Privacy preserving data mining:
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer
2006
|
Schriftenreihe: | Advances in information security
19 |
Schlagworte: | |
Online-Zugang: | http://deposit.dnb.de/cgi-bin/dokserv?id=2739418&prov=M&dok_var=1&dok_ext=htm Inhaltsverzeichnis Inhaltsverzeichnis Inhaltsverzeichnis |
Beschreibung: | Literaturverz. S. [115] - 120 |
Beschreibung: | 120 S. graph. Darst. |
ISBN: | 0387258868 9780387258867 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV022193699 | ||
003 | DE-604 | ||
005 | 20070411 | ||
007 | t | ||
008 | 061214s2006 d||| |||| 00||| eng d | ||
010 | |a 005934034 | ||
020 | |a 0387258868 |9 0-387-25886-8 | ||
020 | |a 9780387258867 |9 978-0-387-25886-7 | ||
035 | |a (OCoLC)61424926 | ||
035 | |a (DE-599)BVBBV022193699 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-384 |a DE-355 | ||
050 | 0 | |a QA76.9.D343 | |
082 | 0 | |a 006.312 |2 22 | |
082 | 0 | |a 005.74 |2 22 | |
084 | |a PZ 4800 |0 (DE-625)141183: |2 rvk | ||
084 | |a ST 530 |0 (DE-625)143679: |2 rvk | ||
100 | 1 | |a Vaidya, Jaideep |e Verfasser |4 aut | |
245 | 1 | 0 | |a Privacy preserving data mining |c by Jaideep Vaidya ; Chris Clifton ; Michael Zhu |
264 | 1 | |a New York, NY |b Springer |c 2006 | |
300 | |a 120 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Advances in information security |v 19 | |
500 | |a Literaturverz. S. [115] - 120 | ||
650 | 4 | |a Bases de données - Sécurité - Mesures | |
650 | 4 | |a Exploration de données (Informatique) | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 4 | |a Data mining | |
650 | 4 | |a Data protection | |
650 | 4 | |a Database security | |
650 | 0 | 7 | |a Datenbank |0 (DE-588)4011119-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Geheimhaltung |0 (DE-588)4140232-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Recherche |0 (DE-588)4121560-6 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datenbank |0 (DE-588)4011119-2 |D s |
689 | 0 | 1 | |a Recherche |0 (DE-588)4121560-6 |D s |
689 | 0 | 2 | |a Geheimhaltung |0 (DE-588)4140232-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Clifton, Christopher W. |e Verfasser |4 aut | |
700 | 1 | |a Zhu, Yu Michael |e Verfasser |4 aut | |
830 | 0 | |a Advances in information security |v 19 |w (DE-604)BV014168308 |9 19 | |
856 | 4 | |u http://deposit.dnb.de/cgi-bin/dokserv?id=2739418&prov=M&dok_var=1&dok_ext=htm | |
856 | 4 | |u http://www.gbv.de/dms/ilmenau/toc/492861021vaidy.PDF |z lizenzfrei |3 Inhaltsverzeichnis | |
856 | 4 | |u http://www.loc.gov/catdir/toc/fy0613/2005934034.html |z lizenzfrei |3 Inhaltsverzeichnis | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015405248&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015405248 |
Datensatz im Suchindex
_version_ | 1804136167630700544 |
---|---|
adam_text | IMAGE 1
PRIVACY PRESERVING
DATA MINING
BY
JAIDEEP VAIDYA RUTGERS UNIVERSITY, NEWURK, NJ
CHRIS CLIFTON PURDUE, W. LAFAYETTE, IN, USA
MICHAEL ZHU PURDUE, W, LAFAYETTE, IN, USA
L SPRI
NNEER
IMAGE 2
CONTENTS
1 PRIVACY AND DATA MINING 1
2 W H AT IS PRIVACY? 7
2.1 INDIVIDUAL IDENTIFIABILITY 8
2.2 MEASURIIIG THE INTRUSIVENESS OF DISCIOSURE 11
3 SOLUTION APPROACHES / PROBLEMS 17
3.1 DATA PARTITIONING MODELS 18
3.2 PERTURBATION 19
3.3 SECURE MULTI-PARTY COMPUTATION 21
3.3.1 SECURE CIRCUIT EVALUATION 23
3.3.2 SECURE SUM 25
4 PREDICTIVE MODELING FOR CLASSIFICATION 29
4.1 DECISION TREE CLASSIFICATION 31
4.2 A PERTURBATION-BASED SOLUTION FOR ID3 34
4.3 A CRYPTOGRAPHIC SOLUTION FOR ID3 38
4.4 ID3 ON VERTICALLY PARTITIONED DATA 40
4.5 BAYESIAN METHODS 45
4.5.1 HORIZONTALLY PARTITIONED DATA 47
4.5.2 VERTICALLY PARTITIONED DATA 48
4.5.3 LEARNING BAYESIAN NETWORK STRUCTURE 50
4.6 SUMMARY 51
5 PREDICTIVE MODELING FOR REGRESSION 53
5.1 INTRODUCTION AND CASE STUDY 53
5.1.1 CASE STUDY 55
5.1.2 WHAT ARE THE PROBLEMS? 55
5.1.3 WEAK SECURE MODEL 58
5.2 VERTICALLY PARTITIONED DATA 60
