{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T02:10:06Z","timestamp":1738289406860,"version":"3.35.0"},"publisher-location":"Boston, MA","reference-count":18,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387096988"},{"type":"electronic","value":"9780387096995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-09699-5_23","type":"book-chapter","created":{"date-parts":[[2008,7,16]],"date-time":"2008-07-16T18:12:54Z","timestamp":1216231974000},"page":"349-363","source":"Crossref","is-referenced-by-count":4,"title":["A Parallelization Framework for Exact Knowledge Hiding in Transactional Databases"],"prefix":"10.1007","author":[{"given":"Aris","family":"Gkoulalas-Divanis","sequence":"first","affiliation":[]},{"given":"Vassilios S.","family":"Verykios","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"1. ILOG CPLEX 9.0 User\u2019s Manual. ILOG Inc., Gentilly, France (2003)"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Shafer, J.C.: Parallel mining of association rules. IEEE Transactions on Knowledge and Data Engineering (TKDE) 8(1), 962\u2013969","DOI":"10.1109\/69.553164"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"3. Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V.S.: Disclosure limitation of sensitive rules. In: Proceedings of the IEEE Knowledge and Data Engineering Exchange Workshop (KDEX), pp. 45\u201352 (1999)","DOI":"10.1109\/KDEX.1999.836532"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"4. Bayardo, R.: Efficiently mining long patterns from databases. Proceedings of the ACM SIGMOD International Conference on Management of Data (1998)","DOI":"10.1145\/276304.276313"},{"key":"23_CR5","unstructured":"5. Clifton, C., Kantarcioglu, M., Vaidya, J.: Defining privacy for data mining. National Science Foundation Workshop on Next Generation Data Mining (WNGDM) pp. 126\u2013133 (2002)"},{"key":"23_CR6","unstructured":"6. Clifton, C., Marks, D.: Security and privacy implications of data mining. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 15\u201319 (1996)"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"7. Gkoulalas-Divanis, A., Verykios, V.S.: An integer programming approach for frequent itemset hiding. In: Proceedings of the ACM Conference on Information and Knowledge Management (CIKM) (2006)","DOI":"10.1145\/1183614.1183721"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"8. Gkoulalas-Divanis, A., Verykios, V.S.: A hybrid approach to frequent itemset hiding. In: Proceedings of the IEEE International Conference on Tools with Artificial Intelligence (ICTAI) (2007)","DOI":"10.1109\/ICTAI.2007.68"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"9. Han, E.H., Karypis, G., Kumar, V.: Scalable parallel data mining for association rules. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 277\u2013288 (2007)","DOI":"10.1145\/253262.253330"},{"issue":"9","key":"23_CR10","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1109\/TKDE.2004.45","volume":"16","author":"M. Kantarcioglu","year":"2004","unstructured":"Kantarcioglu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering (TKDE) 16(9), 1026\u20131037 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering (TKDE)"},{"issue":"1","key":"23_CR11","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1137\/S1064827595287997","volume":"20","author":"G. Karypis","year":"1998","unstructured":"Karypis, G., Kumar, V.: A fast and high quality multilevel scheme for partitioning irregular graphs. SIAM Journal of Scientific Computing 20(1), 359\u2013392 (1998)","journal-title":"SIAM Journal of Scientific Computing"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Kohavi, R., Brodley, C., Frasca, B., Mason, L., Zheng, Z.: KDD-Cup 2000 organizers\u2019 report: Peeling the onion. SIGKDD Explorations 2(2), 86\u201398 (2000)","DOI":"10.1145\/380995.381033"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Menon, S., Sarkar, S., Mukherjee, S.: Maximizing accuracy of shared databases when concealing sensitive patterns. Information Systems Research 16(3), 256\u2013270 (2005)","DOI":"10.1287\/isre.1050.0056"},{"key":"23_CR14","unstructured":"14. Oliveira, S.R.M., Za\u00efane, O.R.: Privacy preserving frequent itemset mining. In: Proceedings of the IEEE International Conference on Privacy, Security and Data Mining (CRPITS), pp. 43\u201354 (2002)"},{"issue":"4","key":"23_CR15","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/604264.604271","volume":"30","author":"Y. Saygin","year":"2001","unstructured":"Saygin, Y., Verykios, V.S., Clifton, C.: Using unknowns to prevent discovery of association rules. ACM SIGMOD Record 30(4), 45\u201354 (2001)","journal-title":"ACM SIGMOD Record"},{"key":"23_CR16","unstructured":"16. Sun, X., Yu, P.S.: A border-based approach for hiding sensitive frequent itemsets. In: Proceedings of the IEEE International Conference on Data Mining (ICDM), pp. 426\u2013433 (2005)"},{"issue":"5","key":"23_CR17","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1109\/69.729707","volume":"10","author":"M. Yokoo","year":"1998","unstructured":"Yokoo, M., Durfee, E.H., Ishida, T., Kuwabara, K.: The distributed constraint satisfaction problem: Formalization and algorithms. IEEE Transactions on Knowledge and Data Engineering 10(5), 673\u2013685 (1998)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"18. Za\u00efane, O.R., M.El-Hajj, Lu, P.: Fast parallel association rule mining without candidacy generation. In: Proceedings of the IEEE International Conference on Data Mining (ICDM), pp. 665\u2013668 (2001)","DOI":"10.1109\/ICDM.2001.989600"}],"container-title":["IFIP \u2013 The International Federation for Information Processing","Proceedings of The Ifip Tc 11 23rd International Information Security Conference"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09699-5_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T01:31:25Z","timestamp":1738287085000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-09699-5_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387096988","9780387096995"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09699-5_23","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[]}}