Workshop on Privacy, Security, and Data Mining
How do we mine data when we aren't allowed to see it?

To be held in conjunction with The 2002 IEEE International Conference on Data Mining.

Maebashi TERRSA Room 4F, Maebashi City, Japan, December 9, 2002

TimePaper/TalkAuthor
08:50-09:10 Welcome and Introduction (slides) Vladimir Estivill-Castro
09:10-10:00 Lay of the Land: Legal, Moral, and Historical reasons why Privacy Preserving Data Mining is Important (slides) Chris Clifton
10:00-10:30Break
10:30-11:15 Building Decision Tree Classifier on Private Data (slides) Wenliang Du and Zhijun Zhan
Syracuse University
11:15-12:00 A Methodology for Hiding Knowledge in Databases (slides) Tom Johnsten and Vijay V. Raghavan
University of South Alabama and University of Louisiana Lafayette
12:00-13:00 Lunch (provided)
13:00-13:45 Foundations for an Access Control Model for Privacy Preservation in Multi-Relational Association Rule Mining (slides) Stanley R. M. Oliveira and Osmar R. Zaïane
Embrapa Information Technology and University of Alberta
13:45-14:20 An Architecture for Privacy-preserving Mining of Client Information (slides) Murat Kantarcioglu and Jaideep Vaidya
Purdue University
14:20-14:55 Privacy Preserving Frequent Itemset Mining (slides) Stanley R. M. Oliveira and Osmar R. Zaïane
Embrapa Information Technology and University of Alberta
15:00-15:30Break
15:30-16:05 Privacy Conflicts in CRM Services for Online Shops: A Case Study (slides) Claus Boyens, Oliver Günther, Maximilian Teltzrow
Humboldt-Universität zu Berlin
16:05-16:40 Privacy-Preserving Distributed Queries for a Clinical Case Research Network (slides) Gunther Schadow, Shaun J. Grannis, Clement J. McDonald
Regenstrief Institute and Indiana University School of Medicine
16:40-17:00Break
17:00-18:00 Panel and Discussion: What are the key applications and challenge problems for privacy-preserving data mining? (slides) Chris Clifton, Vladimir Estivill-Castro, Gunther Schadow, Maximilian Teltzrow

Valid XHTML 1.1!