Integrated Association Rules Complete Hiding Algorithms
نویسندگان
چکیده
منابع مشابه
double clustering method in hiding association rules
association rules are among important techniques in data mining which are used for extracting hidden patterns and knowledge in large volumes of data. association rules help individuals and organizations take strategic decisions and improve their business processes. extracted association rules from a database contain important and confidential information that if published, the privacy of indivi...
متن کاملHiding Generalized Association Rules in RDF Databases
One of the important usage of RDF documents is storing semi-structured and structured data for web information systems. But large repositories of data on the web may contain sensitive information that must be protected against unauthorized access. A possible problem, and still not investigated in this documents, is need to balance confidentiality of disclosed data with legitimate needs of the d...
متن کاملAlgorithms for Association Rules
Association rules are ”if-then rules” with two measures which quantify the support and confidence of the rule for a given data set. Having their origin in market basked analysis, association rules are now one of the most popular tools in data mining. This popularity is to a large part due to the availability of efficient algorithms following from the development of the Apriori algorithm. We wil...
متن کامل****draft**** Algorithms for Association Rules
Association rules are ”if-then rules” with two measures which quantify the support and confidence of the rule for a given data set. Having their origin in market basked analysis, association rules are now one of the most popular tools in data mining. This popularity is to a large part due to the availability of efficient algorithms following from the development of the Apriori algorithm. In the...
متن کاملHiding Association Rules by Using Confidence and Support
Large repositories of data contain sensitive information which must be protected against unauthorized access. The protection of the confidentiality of tills information has been a long-term goal for the database security research community and the government statistical agencies. Recent advances, in data mining and machine learning algorithms, have increased the disclosure risks one may encount...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advances in Electrical and Electronic Engineering
سال: 2017
ISSN: 1804-3119,1336-1376
DOI: 10.15598/aeee.v15i2.2164