{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:22:25Z","timestamp":1743070945136,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642221903"},{"type":"electronic","value":"9783642221910"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22191-0_47","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T00:22:53Z","timestamp":1309220573000},"page":"542-555","source":"Crossref","is-referenced-by-count":0,"title":["Revisiting Protocol for Privacy Preserving Sharing Distributed Data: A Review with Recent Results"],"prefix":"10.1007","author":[{"given":"Ahmed","family":"HajYasien","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"47_CR1","unstructured":"Edgar, D.: Data sanitization techniques. White Papers (2004)"},{"key":"47_CR2","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-540-24775-3_10","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"S.R.M. Oliveira","year":"2004","unstructured":"Oliveira, S.R.M., Za\u00efane, O.R., Sayg\u0131n, Y.: Secure association rule sharing. In: Dai, H., Srikant, R., Zhang, C. (eds.) PAKDD 2004. LNCS (LNAI), vol.\u00a03056, pp. 74\u201385. Springer, Heidelberg (2004)"},{"key":"47_CR3","doi-asserted-by":"crossref","unstructured":"Dasseni, E., Verykios, V.S., Elmagarmid, A.K., Bertino, E.: Hiding association rules by using confidence and support. In: Proc. of the 4th Information Hiding Workshop, Pittsburg, USA, pp. 369\u2013383 (April 2001)","DOI":"10.1007\/3-540-45496-9_27"},{"key":"47_CR4","unstructured":"Oliveira, S.R.M., Zaiane, O.R.: Privacy preserving frequent itemset mining. In: Proc. of the IEEE ICDM Workshop on Privacy, Security, and Data Mining, Maebashi City, Japan, pp. 43\u201354 (December 2002)"},{"key":"47_CR5","doi-asserted-by":"crossref","unstructured":"Oliveira, S.R.M., Zaiane, O.R.: Algorithms for balancing privacy and knowledge discov- ery in association rule mining. In: Proc. of the 7th In- ternational Database Engineering and Applications Symposium (IDEAS 2003), Hong Kong, pp. 54\u201363. China (July 2003)","DOI":"10.1109\/IDEAS.2003.1214911"},{"key":"47_CR6","doi-asserted-by":"crossref","unstructured":"Oliveira, S.R.M., Zaiane, O.R.: Protecting sensitive knowledge by data sanitization. In: Proc. of the 3rd IEEE International Conference on Data Mining (ICDM 2003), Melbourne Florida, USA, pp. 613\u2013616 (November 2003)","DOI":"10.1109\/ICDM.2003.1250990"},{"issue":"4","key":"47_CR7","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/604264.604271","volume":"30","author":"Y. Saygin","year":"2001","unstructured":"Saygin, Y., Verykios, V.S., Clifton, C.: Using unknowns to prevent discovery of association rules. SIGMOD Record\u00a030(4), 45\u201354 (2001)","journal-title":"SIGMOD Record"},{"key":"47_CR8","unstructured":"Kantarcioglu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. In: The ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery DMKD 2002 (June 2002)"},{"key":"47_CR9","unstructured":"The Guardian (May 18, 2009), http:\/\/www.guardian.co.uk\/business\/2009\/may\/18\/digital-content-expansion (retrieved on April 23, 2010)"},{"key":"47_CR10","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1145\/375551.375602","volume-title":"Proc. of the 20th ACM SIGMOD-SIGACT- SIGART Symposium on Principles of Database Systems","author":"D. Agrawal","year":"2001","unstructured":"Agrawal, D., Aggarwal, R.: On the design and quantification of privacy preserving data mining algorithms. In: Proc. of the 20th ACM SIGMOD-SIGACT- SIGART Symposium on Principles of Database Systems, pp. 247\u2013255. ACM Press, New York (2001)"},{"key":"47_CR11","first-page":"439","volume-title":"Proc. of the ACM SIGMOD Conference on Management of Data","author":"R. Agrawal","year":"2000","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proc. of the ACM SIGMOD Conference on Management of Data, pp. 439\u2013450. ACM Press, New York (2000)"},{"key":"47_CR12","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1145\/956750.956810","volume-title":"Proc. of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"W.L. Du","year":"2003","unstructured":"Du, W.L., Zhan, Z.J.: Using randomized response techniques for privacy-preserving data mining. In: Proc. of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 505\u2013510. ACM Press, New York (2003)"},{"key":"47_CR13","first-page":"211","volume-title":"Proc. of the 22nd ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems","author":"A. Evfimievski","year":"2003","unstructured":"Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: Proc. of the 22nd ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, pp. 211\u2013222. ACM Press, San Diego (2003)"},{"key":"47_CR14","first-page":"217","volume-title":"Proc. of 8th ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining (KDD)","author":"A. Evfimievski","year":"2002","unstructured":"Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. In: Proc. of 8th ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining (KDD), pp. 217\u2013228. ACM Press, New York (2002)"},{"key":"47_CR15","doi-asserted-by":"crossref","unstructured":"Rizvi, S.J., Haritsa, J.R.: Maintaining data privacy in association rule mining. In: Proc. of 28th VLDB Conference (2002)","DOI":"10.1016\/B978-155860869-6\/50066-4"},{"key":"47_CR16","unstructured":"Kargupta, H., Datta, S., Wang, A., Sivakumar, K.: On the privacy preserving properties of ran- dom data perturbation techniques. In: Proc. of the Third IEEE International Conference on Data Mining, ICDM 2003 (2003)"},{"key":"47_CR17","doi-asserted-by":"crossref","unstructured":"Pinkas, B.: Cryptographic techniques for privacy- preserving data mining. In: Proc. of the ACM SIGKDD Explorations, vol.