The process of discovering relevant patterns holding in a database, was first indicated as a threat to database security by O' Leary. Since then, many different approaches for knowledge hiding have emerged over the years, mainly in the context of association rules and frequent itemsets mining. Following many real-world data and applications demands, in this paper we shift the problem of knowledge hiding to contexts where both the data and the extracted knowledge have a sequential structure. We provide problem statement, some theoretical issues including NP-hardness of the problem, a polynomial sanitization algorithm and an experimental evaluation. Finally we discuss possible extensions that will allow to use this work as a basic building block formore complex kinds of patterns and applications.
Hiding sequences
Atzori M;Bonchi F;Giannotti F
2007
Abstract
The process of discovering relevant patterns holding in a database, was first indicated as a threat to database security by O' Leary. Since then, many different approaches for knowledge hiding have emerged over the years, mainly in the context of association rules and frequent itemsets mining. Following many real-world data and applications demands, in this paper we shift the problem of knowledge hiding to contexts where both the data and the extracted knowledge have a sequential structure. We provide problem statement, some theoretical issues including NP-hardness of the problem, a polynomial sanitization algorithm and an experimental evaluation. Finally we discuss possible extensions that will allow to use this work as a basic building block formore complex kinds of patterns and applications.File | Dimensione | Formato | |
---|---|---|---|
prod_91794-doc_130887.pdf
accesso aperto
Descrizione: Hiding sequences
Tipologia:
Versione Editoriale (PDF)
Dimensione
314.38 kB
Formato
Adobe PDF
|
314.38 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.