|
| | | |
A Methodology for Hiding Knowledge in Databases
Johnsten, T. and Raghavan, V.V.
In this paper, we present a methodology to analyse the impact of data mining technology on database security. Our methodology consists of six steps that make up a new data analysis process that we call Knowledge Hiding in Databases (KHD). The specific contributions of this paper include a description of the KHD process, and the initial application of KHD to classification and association mining algorithms. |
Cite as: Johnsten, T. and Raghavan, V.V. (2002). A Methodology for Hiding Knowledge in Databases. In Proc. IEEE ICDM Workshop on Privacy, Security and Data Mining (PSDM 2002), Maebashi City, Japan. CRPIT, 14. Clifton, C. and Estivill-Castro, V., Eds. ACS. 9-17. |
(from crpit.com)
(local if available)
|
|