Privacy Preserving Data Mining Privacy Preserving Data Mining
Advances in Information Security

Privacy Preserving Data Mining

Jaideep Vaidya and Others
    • €109.99
    • €109.99

Publisher Description

Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a "Data-Mining Moratorium Act" introduced in the U.S. Senate that would have banned all data-mining programs (including research and development) by the U.S. Department of Defense.

Privacy Preserving Data Mining provides a comprehensive overview of available approaches, techniques and open problems in privacy preserving data mining. This book demonstrates how these approaches can achieve data mining, while operating within legal and commercial restrictions that forbid release of data. Furthermore, this research crystallizes much of the underlying foundation, and inspires further research in the area.

Privacy Preserving Data Mining is designed for a professional audience composed of practitioners and researchers in industry. This volume is also suitable for graduate-level students in computer science.

GENRE
Computing & Internet
RELEASED
2006
28 September
LANGUAGE
EN
English
LENGTH
132
Pages
PUBLISHER
Springer US
PROVIDER INFO
Springer Science & Business Media LLC
SIZE
1.1
MB
Privacy and Anonymity in Information Management Systems Privacy and Anonymity in Information Management Systems
2010
Secure Data Management Secure Data Management
2010
Privacy and Security Issues in Data Mining and Machine Learning Privacy and Security Issues in Data Mining and Machine Learning
2011
Privacy in Statistical Databases Privacy in Statistical Databases
2016
Privacy in Statistical Databases Privacy in Statistical Databases
2010
Data Privacy Management, Cryptocurrencies and Blockchain Technology Data Privacy Management, Cryptocurrencies and Blockchain Technology
2020
Computer Security – ESORICS 2025 Computer Security – ESORICS 2025
2025
Computer Security – ESORICS 2025 Computer Security – ESORICS 2025
2025
Computer Security – ESORICS 2025 Computer Security – ESORICS 2025
2025
Computer Security – ESORICS 2025 Computer Security – ESORICS 2025
2025
Proceedings of the Tenth International Conference on Mathematics and Computing Proceedings of the Tenth International Conference on Mathematics and Computing
2024
Proceedings of the Tenth International Conference on Mathematics and Computing Proceedings of the Tenth International Conference on Mathematics and Computing
2024
Enabling Privacy Preserving Data Analytics Enabling Privacy Preserving Data Analytics
2025
Physical Layer Security in Power Line Communications Physical Layer Security in Power Line Communications
2024
Adversarial Multimedia Forensics Adversarial Multimedia Forensics
2024
Blockchains Blockchains
2024
Decision Making and Security Risk Management for IoT Environments Decision Making and Security Risk Management for IoT Environments
2024
Security and Risk Analysis for Intelligent Edge Computing Security and Risk Analysis for Intelligent Edge Computing
2023