{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:54Z","timestamp":1750306554216,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T00:00:00Z","timestamp":1415318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,7]]},"DOI":"10.1145\/2663715.2669611","type":"proceedings-article","created":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T14:41:51Z","timestamp":1415025711000},"page":"11-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Hiding a Needle in a Haystack"],"prefix":"10.1145","author":[{"given":"Kangsoo","family":"Jung","sequence":"first","affiliation":[{"name":"Sogang University, Seoul, South Korea"}]},{"given":"Sehwa","family":"Park","sequence":"additional","affiliation":[{"name":"Sogang University, Seoul, South Korea"}]},{"given":"Seog","family":"Park","sequence":"additional","affiliation":[{"name":"Sogang University, Seoul, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2014,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_2_1","first-page":"431","volume-title":"Gertz","author":"Aggarwal C. C.","year":"2008","unstructured":"C. C. Aggarwal and P. S. Yu , \" Privacy-Preserving Data Mining: A Survey,\" Handbook of Database Security : Application and Trends , Gertz , M. and Jajodia, S. (Eds.), pp. 431 -- 460 , Springer , 2008 . C. C. Aggarwal and P. S. Yu, \"Privacy-Preserving Data Mining: A Survey,\" Handbook of Database Security : Application and Trends, Gertz, M. and Jajodia, S. (Eds.), pp.431--460, Springer, 2008."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.121"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"e_1_3_2_1_5_1","unstructured":"Life Science Journal 10.7s 2013 Aruldoss Albert Victoire. \"Hybrid techniques for Privacy preserv-ing in Data Mining"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835868"},{"key":"e_1_3_2_1_7_1","first-page":"29","article-title":"An assessment of Identity Security in Data Mining","volume":"7","author":"Chakrapani Venkatesh","year":"2013","unstructured":"9 . Gurusamy, Kirubhakar, and Venkatesh Chakrapani . \" An assessment of Identity Security in Data Mining .\" International Journa of Science and Modern Engineering (IJISME) 1 . 7 , 29 -- 31 , 2013 . 9. Gurusamy, Kirubhakar, and Venkatesh Chakrapani. \"An assessment of Identity Security in Data Mining.\" International Journa of Science and Modern Engineering (IJISME) 1.7, 29--31, 2013.","journal-title":"International Journa of Science and Modern Engineering (IJISME) 1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"volume-title":"Privacy Preserving RBF Kernel Support Vector Machine.\" BioMed re-search international","year":"2014","key":"e_1_3_2_1_9_1","unstructured":"Li, Haoran, \" Privacy Preserving RBF Kernel Support Vector Machine.\" BioMed re-search international , 2014 . Li, Haoran, et al. \"Privacy Preserving RBF Kernel Support Vector Machine.\" BioMed re-search international, 2014."},{"key":"e_1_3_2_1_10_1","article-title":"Preserving Differential Privacy for Similarity Meas-urement in Smart Environments","author":"KokSeng Wong","year":"2014","unstructured":"Wong KokSeng , KIM MyungHo . \" Preserving Differential Privacy for Similarity Meas-urement in Smart Environments \", The Scientific World Journal , 2014 . Wong KokSeng, KIM MyungHo. \"Preserving Differential Privacy for Similarity Meas-urement in Smart Environments\", The Scientific World Journal, 2014.","journal-title":"The Scientific World Journal"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775142"},{"key":"e_1_3_2_1_13_1","first-page":"102","volume-title":"New Orleans","author":"Du W.","year":"2001","unstructured":"W. Du and M. J. Atallah , \" Privacy-Preserving Cooperative Statistical Analysis,\" In Proc. of the 17th Conf. on Annual Computer Security Applications , New Orleans , Louisiana , pp. 102 -- 110 , Dec. 2001 . W. Du and M. J. Atallah, \"Privacy-Preserving Cooperative Statistical Analysis,\" In Proc. of the 17th Conf. on Annual Computer Security Applications, New Orleans, Louisiana, pp.102--110, Dec. 2001."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2003.09.001"},{"key":"e_1_3_2_1_15_1","unstructured":"ApacheMahout machine learning library. http:\/\/mahout.apache.org\/. Accessed on 10 Mar 2013.  ApacheMahout machine learning library. http:\/\/mahout.apache.org\/. Accessed on 10 Mar 2013."},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"Proceedings of the 3rd USENIX conference on hot topics in cloud compu-ting (HotCloud'11)","author":"Ko SY","year":"2011","unstructured":"Ko SY , Jeon K, Morales R, \"The hybrex model for confidentiality and privacy in cloud computing \", In Proceedings of the 3rd USENIX conference on hot topics in cloud compu-ting (HotCloud'11) , pp. 1 -- 5 , 2011 Ko SY, Jeon K, Morales R, \"The hybrex model for confidentiality and privacy in cloud computing\", In Proceedings of the 3rd USENIX conference on hot topics in cloud compu-ting (HotCloud'11), pp.1--5, 2011"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38586-5_8"}],"event":{"name":"CIKM '14: 2014 ACM Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Shanghai China","acronym":"CIKM '14"},"container-title":["Proceedings of the First International Workshop on Privacy and Secuirty of Big Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663715.2669611","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2663715.2669611","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:48Z","timestamp":1750227168000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663715.2669611"}},"subtitle":["Privacy Preserving Apriori algorithm inMapReduce Framework"],"short-title":[],"issued":{"date-parts":[[2014,11,7]]},"references-count":17,"alternative-id":["10.1145\/2663715.2669611","10.1145\/2663715"],"URL":"https:\/\/doi.org\/10.1145\/2663715.2669611","relation":{},"subject":[],"published":{"date-parts":[[2014,11,7]]},"assertion":[{"value":"2014-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}