Rebecca N. Wright}, title = {PrivacyPreserving Computation of Bayesian Networks on Vertically Partitioned Data}, journal ={IEEE Transactions on Knowledge and Data Engineering}, volume = {18}, number = {9}, issn = {10414347}, year = {2006}, pages = {12531264}, doi = {http://doi.ieeecomputersociety.org/10.1109/TKDE.2006.147}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  JOUR JO  IEEE Transactions on Knowledge and Data Engineering TI  PrivacyPreserving Computation of Bayesian Networks on Vertically Partitioned Data IS  9 SN  10414347 SP1253 EP1264 EPD  12531264 A1  Zhiqiang Yang, A1  Rebecca N. Wright, PY  2006 KW  Data privacy KW  Bayesian networks KW  privacypreserving data mining. VL  18 JA  IEEE Transactions on Knowledge and Data Engineering ER   
[1] D. Agrawal and C. Aggarwal, “On the Design and Quantification of Privacy Preserving Data Mining Algorithms,” Proc. 20th ACM SIGMODSIGACTSIGART Symp. Principles of Database Systems, pp. 247255, 2001.
[2] R. Agrawal, A. Evfimievski, and R. Srikant, “Information Sharing across Private Databases,” Proc. 2003 ACM SIGMOD Int'l Conf. Management of Data, pp. 8697, 2003.
[3] R. Agrawal and R. Srikant, “PrivacyPreserving Data Mining,” Proc. 2000 ACM SIGMOD Int'l Conf. Management of Data, pp. 439450, May 2000.
[4] M. Atallah and W. Du, “Secure MultiParty Computational Geometry,” Proc. Seventh Int'l Workshop Algorithms and Data Structures, pp. 165179, 2001.
[5] R. Canetti, “Security and Composition of Multiparty Cryptographic Protocols,” J. Cryptology, vol. 13, no. 1, pp. 143202, 2000.
[6] R. Canetti, Y. Ishai, R. Kumar, M. Reiter, R. Rubinfeld, and R.N. Wright, “Selective Private Function Evaluation with Applications to Private Statistics,” Proc. 20th Ann. ACM Symp. Principles of Distributed Computing, pp. 293304, 2001.
[7] J. Canny, “Collaborative Filtering with Privacy,” Proc. 2002 IEEE Symp. Security and Privacy, pp. 4557, 2002.
[8] R. Chen, K. Sivakumar, and H. Kargupta, “Learning Bayesian Network Structure from Distributed Data,” Proc. SIAM Int'l Data Mining Conf., pp. 284288, 2003.
[9] R. Chen, K. Sivakumar, and H. Kargupta, “Collective Mining of Bayesian Networks from Distributed Heterogeneous Data,” Knowledge Information Syststems, vol. 6, no. 2, pp. 164187, 2004.
[10] D.M. Chickering, “Learning Bayesian Networks is NPComplete,” Learning from Data: Artificial Intelligence and Statistics V, pp. 121130, 1996.
[11] G. Cooper and E. Herskovits, “A Bayesian Method for the Induction of Probabilistic Networks from Data,” Machine Learning, vol. 9, no. 4, pp. 309347, 1992.
[12] J. Daemen and V. Rijmen, The Design of Rijndael: AES— The Advanced Encryption Standard. SpringerVerlag, 2002.
[13] V. EstivillCastro and L. Brankovic, “Balancing Privacy against Precision in Mining for Logic Rules,” Proc. First Int'l Data Warehousing and Knowledge Discovery, pp. 389398, 1999.
[14] A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, “Privacy Preserving Mining of Association Rules,“ Proc. Eighth ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, pp. 217228, 2002.
[15] M. Freedman, K. Nissim, and B. Pinkas, “Efficient Private Matching and Set Intersection,” Advances in Cryptology— Proc. EUROCRYPT 2004, pp. 119, SpringerVerlag, 2004.
[16] B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen, “On Private Scalar Product Computation for PrivacyPreserving Data Mining,” Information Security and Cryptology— Proc. ICISC, vol. 3506, pp. 104120, 2004.
[17] O. Goldreich, S. Micali, and A. Wigderson, “How to Play ANY Mental Game,” Proc. 19th Ann. ACM Conf. Theory of Computing, pp. 218229, 1987.
[18] O. Goldreich, Foundations of Cryptography, Volume II: Basic Applications. Cambridge Univ. Press, 2004.
[19] The Health Insurance Portability and Accountability Act of 1996, citeseer.ist.psu.edu/bahl00radar.htmlhttp:/ /www.cms.hhs.govhipaa, 1996.
[20] G. Jagannathan, K. Pillaipakkamnatt, and R.N. Wright, “A New PrivacyPreserving Distributed $k{\hbox{}}{\rm{Clustering}}$ Algorithm,” Proc. Sixth SIAM Int'l Conf. Data Mining, 2006.
[21] G. Jagannathan and R.N. Wright, “PrivacyPreserving Distributed $k{\hbox{}}{\rm{Means}}$ Clustering over Arbitrarily Partitioned Data,” Proc. 11th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, pp. 593599, 2005.
