Skip to main content
Log in

Privacy-Preserving Data-Mining

  • AKTUELLES SCHLAGWORT
  • PRIVACY-PRESERVING DATA-MINING
  • Published:
Informatik-Spektrum Aims and scope

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Atzori M, Bonchi F, Giannotti F, Pedreschi D (2008) Anonymity preserving pattern discovery. VLDB J 17(4):703–727

    Google Scholar 

  2. Lemmen B (2009) Subgruppensuche auf verteilten und datenschutzsensiblen Daten. Diplomarbeit, Universität Bonn

  3. Pinkas B (2003) Cryptographic Techniques for Privacy-Preserving Data Mining. SIGKDD Explorations

  4. Samarati P (2001) Protecting Respondents’ Identities in Microdata Release. IEEE Transact Knowl Data Eng 13(6):1010–1027

    Google Scholar 

  5. Schmidt J, Hapfelmeier A, Mueller M, Perneczky R, Kurz A, Drzezga A, Kramer S (2009) Interpreting PET scans by structured patient data: a data mining case study in dementia research. ICDM 2008:213–222

  6. Wrobel S (1997) An algorithm for multi-relational discovery of subgroups. Proceedings of the First European Symposion on Principles of Data Mining and Knowledge Discovery

  7. Yao AC (1982) Protocols for secure computations. Proceedings of the 23rd Annual Symposium on Foundations of Computer Science

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Henrik Grosskreutz.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Grosskreutz, H., Lemmen, B. & Rüping, S. Privacy-Preserving Data-Mining. Informatik Spektrum 33, 380–383 (2010). https://doi.org/10.1007/s00287-010-0447-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00287-010-0447-1

Navigation