On security and privacy risks in association mining algorithms

0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Association mining algorithms can be used to discover sensitive knowledge from non-protected data that are voluntarily released for mining purposes. In this paper, we present a risk assessment procedure designed to control the security and privacy threats presented by association mining algorithms. The assessment procedure is based upon a new data analysis process that we introduce called Knowledge Hiding in Databases (KHD). The specific contributions of this paper include a description of the KHD process, and the development and implementation of a risk assessment procedure for association mining algorithms. © 2003 by Springer Science+Business Media New York.

Cite

CITATION STYLE

APA

Johnsten, T., Raghavan, V., & Hill, K. (2003). On security and privacy risks in association mining algorithms. In IFIP Advances in Information and Communication Technology (Vol. 128, pp. 163–174). Springer New York LLC. https://doi.org/10.1007/978-0-387-35697-6_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free