Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals. This has caused concerns that personal data may be used for a variety of intrusive or malicious purposes.
Privacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in a privacy-preserving way. These techniques generally fall into the following categories: data modification techniques, cryptographic methods and protocols for data sharing, statistical techniques for disclosure and inference control, query auditing methods, randomization and perturbation-based techniques. This edited volume also contains surveys by distinguished researchers in the privacy field. Each survey includes the key research content as well as future research directions of a particular topic in privacy.
Privacy Preserving Data Mining: Models and Algorithms is designed for researchers, professors, and advanced-level students in computer science. This book is also suitable for practitioners in industry.
Privacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in a privacy-preserving way. These techniques generally fall into the following categories: data modification techniques, cryptographic methods and protocols for data sharing, statistical techniques for disclosure and inference control, query auditing methods, randomization and perturbation-based techniques. This edited volume also contains surveys by distinguished researchers in the privacy field. Each survey includes the key research content as well as future research directions of a particular topic in privacy.
Privacy Preserving Data Mining: Models and Algorithms is designed for researchers, professors, and advanced-level students in computer science. This book is also suitable for practitioners in industry.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
From the reviews:
"This book provides an exceptional summary of the state-of-the-art accomplishments in the area of privacy-preserving data mining, discussing the most important algorithms, models, and applications in each direction. The target audience includes researchers, graduate students, and practitioners who are interested in this area. ... I recommend this book to all readers interested in privacy-preserving data mining." (Aris Gkoulalas-Divanis, ACM Computing Reviews, October, 2008)
"This book provides an exceptional summary of the state-of-the-art accomplishments in the area of privacy-preserving data mining, discussing the most important algorithms, models, and applications in each direction. The target audience includes researchers, graduate students, and practitioners who are interested in this area. ... I recommend this book to all readers interested in privacy-preserving data mining." (Aris Gkoulalas-Divanis, ACM Computing Reviews, October, 2008)