{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:11Z","timestamp":1750307171815,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T00:00:00Z","timestamp":1351209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,26]]},"DOI":"10.1145\/2393216.2393264","type":"proceedings-article","created":{"date-parts":[[2012,11,13]],"date-time":"2012-11-13T15:04:07Z","timestamp":1352819047000},"page":"283-287","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["An enhanced secure preserving for pre-processed data using DMI and PCRBAC algorithm"],"prefix":"10.1145","author":[{"given":"R. S.","family":"Ramya","sequence":"first","affiliation":[{"name":"SNS College of Technology, Coimbatore"}]},{"given":"S.","family":"Priyadarshini","sequence":"additional","affiliation":[{"name":"SNS College of Technology, Coimbatore"}]},{"given":"S.","family":"Karthik","sequence":"additional","affiliation":[{"name":"SNS College of Technology, Coimbatore"}]}],"member":"320","published-online":{"date-parts":[[2012,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Md.Geaur Rahman and Md. Zahidul Islam \"A Decision Tree- Based Missing Value Imputation Technique for Data Pre-processing\" in the proceedings of 9th Australasian Data Mining Conference (AusDM'11)   Md.Geaur Rahman and Md. Zahidul Islam \"A Decision Tree- Based Missing Value Imputation Technique for Data Pre-processing\" in the proceedings of 9th Australasian Data Mining Conference (AusDM'11)"},{"key":"e_1_3_2_1_2_1","unstructured":"Lalanthika vasudevan S. E. Deepa Sukanya N. Arthi \"Privacy Preserving Data Mining Using Cryptographic Role Based Access Control Approach\" in the proceedings of the international Multiconference of Engineers and Computer Scientist (IMECS08).  Lalanthika vasudevan S. E. Deepa Sukanya N. Arthi \"Privacy Preserving Data Mining Using Cryptographic Role Based Access Control Approach\" in the proceedings of the international Multiconference of Engineers and Computer Scientist (IMECS08)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/974121.974131"},{"key":"e_1_3_2_1_4_1","unstructured":"Chris Clifton Murat Kantarcioglu Jaideep Vaidya \"Defining Privacy for Data Mining\".  Chris Clifton Murat Kantarcioglu Jaideep Vaidya \"Defining Privacy for Data Mining\"."},{"key":"e_1_3_2_1_5_1","unstructured":"Kamakshi Lakshiminarayanan Steven A. Harp Robert Goldman and Tariq Samad \"Imputation of Missing Data Using Machine Learning Techniques\" from KDD 96 proceedings.  Kamakshi Lakshiminarayanan Steven A. Harp Robert Goldman and Tariq Samad \"Imputation of Missing Data Using Machine Learning Techniques\" from KDD 96 proceedings."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2005.103"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IDEAS.2006.37"},{"key":"e_1_3_2_1_8_1","volume-title":"International Journal of Advanced Engineering & Application, 193--196.","author":"Abbas Q. S.","year":"2010","unstructured":"Abbas , Q. S. and Aggarwal , A . ( 2010 ): Development of a Structured Framework To Achieve Quality Data . International Journal of Advanced Engineering & Application, 193--196. Abbas, Q. S. and Aggarwal, A. (2010): Development of a Structured Framework To Achieve Quality Data. International Journal of Advanced Engineering & Application, 193--196."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1515\/jib-2006-40"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1977.tb01600.x"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/375551.375602"},{"key":"e_1_3_2_1_13_1","first-page":"25","volume-title":"Knowledge and Data Engineering Exchange Workshop (KDEX'99)","author":"Atallah E.","year":"1999","unstructured":"M. Atallah , E. Bertino , A. Elmagarmid , M. Ibrahim , and V. Verykios . Disclosure limitation of sensitive rules . In Knowledge and Data Engineering Exchange Workshop (KDEX'99) , pages 25 -- 32 , Chicago, Illinois , Nov. 8 1999 . M. Atallah, E. Bertino, A. Elmagarmid, M. Ibrahim, and V. Verykios. Disclosure limitation of sensitive rules. In Knowledge and Data Engineering Exchange Workshop (KDEX'99), pages 25--32, Chicago, Illinois, Nov. 8 1999."}],"event":{"name":"CCSEIT '12: The Second International Conference on Computational Science, Engineering","sponsor":["Avinashilingam University Avinashilingam University"],"location":"Coimbatore UNK India","acronym":"CCSEIT '12"},"container-title":["Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393264","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2393216.2393264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:47Z","timestamp":1750240487000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393264"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,26]]},"references-count":13,"alternative-id":["10.1145\/2393216.2393264","10.1145\/2393216"],"URL":"https:\/\/doi.org\/10.1145\/2393216.2393264","relation":{},"subject":[],"published":{"date-parts":[[2012,10,26]]},"assertion":[{"value":"2012-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}