{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T11:34:37Z","timestamp":1769945677057,"version":"3.49.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,2,2]],"date-time":"2016-02-02T00:00:00Z","timestamp":1454371200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1007\/s10586-016-0539-z","type":"journal-article","created":{"date-parts":[[2016,2,2]],"date-time":"2016-02-02T11:05:24Z","timestamp":1454411124000},"page":"349-368","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Data security rules\/regulations based classification of file data using TsF-kNN algorithm"],"prefix":"10.1007","volume":"19","author":[{"given":"Munwar Ali","family":"Zardari","sequence":"first","affiliation":[]},{"given":"Low Tang","family":"Jung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,2]]},"reference":[{"key":"539_CR1","series-title":"Handbook of Database Security- Applications and Trends","volume-title":"Security re-egnineering for databases: concepts and techinques","year":"2008","unstructured":"Certz, M., Jajodia, S. (eds.): Security re-egnineering for databases: concepts and techinques. Handbook of Database Security- Applications and Trends. Sringer, USA (2008)"},{"key":"539_CR2","doi-asserted-by":"crossref","unstructured":"Chen, K., Guo, S.: PerturBoost: Practical Confidential Classifier Learning in the cloud. In: 13th International Conference on Data Mining, pp. 991\u2013996, (2013)","DOI":"10.1109\/ICDM.2013.118"},{"key":"539_CR3","unstructured":"Chen, K., Guo, S.: RASP-Boost: confidential boosting-model learning with purturbed data in the cloud. IEEE Trans. Cloud Comput. 1(1) (2015)"},{"key":"539_CR4","unstructured":"Chiang, T., Lo, H., Lin, S.D.: A ranking-based KNN approach for multi-label classification. In: Asia Conference on Machine Learning, pp. 81\u201396 (2012)"},{"issue":"1","key":"539_CR5","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1504\/IJEF.2006.008839","volume":"1","author":"YB Choi","year":"2006","unstructured":"Choi, Y.B., Crowgey, R.L., Price, J.M., VanPelt, J.S.: The State-of-the-art of mobile payment architecture and emerging issues. Int. J. Electron. Financ. 1(1), 94\u2013103 (2006)","journal-title":"Int. J. Electron. Financ."},{"key":"539_CR6","unstructured":"Chung, M., Gertz, M., Levitt, K.: Demids: a misuse detection system for database systems, Integrity and Internal Control in Information Systems, Strategic views on the Need of Control. IFIP TCII WG11.5 Third working conference on Integrity and Internal Control in Information Systerms, Amsterdam, The Natherland, pp. 159\u2013178. Kluwer Academic Publishers, Norwell, (2000)"},{"key":"539_CR7","unstructured":"Clark, D.L.: The Manager\u2019s Defense Guide. Addison-Wesly, USA (2003)"},{"key":"539_CR8","unstructured":"Fabrizio, A.: Fast condensed nearest neighbor rule, Technical report, In: Proceedings of the 22nd International Conference on Machine Learning, Bonn, Germany, pp. 25\u201332, (2005)"},{"key":"539_CR9","unstructured":"Frank, S.: Data Classification for Cloud Readiness, pp. 1\u201319. Published by, Microsoft (2014)"},{"key":"539_CR10","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1109\/TIT.1972.1054809","volume":"18","author":"G Gates","year":"1972","unstructured":"Gates, G.: The reduced nearest neighbor rule. IEEE Trans. Inf. Theory 18, 431\u2013433 (1972)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"539_CR11","unstructured":"Gibbon, D., Moore, R. K., Winski, R. (Eds.) Handbook of Standards and Resources for Spoken Language Systems\u2014Google Books, (1997)"},{"key":"539_CR12","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1109\/TIT.1968.1054155","volume":"14","author":"P Hart","year":"1968","unstructured":"Hart, P.: The condensed nearest neighbor rule. IEEE Trans. Inf. Theory 14, 515\u2013516 (1968)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"539_CR13","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1364782.1364786","volume":"51","author":"B Hayes","year":"2008","unstructured":"Hayes, B.: Cloud computing. Commun. ACM 51(5), 9\u201311 (2008)","journal-title":"Commun. ACM"},{"key":"539_CR14","unstructured":"He, J., Tan, A., Tan, C.: A Comparative Study on Chinese Text Categorization Methods. In: PRICAI 200 Workshop on Text and Web Mining, pp. 24\u201335, (2000)"},{"issue":"4","key":"539_CR15","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/152399.152403","volume":"10","author":"H Hosmer","year":"1992","unstructured":"Hosmer, H.: Using fuzzy logic to represent security policies in the multipolicy paradigm. ACM SIGSAC Rev. 10(4), 12\u201321 (1992)","journal-title":"ACM SIGSAC Rev."},{"issue":"4","key":"539_CR16","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/152399.152403","volume":"10","author":"H Hosmer","year":"1992","unstructured":"Hosmer, H.: Using fuzzy logic to represent security policies in the multipolicies paradigm. ACM SIGSAC Rev. 10(4), 12\u201321 (1992)","journal-title":"ACM SIGSAC Rev."},{"key":"539_CR17","doi-asserted-by":"crossref","unstructured":"Jain, A.K., Murty, M.N., Flynn, P.: Data clustering: a review. ACM Comput. Surv. 31, 264\u2013323 (2002)","DOI":"10.1145\/331499.331504"},{"key":"539_CR18","unstructured":"Jiang, W., Liu, Q.: Dependency Parsing and Projection Based on Word-Pair Classification. In: Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics, pp. 12\u201320, (2009)"},{"issue":"5","key":"539_CR19","doi-asserted-by":"crossref","first-page":"1063","DOI":"10.1007\/s00778-007-0051-4","volume":"17","author":"A Kamra","year":"2007","unstructured":"Kamra, A., Terzi, E., Bertino, E.: Detecting anomalous access patterns in relational databases. VLDB J. 17(5), 1063\u20131077 (2007)","journal-title":"VLDB J."},{"key":"539_CR20","unstructured":"Kerdprasop, N., Kerdprasop, K.: Discrete decision tree induction to avoud overfiting on categorical. ... and intelligent systems, and 10th WSEAS .... pp. 247\u2013252, (2011)"},{"key":"539_CR21","doi-asserted-by":"crossref","first-page":"2311","DOI":"10.1016\/S0031-3203(01)00132-7","volume":"35","author":"G Krasimir","year":"2002","unstructured":"Krasimir, G., Iankiev, Y., Wu, Venu, G.: Improved k-nearest neighbor classification. Pattern Recogn. 35, 2311\u20132318 (2002)","journal-title":"Pattern Recogn."},{"key":"539_CR22","doi-asserted-by":"crossref","unstructured":"Liu, F., Ng, K., W., Zhang, W. Encrypted associatioin rules mining for outsourced data mining. In: 29th International Conference on Advanced Information Networking and Application, pp. 550\u2013557, (2015)","DOI":"10.1109\/AINA.2015.235"},{"key":"539_CR23","doi-asserted-by":"crossref","unstructured":"Masoud, M.: Classification of data based on the a fuzzy logic system. In: International Conference on Computational Intelligence for Modelling Control and Automation, pp. 1288\u20131292, (2008)","DOI":"10.1109\/CIMCA.2008.232"},{"issue":"4","key":"539_CR24","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1504\/IJEF.2009.028977","volume":"3","author":"M Masoud","year":"2009","unstructured":"Masoud, M., Dimitios, H.: Data classification process for security and privacy based on a fuzzy logic classifier. Int. J. Electron. Financ. 3(4), 374\u2013386 (2009)","journal-title":"Int. J. Electron. Financ."},{"key":"539_CR25","first-page":"267","volume-title":"Handbook of Database Security","author":"G Michael","year":"2008","unstructured":"Michael, G., Madhavi, G.: Security re-engineering for databases: concepts and techniques, USA. In: Michael, G., Sushil, J. (eds.) Handbook of Database Security, pp. 267\u2013296. Springer, Berlin (2008)"},{"issue":"3","key":"539_CR26","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1023\/A:1007626913721","volume":"38","author":"W Randall","year":"2000","unstructured":"Randall, W., Tony, R.M.: Reduction techniques for instance-based learning algorithms. Mach. Learn. 