“…In particular, we have a specific set of rules that we wish to protect. This is related to inference protection [7], but the problem now extents to non-strict inferences -rules that hold with only some level of support and confidence.…”
A b s t r a c tData mining technology has given us new capabilities to identify correlations in large data sets. This introduces risks when the data is to be made public, but the correlations are private. We introduce a method for selectively removing individual values from a database to prevent the discovery of a set of rules, while preserving the data for other applications. The efficacy and complexity of this method are discussed. We also present an experiment showing an example of this methodology.
“…In particular, we have a specific set of rules that we wish to protect. This is related to inference protection [7], but the problem now extents to non-strict inferences -rules that hold with only some level of support and confidence.…”
A b s t r a c tData mining technology has given us new capabilities to identify correlations in large data sets. This introduces risks when the data is to be made public, but the correlations are private. We introduce a method for selectively removing individual values from a database to prevent the discovery of a set of rules, while preserving the data for other applications. The efficacy and complexity of this method are discussed. We also present an experiment showing an example of this methodology.
“…• Multilevel secure inference. 15 The purpose of multilevel secure inference is to ensure that a subset of the database (low data) can't be used to infer exact values of a different subset (high data). • Limiting results.…”
Section: Inference From Data Mining Resultsmentioning
Data mining is under attack from privacy advocates because of a misunderstanding about what it actually is and a valid concern about how it's generally done. This article shows how technology from the security community can change data mining for the better, providing all its benefits while still maintaining privacy.
“…Another key direction of research involves role-based access control. For a sampling of relevant literature on these topics, see [34,71,97,106,165,193,194,195,291,294,295,320,324,325,384,410,411].…”
This paper reviews applications in computer science that decision theorists have addressed for years, discusses the requirements posed by these applications that place great strain on decision theory/social science methods, and explores applications in the social and decision sciences of newer decision-theoretic methods developed with computer science applications in mind. The paper deals with the relation between computer science and decision-theoretic methods of consensus, with the relation between computer science and game theory and decisions, and with "algorithmic decision theory."
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.