000 | 03872nam a22003855i 4500 | ||
---|---|---|---|
001 | 279882 | ||
003 | MX-SnUAN | ||
005 | 20160429154001.0 | ||
007 | cr nn 008mamaa | ||
008 | 150903s2008 xxu| o |||| 0|eng d | ||
020 |
_a9780387709925 _99780387709925 |
||
024 | 7 |
_a10.1007/9780387709925 _2doi |
|
035 | _avtls000332095 | ||
039 | 9 |
_a201509030735 _bVLOAD _c201404122024 _dVLOAD _c201404091752 _dVLOAD _y201402041020 _zstaff |
|
040 |
_aMX-SnUAN _bspa _cMX-SnUAN _erda |
||
050 | 4 | _aQA76.9.A25 | |
100 | 1 |
_aAggarwal, Charu C. _eeditor. _9300405 |
|
245 | 1 | 0 |
_aPrivacy-Preserving Data Mining : _bModels and Algorithms / _cedited by Charu C. Aggarwal, Philip S. Yu. |
264 | 1 |
_aBoston, MA : _bSpringer US, _c2008. |
|
300 |
_axxii, 513 páginas _brecurso en línea. |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
490 | 0 |
_aAdvances in Database Systems, _x1386-2944 ; _v34 |
|
500 | _aSpringer eBooks | ||
505 | 0 | _aAn Introduction to Privacy-Preserving Data Mining -- A General Survey of Privacy-Preserving Data Mining Models and Algorithms -- A Survey of Inference Control Methods for Privacy-Preserving Data Mining -- Measures of Anonymity -- k-Anonymous Data Mining: A Survey -- A Survey of Randomization Methods for Privacy-Preserving Data Mining -- A Survey of Multiplicative Perturbation for Privacy-Preserving Data Mining -- A Survey of Quantification of Privacy Preserving Data Mining Algorithms -- A Survey of Utility-based Privacy-Preserving Data Transformation Methods -- Mining Association Rules under Privacy Constraints -- A Survey of Association Rule Hiding Methods for Privacy -- A Survey of Statistical Approaches to Preserving Confidentiality of Contingency Table Entries -- A Survey of Privacy-Preserving Methods Across Horizontally Partitioned Data -- A Survey of Privacy-Preserving Methods Across Vertically Partitioned Data -- A Survey of Attack Techniques on Privacy-Preserving Data Perturbation Methods -- Private Data Analysis via Output Perturbation -- A Survey of Query Auditing Techniques for Data Privacy -- Privacy and the Dimensionality Curse -- Personalized Privacy Preservation -- Privacy-Preserving Data Stream Classification. | |
520 | _aAdvances in hardware technology have increased the capability to store and record personal data about consumers and individuals. This has caused concerns that personal data may be used for a variety of intrusive or malicious purposes. Privacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in a privacy-preserving way. These techniques generally fall into the following categories: data modification techniques, cryptographic methods and protocols for data sharing, statistical techniques for disclosure and inference control, query auditing methods, randomization and perturbation-based techniques. This edited volume also contains surveys by distinguished researchers in the privacy field. Each survey includes the key research content as well as future research directions of a particular topic in privacy. Privacy Preserving Data Mining: Models and Algorithms is designed for researchers, professors, and advanced-level students in computer science. This book is also suitable for practitioners in industry. | ||
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aYu, Philip S. _eeditor. _9303864 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9780387709918 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-0-387-70992-5 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c279882 _d279882 |