Security Measures in Data Mining

Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of information engineering and electronic business 2012-07, Vol.4 (3), p.34-39
Hauptverfasser: Gupta, Anish, Bibhu, Vimal, Hussain, Rashid
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 39
container_issue 3
container_start_page 34
container_title International journal of information engineering and electronic business
container_volume 4
creator Gupta, Anish
Bibhu, Vimal
Hussain, Rashid
description Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of security for data mining in tabular format. The summarization is performed by the requirements with different aspects of security measure of data mining. The performances and outcomes are determined by the given factors under the summarization criteria. Effects are also given under the tabular form for the requirements of different parameters of security aspects.
doi_str_mv 10.5815/ijieeb.2012.03.05
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1625908086</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3500284211</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1135-773a1071f4476fb0a5004b732f2b1ba3a647e10f0901cd8d0b364c2b766d98ba3</originalsourceid><addsrcrecordid>eNo9kEtLxDAUhYMoOIzzA9wVXLfem3eXMj5hBhfqOiRtIinajkm7mH9vh4p3c-7i4xz4CLlGqIRGcRu76L2rKCCtgFUgzsiKguJlDQzP_3_KLskm5w7mk1RxDStSvPlmSnE8Fntv85R8LmJf3NvRFvvYx_7zilwE-5X95i_X5OPx4X37XO5en162d7uyQWSiVIpZBIWBcyWDAysAuFOMBurQWWYlVx4hQA3YtLoFxyRvqFNStrWegTW5WXoPafiZfB5NN0ypnycNSipq0KDlTOFCNWnIOflgDil-23Q0CObkwiwuzMmFAWZAsF9IPE_5</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1625908086</pqid></control><display><type>article</type><title>Security Measures in Data Mining</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Gupta, Anish ; Bibhu, Vimal ; Hussain, Rashid</creator><creatorcontrib>Gupta, Anish ; Bibhu, Vimal ; Hussain, Rashid</creatorcontrib><description>Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of security for data mining in tabular format. The summarization is performed by the requirements with different aspects of security measure of data mining. The performances and outcomes are determined by the given factors under the summarization criteria. Effects are also given under the tabular form for the requirements of different parameters of security aspects.</description><identifier>ISSN: 2074-9023</identifier><identifier>EISSN: 2074-9031</identifier><identifier>DOI: 10.5815/ijieeb.2012.03.05</identifier><language>eng</language><publisher>Hong Kong: Modern Education and Computer Science Press</publisher><ispartof>International journal of information engineering and electronic business, 2012-07, Vol.4 (3), p.34-39</ispartof><rights>Copyright Modern Education and Computer Science Press Jul 2012</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,777,781,27905,27906</link.rule.ids></links><search><creatorcontrib>Gupta, Anish</creatorcontrib><creatorcontrib>Bibhu, Vimal</creatorcontrib><creatorcontrib>Hussain, Rashid</creatorcontrib><title>Security Measures in Data Mining</title><title>International journal of information engineering and electronic business</title><description>Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of security for data mining in tabular format. The summarization is performed by the requirements with different aspects of security measure of data mining. The performances and outcomes are determined by the given factors under the summarization criteria. Effects are also given under the tabular form for the requirements of different parameters of security aspects.</description><issn>2074-9023</issn><issn>2074-9031</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNo9kEtLxDAUhYMoOIzzA9wVXLfem3eXMj5hBhfqOiRtIinajkm7mH9vh4p3c-7i4xz4CLlGqIRGcRu76L2rKCCtgFUgzsiKguJlDQzP_3_KLskm5w7mk1RxDStSvPlmSnE8Fntv85R8LmJf3NvRFvvYx_7zilwE-5X95i_X5OPx4X37XO5en162d7uyQWSiVIpZBIWBcyWDAysAuFOMBurQWWYlVx4hQA3YtLoFxyRvqFNStrWegTW5WXoPafiZfB5NN0ypnycNSipq0KDlTOFCNWnIOflgDil-23Q0CObkwiwuzMmFAWZAsF9IPE_5</recordid><startdate>20120701</startdate><enddate>20120701</enddate><creator>Gupta, Anish</creator><creator>Bibhu, Vimal</creator><creator>Hussain, Rashid</creator><general>Modern Education and Computer Science Press</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BVBZV</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>M0N</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>Q9U</scope></search><sort><creationdate>20120701</creationdate><title>Security Measures in Data Mining</title><author>Gupta, Anish ; Bibhu, Vimal ; Hussain, Rashid</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1135-773a1071f4476fb0a5004b732f2b1ba3a647e10f0901cd8d0b364c2b766d98ba3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Gupta, Anish</creatorcontrib><creatorcontrib>Bibhu, Vimal</creatorcontrib><creatorcontrib>Hussain, Rashid</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>East &amp; South Asia Database</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Computing Database</collection><collection>Engineering Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of information engineering and electronic business</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Gupta, Anish</au><au>Bibhu, Vimal</au><au>Hussain, Rashid</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security Measures in Data Mining</atitle><jtitle>International journal of information engineering and electronic business</jtitle><date>2012-07-01</date><risdate>2012</risdate><volume>4</volume><issue>3</issue><spage>34</spage><epage>39</epage><pages>34-39</pages><issn>2074-9023</issn><eissn>2074-9031</eissn><abstract>Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of security for data mining in tabular format. The summarization is performed by the requirements with different aspects of security measure of data mining. The performances and outcomes are determined by the given factors under the summarization criteria. Effects are also given under the tabular form for the requirements of different parameters of security aspects.</abstract><cop>Hong Kong</cop><pub>Modern Education and Computer Science Press</pub><doi>10.5815/ijieeb.2012.03.05</doi><tpages>6</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2074-9023
ispartof International journal of information engineering and electronic business, 2012-07, Vol.4 (3), p.34-39
issn 2074-9023
2074-9031
language eng
recordid cdi_proquest_journals_1625908086
source EZB-FREE-00999 freely available EZB journals
title Security Measures in Data Mining
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T20%3A57%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20Measures%20in%20Data%20Mining&rft.jtitle=International%20journal%20of%20information%20engineering%20and%20electronic%20business&rft.au=Gupta,%20Anish&rft.date=2012-07-01&rft.volume=4&rft.issue=3&rft.spage=34&rft.epage=39&rft.pages=34-39&rft.issn=2074-9023&rft.eissn=2074-9031&rft_id=info:doi/10.5815/ijieeb.2012.03.05&rft_dat=%3Cproquest_cross%3E3500284211%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1625908086&rft_id=info:pmid/&rfr_iscdi=true