\u00a04, pp. 12\u201319 (2003)","DOI":"10.1145\/772862.772865"},{"key":"47_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/978-3-540-24632-9_31","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"A. Ambainis","year":"2004","unstructured":"Ambainis, A., Jakobsson, M., Lipmaa, H.: Cryptographic randomized response techniques. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 425\u2013438. Springer, Heidelberg (2004)"},{"key":"47_CR19","volume-title":"Proc. of ACM SIGMOD","author":"R. Agrawal","year":"2003","unstructured":"Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: Proc. of ACM SIGMOD. ACM Press, San Diego (2003)"},{"key":"47_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-44598-6_3","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"Y. Lindell","year":"2000","unstructured":"Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 36\u201354. Springer, Heidelberg (2000)"},{"key":"47_CR21","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1145\/956750.956776","volume-title":"Proc. of the ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"J. Vaidya","year":"2003","unstructured":"Vaidya, J., Clifton, C.: Privacy-preserving k-means clustering over vertically partitioned data. In: Proc. of the ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 206\u2013215. ACM Press, Washington, D.C (2003)"},{"key":"47_CR22","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Privacy preserving nave bayes classifier for vertically partitioned data. In: Proc. of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2003)","DOI":"10.1145\/956750.956776"},{"key":"47_CR23","doi-asserted-by":"crossref","unstructured":"Estivill-Castro, V., HajYasien, A.: Fast Private Association Rule Mining by a Protocol for Securely Sharing Distributed Data. In: Proc. IEEE International Conference on Intelligence and Security Informatics, ISI 2007, New Brunswick, New Jersey, USA, May 23-24, pp. 324\u2013330 (2007)","DOI":"10.1109\/ISI.2007.379492"},{"key":"47_CR24","unstructured":"Goldreich, O.: Secure multi-party computation. Working Draft (1998)"},{"key":"47_CR25","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"J. Menezes","year":"1996","unstructured":"Menezes, J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"47_CR26","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography. John Wiley and Sons, Chichester (1996)"},{"key":"47_CR27","doi-asserted-by":"crossref","unstructured":"Rivest, R.L., Shamir, A., Adelman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Technical Report MIT\/LCS\/TM-82 (1977)","DOI":"10.21236\/ADA606588"},{"key":"47_CR28","unstructured":"Wiener, M.: Performance comparisons of public-key cryptosystems. In: Proc. of the RSA Data Security Conference, San Francisco, USA (January 1998)"},{"key":"47_CR29","unstructured":"RSA Laboratories Web Site, http:\/\/www.devx.com\/security\/link\/8206"},{"key":"47_CR30","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Imielinski, T., Swami, A.: Mining association rules between sets of items in large databases. In: Proc. of the ACM SIGMOD Conference on Management of Data, Washington D.C., USA, pp. 207\u2013216 (May 1993)","DOI":"10.1145\/170035.170072"},{"key":"47_CR31","unstructured":"OpenSSL, http:\/\/www.openssl.org\/"},{"key":"47_CR32","doi-asserted-by":"crossref","unstructured":"Apostolopoulos, G., Peris, V., Saha, D.: Transport layer security: How much does it really cost? In: INFOCOM: The Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, pp. 717\u2013725 (1999)","DOI":"10.1109\/INFCOM.1999.751458"},{"key":"47_CR33","volume-title":"Computer Networks","author":"S. Tanenbaum","year":"1996","unstructured":"Tanenbaum, S.: Computer Networks, 3rd edn. Prentice-Hall, Englewood Cliffs (1996)","edition":"3"},{"issue":"6","key":"47_CR34","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1109\/69.553158","volume":"8","author":"W.L. Cheung","year":"1996","unstructured":"Cheung, W.L., Ng, V., Fu, W.C., Fu, Y.: Efficient mining of association rules of distributed databases. IEEE Transactions Knowledge Data Engineering\u00a08(6), 911\u2013922 (1996)","journal-title":"IEEE Transactions Knowledge Data Engineering"},{"key":"47_CR35","unstructured":"Hann, I.H., Hui, K.L., Lee, T.S., Png, I.P.L.: Online information privacy: Measuring the cost- benefit trade-off. In: Proc. of the Twenty-Third Inter- national Conference on Information Systems(ICIS), Barcelona, Spain (December 2002)"},{"issue":"3","key":"47_CR36","first-page":"26","volume":"4","author":"A. Westin","year":"1999","unstructured":"Westin, A.: Freebies and privacy: What net users think? Technical report. Opinion Research Corporation\u00a04(3), 26 (1999)","journal-title":"Opinion Research Corporation"}],"container-title":["Communications in Computer and Information Science","Software Engineering and Computer Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22191-0_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T19:24:29Z","timestamp":1741289069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22191-0_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642221903","9783642221910"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22191-0_47","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}