On mining sensitive rules to identify privacy threats

4Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Data mining techniques represent a useful tool to cope with privacy problems. In this work an association rule mining algorithm adapted to the privacy context is developed. The algorithm produces association rules with a certain structure (the premise set is a subset of the public features of a released table while the consequent is the feature to protect). These rules are then used to reveal and explain relationships from data affected by some kind of anonymization process and thus, to detect threats. © 2013 Springer-Verlag.

Cite

CITATION STYLE

APA

Díaz, I., Rodríguez-Muñiz, L. J., & Troiano, L. (2013). On mining sensitive rules to identify privacy threats. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8073 LNAI, pp. 232–241). https://doi.org/10.1007/978-3-642-40846-5_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free