skip to main content
article

Data mining, national security, privacy and civil liberties

Published:01 December 2002Publication History
Skip Abstract Section

Abstract

In this paper, we describe the threats to privacy that can occur through data mining and then view the privacy problem as a variation of the inference problem in databases.

References

  1. {ACM02} ACM Computer Security Conference Workshop on Privacy, Washington DC, November 2002.]]Google ScholarGoogle Scholar
  2. {AFSB83} Air Force Summer Study Report on Multilevel Secure Database Systems, Washington DC, 1983.]]Google ScholarGoogle Scholar
  3. {AGRA00} Agrawal, R, and R. Srikant, "Privacy-preserving Data Mining," Proceedings of the ACM SIGMOD Conference, Dallas, TX, May 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. {BAIN03} Bainbridge, W., "Privacy," Encyclopedia of Community, Sage Reference, Thousand Oaks, CA, 2003]]Google ScholarGoogle Scholar
  5. {CLIF96} Clifton, C. and D. Marks, "Security and Privacy Implications of Data Mining", Proceedings of the ACM SIGMOD Conference Workshop on Research Issues in Data Mining and Knowledge Discovery, Montreal, June 1996.]]Google ScholarGoogle Scholar
  6. {CLIF00} Clifton, C., "Using Sample Size to Limit Exposure to Data Mining," Journal of Computer Security, November 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. {CLIF02} Clifton, C., M. Kantarcioglu and J. Vaidya, "Defining Privacy for Data Mining," Purdue University, 2002 (see also Next Generation Data Mining Workshop, Baltimore, MD, November 2002).]]Google ScholarGoogle Scholar
  8. {EVFI02} Evfimievski, A., R. Srikant, R. Agrawal, and J. Gehrke, "Privacy Preserving Mining of Association Rules," In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Edmonton, Alberta, Canada, July 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. {GEHR02} Gehrke, J., "Research Problems in Data Stream Processing and Privacy-Preserving Data Mining," Proceedings of the Next Generation Data Mining Workshop, Baltimore, MD, November 2002.]]Google ScholarGoogle Scholar
  10. {HINK88} Hinke T., "Inference and Aggregation Detection in Database Management Systems," Proceedings of the Security and Privacy Conference, Oakland, CA, April 1988.]]Google ScholarGoogle Scholar
  11. {MORG88} Morgenstern, M., "Security and Inference in Multilevel Database and Knowledge Base Systems," Proceedings of the ACM SIGMOD Conference, San Francisco, CA, June 1987.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. {NGDM02} Next Generation Data Mining Workshop, Baltimore, MD, November 2002.]]Google ScholarGoogle Scholar
  13. {THUR87} Thuraisingham, B., "Multilevel Security for Relational Database Systems Augmented by an Inference Engine," Computers and Security," December 1987.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. {THUR90} Thuraisingham, B., "Recursion Theoretic Properties of the Inference Problem," MITRE Report MTP291, June 1990 (also presented at the 1990 Computer Security Foundations Workshop, Franconia, NH, June 1990).]]Google ScholarGoogle Scholar
  15. {THUR91a} Thuraisingham, B., "On the Use of Conceptual Structures to Handle the Inference Problem," Proceedings of the 1991 IFIP Database Security Conference, Shepherdstown, WVA, November 1991.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. {THUR91b} Thuraisingham, B., "Nonmonotonic Types Multilevel Logic for Multilevel Secure Data and Knowledge Base Management System," Proceedings of the IEEE Computer Security Foundations Workshop, Franconia, NH, June 1991.]]Google ScholarGoogle Scholar
  17. {THUR93} Thuraisingham, B., W. Ford and M. Collins, "Design and Implementation of a Database Infernce Controller," Data and Knowledge Engineering Journal, December 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. {THUR95} Thuraisingham B. and W. Ford, "Security Constraint Processing in a Multilevel Distributed Database Management System," IEEE Transactions on Knowledge and Data Engineering, April 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. {THUR96} Thuraisingham, B., "Data Warehousing, Data Mining and Security," IFIP Database Security Conference, Como, Italy, July 1996 (paper in book by Chapman and Hall, 1997).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. {THUR98} Thuraisingham, B., "Data Mining: Technologies, Techniques, Tools and Trends," CRC Press, FL, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. {THUR03} Thuraisingham, B. "Web Data Mining: Technologies and Their Applications to Counter-terrorism," CRC Press, FL, 2003.]]Google ScholarGoogle Scholar

Index Terms

  1. Data mining, national security, privacy and civil liberties
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader