{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:16:08Z","timestamp":1725560168147},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540286608"},{"type":"electronic","value":"9783540318248"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11548706_58","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T10:13:06Z","timestamp":1127815986000},"page":"548-557","source":"Crossref","is-referenced-by-count":2,"title":["Ensuring Data Security Against Knowledge Discovery in Distributed Information Systems"],"prefix":"10.1007","author":[{"given":"Seunghyun","family":"Im","sequence":"first","affiliation":[]},{"given":"Zbigniew W.","family":"Ra\u015b","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"58_CR1","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/3-540-32370-8_9","volume-title":"Monitoring, Security and Rescue Techniques in Multiagent Systems, Advances in Soft Computing","author":"Z.W. Ra\u015b","year":"2005","unstructured":"Ra\u015b, Z.W., Dardzi\u0144ska, A.: Data security and null value imputation in distributed information systems. In: Monitoring, Security and Rescue Techniques in Multiagent Systems, Advances in Soft Computing, pp. 133\u2013146. Springer, Heidelberg (2005)"},{"key":"58_CR2","unstructured":"Dardzi\u0144ska, A., Ra\u015b, Z.W.: Rule-based chase algorithm for partially incomplete information systems. In: Proceedings of the Second International Workshop on Active Mining (AM 2003), Maebashi City, Japan, pp. 42\u201351 (October 2003)"},{"key":"58_CR3","first-page":"31","volume-title":"Proceedings of ICDM\u201903 Workshop on Foundations and New Directions of Data Mining","author":"A. Dardzi\u0144ska","year":"2003","unstructured":"Dardzi\u0144ska, A., Ra\u015b, Z.W.: On rules discovery from incomplete information systems. In: Lin, T.Y., Hu, X., Ohsuga, S., Liau, C. (eds.) Proceedings of ICDM\u201903 Workshop on Foundations and New Directions of Data Mining, Melbourne, Florida, pp. 31\u201335. IEEE Computer Society, Los Alamitos (2003)"},{"key":"58_CR4","first-page":"24","volume-title":"Proceedings of ICDM 2003 Workshop on Foundations and New Directions of Data Mining","author":"A. Dardzi\u0144ska","year":"2003","unstructured":"Dardzi\u0144ska, A., Ra\u015b, Z.W.: Chasing unknown values in incomplete information systems. In: Lin, T.Y., Hu, X., Ohsuga, S., Liau, C. (eds.) Proceedings of ICDM 2003 Workshop on Foundations and New Directions of Data Mining, Melbourne, Florida, pp. 24\u201330. IEEE Computer Society, Los Alamitos (2003)"},{"key":"58_CR5","volume-title":"Ontologies: a silver bullet for knowledge management and electronic commerce","author":"D. Fensel","year":"1998","unstructured":"Fensel, D.: Ontologies: a silver bullet for knowledge management and electronic commerce. Springer, Heidelberg (1998)"},{"key":"58_CR6","volume-title":"Towards Very Large Knowledge Bases: Knowledge Building and Knowledge Sharing","author":"N. Guarino","year":"1995","unstructured":"Guarino, N., Giaretta, P.: Ontologies and knowledge bases, towards a terminological clarification. In: Towards Very Large Knowledge Bases: Knowledge Building and Knowledge Sharing, IOS Press, Amsterdam (1995)"},{"key":"58_CR7","unstructured":"Ra\u015b, Z.W.: Dictionaries in a distributed knowledge-based system. In: Concurrent Engineering: Research and Applications, Conference Proceedings, Pittsburgh, Penn. Concurrent Technologies Corporation, pp. 383\u2013390 (1994)"},{"issue":"1","key":"58_CR8","first-page":"47","volume":"29","author":"Z.W. Ra\u015b","year":"2004","unstructured":"Ra\u015b, Z.W., Dardzi\u0144ska, A.: Ontology based distributed autonomous knowledge systems. Information Systems International Journal\u00a029(1), 47\u201358 (2004)","journal-title":"Information Systems International Journal"},{"key":"58_CR9","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-540-25957-2_11","volume-title":"Flexible Query Answering Systems","author":"Z.W. Ra\u015b","year":"2004","unstructured":"Ra\u015b, Z.W., Dardzi\u0144ska, A.: Query answering based on collaboration and chase. In: Christiansen, H., Hacid, M.-S., Andreasen, T., Larsen, H.L. (eds.) FQAS 2004. LNCS (LNAI), vol.\u00a03055, pp. 125\u2013136. Springer, Heidelberg (2004)"},{"key":"58_CR10","first-page":"162","volume-title":"Proceedings of the 27th IEEE Symposium on Founda- tions of Computer Science","author":"A.C. Yao","year":"1986","unstructured":"Yao, A.C.: How to generate and exchange secrets. In: Proceedings of the 27th IEEE Symposium on Founda- tions of Computer Science, pp. 162\u2013167. IEEE, Los Alamitos (1986)"},{"key":"58_CR11","doi-asserted-by":"crossref","unstructured":"Clifton, C., Kantarcioglou, M., Lin, X.D., Zhu, M.Y.: in Tools for privacy preserving distributed data mining, SIGKDDExplorations, Vol. 4, No. 2 (2002)","DOI":"10.1145\/772862.772867"},{"key":"58_CR12","unstructured":"Kantarcioglou, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. In: Proceedings of the ACM SIGMOD Workshop on Research Isuues in Data Mining and Knowledge Discovery, pp. 24\u201331 (2002)"},{"key":"58_CR13","unstructured":"Du, W.L., Zhan, Z.J.: Building decision tree classifier on private data. In: Proceedings of the IEEE ICDM Workshop on Privacy, Security and Data Mining (2002)"},{"key":"58_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-44598-6_3","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"Y. Lindell","year":"2000","unstructured":"Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 36\u201354. Springer, Heidelberg (2000)"},{"key":"58_CR15","unstructured":"Oliveira, S.R.M., Zaiane, O.R.: Privacy preserving frequent itemset mining. In: Proceedings of the IEEE ICDM Workshop on Privacy, Security and Data Mining, pp. 43\u201354 (2002)"},{"key":"58_CR16","doi-asserted-by":"crossref","unstructured":"Saygin, Y., Verykios, S.V., Elmagarmid, A.K.: Privacy preserving association rule mining. In: Proceedings of the 12th International Workshop on Research Issues in Data Engineering, pp. 151\u2013158 (2002)","DOI":"10.1109\/RIDE.2002.995109"}],"container-title":["Lecture Notes in Computer Science","Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11548706_58.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T02:58:19Z","timestamp":1619492299000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11548706_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540286608","9783540318248"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11548706_58","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}