Data security and null value imputation in distributed information systems

被引:4
|
作者
Ras, ZW [1 ]
Dardzinska, A [1 ]
机构
[1] Univ N Carolina, Dept Comp Sci, Charlotte, NC 28223 USA
关键词
D O I
10.1007/3-540-32370-8_9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Distributed Information System (DIS) is seen as a collection of autonomous information systems which can collaborate with each other. This collaboration can be driven by requests for knowledge needed to predict what values should replace null values in missing or incomplete attributes. Any incompleteness in data can be seen either as the result of a partial knowledge about properties of objects stored in DIS or some attributes might be just hidden from users because of the security reason. Clearly, in the second case, we have to be certain that the missing values can not be predicted from the available data by chase, distributed chase or any other null value imputation method. Let us assume that an attributes d is hidden at one of the sites of DIS, denoted by S and called a client. With a goal to reconstruct this hidden attribute, a request for a definition of this attribute can be sent by S to some of its remote sites (see [15]). These definitions stored in a knowledge-base KB can be used by Chase algorithm (see [4], [6]) to impute missing attribute values describing objects in S. In this paper we show how to identify these objects and what additional values in S have to be hidden from users to guarantee that initially hidden attribute values in S can not be properly predicted by Distributed Chase.
引用
收藏
页码:133 / 146
页数:14
相关论文
共 50 条
  • [31] Missing value imputation for microarray gene expression data using histone acetylation information
    Xiang, Qian
    Dai, Xianhua
    Deng, Yangyang
    He, Caisheng
    Wang, Jiang
    Feng, Jihua
    Dai, Zhiming
    [J]. BMC BIOINFORMATICS, 2008, 9 (1)
  • [32] Missing value imputation for microarray gene expression data using histone acetylation information
    Qian Xiang
    Xianhua Dai
    Yangyang Deng
    Caisheng He
    Jiang Wang
    Jihua Feng
    Zhiming Dai
    [J]. BMC Bioinformatics, 9
  • [33] Toward management and imputation of unavailable data in online Advanced Traveler Information Systems
    Fernandez-Moctezuma, Rafael J.
    Tufte, Kristin A.
    Maier, David
    Bertini, Robert L.
    [J]. 2007 IEEE INTELLIGENT TRANSPORTATION SYSTEMS CONFERENCE, VOLS 1 AND 2, 2007, : 546 - +
  • [34] VALUE OF INFORMATION CONCEPT APPLIED TO DATA SYSTEMS
    MATHUSZ, DV
    [J]. OMEGA-INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE, 1977, 5 (05): : 593 - 608
  • [35] The value of intrusion detection systems in information technology security architecture
    Cavusoglu, H
    Mishra, B
    Raghunathan, S
    [J]. INFORMATION SYSTEMS RESEARCH, 2005, 16 (01) : 28 - 46
  • [36] DATA SECURITY IN INFORMATION-SYSTEMS BY LANGUAGE ANALYSIS
    MEINZER, HP
    SANDBLAD, B
    [J]. COMPUTER PROGRAMS IN BIOMEDICINE, 1979, 10 (02): : 175 - 181
  • [37] Security of e-data in sensitive information systems
    Simovic, Vladimir
    Varga, Matija
    Milkovic, Marin
    [J]. INTERNATIONAL JOURNAL OF INNOVATION AND LEARNING, 2015, 18 (04) : 487 - 517
  • [38] Modeling Big Data Management Systems in Information Security
    Poltavtseva, M. A.
    Kalinin, M. O.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 895 - 902
  • [39] Value of information for spatially distributed systems: Application to sensor placement
    Malings, Carl
    Pozzi, Matteo
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2016, 154 : 219 - 233
  • [40] Addressing the problem of data security in healthcare information systems
    Furnell, SM
    Sanders, PW
    Warren, MJ
    [J]. CURRENT PERSPECTIVES IN HEALTHCARE COMPUTING, CONFERENCE, 1997, : 55 - 62