Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 20 Jan 2012

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

A Methodology for Hiding Knowledge in Databases

Johnsten, T. and Raghavan, V.V.

    In this paper, we present a methodology to analyse the impact of data mining technology on database security. Our methodology consists of six steps that make up a new data analysis process that we call Knowledge Hiding in Databases (KHD). The specific contributions of this paper include a description of the KHD process, and the initial application of KHD to classification and association mining algorithms.
Cite as: Johnsten, T. and Raghavan, V.V. (2002). A Methodology for Hiding Knowledge in Databases. In Proc. IEEE ICDM Workshop on Privacy, Security and Data Mining (PSDM 2002), Maebashi City, Japan. CRPIT, 14. Clifton, C. and Estivill-Castro, V., Eds. ACS. 9-17.
pdf (from crpit.com) pdf (local if available) BibTeX EndNote GS
 

 

ACS Logo© Copyright Australian Computer Society Inc. 2001-2014.
Comments should be sent to the webmaster at crpit@scem.uws.edu.au.
This page last updated 16 Nov 2007