5.2.1 SECURE ESTIIIIATION OF REGRESSION COEFFICICNTS 60
IMAGE 3
CONTENTS VIII
5.2.2 DIAGNOSTICS AND MODEL DETERMINATION 62
5.2.3 SECURITY ANALYSIS 63
5.2.4 AN ALTERNATIVE: SECURE POWELL S ALGORITHM 65
5.3 HORIZONTALLY PARTITIONED DATA 68
5.4 SUMMARY AND FUTURE RESEARCH 69
6 FINDING PATTERNS AND RULES (ASSOCIATION RULES) 71
6.1 RANDOMLXATION-BASED APPROACHES 72
6.1.1 RANDOMIZATION OPERATOR 73
6.1.2 SUPPORT ESTIMATION AND ALGORITHM 74
6.1.3 LIMITING PRIVAEY BREACH 75
6.1.4 OTHER WORK 7G
6.2 CRYPTOGRAPHY-HASED APPROACHES 79
6.2.1 HORIZONTALLY PARTITIONED DATA 79
6.2.2 VERTICALLY PARTITIONED DATA 80
6.3 INFERENCE FROM RESULTS 82
7 DESCRIPTIVE MODELING (CIUSTERING, OUTLIER DETECTION) 85
7.1 CIUSTERING 86
7.1.1 DATA PCRTURBATION FOR CIUSTERING 86
7.2 CRYPTOGRAPHY-BASED APPROACHES 91
7.2.1 EM-CLUSTERING FOR HORIZONTALLY PARTITIONED DATA 91
7.2.2 K-MEANS CIUSTERING FOR VERTICALLY PARTITIONED DATA . . .. 95 7.3
OUTLIER DETECTION 99
7.3.1 DISTANCE-BASED OUTLIERS 101
7.3.2 BASIC APPROACH 102
7.3.3 HORIZONTALLY PARTITIONED DATA 102
7.3.4 VERTICALLY PARTITIONED DATA 105
7.3.5 MODIFIED SECURE COMPARISON PROTOCOL 106
7.3.6 SECURITY ANALYSIS 107
7.3.7 COMPUTATION AND COMMUNICATION ANALYSIS 110
7.3.8 SNMMARY 111
8 FUTURE RESEARCH - PROBLEMS REMAINING 113
REFERENCES 115
INDEX 121
|
adam_txt |
IMAGE 1
PRIVACY PRESERVING
DATA MINING
BY
JAIDEEP VAIDYA RUTGERS UNIVERSITY, NEWURK, NJ
CHRIS CLIFTON PURDUE, W. LAFAYETTE, IN, USA
MICHAEL ZHU PURDUE, W, LAFAYETTE, IN, USA
L SPRI
NNEER
IMAGE 2
CONTENTS
1 PRIVACY AND DATA MINING 1
2 W H AT IS PRIVACY? 7
2.1 INDIVIDUAL IDENTIFIABILITY 8
2.2 MEASURIIIG THE INTRUSIVENESS OF DISCIOSURE 11
3 SOLUTION APPROACHES / PROBLEMS 17
3.1 DATA PARTITIONING MODELS 18
3.2 PERTURBATION 19
3.3 SECURE MULTI-PARTY COMPUTATION 21
3.3.1 SECURE CIRCUIT EVALUATION 23
3.3.2 SECURE SUM 25
4 PREDICTIVE MODELING FOR CLASSIFICATION 29
4.1 DECISION TREE CLASSIFICATION 31
4.2 A PERTURBATION-BASED SOLUTION FOR ID3 34
4.3 A CRYPTOGRAPHIC SOLUTION FOR ID3 38
4.4 ID3 ON VERTICALLY PARTITIONED DATA 40
4.5 BAYESIAN METHODS 45
4.5.1 HORIZONTALLY PARTITIONED DATA 47
4.5.2 VERTICALLY PARTITIONED DATA 48
4.5.3 LEARNING BAYESIAN NETWORK STRUCTURE 50
4.6 SUMMARY 51
5 PREDICTIVE MODELING FOR REGRESSION 53
5.1 INTRODUCTION AND CASE STUDY 53
5.1.1 CASE STUDY 55
5.1.2 WHAT ARE THE PROBLEMS? 55
5.1.3 WEAK SECURE MODEL 58
5.2 VERTICALLY PARTITIONED DATA 60
5.2.1 SECURE ESTIIIIATION OF REGRESSION COEFFICICNTS 60
IMAGE 3
CONTENTS VIII
5.2.2 DIAGNOSTICS AND MODEL DETERMINATION 62
5.2.3 SECURITY ANALYSIS 63
5.2.4 AN ALTERNATIVE: SECURE POWELL'S ALGORITHM 65
5.3 HORIZONTALLY PARTITIONED DATA 68
5.4 SUMMARY AND FUTURE RESEARCH 69
6 FINDING PATTERNS AND RULES (ASSOCIATION RULES) 71
6.1 RANDOMLXATION-BASED APPROACHES 72
6.1.1 RANDOMIZATION OPERATOR 73
6.1.2 SUPPORT ESTIMATION AND ALGORITHM 74
6.1.3 LIMITING PRIVAEY BREACH 75
6.1.4 OTHER WORK 7G
6.2 CRYPTOGRAPHY-HASED APPROACHES 79
6.2.1 HORIZONTALLY PARTITIONED DATA 79
6.2.2 VERTICALLY PARTITIONED DATA 80
6.3 INFERENCE FROM RESULTS 82
7 DESCRIPTIVE MODELING (CIUSTERING, OUTLIER DETECTION) 85
7.1 CIUSTERING 86
7.1.1 DATA PCRTURBATION FOR CIUSTERING 86
7.2 CRYPTOGRAPHY-BASED APPROACHES 91
7.2.1 EM-CLUSTERING FOR HORIZONTALLY PARTITIONED DATA 91
7.2.2 K-MEANS CIUSTERING FOR VERTICALLY PARTITIONED DATA . . . 95 7.3
OUTLIER DETECTION 99
7.3.1 DISTANCE-BASED OUTLIERS 101
7.3.2 BASIC APPROACH 102
7.3.3 HORIZONTALLY PARTITIONED DATA 102
7.3.4 VERTICALLY PARTITIONED DATA 105
7.3.5 MODIFIED SECURE COMPARISON PROTOCOL 106
7.3.6 SECURITY ANALYSIS 107
7.3.7 COMPUTATION AND COMMUNICATION ANALYSIS 110
7.3.8 SNMMARY 111
8 FUTURE RESEARCH - PROBLEMS REMAINING 113
REFERENCES 115
INDEX 121 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Vaidya, Jaideep Clifton, Christopher W. Zhu, Yu Michael |
author_facet | Vaidya, Jaideep Clifton, Christopher W. Zhu, Yu Michael |
author_role | aut aut aut |
author_sort | Vaidya, Jaideep |
author_variant | j v jv c w c cw cwc y m z ym ymz |
