Security procedures for classification mining algorithms

T Johnsten, VV Raghavan - Database and Application Security XV: IFIP …, 2002 - Springer
Classification mining algorithms can be used to discover protected values from non-
protected data that are voluntarily released for mining purposes. We reported earlier on the
development of an assessment algorithm, along with a set of security policies, for use in
analyzing a protected data element's risk of disclosure with respect to decision-region based
algorithms. This paper presents an extension of the previous work. Specifically, two
algorithms, one for assessing a protected data element's risk of disclosure with respect to …

SECURITY PROCEDURES FOR CLASSIFICATION MINING ALGORITHMS

VV Raghavan - Database and Application Security XV: IFIP TC11 …, 2002 - books.google.com
Classification mining algorithms can be used to discover protected values from non-
protected data that are voluntarily released for mining purposes. We reported earlier on the
development of an assessment algorithm, along with a set of security policies, for use in
analyzing a protected data element's risk of disclosure with respect to decision-region based
algorithms. This paper presents an extension of the previous work. Specifically, two
algorithms, one for assessing a protected data element's risk of disclosure with respect to …
Showing the best results for this search. See all results