{"id":"https://openalex.org/W1972328629","doi":"https://doi.org/10.1145/2393216.2393264","title":"An enhanced secure preserving for pre-processed data using DMI and PCRBAC algorithm","display_name":"An enhanced secure preserving for pre-processed data using DMI and PCRBAC algorithm","publication_year":2012,"publication_date":"2012-10-26","ids":{"openalex":"https://openalex.org/W1972328629","doi":"https://doi.org/10.1145/2393216.2393264","mag":"1972328629"},"language":"en","primary_location":{"id":"doi:10.1145/2393216.2393264","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2393216.2393264","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"R. S. Ramya","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"R. S. Ramya","raw_affiliation_strings":["SNS College of Technology, Coimbatore","SNS College Of Technology, Coimbatore"],"affiliations":[{"raw_affiliation_string":"SNS College of Technology, Coimbatore","institution_ids":[]},{"raw_affiliation_string":"SNS College Of Technology, Coimbatore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018033657","display_name":"Sabina Priyadarshini","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. Priyadarshini","raw_affiliation_strings":["SNS College of Technology, Coimbatore","SNS College Of Technology, Coimbatore"],"affiliations":[{"raw_affiliation_string":"SNS College of Technology, Coimbatore","institution_ids":[]},{"raw_affiliation_string":"SNS College Of Technology, Coimbatore","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108040064","display_name":"S. Karthik","orcid":"https://orcid.org/0000-0002-8596-230X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. Karthik","raw_affiliation_strings":["SNS College of Technology, Coimbatore","SNS College Of Technology, Coimbatore"],"affiliations":[{"raw_affiliation_string":"SNS College of Technology, Coimbatore","institution_ids":[]},{"raw_affiliation_string":"SNS College Of Technology, Coimbatore","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.07080935,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"283","last_page":"287"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8339502811431885},{"id":"https://openalex.org/keywords/data-pre-processing","display_name":"Data pre-processing","score":0.7235935926437378},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.7230910658836365},{"id":"https://openalex.org/keywords/missing-data","display_name":"Missing data","score":0.6406261920928955},{"id":"https://openalex.org/keywords/raw-data","display_name":"Raw data","score":0.6206027269363403},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.5826709866523743},{"id":"https://openalex.org/keywords/outlier","display_name":"Outlier","score":0.5799673795700073},{"id":"https://openalex.org/keywords/data-quality","display_name":"Data quality","score":0.5766162276268005},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.5613240003585815},{"id":"https://openalex.org/keywords/imputation","display_name":"Imputation (statistics)","score":0.4811623990535736},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46923142671585083},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.41167089343070984},{"id":"https://openalex.org/keywords/data-cleansing","display_name":"Data cleansing","score":0.4111960828304291},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3572823405265808},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.17583432793617249},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1626063883304596},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.15536925196647644},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10223135352134705}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8339502811431885},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.7235935926437378},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.7230910658836365},{"id":"https://openalex.org/C9357733","wikidata":"https://www.wikidata.org/wiki/Q6878417","display_name":"Missing data","level":2,"score":0.6406261920928955},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.6206027269363403},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.5826709866523743},{"id":"https://openalex.org/C79337645","wikidata":"https://www.wikidata.org/wiki/Q779824","display_name":"Outlier","level":2,"score":0.5799673795700073},{"id":"https://openalex.org/C24756922","wikidata":"https://www.wikidata.org/wiki/Q1757694","display_name":"Data quality","level":3,"score":0.5766162276268005},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.5613240003585815},{"id":"https://openalex.org/C58041806","wikidata":"https://www.wikidata.org/wiki/Q1660484","display_name":"Imputation (statistics)","level":3,"score":0.4811623990535736},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46923142671585083},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.41167089343070984},{"id":"https://openalex.org/C42199009","wikidata":"https://www.wikidata.org/wiki/Q1172378","display_name":"Data cleansing","level":4,"score":0.4111960828304291},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3572823405265808},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.17583432793617249},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1626063883304596},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.15536925196647644},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10223135352134705},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2393216.2393264","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2393216.2393264","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W5320521","https://openalex.org/W186161899","https://openalex.org/W1251444851","https://openalex.org/W1999602050","https://openalex.org/W2049633694","https://openalex.org/W2128906841","https://openalex.org/W2132084990","https://openalex.org/W2135239779","https://openalex.org/W2140592133","https://openalex.org/W2145747124","https://openalex.org/W2171514319","https://openalex.org/W4248358572"],"related_works":["https://openalex.org/W3086422166","https://openalex.org/W3010890513","https://openalex.org/W2604861547","https://openalex.org/W2605106030","https://openalex.org/W2412415446","https://openalex.org/W3117229956","https://openalex.org/W4220726286","https://openalex.org/W2053247611","https://openalex.org/W3165117444","https://openalex.org/W3016972457"],"abstract_inverted_index":{"Data":[0,38],"preprocessing":[1],"plays":[2],"an":[3,67],"important":[4],"role":[5],"in":[6],"data":[7,16,21,26,31,80,93,108,116],"mining":[8],"for":[9],"ensuring":[10],"better":[11],"quality":[12],"of":[13,46,66,78,91],"data.":[14,48],"The":[15,76,89],"being":[17],"extracted":[18],"from":[19,118],"raw":[20],"will":[22],"contain":[23],"impurities,":[24],"noisy":[25,47],"which":[27,63,102],"leads":[28],"to":[29,105],"inefficient":[30],"analysis,":[32],"inaccurate":[33],"decisions":[34],"and":[35,70],"user":[36],"inconveniencies.":[37],"pre-processing":[39],"tasks":[40],"involves":[41],"identifying":[42],"the":[43,85,92,99,106,115,119],"outliers,":[44],"cleaning":[45],"In":[49],"this":[50],"paper":[51],"we":[52],"present":[53],"a":[54,71],"\"Decision":[55],"tree":[56,73],"based":[57,109],"Missing":[58],"value":[59],"Imputation":[60],"technique\"":[61],"(DMI)":[62],"makes":[64,114],"use":[65],"EM":[68],"algorithm":[69],"decision":[72],"(DT)":[74],"algorithm.":[75],"result":[77],"pre-processed":[79],"should":[81],"be":[82,95],"secured":[83],"using":[84],"privacy":[86,90],"preserving":[87],"techniques.":[88],"can":[94],"obtain":[96],"by":[97],"applying":[98],"cryptographic":[100],"techniques":[101],"provides":[103],"access":[104],"stored":[107],"on":[110],"individual's":[111],"roles":[112],"that":[113],"secure":[117],"unauthorised":[120],"access.":[121]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
