<span lang="EN-IN">[1] V.
Verykios, E. Bertino, I.G. Fovino, L.P. Provenza, Y. Saygin, and Y.
Theodoridis, State-of-the-art in Privacy Preserving Data Mining? SIGMOD Record,
Vol. 33, No. 1, 50-57, March 2004.
<span lang="EN-IN">[2]
Kargupta H, Datta S, Wang Q, Sivakumar K. On the privacy preserving properties
of random data perturbation techniques, Proceedings of the IEEE International
Conference on Data Mining
<span lang="EN-IN">(ICDM).
Melbourne, Florida, 2003: 99-106
<span lang="EN-IN">[3]
Moskowitz I S, Chang L W. A decision theoretical based system for information
downgrading//Proceedings of the 5th Joint Conference on Information Sciences
(JCIS). AtlanticCity, NJ USA, 2000: 82-89
<span lang="EN-IN">[4]
VERYKIOS V S, ELMAGARMID A, BERTINO E, et al. Association rule hiding[J].IEEE
Trans on Know ledge and Data Engineering,2004,16(4): 434-447
<span lang="EN-IN">[5]
Pinkas B. Cryptographic techniques for privacy-preserving datamining· SIGKDD
Explorations,2002,4(2)
<span lang="EN-IN">[6] DU
Wen-liang, ZHAN Zhi-jun. Building decision tree classifier on private data[C]
Proc of IEEE International Coference on Privacy, Security and DataMining.
Darlinghurst: Australian Computer
Society, 2002: 1-8.
<span lang="EN-IN">[7]
ZHOU Shui-Geng, LI Feng1, TAO Yu-Fei, XIAO Xiao-Kui. Privacy Preservation in
Database Applications: A Surve. CHINESE JOURNAL OF COMPUTER,2009,32(5)
<span lang="EN-IN">[8]
Pinkas B. Cryptographic techniques for privacy-preserving data mining [J]. ACM
SIGKDD Explorations Newsletter,2002,4(2):12-19.
<span lang="EN-IN">[9] Du
Wenliang, Attalah M J. Secure multi problem computation problems and their
applications: A review and open problems [R].CERIAS Tech Report 2001-51,Center
for Education and Research in Information Assurance and Security and Department
of
<span lang="EN-IN">Computer
Sciences, Purdue University, West Lafayette,IN,2001.
<span lang="EN-IN">[10]
Kantarcioglu M, Clifton C· Privacy preserving Distributed Mining of Association
Rules on Horizontally Partitioned Data In: ACM SIGMOD Workshop on Research
Issues on Data Mining and Knowledge Discovery, 2002
<span lang="EN-IN">[11]
Agrawal R, Srikant R. Privacy-preserving data mining [A]. Proceedings of the
2000 ACM SIGMOD international conference on Management of data[C]. Dallas,
Texas, United States: ACM, 2000. 439-450
<span lang="EN-IN">[12]
Clifton C ,
<span lang="EN-IN">Kantarcioglou M , <span lang="EN-IN">Zhu Y M.
Tools for privacy preserving distributed data mining[J]. SIGKDD Explorations 4,<span lang="EN-IN">2002,<span lang="EN-IN">(2).
<span lang="EN-IN">[13] Du
Wenliang,<span lang="EN-IN">Zhan Zhijun. Building
decision tree classifier on private data[C]. In Proceedings of the IEEE ICDM
Workshop on Privacy,<span lang="EN-IN">Security and DataMining,<span lang="EN-IN">2002
<span lang="EN-IN">[14]
Lindell Y ,
<span lang="EN-IN">Pinkas B. Privacy preserving data mining[C]. In
Advances in Cryptology-CRYPTO 2000,<span lang="EN-IN">2000:<span lang="EN-IN">36-54.
<span lang="EN-IN">[15]
Rizvi S J, Haritsa J R. Maintaining data privacy in association rule mining
[A]. In Proceedings of the 28th International Conference on Very Large
Databases(VLD) [C]. Hong Kong,Chi-na: [s.n.], 2002. 682-693.
<span lang="EN-IN">[16]
Agrawal D,Aggarwal C C.On the design and quantification of privacy preserving
<span lang="EN-IN">[17]
data mining algorithms[A]. Proceedings of the twentieth ACM
SIGMOD-SIGACT-SIGART symposium on Principles of Study of Privacy Preserving Data Mining Haisheng Li East China
Jiaotong University, Nachang330013,China
<span lang="EN-IN">[18] 4.
L. Wang, S. Jajodia, and D. Wijesekera, “Securing OLAP Data Cubes against
Privacy Breaches,” Proc. 25th IEEE Symp.Security and Privacy, IEEE
Press, 2004, pp. 161-175.
<span lang="EN-IN">[19] Verykios, VS; Bertino, E;
Fovino, IN; Provenza, LP; Saygin, and Theodoridis, Y. 2004. State-of –the-art
in Privacy Preserving Data Mining. SIGMOD Record. Volume 33, Issue 1:50-57.
<span lang="EN-IN">[20]
JAIDEEP VAIDYA Rutgers University, CHRIS
CLIFTON Purdue University<o:p></o:p>
<span lang="EN-IN">[21] <span lang="EN-IN">Devendra Kumar
“Models and Techniques of Privacy Preserving Data Mining and its important
aspects” June-2013, published in the International Journal of Advances Research
in Computer Science
<span lang="EN-IN">[22]
Devendra Kumar “Analytical Study on Privacy Preserving Data Mining Models and
Techniques”, Volume-2, Issue-2, Year – 2012, published in the International
Research Journal of Science Engineering and Technology
<span lang="EN-IN">[23]
Devendra Kumar “Analytically study of Privacy Preserving Data Mining and its
structure” 27-April, 2013, published in the proceeding of National Conference
on “Role of ICT in Inclusive Sustainable National Development” at GNIT, Gr.
Noida
<span lang="EN-IN">[24]
Devendra Kumar “Study of Privacy Preserving Data Mining Techniques for Securing
Web Services” 27-April, 2013, proceeding of National Conference on “Role of ICT
in Inclusive Sustainable National Development” at GNIT, Gr. Noida
<span lang="EN-IN">[25]
Devendra Kumar “Important aspects for securing web serving using privacy data
mining Techniques” 24-Nov, 2012, Published in the proceeding of National
Conference on “Strategies for sustainable growth in the era of Information
Technology” at GNIT Management School, Greater Noida
<span lang="EN-IN">[26]
Devendra Kumar, Naveen Singh, Rakesh Kumar “Implementation of Data Mining
Techniques to ERP System for Securing Data” Feb. 24-25, 2012, Published in the
proceeding of National Conference on “Cloud Computing Technologies and Services
(CCTS-2012)” at ABES Engineering College, Ghaziabad.