C4.5: programs for machine learning
C4.5: programs for machine learning
Parsimonious downgrading and decision trees applied to the inference problem
Proceedings of the 1998 workshop on New security paradigms
Protecting Against Data Mining through Samples
Proceedings of the IFIP WG 11.3 Thirteenth International Conference on Database Security: Research Advances in Database and Information Systems Security
Impact of Decision-Region Based Classification Mining Algorithms on Database Security
Proceedings of the IFIP WG 11.3 Thirteenth International Conference on Database Security: Research Advances in Database and Information Systems Security
An Integrated Framework for Database Privacy Protection
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Data Mining: the search for knowledge in databases.
Data Mining: the search for knowledge in databases.
A methodology for hiding knowledge in databases
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Efficient algorithms for distortion and blocking techniques in association rule hiding
Distributed and Parallel Databases
Hi-index | 0.00 |
Classification mining algorithms can be used to discover protected values from non-protected data that are voluntarily released for mining purposes. We reported earlier on the development of an assessment algorithm, along with a set of security policies, for use in analyzing a protected data element's risk of disclosure with respect to decision-region based algorithms. This paper presents an extension of the previous work. Specifically, two algorithms, one for assessing a protected data element's risk of disclosure with respect to decision-region based algorithms and the other with respect to extended decision-region based algorithms, are developed. The former risk assessment algorithm has a relatively low execution time, but may not achieve an exact assessment of a protected data element's risk of disclosure. However, data collected from initial experiments indicate that the application of this particular assessment algorithm can lead to an exact assessment, under certain security policies.