Skip to main content

Data Mining for Security Applications and Its Privacy Implications

  • Conference paper
Privacy, Security, and Trust in KDD (PInKDD 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5456))

Included in the following conference series:

  • 607 Accesses

Abstract

In this paper we first examine data mining applications in security and their implications for privacy. We then examine the notion of privacy and provide an overview of the developments especially those on privacy preserving data mining. We then provide an agenda for research on privacy and data mining.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., Srikant, R.: Privacy-Preserving Data Mining. In: SIGMOD Conference, pp. 439–450 (2000)

    Google Scholar 

  2. Agrawal, R.: Data Mining and Privacy: Friends or Foes. In: SIGKDD Panel (2003)

    Google Scholar 

  3. Kantarcioglu, M., Clifton, C.: Privately Computing a Distributed k-nn Classifier. In: Boulicaut, J.-F., Esposito, F., Giannotti, F., Pedreschi, D. (eds.) PKDD 2004. LNCS, vol. 3202, pp. 279–290. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  4. Kantarcioglu, M., Kardes, O.: Privacy-Preserving Data Mining Applications in the Malicious Model. In: ICDM Workshops, pp. 717–722 (2007)

    Google Scholar 

  5. Liu, L., Kantarcioglu, M., Thuraisingham, B.M.: The applicability of the perturbation based privacy preserving data mining for real-world data. Data Knowl. Eng. 65(1), 5–21 (2008)

    Article  Google Scholar 

  6. Liu, L., Kantarcioglu, M., Thuraisingham, B.M.: A Novel Privacy Preserving Decision Tree. In: Proceedings Hawaii International Conf. on Systems Sciences (2009)

    Google Scholar 

  7. Thuraisingham, B.: One the Complexity of the Inference Problem. In: IEEE Computer Security Foundations Workshop (1990) (also available as MITRE Report, MTP-291)

    Google Scholar 

  8. Thuraisingham, B.M.: Privacy constraint processing in a privacy-enhanced database management system. Data Knowl. Eng. 55(2), 159–188 (2005)

    Article  Google Scholar 

  9. Clifton, C.: Using Sample Size to Limit Exposure to Data Mining. Journal of Computer Security 8(4) (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Thuraisingham, B. (2009). Data Mining for Security Applications and Its Privacy Implications. In: Bonchi, F., Ferrari, E., Jiang, W., Malin, B. (eds) Privacy, Security, and Trust in KDD. PInKDD 2008. Lecture Notes in Computer Science, vol 5456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01718-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-01718-6_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-01717-9

  • Online ISBN: 978-3-642-01718-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics