{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:06:29Z","timestamp":1725559589254},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540269236"},{"type":"electronic","value":"9783540318910"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11510888_60","type":"book-chapter","created":{"date-parts":[[2010,7,18]],"date-time":"2010-07-18T13:37:46Z","timestamp":1279460266000},"page":"610-619","source":"Crossref","is-referenced-by-count":3,"title":["Inference on Distributed Data Clustering"],"prefix":"10.1007","author":[{"given":"Josenildo C.","family":"da Silva","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Klusch","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"60_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy preserving data mining algorithms. In: Proceedings of 20th ACM Symposium on Principles of Database Systems, Santa Barbara, Califonia, May 2001, pp. 247\u2013255 (2001)","DOI":"10.1145\/375551.375602"},{"key":"60_CR2","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1145\/342009.335438","volume-title":"Proc. of the ACM SIGMOD Conference on Management of Data","author":"R. Agrawal","year":"2000","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proc. of the ACM SIGMOD Conference on Management of Data, May 2000, pp. 439\u2013450. ACM Press, New York (2000)"},{"key":"60_CR3","unstructured":"Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V.: Disclosure limitation of sensitive rules. In: Proceedings of 1999 IEEE Knowledge and Data Engineering Exchange Workshop (KDEX 1999), Chicago,IL, November 1999, pp. 45\u201352 (1999)"},{"key":"60_CR4","unstructured":"da Silva, J.C., Klusch, M., Lodi, S., Moro, G.: Inference attacks in peer-to-peer homogeneous distributed data mining. In: 16th European Conference on Artificial Intelligence (ECAI 2004), Valencia, Spain (August 2004)"},{"key":"60_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-45496-9_27","volume-title":"Information Hiding","author":"E. Dasseni","year":"2001","unstructured":"Dasseni, E., Verykios, V.S., Elmagarmid, A.K., Bertino, E.: Hiding association rules by using confidence and support. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 369\u2013383. Springer, Heidelberg (2001)"},{"key":"60_CR6","doi-asserted-by":"crossref","unstructured":"Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: Proceedings of PODS 2003, San Diego, California, June 9-12, San Diego, California (2003)","DOI":"10.1145\/773153.773174"},{"issue":"2","key":"60_CR7","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/772862.772864","volume":"4","author":"C. Farkas","year":"2002","unstructured":"Farkas, C., Jajodia, S.: The inference problem: A survey. ACM SIGKDD Explorations Newsletter\u00a04(2), 6\u201311 (2002)","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"60_CR8","unstructured":"Hinneburg, A., Keim, D.A.: An efficient approach to clustering in large multimedia databases with noise. In: Knowledge Discovery and Data Mining, pp. 58\u201365 (1998)"},{"key":"60_CR9","unstructured":"Kantarcioglu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. In: The ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery (DMKD 2002) (June 2002)"},{"key":"60_CR10","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-36561-3_5","volume-title":"Intelligent Information Agents","author":"M. Klusch","year":"2003","unstructured":"Klusch, M., Lodi, S., Moro, G.: Agent-based distributed data mining: the KDEC scheme. In: Klusch, M., Bergamaschi, S., Edwards, P., Petta, P. (eds.) Intelligent Information Agents. LNCS (LNAI), vol.\u00a02586, pp. 104\u2013122. Springer, Heidelberg (2003)"},{"key":"60_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-44598-6_3","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"Y. Lindell","year":"2000","unstructured":"Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 36\u201354. Springer, Heidelberg (2000)"},{"issue":"2","key":"60_CR12","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/772862.772865","volume":"4","author":"B. Pinkas","year":"2002","unstructured":"Pinkas, B.: Cryptographic techniques for privacy-preserving data mining. ACM SIGKDD Explorations Newsletter\u00a04(2), 12\u201319 (2002)","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"60_CR13","doi-asserted-by":"crossref","unstructured":"Rizvi, S.J., Haritsa, J.R.: Maintaining data privacy in association rule mining. In: Proceedings of the 28th VLDB \u2013 Very Large Data Base Conference, Hong Kong, China, pp. 682\u2013693 (2002)","DOI":"10.1016\/B978-155860869-6\/50066-4"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Data Mining in Pattern Recognition"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11510888_60","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,16]],"date-time":"2019-03-16T18:36:01Z","timestamp":1552761361000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11510888_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540269236","9783540318910"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11510888_60","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}