Database security
Finding interesting rules from large sets of discovered association rules
CIKM '94 Proceedings of the third international conference on Information and knowledge management
Safeware: system safety and computers
Safeware: system safety and computers
Data mining: concepts and techniques
Data mining: concepts and techniques
Using unknowns to prevent discovery of association rules
ACM SIGMOD Record
Protecting Against Data Mining through Samples
Proceedings of the IFIP WG 11.3 Thirteenth International Conference on Database Security: Research Advances in Database and Information Systems Security
Impact of Decision-Region Based Classification Mining Algorithms on Database Security
Proceedings of the IFIP WG 11.3 Thirteenth International Conference on Database Security: Research Advances in Database and Information Systems Security
Hiding Association Rules by Using Confidence and Support
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Security procedures for classification mining algorithms
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Data Mining: the search for knowledge in databases.
Data Mining: the search for knowledge in databases.
Knowledge Hiding in Databases for concept-based data mining algorithms
WISICT '04 Proceedings of the winter international synposium on Information and communication technologies
Distributed data mining and agents
Engineering Applications of Artificial Intelligence
KD3 scheme for privacy preserving data mining
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Privacy preserving naive bayes classification
ADMA'05 Proceedings of the First international conference on Advanced Data Mining and Applications
Bands of privacy preserving objectives: classification of PPDM strategies
AusDM '11 Proceedings of the Ninth Australasian Data Mining Conference - Volume 121
Effective sanitization approaches to hide sensitive utility and frequent itemsets
Intelligent Data Analysis
Hi-index | 0.00 |
In this paper, we present a methodology to analyze the impact of data mining technology on database security. Our methodology consists of six steps that make up a new data analysis process that we call Knowledge Hiding in Databases (KHD). The specific contributions of this paper include a description of the KHD process, and the initial application of KHD to classification and association mining algorithms.