[22] E. Johnson and H. Kargupta, “Collective, Hierarchical Clustering from Distributed, Heterogeneous Data,” Lecture Notes in Computer Science, vol. 1759, pp. 221244, 1999.
[23] M. Kantarcioglu and C. Clifton, “PrivacyPreserving Distributed Mining of Association Rules on Horizontally Partitioned Data,” Proc. ACM SIGMOD Workshop Research Issues on Data Mining and Knowledge Discovery (DMKD '02), pp. 2431, June 2002.
[24] M. Kantarcioglu and J. Vaidya, “Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data,” Proc. IEEE Workshop Privacy Preserving Data Mining, 2003.
[25] M. Kantarcioglu, J. Jin, and C. Clifton, “When Do Data Mining Results Violate Privacy?” Proc. 10th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, pp. 599604, 2004.
[26] O. Kardes, R.S. Ryger, R.N. Wright, and J. Feigenbaum, “Implementing PrivacyPreserving BayesianNet Discovery for Vertically Partitioned Data,” Proc. Int'l Conf. Data Mining Workshop Privacy and Security Aspects of Data Mining, 2005.
[27] H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, “On the Privacy Preserving Properties of Random Data Perturbation Techniques,” Proc. Third IEEE Int'l Conf. Data Mining, pp. 99106, 2003.
[28] H. Kargupta, B. Park, D. Hershberger, and E. Johnson, “Collective Data Mining: A New Perspective towards Distributed Data Mining,” Advances in Distributed and Parallel Knowledge Discovery, AAAI/MIT Press, 2000.
[29] Y. Lindell and B. Pinkas, “Privacy Preserving Data Mining,” J. Cryptology, vol. 15, no. 3, pp. 177206, 2002.
[30] K. Liu, H. Kargupta, and J. Ryan, “Multiplicative Noise, Random Projection, and Privacy Preserving Data Mining from Distributed MultiParty Data,” Technical Report TRCS0324, Computer Science and Electrical Eng. Dept., Univ. of Maryland, Baltimore County, 2003.
[31] D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella, “Fairplay— A Secure TwoParty Computation System,” Proc. 13th Usenix Security Symp., pp. 287302, 2004.
[32] D. Meng, K. Sivakumar, and H. Kargupta, “PrivacySensitive Bayesian Network Parameter Learning,” Proc. Fourth IEEE Int'l Conf. Data Mining, pp. 487490, 2004.
[33] D.E. O'Leary, “Some Privacy Issues in Knowledge Discovery: The OECD Personal Privacy Guidelines,” IEEE Expert, vol. 10, no. 2, pp. 4852, 1995.
[34] P. Paillier, “PublicKey Cryptosystems Based on Composite Degree Residue Classes,” Advances in Cryptography— Proc. EUROCRYPT '99, pp. 223238, 1999.
[35] European Parliament, “Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data,” Official J. European Communities, p. 31 1995.
[36] European Parliament, “Directive 97/66/EC of the European Parliament and of the Council of 15 December 1997 Concerning the Processing of Personal Data and the Protection of Privacy in the Telecommunications Sector,” Official J. European Communities, pp. 18, 1998.
[37] S. Rizvi and J. Haritsa, “Maintaining Data Privacy in Association Rule Mining,” Proc. 28th Very Large Data Bases Conf., pp. 682693, 2002.
[38] S. Stolfo, A. Prodromidis, S. Tselepis, W. Lee, D. Fan, and P. Chan, “JAM: Java Agents for MetaLearning over Distributed Databases,” Knowledge Discovery and Data Mining, pp. 7481, 1997.
[39] H. Subramaniam, R.N. Wright, and Z. Yang, “Experimental Analysis of PrivacyPreserving Statistics Computation,” Proc. Very Large Data Bases Worshop Secure Data Management, pp. 5566, Aug. 2004.
[40] J. Vaidya and C. Clifton, “Privacy Preserving Association Rule Mining in Vertically Partitioned Data,” Proc. Eighth ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, pp. 639644, 2002.
[41] J. Vaidya and C. Clifton, “PrivacyPreserving kMeans Clustering over Vertically Partitioned Data,” Proc. Ninth ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, pp. 206215, 2003.
[42] J. Vaidya and C. Clifton, “Privacy Preserving Naive Bayes Classifier on Vertically Partitioned Data,” Proc. 2004 SIAM Int'l Conf. Data Mining, 2004.
[43] R.N. Wright and Z. Yang, “PrivacyPreserving Bayesian Network Structure Computation on Distributed Heterogeneous Data,” Proc. 10th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, pp. 713718, 2004.
[44] K. Yamanishi, “Distributed Cooperative Bayesian Learning Strategies,” Information and Computation, vol. 150, no. 1, pp. 2256, 1999.
[45] Z. Yang and R.N. Wright, “Improved PrivacyPreserving Bayesian Network Parameter Learning on Vertically Partitioned Data,” Proc. Int'l Conf. Data Eng. Int'l Workshop Privacy Data Management, Apr. 2005.
[46] A. Yao, “How to Generate and Exchange Secrets,” Proc. 27th IEEE Symp. Foundations of Computer Science, pp. 162167, 1986.