Details

Privacy Preserving Data Mining


Privacy Preserving Data Mining


Advances in Information Security, Band 19

von: Jaideep Vaidya, Christopher W. Clifton, Yu Michael Zhu

96,29 €

Verlag: Springer
Format: PDF
Veröffentl.: 28.09.2006
ISBN/EAN: 9780387294896
Sprache: englisch
Anzahl Seiten: 122

Dieses eBook enthält ein Wasserzeichen.

Beschreibungen

<P>Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a "Data-Mining Moratorium Act" introduced in the U.S. Senate that would have banned all data-mining programs (including research and development) by the U.S. Department of Defense.</P>
<P><STRONG>Privacy Preserving Data Mining</STRONG> provides a comprehensive overview of available approaches, techniques and open problems in privacy preserving data mining. This book demonstrates how these approaches can achieve data mining, while operating within legal and commercial restrictions that forbid release of data. Furthermore, this research crystallizes much of the underlying foundation, and inspires further research in the area.</P>
<P><STRONG>Privacy Preserving Data Mining</STRONG> is designed for a professional audience composed of practitioners and researchers in industry. This volume is also suitable for graduate-level students in computer science.</P>
Privacy and Data Mining.- What is Privacy?.- Solution Approaches / Problems.- Predictive Modeling for Classification.- Predictive Modeling for Regression.- Finding Patterns and Rules (Association Rules).- Descriptive Modeling (Clustering, Outlier Detection).- Future Research - Problems remaining.
<P>Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a "Data-Mining Moratorium Act" introduced in the U.S. Senate that would have banned all data-mining programs (including research and development) by the U.S. Department of Defense.</P>
<P><STRONG>Privacy Preserving Data Mining</STRONG> provides a comprehensive overview of available approaches, techniques and open problems in privacy preserving data mining. This book demonstrates how these approaches can achieve data mining, while operating within legal and commercial restrictions that forbid release of data. Furthermore, this research crystallizes much of the underlying foundation, and inspires further research in the area.</P>
<P><STRONG>Privacy Preserving Data Mining</STRONG> is designed for a professional audience composed of practitioners and researchers in industry. This volume is also suitable for graduate-level students in computer science.</P>
First book on privacy preserving data mining - a real application of secure computation Written for researchers who wish to enter the field and need to know the state of the art methods for developing algorithms, and how to "prove" privacy Also intended for practitioners who need advice on privacy-preserving data mining applications, how to apply it, and what to watch out for Includes supplementary material: sn.pub/extras
<P>Privacy preserving data mining implies the "mining" of knowledge from distributed data without violating the privacy of the individual/corporations involved in contributing the data. This volume provides a comprehensive overview of available approaches, techniques and open problems in privacy preserving data mining. Crystallizing much of the underlying foundation, the book aims to inspire further research in this new and growing area.</P>
<P><STRONG>Privacy Preserving Data Mining</STRONG> is intended to be accessible to industry practitioners and policy makers, to help inform future decision making and legislation, and to serve as a useful technical reference.</P>

Diese Produkte könnten Sie auch interessieren:

Topics in Artificial Intelligence Applied to Industry 4.0
Topics in Artificial Intelligence Applied to Industry 4.0
von: Mahmoud Ragab AL-Refaey, Amit Kumar Tyagi, Abdullah Saad AL-Malaise AL-Ghamdi, Swetta Kukreja
PDF ebook
102,99 €
Effective Vulnerability Management
Effective Vulnerability Management
von: Chris Hughes, Nikki Robinson
EPUB ebook
22,99 €