38(3), 257\u2013286 (2000)","journal-title":"Mach. Learn."},{"issue":"5","key":"539_CR27","first-page":"1261","volume":"27","author":"BK Samanthula","year":"2015","unstructured":"Samanthula, B.K., Elmehdwi, Y., Jiang, W.: k-nearest neighbor classification over semantically secure encrypted relational data. IEEE Comput. Soc. 27(5), 1261\u20131273 (2015)","journal-title":"IEEE Comput. Soc."},{"key":"539_CR28","doi-asserted-by":"crossref","unstructured":"Spalka, A., Lehndardt, J. A comprehensive approach to anomaly detection in relational databases. In: Data and Applications Security 205, LNCS 3654, Springer, Germany, pp. 207\u2013221, (2005)","DOI":"10.1007\/11535706_16"},{"key":"539_CR29","volume-title":"A Comprehensive Approach to Anomaly Detection in Relational Databases. Data and Applications Security","author":"A Spalka","year":"2005","unstructured":"Spalka, A., Lehnhardt, J.: A Comprehensive Approach to Anomaly Detection in Relational Databases. Data and Applications Security. Springer, Heidelberg (2005)"},{"key":"539_CR30","doi-asserted-by":"crossref","unstructured":"Steve, S., Uwe, B., Oliver, K., Frank, L., Tobias, U.: Cloud data patterns for confidentiality. In: Proceedings of the 2nd International Conference on Cloud Computing and Service Science, pp. 387\u2013394, (2012)","DOI":"10.5220\/0003893903870394"},{"issue":"4","key":"539_CR31","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1016\/S0306-4573(01)00045-0","volume":"38","author":"C Tan","year":"2002","unstructured":"Tan, C., Wang, Y., Lee, C.: The use of bigrams to enhance text categorization. Inf. Process. Manag. 38(4), 529\u2013546 (2002)","journal-title":"Inf. Process. Manag."},{"key":"539_CR32","doi-asserted-by":"crossref","unstructured":"Tsuruoka, Y.: Developing a robust part-of-speech tagger for biomedical text. Lecture notes in computer science, vol. 3746, pp. 382\u2013392 (2005)","DOI":"10.1007\/11573036_36"},{"key":"539_CR33","doi-asserted-by":"crossref","first-page":"704","DOI":"10.1016\/j.patcog.2010.08.014","volume":"44","author":"QH Wu","year":"2011","unstructured":"Wu, Q.H., Nikolaidis, K., Goulermas, J.Y.: A class boundary preserving algorithm for data condensation. Pattern Recogn. 44, 704\u2013715 (2011)","journal-title":"Pattern Recogn."},{"key":"539_CR34","doi-asserted-by":"crossref","unstructured":"Yang, Y., Liu, X.: A re-examination of text categorization methods. In: 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 42\u201349, (1999)","DOI":"10.1145\/312624.312647"},{"key":"539_CR35","doi-asserted-by":"crossref","unstructured":"Yao, Q., An, A., Huang, X.: Finding and analyzing database user sessions. In: Procedings of the 10th International Conference on Database Systems for Advanced Applications, pp. 851\u2013862, (2005)","DOI":"10.1007\/11408079_77"},{"key":"539_CR36","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Xu, R., Takagi, T. Secure k-NN computation on encrypted cloud data without sharing key with query users. In: Proceedings of the 2013 International Workshop on Security in Cloud Computing\u2014Cloud Computing \u201913, pp. 55\u201360, (2013)","DOI":"10.1145\/2484402.2484415"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-016-0539-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-016-0539-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-016-0539-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T08:40:05Z","timestamp":1748767205000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-016-0539-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,2]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["539"],"URL":"https:\/\/doi.org\/10.1007\/s10586-016-0539-z","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,2]]}}}