building | Verbundindex |
bvnumber | BV022193699 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.D343 |
callnumber-search | QA76.9.D343 |
callnumber-sort | QA 276.9 D343 |
callnumber-subject | QA - Mathematics |
classification_rvk | PZ 4800 ST 530 |
ctrlnum | (OCoLC)61424926 (DE-599)BVBBV022193699 |
dewey-full | 006.312 005.74 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods 005 - Computer programming, programs, data, security |
dewey-raw | 006.312 005.74 |
dewey-search | 006.312 005.74 |
dewey-sort | 16.312 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Rechtswissenschaft Informatik |
discipline_str_mv | Rechtswissenschaft Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02419nam a2200601 cb4500</leader><controlfield tag="001">BV022193699</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20070411 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">061214s2006 d||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">005934034</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0387258868</subfield><subfield code="9">0-387-25886-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387258867</subfield><subfield code="9">978-0-387-25886-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)61424926</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022193699</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.D343</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.312</subfield><subfield code="2">22</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.74</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 4800</subfield><subfield code="0">(DE-625)141183:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 530</subfield><subfield code="0">(DE-625)143679:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Vaidya, Jaideep</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Privacy preserving data mining</subfield><subfield code="c">by Jaideep Vaidya ; Chris Clifton ; Michael Zhu</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">120 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in information security</subfield><subfield code="v">19</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverz. S. [115] - 120</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Bases de données - Sécurité - Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Exploration de données (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data mining</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenbank</subfield><subfield code="0">(DE-588)4011119-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Geheimhaltung</subfield><subfield code="0">(DE-588)4140232-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Recherche</subfield><subfield code="0">(DE-588)4121560-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenbank</subfield><subfield code="0">(DE-588)4011119-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Recherche</subfield><subfield code="0">(DE-588)4121560-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Geheimhaltung</subfield><subfield code="0">(DE-588)4140232-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Clifton, Christopher W.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhu, Yu Michael</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in information security</subfield><subfield code="v">19</subfield><subfield code="w">(DE-604)BV014168308</subfield><subfield code="9">19</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=2739418&prov=M&dok_var=1&dok_ext=htm</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.gbv.de/dms/ilmenau/toc/492861021vaidy.PDF</subfield><subfield code="z">lizenzfrei</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/fy0613/2005934034.html</subfield><subfield code="z">lizenzfrei</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015405248&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015405248</subfield></datafield></record></collection> |
