ARCHIVES
Research Article
Security Preserving in Association Rule Mining
BRAHMESWARA RAO DAKEY1
SUNKARA SURESHBABU2
12 Dept. of Computer Science Engineering, GMR Institute of Technology, Razam, AP, India.
Published Online: May-August 2022
Pages: 17-19
Cite this article
No DOIReferences
[1] V.S.Verykios,A.K.Elmagarmid,E.Bertino,Y.Saygin,andE.Dasseni,“Association rule hiding,” IEEE Transactions on Knowledge and Data
Engineering, vol.16(4),pp.434–447,April2004.
[2] Rakesh Agrawal and Ramakr is hnanSrikant,“Privacy-preservingdata mining, In Proceedings of the ACMSIGMOD Conference on
Management of Data 2000)”,439–450.
[3] VassiliosS.Verykios,Elisa Bertino, IgorNaiFovinoLoredanaParasilitiProvenza, YucelSaygin,YannisTheodoridis:
“State-of-the-artinPrivacy Preserving Data Mining”, March 2004.
[4] Y.H.Wu,C.M.ChiangandA.L.P.Chen,“HidingSensitiveAssociationRuleswithLimitedSideEffects,”IEEETransactionsonKnowledgea
ndDataEngineering,vol.19(1),pp.29–42,Jan.2007.
[5] K.Duraiswamy,andD.Manjula,“AdvancedApproachinSensitiveRuleHiding”ModernAppliedScience,vol.3(2), Feb.2009.
[6] Y.Saygin,V.S.Verykios,andC.Clifton,“UsingUnknownstoPreventDiscoveryofAssociationRules,”ACMSIGMOD,vol.30(4),pp.4554,
Dec.2001
[7] Y. Saygin, V. S. Verykios, and A. K. Elmagarmid, “Privacy preserving association rule mining,” In Proc. Int’l Workshop on Research
Issues in Data Engineering(RIDE2002),2002,pp.151–163.
[8] S.L.Wang and A. Jafari, “Using unknowns for hiding sensitive predictive association rules,” In Proc. IEEE
Int’l Conf. InformationReuseand Integration (IRI2005),pp.223–228,Aug.2005
Engineering, vol.16(4),pp.434–447,April2004.
[2] Rakesh Agrawal and Ramakr is hnanSrikant,“Privacy-preservingdata mining, In Proceedings of the ACMSIGMOD Conference on
Management of Data 2000)”,439–450.
[3] VassiliosS.Verykios,Elisa Bertino, IgorNaiFovinoLoredanaParasilitiProvenza, YucelSaygin,YannisTheodoridis:
“State-of-the-artinPrivacy Preserving Data Mining”, March 2004.
[4] Y.H.Wu,C.M.ChiangandA.L.P.Chen,“HidingSensitiveAssociationRuleswithLimitedSideEffects,”IEEETransactionsonKnowledgea
ndDataEngineering,vol.19(1),pp.29–42,Jan.2007.
[5] K.Duraiswamy,andD.Manjula,“AdvancedApproachinSensitiveRuleHiding”ModernAppliedScience,vol.3(2), Feb.2009.
[6] Y.Saygin,V.S.Verykios,andC.Clifton,“UsingUnknownstoPreventDiscoveryofAssociationRules,”ACMSIGMOD,vol.30(4),pp.4554,
Dec.2001
[7] Y. Saygin, V. S. Verykios, and A. K. Elmagarmid, “Privacy preserving association rule mining,” In Proc. Int’l Workshop on Research
Issues in Data Engineering(RIDE2002),2002,pp.151–163.
[8] S.L.Wang and A. Jafari, “Using unknowns for hiding sensitive predictive association rules,” In Proc. IEEE
Int’l Conf. InformationReuseand Integration (IRI2005),pp.223–228,Aug.2005
Related Articles
2022
Review on Detection and Rectification of Distorted Fingerprint
2022
Case Study of Student Information tracking System
2022
Investigation of Novel Algorithm for Compact Computational Time by Using Fuzzy Practice in Data Mining
2022
An Exploratory Review on Data from Web Page Using Content Mining Methodology
2022
Investigation on Video Genus Recognition Using Gestures of the Viewer
2022