Abstract
In this paper, we describe the threats to privacy that can occur through data mining and then view the privacy problem as a variation of the inference problem in databases.
- {ACM02} ACM Computer Security Conference Workshop on Privacy, Washington DC, November 2002.]]Google Scholar
- {AFSB83} Air Force Summer Study Report on Multilevel Secure Database Systems, Washington DC, 1983.]]Google Scholar
- {AGRA00} Agrawal, R, and R. Srikant, "Privacy-preserving Data Mining," Proceedings of the ACM SIGMOD Conference, Dallas, TX, May 2000.]] Google ScholarDigital Library
- {BAIN03} Bainbridge, W., "Privacy," Encyclopedia of Community, Sage Reference, Thousand Oaks, CA, 2003]]Google Scholar
- {CLIF96} Clifton, C. and D. Marks, "Security and Privacy Implications of Data Mining", Proceedings of the ACM SIGMOD Conference Workshop on Research Issues in Data Mining and Knowledge Discovery, Montreal, June 1996.]]Google Scholar
- {CLIF00} Clifton, C., "Using Sample Size to Limit Exposure to Data Mining," Journal of Computer Security, November 2000.]] Google ScholarDigital Library
- {CLIF02} Clifton, C., M. Kantarcioglu and J. Vaidya, "Defining Privacy for Data Mining," Purdue University, 2002 (see also Next Generation Data Mining Workshop, Baltimore, MD, November 2002).]]Google Scholar
- {EVFI02} Evfimievski, A., R. Srikant, R. Agrawal, and J. Gehrke, "Privacy Preserving Mining of Association Rules," In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Edmonton, Alberta, Canada, July 2002.]] Google ScholarDigital Library
- {GEHR02} Gehrke, J., "Research Problems in Data Stream Processing and Privacy-Preserving Data Mining," Proceedings of the Next Generation Data Mining Workshop, Baltimore, MD, November 2002.]]Google Scholar
- {HINK88} Hinke T., "Inference and Aggregation Detection in Database Management Systems," Proceedings of the Security and Privacy Conference, Oakland, CA, April 1988.]]Google Scholar
- {MORG88} Morgenstern, M., "Security and Inference in Multilevel Database and Knowledge Base Systems," Proceedings of the ACM SIGMOD Conference, San Francisco, CA, June 1987.]] Google ScholarDigital Library
- {NGDM02} Next Generation Data Mining Workshop, Baltimore, MD, November 2002.]]Google Scholar
- {THUR87} Thuraisingham, B., "Multilevel Security for Relational Database Systems Augmented by an Inference Engine," Computers and Security," December 1987.]] Google ScholarDigital Library
- {THUR90} Thuraisingham, B., "Recursion Theoretic Properties of the Inference Problem," MITRE Report MTP291, June 1990 (also presented at the 1990 Computer Security Foundations Workshop, Franconia, NH, June 1990).]]Google Scholar
- {THUR91a} Thuraisingham, B., "On the Use of Conceptual Structures to Handle the Inference Problem," Proceedings of the 1991 IFIP Database Security Conference, Shepherdstown, WVA, November 1991.]] Google ScholarDigital Library
- {THUR91b} Thuraisingham, B., "Nonmonotonic Types Multilevel Logic for Multilevel Secure Data and Knowledge Base Management System," Proceedings of the IEEE Computer Security Foundations Workshop, Franconia, NH, June 1991.]]Google Scholar
- {THUR93} Thuraisingham, B., W. Ford and M. Collins, "Design and Implementation of a Database Infernce Controller," Data and Knowledge Engineering Journal, December 1993.]] Google ScholarDigital Library
- {THUR95} Thuraisingham B. and W. Ford, "Security Constraint Processing in a Multilevel Distributed Database Management System," IEEE Transactions on Knowledge and Data Engineering, April 1995.]] Google ScholarDigital Library
- {THUR96} Thuraisingham, B., "Data Warehousing, Data Mining and Security," IFIP Database Security Conference, Como, Italy, July 1996 (paper in book by Chapman and Hall, 1997).]] Google ScholarDigital Library
- {THUR98} Thuraisingham, B., "Data Mining: Technologies, Techniques, Tools and Trends," CRC Press, FL, 1998.]] Google ScholarDigital Library
- {THUR03} Thuraisingham, B. "Web Data Mining: Technologies and Their Applications to Counter-terrorism," CRC Press, FL, 2003.]]Google Scholar
Index Terms
- Data mining, national security, privacy and civil liberties
Recommendations
Countering Terrorism through Information and Privacy Protection Technologies
Security and privacy aren't dichotomous or conflicting concerns--the solution lies in developing and integrating advanced information technologies for counterterrorism along with privacy-protection technologies to safeguard civil liberties. Coordinated ...
IMR based Anonymization for Privacy Preservation in Data Mining
KMO '16: Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting SocietyPrivacy Preserving Data Mining (PPDM) is a data mining research area that aims to protect individual's personal information from unsolicited or unauthorized disclosure. Privacy relates to personal information that a person would not wish others to know ...
Fool's Gold in the Nation's Data-Mining Programs
Under the USA PATRIOT Act, the government has a wide range of options to use in what has been labeled as the "War Against Terror." Among those options is the use of data-mining programs. More than 50 federal departments and agencies are now using about ...
Comments