2001
DOI: 10.1007/3-540-45496-9_27
|View full text |Cite
|
Sign up to set email alerts
|

Hiding Association Rules by Using Confidence and Support

Abstract: Large repositories of data contain sensitive information which must be protected against unauthorized access. The protection of the confidentiality of tills information has been a long-term goal for the database security research community and the government statistical agencies. Recent advances, in data mining and machine learning algorithms, have increased the disclosure risks one may encounter when releasing data to outside parties.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
193
0
4

Year Published

2003
2003
2021
2021

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 255 publications
(198 citation statements)
references
References 4 publications
1
193
0
4
Order By: Relevance
“…We set the confidence threshold to 0.01 and this might have affected the results. While this is a low threshold, it results in a higher recall (Dasseni et al 2001) (i.e., identified a larger set of frequently co-changing classes). We further conducted a manual check on the returned association rules in the smaller projects to ensure that class pairs returned by the arules tool actually co-changed and to validate its accuracy.…”
Section: External Validity This Paper Presents the Results Of An Empimentioning
confidence: 99%
“…We set the confidence threshold to 0.01 and this might have affected the results. While this is a low threshold, it results in a higher recall (Dasseni et al 2001) (i.e., identified a larger set of frequently co-changing classes). We further conducted a manual check on the returned association rules in the smaller projects to ensure that class pairs returned by the arules tool actually co-changed and to validate its accuracy.…”
Section: External Validity This Paper Presents the Results Of An Empimentioning
confidence: 99%
“…The utility of the approach was defined by the number of non-sensitive rules whose support was also lowered by using such an approach. This approach was extended in [24] in which both support and confidence of the appropriate rules could be lowered. In this case, 0-values in the transactional database could also change to 1-values.…”
Section: Knowledge Hidingmentioning
confidence: 99%
“…Besides these categorizations, widely known classification is done according to the nature of the base algorithm and following classes appear; heuristic based approaches, border based approaches, exact approaches, reconstruction based approaches and cryptography based approaches. Heuristic Based Approaches: Hiding problem is generalized as to consider the hiding of both sensitive frequent itemsets and sensitive association rules in (Dasseni et al, 2001). The authors propose three single rule heuristic hiding algorithms that are based on the reduction of either the support or the confidence of the sensitive rules, but not both.…”
Section: Related Workmentioning
confidence: 99%