[go: up one dir, main page]

skip to main content
10.1145/310889.310921acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article
Free access

Parsimonious downgrading and decision trees applied to the inference problem

Published: 01 January 1998 Publication History
First page of PDF

References

[1]
Chang, L., and Moskowitz, I.S. (1998) "Bayesian Methods Applied to the Database Inference Problem," Proc. IFIP WGll.3 Working Conference on Database Security, Greece, 1998.
[2]
Dudewicz, E.J., and Moshra, S.N. (1988) Modern Mathematical Statistics, Wiley.
[3]
Feigenbaum, McCorduck, & Nil (1988) Rise of the Expert Company, Times Books.
[4]
Hosmer, H. (1993) "Security is Fuzzy!," Proc. New Security Paradigms Workshop, pp. 175-184, 1993.
[5]
Kaug, M.H., Moore, A. & Moskowitz, I.S. (1998) "Design and Assurance Strategy for the NRL Pump," Computer, }EEE CS Press, April, pp. 56-64, 1998.
[6]
Lin, T.Y., Hinke, T.H., Marks, D.G., & Thuraisingham, B. (1996) "Security and Data Mining," Database Security Vol. 9: Status and Prospects, IFIP, pp. 391-399.
[7]
Moskowitz, I.S. and Kang, M.H. (1997) "An Insecurity Flow Model," Proc. New Security Paradigms, pp. 61- 74, 1997.
[8]
Moskowitz, I.S. and Chang, L. (1999) "A Formal view of the Database Inference Problem," Proc. CIMCA'99, 1999.
[9]
Pawlak, Z. (1982) "Rough Sets," Int. J. Comput. Inf. Sei., 11. pp 341-356, 1982.
[10]
Quinlan, J.R. (1979) "Discovering Rules by Induction from Large Numbers of examples: A Case Study," Expert Systems in the Micro-Electronic Age, D. Michie, editor, Edinburg Univ. Press.
[11]
Quinlan, J.R. (}993) C4.5 Programs for Machine Learning. Morgan-Kaufmann.
[12]
Shannon, C. (1948) "A Mathematical Theory of Communication," Bell System Technical Journal, Vol. 27, pp. 379-423, 623-656, July, October, 1948.
[13]
Syverson, P.F. (1997) "A Different Look at Secure Distributed Computation," Proc. Computer Security Foundations Workshop, pp. 109-115, 1997.
[14]
Waldram, J.R. (1985) The Theory of Thermodynamics, Cambridge University Press.
[15]
Winston, tI. (1991) Artificial intelligence, 3rd Ed., Addison-Wesly.
[16]
Zhang, K (1997) "IRI: A Quantitative Approach to Inference Analysis in Relational Databases," Proc. IFIP WG 11.3 Working Con}erence on Database Security, 1997.

Cited By

View all
  • (2023)APPLICATION OF COMPUTER SIMULATION TO THE ANONYMIZATION OF PERSONAL DATA: STATE-OF-THE-ART AND KEY POINTSПрограммирование10.31857/S0132347423040040(58-74)Online publication date: 1-Jul-2023
  • (2023)Application of Computer Simulation to the Anonymization of Personal Data: State-of-the-Art and Key PointsProgramming and Computer Software10.1134/S036176882304004749:4(232-246)Online publication date: 28-Jul-2023
  • (2021)A survey on federated learning in data miningWIREs Data Mining and Knowledge Discovery10.1002/widm.144312:1Online publication date: 9-Dec-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
NSPW '98: Proceedings of the 1998 workshop on New security paradigms
January 1998
142 pages
ISBN:1581131682
DOI:10.1145/310889
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 January 1998

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. data mining
  2. downgrading
  3. inference
  4. rules

Qualifiers

  • Article

Conference

NSPW98
Sponsor:
NSPW98: New Security Paradigms Workshop '98
September 22 - 26, 1998
Virginia, Charlottesville, USA

Acceptance Rates

Overall Acceptance Rate 62 of 170 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)28
  • Downloads (Last 6 weeks)6
Reflects downloads up to 04 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2023)APPLICATION OF COMPUTER SIMULATION TO THE ANONYMIZATION OF PERSONAL DATA: STATE-OF-THE-ART AND KEY POINTSПрограммирование10.31857/S0132347423040040(58-74)Online publication date: 1-Jul-2023
  • (2023)Application of Computer Simulation to the Anonymization of Personal Data: State-of-the-Art and Key PointsProgramming and Computer Software10.1134/S036176882304004749:4(232-246)Online publication date: 28-Jul-2023
  • (2021)A survey on federated learning in data miningWIREs Data Mining and Knowledge Discovery10.1002/widm.144312:1Online publication date: 9-Dec-2021
  • (2020)Local Distortion Hiding (LDH) Algorithm: a Java-based prototype11th Hellenic Conference on Artificial Intelligence10.1145/3411408.3411419(144-149)Online publication date: 2-Sep-2020
  • (2020)A reversible privacy-preserving clustering technique based on k-means algorithmApplied Soft Computing10.1016/j.asoc.2019.10599587(105995)Online publication date: Feb-2020
  • (2020)Knowledge Hiding in Decision Trees for Learning Analytics ApplicationsAdvances in Core Computer Science-Based Technologies10.1007/978-3-030-41196-1_3(37-54)Online publication date: 19-Jun-2020
  • (2019)Using Minimum Local Distortion to Hide Decision Tree RulesEntropy10.3390/e2104033421:4(334)Online publication date: 28-Mar-2019
  • (2019)On Using Linear Diophantine Equations for in-Parallel Hiding of Decision Tree RulesEntropy10.3390/e2101006621:1(66)Online publication date: 14-Jan-2019
  • (2018)Shifting ParadigmsProceedings of the New Security Paradigms Workshop10.1145/3285002.3285013(28-40)Online publication date: 28-Aug-2018
  • (2018)On Using Linear Diophantine Equations for Efficient Hiding of Decision Tree RulesProceedings of the 10th Hellenic Conference on Artificial Intelligence10.1145/3200947.3201030(1-8)Online publication date: 9-Jul-2018
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media