Privacy Preserving Data Mining Privacy Preserving Data Mining
Advances in Information Security

Privacy Preserving Data Mining

    • USD 129.99
    • USD 129.99

Descripción editorial

Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a "Data-Mining Moratorium Act" introduced in the U.S. Senate that would have banned all data-mining programs (including research and development) by the U.S. Department of Defense.

Privacy Preserving Data Mining provides a comprehensive overview of available approaches, techniques and open problems in privacy preserving data mining. This book demonstrates how these approaches can achieve data mining, while operating within legal and commercial restrictions that forbid release of data. Furthermore, this research crystallizes much of the underlying foundation, and inspires further research in the area.

Privacy Preserving Data Mining is designed for a professional audience composed of practitioners and researchers in industry. This volume is also suitable for graduate-level students in computer science.

GÉNERO
Informática e Internet
PUBLICADO
2006
28 de septiembre
IDIOMA
EN
Inglés
EXTENSIÓN
132
Páginas
EDITORIAL
Springer US
VENDEDOR
Springer Nature B.V.
TAMAÑO
1.1
MB
Computer Security – ESORICS 2025 Computer Security – ESORICS 2025
2025
Computer Security – ESORICS 2025 Computer Security – ESORICS 2025
2025
Computer Security – ESORICS 2025 Computer Security – ESORICS 2025
2025
Computer Security – ESORICS 2025 Computer Security – ESORICS 2025
2025
Proceedings of the Tenth International Conference on Mathematics and Computing Proceedings of the Tenth International Conference on Mathematics and Computing
2024
Proceedings of the Tenth International Conference on Mathematics and Computing Proceedings of the Tenth International Conference on Mathematics and Computing
2024
Multivariate Public Key Cryptosystems Multivariate Public Key Cryptosystems
2006
Security for Wireless Sensor Networks Security for Wireless Sensor Networks
2007
Malware Detection Malware Detection
2007
Network Security Policies and Procedures Network Security Policies and Procedures
2007
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007
Preserving Privacy in On-Line Analytical Processing (OLAP) Preserving Privacy in On-Line Analytical Processing (OLAP)
2007