id | DE-604.BV022193699 |
illustrated | Illustrated |
index_date | 2024-07-02T16:22:11Z |
indexdate | 2024-07-09T20:52:06Z |
institution | BVB |
isbn | 0387258868 9780387258867 |
language | English |
lccn | 005934034 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015405248 |
oclc_num | 61424926 |
open_access_boolean | |
owner | DE-384 DE-355 DE-BY-UBR |
owner_facet | DE-384 DE-355 DE-BY-UBR |
physical | 120 S. graph. Darst. |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Springer |
record_format | marc |
series | Advances in information security |
series2 | Advances in information security |
spelling | Vaidya, Jaideep Verfasser aut Privacy preserving data mining by Jaideep Vaidya ; Chris Clifton ; Michael Zhu New York, NY Springer 2006 120 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Advances in information security 19 Literaturverz. S. [115] - 120 Bases de données - Sécurité - Mesures Exploration de données (Informatique) Protection de l'information (Informatique) Data mining Data protection Database security Datenbank (DE-588)4011119-2 gnd rswk-swf Geheimhaltung (DE-588)4140232-7 gnd rswk-swf Recherche (DE-588)4121560-6 gnd rswk-swf Datenbank (DE-588)4011119-2 s Recherche (DE-588)4121560-6 s Geheimhaltung (DE-588)4140232-7 s DE-604 Clifton, Christopher W. Verfasser aut Zhu, Yu Michael Verfasser aut Advances in information security 19 (DE-604)BV014168308 19 http://deposit.dnb.de/cgi-bin/dokserv?id=2739418&prov=M&dok_var=1&dok_ext=htm http://www.gbv.de/dms/ilmenau/toc/492861021vaidy.PDF lizenzfrei Inhaltsverzeichnis http://www.loc.gov/catdir/toc/fy0613/2005934034.html lizenzfrei Inhaltsverzeichnis GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015405248&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Vaidya, Jaideep Clifton, Christopher W. Zhu, Yu Michael Privacy preserving data mining Advances in information security Bases de données - Sécurité - Mesures Exploration de données (Informatique) Protection de l'information (Informatique) Data mining Data protection Database security Datenbank (DE-588)4011119-2 gnd Geheimhaltung (DE-588)4140232-7 gnd Recherche (DE-588)4121560-6 gnd |
subject_GND | (DE-588)4011119-2 (DE-588)4140232-7 (DE-588)4121560-6 |
title | Privacy preserving data mining |
title_auth | Privacy preserving data mining |
title_exact_search | Privacy preserving data mining |
title_exact_search_txtP | Privacy preserving data mining |
title_full | Privacy preserving data mining by Jaideep Vaidya ; Chris Clifton ; Michael Zhu |
title_fullStr | Privacy preserving data mining by Jaideep Vaidya ; Chris Clifton ; Michael Zhu |
title_full_unstemmed | Privacy preserving data mining by Jaideep Vaidya ; Chris Clifton ; Michael Zhu |
title_short | Privacy preserving data mining |
title_sort | privacy preserving data mining |
topic | Bases de données - Sécurité - Mesures Exploration de données (Informatique) Protection de l'information (Informatique) Data mining Data protection Database security Datenbank (DE-588)4011119-2 gnd Geheimhaltung (DE-588)4140232-7 gnd Recherche (DE-588)4121560-6 gnd |
topic_facet | Bases de données - Sécurité - Mesures Exploration de données (Informatique) Protection de l'information (Informatique) Data mining Data protection Database security Datenbank Geheimhaltung Recherche |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=2739418&prov=M&dok_var=1&dok_ext=htm http://www.gbv.de/dms/ilmenau/toc/492861021vaidy.PDF http://www.loc.gov/catdir/toc/fy0613/2005934034.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015405248&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014168308 |
work_keys_str_mv | AT vaidyajaideep privacypreservingdatamining AT cliftonchristopherw privacypreservingdatamining AT zhuyumichael privacypreservingdatamining |
Es ist kein Print-Exemplar vorhanden.
Inhaltsverzeichnis
Inhaltsverzeichnis