<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article"><front><journal-meta><journal-id journal-id-type="publisher-id">INFORMATICA</journal-id><journal-title-group><journal-title>Informatica</journal-title></journal-title-group><issn pub-type="epub">0868-4952</issn><issn pub-type="ppub">0868-4952</issn><publisher><publisher-name>VU</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">inf14301</article-id><article-id pub-id-type="doi">10.15388/Informatica.2003.021</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research article</subject></subj-group></article-categories><title-group><article-title>An Algorithm for Protecting Knowledge Discovery Data</article-title></title-group><contrib-group><contrib contrib-type="Author"><name><surname>Brumen</surname><given-names>Boštjan</given-names></name><email xlink:href="mailto:bostjan.brumen@uni-mb.si">bostjan.brumen@uni-mb.si</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><contrib contrib-type="Author"><name><surname>Golob</surname><given-names>Izidor</given-names></name><email xlink:href="mailto:izidor.golob@uni-mb.si">izidor.golob@uni-mb.si</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><contrib contrib-type="Author"><name><surname>Welzer</surname><given-names>Tatjana</given-names></name><email xlink:href="mailto:welzer@uni-mb.si">welzer@uni-mb.si</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><contrib contrib-type="Author"><name><surname>Rozman</surname><given-names>Ivan</given-names></name><email xlink:href="mailto:i.rozman@uni-mb.si">i.rozman@uni-mb.si</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><aff id="j_INFORMATICA_aff_000">University of Maribor, Faculty of Electrical Engineering and Computer Science, Smetanova 17, Si‐2000 Maribor, Slovenia</aff></contrib-group><contrib-group><contrib contrib-type="Author"><name><surname>Družovec</surname><given-names>Marjan</given-names></name><email xlink:href="mailto:marjan.druzovec@uni-mb.si">marjan.druzovec@uni-mb.si</email><xref ref-type="aff" rid="j_INFORMATICA_aff_001"/></contrib><aff id="j_INFORMATICA_aff_001">University of Maribor, Faculty of Mechanical Engineering, Smetanova 17, Si‐2000 Maribor, Slovenia</aff></contrib-group><contrib-group><contrib contrib-type="Author"><name><surname>Jaakkola</surname><given-names>Hannu</given-names></name><email xlink:href="mailto:hj@pori.tut.fi">hj@pori.tut.fi</email><xref ref-type="aff" rid="j_INFORMATICA_aff_002"/></contrib><aff id="j_INFORMATICA_aff_002">Tampere University of Technology, Pori Technology and Economics, PO BOX 300, Fi‐28101 Pori, Finland</aff></contrib-group><pub-date pub-type="epub"><day>01</day><month>01</month><year>2003</year></pub-date><volume>14</volume><issue>3</issue><fpage>277</fpage><lpage>288</lpage><history><date date-type="received"><day>01</day><month>03</month><year>2003</year></date></history><abstract><p>In the paper, we present an algorithm that can be applied to protect data before a data mining process takes place. The data mining, a part of the knowledge discovery process, is mainly about building models from data. We address the following question: can we protect the data and still allow the data modelling process to take place? We consider the case where the distributions of original data values are preserved while the values themselves change, so that the resulting model is equivalent to the one built with original data. The presented formal approach is especially useful when the knowledge discovery process is outsourced. The application of the algorithm is demonstrated through an example.</p></abstract><kwd-group><label>Keywords</label><kwd>data protection algorithm</kwd><kwd>disclosure control</kwd><kwd>data mining</kwd><kwd>knowledge discovery</kwd><kwd>data security</kwd></kwd-group></article-meta></front></article>