Details

Privacy-Preserving Data Mining


Privacy-Preserving Data Mining

Models and Algorithms
Advances in Database Systems

von: Charu C. Aggarwal, Philip S. Yu

213,99 €

Verlag: Springer
Format: PDF
Veröffentl.: 10.06.2008
ISBN/EAN: 9780387709925
Sprache: englisch
Anzahl Seiten: 513

Dieses eBook enthält ein Wasserzeichen.

Beschreibungen

<P>Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals, causing concerns that personal data may be used for a variety of intrusive or malicious purposes.</P>
<P><STRONG>Privacy-Preserving Data Mining: Models and Algorithms</STRONG> proposes a number of techniques to perform the data mining tasks in a privacy-preserving way. These techniques generally fall into the following categories: data modification techniques, cryptographic methods and protocols for data sharing, statistical techniques for disclosure and inference control, query auditing methods, randomization and perturbation-based techniques.</P>
<P>This edited volume contains surveys by distinguished researchers in the privacy field. Each survey includes the key research content as well as future research directions.</P>
<P><STRONG>Privacy-Preserving Data Mining: Models and Algorithms</STRONG> is designed for researchers, professors, and advanced-level students in computer science, and is also suitable for industry practitioners.</P>
<P>&nbsp;</P>
An Introduction to Privacy-Preserving Data Mining.- A General Survey of Privacy-Preserving Data Mining Models and Algorithms.- A Survey of Inference Control Methods for Privacy-Preserving Data Mining.- Measures of Anonymity.- k-Anonymous Data Mining: A Survey.- A Survey of Randomization Methods for Privacy-Preserving Data Mining.- A Survey of Multiplicative Perturbation for Privacy-Preserving Data Mining.- A Survey of Quantification of Privacy Preserving Data Mining Algorithms.- A Survey of Utility-based Privacy-Preserving Data Transformation Methods.- Mining Association Rules under Privacy Constraints.- A Survey of Association Rule Hiding Methods for Privacy.- A Survey of Statistical Approaches to Preserving Confidentiality of Contingency Table Entries.- A Survey of Privacy-Preserving Methods Across Horizontally Partitioned Data.- A Survey of Privacy-Preserving Methods Across Vertically Partitioned Data.- A Survey of Attack Techniques on Privacy-Preserving Data Perturbation Methods.- Private Data Analysis via Output Perturbation.- A Survey of Query Auditing Techniques for Data Privacy.- Privacy and the Dimensionality Curse.- Personalized Privacy Preservation.- Privacy-Preserving Data Stream Classification.
<P>Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals. This has caused concerns that personal data may be used for a variety of intrusive or malicious purposes.</P>
<P><STRONG>Privacy Preserving Data Mining: Models and Algorithms</STRONG> proposes a number of techniques to perform the data mining tasks in a privacy-preserving way. These techniques generally fall into the following categories: data modification techniques, cryptographic methods and protocols for data sharing, statistical techniques for disclosure and inference control, query auditing methods, randomization and perturbation-based techniques.&nbsp; This edited volume also contains surveys by distinguished researchers in the privacy field. Each survey includes the key research content as well as future research directions of a particular topic in privacy.</P>
<P><STRONG>Privacy Preserving Data Mining: Models and Algorithms</STRONG> is designed for researchers, professors, and advanced-level students in computer science. This book is also suitable for practitioners in industry.</P>
<P>&nbsp;</P>
Occupies an important niche in the privacy-preserving data mining field Survey information included with each chapter is unique in terms of its focus on introducing the different topics more comprehensively Provides relative understanding of the work of different communities, such as cryptography, statistical disclosure control, data mining working in the privacy field Key advances in privacy Includes supplementary material: sn.pub/extras
<P>Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals. This has caused concerns that personal data may be used for a variety of intrusive or malicious purposes. This book proposes a number of techniques to perform the data mining tasks in a privacy-preserving way. This edited volume contains surveys by distinguished researchers in the privacy field. The survey information included with each chapter is unique in terms of its focus on introducing the different topics more comprehensively. Key advances in privacy that have appeared only in the past three years are covered. The book is designed for researchers, professors, and advanced-level students in computer science. It is also suitable for practitioners in industry.</P>