deleting, the supporting transactions by removing some the systematic work all these years have created a lot of
items until the sensitive itemsets are protected. The third research results, there is still a lot of work to be done.
heuristic combines the previous two by using the first Apart from ongoing work in the field we foresee the
approach to identify the sensitive transactions and the need of applying these techniques to operational data
second one to remove items from these transactions, warehouses so that we can evaluate in a real environ-
until the sensitive knowledge is hidden. ment their effectiveness and applicability. We also
Still another approach (Oliveira, Zaiane & Saygin, envision the necessity of applying knowledge hiding
2004) investigates the distribution of non-sensitive rules techniques to distributed environments where infor-
for security reasons instead of publishing the perturbed mation and knowledge is shared among collaborators
database. The proposed approach presents a rule sani- and/or competitors.
tization algorithm for blocking inference channels that
may lead to the disclosure of sensitive rules.
REFERENCES