A methodology for hiding knowledge in databases

  • Authors:
  • Tom Johnsten;Vijay V. Raghavan

  • Affiliations:
  • School of Computer and Information Sciences, University of South Alabama, Mobile, AL;Center for Advanced Computer Studies, University of Louisiana Lafayette, Lafayette, LA

  • Venue:
  • CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we present a methodology to analyze the impact of data mining technology on database security. Our methodology consists of six steps that make up a new data analysis process that we call Knowledge Hiding in Databases (KHD). The specific contributions of this paper include a description of the KHD process, and the initial application of KHD to classification and association mining algorithms.