نتایج جستجو برای: data sanitization

تعداد نتایج: 2410486  

Journal: :Advanced Engineering Informatics 2007
Yu-Chiang Li Jieh-Shan Yeh Chin-Chen Chang

Data mining mechanisms have widely been applied in various businesses and manufacturing companies across many industry sectors. Sharing data or sharing mined rules has become a trend among business partnerships, as it is perceived to be a mutually benefit way of increasing productivity for all parties involved. Nevertheless, this has also increased the risk of unexpected information leaks when ...

Journal: :Expert Syst. Appl. 2008
Shyue-Liang Wang Rajeev Maskey Ayat Jafari Tzung-Pei Hong

Recent development in Privacy-Preserving Data Mining has proposed many efficient and practical techniques for hiding sensitive patterns or information from been discovered by data mining algorithms. In hiding association rules, current approaches require hidden rules or patterns to be given in advance. In addition, for Apriori algorithm based techniques [26], multiple scanning of the entire dat...

2013
David Sánchez Montserrat Batet Alexandre Viejo

Nowadays, the publication of textual documents provides critical benefits to scientific research and business scenarios where information analysis plays an essential role. Nevertheless, the possible existence of identifying or confidential data in this kind of documents motivates the use of measures to sanitize sensitive information before being published, while keeping the innocuous data unmod...

2006
Ahmed HajYasien Vladimir Estivill-Castro

Many privacy preserving data mining algorithms attempt to selectively hide what database owners consider as sensitive. Specifically, in the association-rules domain, many of these algorithms are based on item-restriction methods; that is, removing items from some transactions in order to hide sensitive frequent itemsets. The infancy of this area has not produced clear methods neither evaluated ...

2015
Tevfik Bultan

String manipulation errors in input validation and sanitization code are a common source for security vulnerabilities in web applications. This short survey summarizes the string analysis techniques we developed that can automatically identify and repair such vulnerabilities. Our approach (1) extracts clientand server-side input validation and sanitization functions, (2) models them as determin...

2004
Stanley R. M. Oliveira Osmar R. Zaïane Yücel Saygin

The sharing of association rules is often beneficial in industry, but requires privacy safeguards. One may decide to disclose only part of the knowledge and conceal strategic patterns which we call restrictive rules. These restrictive rules must be protected before sharing since they are paramount for strategic decisions and need to remain private. To address this challenging problem, we propos...

2005
Elmira T. Isakbaeva Marc-Alain Widdowson R. Suzanne Beard Sandra N. Bulens James Mullins Stephan S. Monroe Joseph Bresee Patricia Sassano Elaine H. Cramer Roger I. Glass

An outbreak of norovirus gastroenteritis affected passengers on two consecutive cruises of ship X and continued on 4 subsequent cruises despite a 1-week sanitization. We documented transmission by food and person-to-person contact; persistence of virus despite sanitization onboard, including introductions of new strains; and seeding of an outbreak on land.

Journal: :International Journal of Electrical and Computer Engineering (IJECE) 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید