Data mining techniques represent a useful tool to cope with privacy problems. In this work an association rule mining algorithm adapted to the privacy context is developed. The algorithm produces association rules with a certain structure (the premise set is a subset of the public features of a released table while the consequent is the feature to protect). These rules are then used to reveal and explain relationships from data affected by some kind of anonymization process and thus, to detect threats. © 2013 Springer-Verlag.
CITATION STYLE
Díaz, I., Rodríguez-Muñiz, L. J., & Troiano, L. (2013). On mining sensitive rules to identify privacy threats. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8073 LNAI, pp. 232–241). https://doi.org/10.1007/978-3-642-40846-5_24
Mendeley helps you to discover research relevant for your work.