{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T23:38:22Z","timestamp":1723246702804},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2007,1,30]],"date-time":"2007-01-30T00:00:00Z","timestamp":1170115200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2007,6,18]]},"DOI":"10.1007\/s10489-006-0031-1","type":"journal-article","created":{"date-parts":[[2007,2,2]],"date-time":"2007-02-02T18:03:27Z","timestamp":1170439407000},"page":"67-77","source":"Crossref","is-referenced-by-count":9,"title":["Hiding collaborative recommendation association rules"],"prefix":"10.1007","volume":"27","author":[{"given":"Shyue-Liang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Dipen","family":"Patel","sequence":"additional","affiliation":[]},{"given":"Ayat","family":"Jafari","sequence":"additional","affiliation":[]},{"given":"Tzung-Pei","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,1,30]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal D, Aggarwal CC (2001) On the design and quantification of privacy preserving data mining algorithms. In: Proceedings of the 20th Symposium on Principles of Database Systems, Santa Barbara, California, USA","DOI":"10.1145\/375551.375602"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal R, Imielinski T, Swami A (1993) Mining association rules between sets of items in large databases. In: Proceedings of ACM SIGMOD International Conference on Management of Data, Washington DC","DOI":"10.1145\/170035.170072"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal R, Srikant R (2000) Privacy preserving data mining. In ACM SIGMOD Conference on Management of Data, Dallas, Texas, pp 439\u2013450","DOI":"10.1145\/342009.335438"},{"key":"31_CR4","unstructured":"Atallah E, Bertino E, Elmagarmid A, Ibrahim M, Verykios V (1999) Disclosure limitation of sensitive rules. In: Proceedings of Knowledge and Data Exchange Workshop"},{"key":"31_CR5","unstructured":"Brankovic L, Estivill-Castro V (1999) Privacy issues in knowledge discovery and data mining. Australian Institute of Computer Ethics Conference, Lilydale"},{"key":"31_CR6","unstructured":"Clifton C, Marks D (1996) Security and privacy implications of data mining. In: SIGMOD Workshop on Research Issues on Data Mining and knowledge Discovery"},{"key":"31_CR7","unstructured":"Clifton C (1999) Protecting against data mining through samples. In Proceedings of the Thirteenth Annual IFIP WG 11.3 Working Conference on Database Security"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Clifton C (2000) Using sample size to limit exposure to data mining. J Comput Secur 8(4)","DOI":"10.3233\/JCS-2000-8403"},{"issue":"2","key":"31_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/772862.772867","volume":"4","author":"C Clifton","year":"2002","unstructured":"Clifton C, Kantarcioglu M, Lin X, Zhu MY (2002) Tools for privacy preserving distributed data mining. SIGKDD Explorations 4(2):1\u20137","journal-title":"SIGKDD Explorations"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Dasseni E, Verykios V, Elmagarmid A, Bertino E (2001) Hiding association rules by using confidence and support. In: Proceedings of 4th Information Hiding Workshop, Pittsburgh, PA, pp 369\u2013383","DOI":"10.1007\/3-540-45496-9_27"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Evfimievski A, Srikant R, Agrawal R, Gehrke J (2002) Privacy preserving mining of association rules. In: Proceedings of the 8th ACM SIGKDD Int'l Conference on Knowledge Discovery and Data Mining, Edmonton, Canada","DOI":"10.1145\/775047.775080"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Evfimievski A (2002) Randomization in privacy preserving data mining. SIGKDD Explorations 4(2), Issue 2:43\u201348","DOI":"10.1145\/772862.772869"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Evfimievski A, Gehrke J, Srikant R (2003) Limiting Privacy Breaches in Privacy Preserving Data Mining. PODS 2003, San Diego, CA","DOI":"10.1145\/773153.773174"},{"key":"31_CR14","unstructured":"Kantarcioglu M, Clifton C (2002) Privacy-preserving distributed mining of association rules on horizontally partitioned data. In: ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery"},{"key":"31_CR15","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1023\/A:1013284820704","volume":"6","author":"W Lin","year":"2002","unstructured":"Lin W, Alvarez S, Ruiz C (2002) Efficient adaptive-support association rule mining for recommender systems. Data Mining Knowl Discov 6:83\u2013105","journal-title":"Data Mining Knowl Discov"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Lindell Y, Pinkas B (2000) Privacy preserving data mining. In CRYPTO, pp 36\u201354","DOI":"10.1007\/3-540-44598-6_3"},{"key":"31_CR17","unstructured":"O'Leary DE (1991) Knowledge discovery as a threat to database security. In: Piatetsky-Shapiro G, Frawley WJ (eds) Knowledge discovery in databases. AAAI Press\/ MIT Press, Menlo Park, CA, pp 507\u2013516"},{"key":"31_CR18","unstructured":"Oliveira S, Zaiane O (2002) Privacy preserving frequent itemset mining. In: Proceedings of IEEE International Conference on Data Mining, November 2002, pp 43\u201354."},{"key":"31_CR19","unstructured":"Oliveira S, Zaiane O (2002) A framework for enforcing privacy in mining frequent patterns. Technical report, TR02-13, Computer Science Department, University of Alberta, Canada"},{"key":"31_CR20","unstructured":"Oliveira S, Zaiane O (2003) Algorithms for balancing priacy and knowledge discovery in association rule mining. In: Proceedings of 7th International Database Engineering and Applications Symposium (IDEAS03), Hong Kong"},{"key":"31_CR21","doi-asserted-by":"crossref","unstructured":"Oliveira S, Zaiane O (2003) Protecting sensitive knowledge by data sanitization. In: Proceedings of IEEE International Conference on Data Mining","DOI":"10.1109\/ICDM.2003.1250990"},{"key":"31_CR22","doi-asserted-by":"crossref","unstructured":"O'Mahony M, Hurley N (2004) Nicholas kushmerick and guenole silvestre, collaborative recommendation: A robustness analysis. ACM Trans Internet Technol 4(Issue 4): 344\u2013377","DOI":"10.1145\/1031114.1031116"},{"key":"31_CR23","doi-asserted-by":"crossref","unstructured":"Rizvi SJ, Haritsa JR (2002) Maintaining data privacy in association rule mining. In: Proceedings of the 28th Int'l Conference on Very Large Databases","DOI":"10.1016\/B978-155860869-6\/50066-4"},{"issue":"4","key":"31_CR24","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/604264.604271","volume":"30","author":"Y Saygin","year":"2001","unstructured":"Saygin Y, Verykios V, Clifton C (2001) Using unknowns to prevent discovery of association rules. SIGMOND Record 30(4):45\u201354","journal-title":"SIGMOND Record"},{"key":"31_CR25","doi-asserted-by":"crossref","unstructured":"Vaidya J, Clifton CW (2002) Privacy preserving association rule mining in vertically partitioned data. In: Proceedings of the 8th ACM SIGKDD Int'l Conference on Knowledge Discovery and Data Mining, Edmonton, Canada","DOI":"10.1145\/775047.775142"},{"issue":"1","key":"31_CR26","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/974121.974131","volume":"33","author":"V Verykios","year":"2004","unstructured":"Verykios V, Bertino E, Fovino IG, Provenza LP, Saygin Y, Theodoridis Y (2004) State-of-the-art in privacy preserving data mining. SIGMOD Record 33(1):50\u201357","journal-title":"SIGMOD Record"},{"issue":"4","key":"31_CR27","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1109\/TKDE.2004.1269668","volume":"16","author":"V Verykios","year":"2004","unstructured":"Verykios V, Elmagarmid A, Bertino E, Saygin Y, Dasseni E (2004) Association Rules Hiding. IEEE Trans Knowl Data Eng 16(4):434\u2013447","journal-title":"IEEE Trans Knowl Data Eng"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-006-0031-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10489-006-0031-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-006-0031-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T18:25:38Z","timestamp":1559154338000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10489-006-0031-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,1,30]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,6,18]]}},"alternative-id":["31"],"URL":"https:\/\/doi.org\/10.1007\/s10489-006-0031-1","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,1,30]]}}}