Security Measures in Data Mining
Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of...
Gespeichert in:
Veröffentlicht in: | International journal of information engineering and electronic business 2012-07, Vol.4 (3), p.34-39 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 39 |
---|---|
container_issue | 3 |
container_start_page | 34 |
container_title | International journal of information engineering and electronic business |
container_volume | 4 |
creator | Gupta, Anish Bibhu, Vimal Hussain, Rashid |
description | Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of security for data mining in tabular format. The summarization is performed by the requirements with different aspects of security measure of data mining. The performances and outcomes are determined by the given factors under the summarization criteria. Effects are also given under the tabular form for the requirements of different parameters of security aspects. |
doi_str_mv | 10.5815/ijieeb.2012.03.05 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1625908086</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3500284211</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1135-773a1071f4476fb0a5004b732f2b1ba3a647e10f0901cd8d0b364c2b766d98ba3</originalsourceid><addsrcrecordid>eNo9kEtLxDAUhYMoOIzzA9wVXLfem3eXMj5hBhfqOiRtIinajkm7mH9vh4p3c-7i4xz4CLlGqIRGcRu76L2rKCCtgFUgzsiKguJlDQzP_3_KLskm5w7mk1RxDStSvPlmSnE8Fntv85R8LmJf3NvRFvvYx_7zilwE-5X95i_X5OPx4X37XO5en162d7uyQWSiVIpZBIWBcyWDAysAuFOMBurQWWYlVx4hQA3YtLoFxyRvqFNStrWegTW5WXoPafiZfB5NN0ypnycNSipq0KDlTOFCNWnIOflgDil-23Q0CObkwiwuzMmFAWZAsF9IPE_5</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1625908086</pqid></control><display><type>article</type><title>Security Measures in Data Mining</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Gupta, Anish ; Bibhu, Vimal ; Hussain, Rashid</creator><creatorcontrib>Gupta, Anish ; Bibhu, Vimal ; Hussain, Rashid</creatorcontrib><description>Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of security for data mining in tabular format. The summarization is performed by the requirements with different aspects of security measure of data mining. The performances and outcomes are determined by the given factors under the summarization criteria. Effects are also given under the tabular form for the requirements of different parameters of security aspects.</description><identifier>ISSN: 2074-9023</identifier><identifier>EISSN: 2074-9031</identifier><identifier>DOI: 10.5815/ijieeb.2012.03.05</identifier><language>eng</language><publisher>Hong Kong: Modern Education and Computer Science Press</publisher><ispartof>International journal of information engineering and electronic business, 2012-07, Vol.4 (3), p.34-39</ispartof><rights>Copyright Modern Education and Computer Science Press Jul 2012</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,777,781,27905,27906</link.rule.ids></links><search><creatorcontrib>Gupta, Anish</creatorcontrib><creatorcontrib>Bibhu, Vimal</creatorcontrib><creatorcontrib>Hussain, Rashid</creatorcontrib><title>Security Measures in Data Mining</title><title>International journal of information engineering and electronic business</title><description>Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of security for data mining in tabular format. The summarization is performed by the requirements with different aspects of security measure of data mining. The performances and outcomes are determined by the given factors under the summarization criteria. Effects are also given under the tabular form for the requirements of different parameters of security aspects.</description><issn>2074-9023</issn><issn>2074-9031</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNo9kEtLxDAUhYMoOIzzA9wVXLfem3eXMj5hBhfqOiRtIinajkm7mH9vh4p3c-7i4xz4CLlGqIRGcRu76L2rKCCtgFUgzsiKguJlDQzP_3_KLskm5w7mk1RxDStSvPlmSnE8Fntv85R8LmJf3NvRFvvYx_7zilwE-5X95i_X5OPx4X37XO5en162d7uyQWSiVIpZBIWBcyWDAysAuFOMBurQWWYlVx4hQA3YtLoFxyRvqFNStrWegTW5WXoPafiZfB5NN0ypnycNSipq0KDlTOFCNWnIOflgDil-23Q0CObkwiwuzMmFAWZAsF9IPE_5</recordid><startdate>20120701</startdate><enddate>20120701</enddate><creator>Gupta, Anish</creator><creator>Bibhu, Vimal</creator><creator>Hussain, Rashid</creator><general>Modern Education and Computer Science Press</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BVBZV</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>M0N</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>Q9U</scope></search><sort><creationdate>20120701</creationdate><title>Security Measures in Data Mining</title><author>Gupta, Anish ; Bibhu, Vimal ; Hussain, Rashid</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1135-773a1071f4476fb0a5004b732f2b1ba3a647e10f0901cd8d0b364c2b766d98ba3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Gupta, Anish</creatorcontrib><creatorcontrib>Bibhu, Vimal</creatorcontrib><creatorcontrib>Hussain, Rashid</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>East & South Asia Database</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Computing Database</collection><collection>Engineering Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of information engineering and electronic business</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Gupta, Anish</au><au>Bibhu, Vimal</au><au>Hussain, Rashid</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security Measures in Data Mining</atitle><jtitle>International journal of information engineering and electronic business</jtitle><date>2012-07-01</date><risdate>2012</risdate><volume>4</volume><issue>3</issue><spage>34</spage><epage>39</epage><pages>34-39</pages><issn>2074-9023</issn><eissn>2074-9031</eissn><abstract>Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of security for data mining in tabular format. The summarization is performed by the requirements with different aspects of security measure of data mining. The performances and outcomes are determined by the given factors under the summarization criteria. Effects are also given under the tabular form for the requirements of different parameters of security aspects.</abstract><cop>Hong Kong</cop><pub>Modern Education and Computer Science Press</pub><doi>10.5815/ijieeb.2012.03.05</doi><tpages>6</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2074-9023 |
ispartof | International journal of information engineering and electronic business, 2012-07, Vol.4 (3), p.34-39 |
issn | 2074-9023 2074-9031 |
language | eng |
recordid | cdi_proquest_journals_1625908086 |
source | EZB-FREE-00999 freely available EZB journals |
title | Security Measures in Data Mining |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T20%3A57%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20Measures%20in%20Data%20Mining&rft.jtitle=International%20journal%20of%20information%20engineering%20and%20electronic%20business&rft.au=Gupta,%20Anish&rft.date=2012-07-01&rft.volume=4&rft.issue=3&rft.spage=34&rft.epage=39&rft.pages=34-39&rft.issn=2074-9023&rft.eissn=2074-9031&rft_id=info:doi/10.5815/ijieeb.2012.03.05&rft_dat=%3Cproquest_cross%3E3500284211%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1625908086&rft_id=info:pmid/&rfr_iscdi=true |