dc.contributor.author | Abdellah, Mohamed Refaat | |
dc.contributor.author | Mohamed, Hesham Aboelsoud | |
dc.contributor.author | Badran, Khaled Shafee | |
dc.contributor.author | Senousy, Mohamed Badr | |
dc.date.accessioned | 2017-11-27T11:37:32Z | |
dc.date.available | 2017-11-27T11:37:32Z | |
dc.date.issued | 2017 | |
dc.identifier.citation | Advances in electrical and electronic engineering. 2017, vol. 15, no. 2, p. 192-202 : ill. | cs |
dc.identifier.issn | 1336-1376 | |
dc.identifier.issn | 1804-3119 | |
dc.identifier.uri | http://hdl.handle.net/10084/121805 | |
dc.description.abstract | This paper presents database security approach for complete hiding of sensitive association rules by using six novel algorithms. These algorithms utilize three new weights to reduce the needed database modifications and support complete hiding, as well as they reduce the knowledge distortion and the data distortions. Complete weighted hiding algorithms enhance the hiding failure by 100%; these algorithms have the advantage of performing only a single scan for the database to gather the required information to form the hiding process. These proposed algorithms are built within the database structure which enables the sanitized database to be generated on run time as needed. | cs |
dc.format.extent | 1296215 bytes | |
dc.format.mimetype | application/pdf | |
dc.language | Neuvedeno | cs |
dc.language.iso | en | cs |
dc.publisher | Vysoká škola báňská - Technická univerzita Ostrava | cs |
dc.relation.ispartofseries | Advances in electrical and electronic engineering | cs |
dc.relation.uri | http://dx.doi.org/10.15598/aeee.v15i2.2164 | |
dc.rights | © Vysoká škola báňská - Technická univerzita Ostrava | |
dc.rights | © Vysoká škola báňská - Technická univerzita Ostrava | |
dc.rights | Attribution 4.0 International | * |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | * |
dc.subject | association rule | cs |
dc.subject | complete hiding approaches | cs |
dc.subject | database security | cs |
dc.subject | privacy preserving data mining | cs |
dc.title | Integrated association rules complete hiding algorithms | cs |
dc.type | article | cs |
dc.identifier.doi | 10.15598/aeee.v15i2.2164 | |
dc.rights.access | openAccess | |
dc.type.version | publishedVersion | |
dc.type.status | Peer-reviewed | |