Evaluation of Sensitive Data Hiding Techniques for Transaction Databases.
Christos MakrisPanagiotis MarkovitsPublished in: SETN (2018)
Keyphrases
- sensitive data
- transaction databases
- privacy preserving
- data storage
- smart card
- mining algorithm
- privacy preservation
- frequent itemset mining
- privacy protection
- database
- information security
- frequent patterns
- frequent itemsets
- data sharing
- information sharing
- mining association rules
- database management systems
- data sets