Security and Integrity in Outsourcing of Data Mining

被引:0
|
作者
Cheung, David Wai-lok [1 ]
机构
[1] Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
关键词
D O I
10.1109/GRC.2008.4664808
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
引用
收藏
页码:1 / 1
页数:1
相关论文
共 50 条
  • [1] Security and Integrity in Outsourcing of Data Mining
    Cheung, David Wai-lok
    2008 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2, 2008, : C1 - C1
  • [2] How Reliable Is Your Outsourcing Service for Data Mining? A Metamorphic Method for Verifying the Result Integrity
    Zhang, Jiewei
    Xie, Xiaoyuan
    Zhang, Zhiyi
    SOFTWARE ANALYSIS, TESTING, AND EVOLUTION, SATE 2018, 2018, 11293 : 120 - 136
  • [3] Data Outsourcing: A Threat to Confidentiality, Integrity, and Availability
    Kumar, Malay
    Meena, Jasraj
    Singh, Rahul
    Vardhan, Manu
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1496 - 1501
  • [4] A SURVEY ON SECURITY OVER DATA OUTSOURCING
    Thangavel, M.
    Varalakshmi, P.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 341 - 349
  • [5] Privacy-Preserving Outsourcing of Data Mining
    Monreale, Anna
    Wang, Wendy Hui
    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2, 2016, : 583 - 588
  • [6] On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining
    Molloy, Ian
    Li, Ninghui
    Li, Tiancheng
    2009 9TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, 2009, : 872 - +
  • [7] Efficient audit service outsourcing for data integrity in clouds
    Zhu, Yan
    Hu, Hongxin
    Ahn, Gail-Joon
    Yau, Stephen S.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (05) : 1083 - 1095
  • [8] Generic Dynamic Data Outsourcing Framework for Integrity Verification
    Etemad, Mohammad
    Kupcu, Alptekin
    ACM COMPUTING SURVEYS, 2020, 53 (01)
  • [9] Dynamic data integrity auditing for secure outsourcing in the cloud
    Wei, Jinxia
    Zhang, Ru
    Liu, Jianyi
    Li, Jing
    Niu, Xinxin
    Yao, Yuangang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (12):
  • [10] Data security services, solutions and standards for outsourcing
    Hamlen, Kevin W.
    Thuraisingham, Bhavani
    COMPUTER STANDARDS & INTERFACES, 2013, 35 (01) : 1 - 5