Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised, Selected Papers / [electronic resource] :
edited by Francesco Bonchi, Elena Ferrari, Bradley Malin, Yücel Saygin.
- 1st ed. 2008.
- IX, 173 p. online resource.
- Information Systems and Applications, incl. Internet/Web, and HCI, 4890 2946-1642 ; .
- Information Systems and Applications, incl. Internet/Web, and HCI, 4890 .
Invited Paper -- An Ad Omnia Approach to Defining and Achieving Private Data Analysis -- Contributed Papers -- Phoenix: Privacy Preserving Biclustering on Horizontally Partitioned Data -- Allowing Privacy Protection Algorithms to Jump Out of Local Optimums: An Ordered Greed Framework -- Probabilistic Anonymity -- Website Privacy Preservation for Query Log Publishing -- Privacy-Preserving Data Mining through Knowledge Model Sharing -- Privacy-Preserving Sharing of Horizontally-Distributed Private Data for Constructing Accurate Classifiers -- Towards Privacy-Preserving Model Selection -- Preserving the Privacy of Sensitive Relationships in Graph Data.
9783540784784
10.1007/978-3-540-78478-4 doi
Data protection.
Application software.
Data mining.
Computer networks .
Computers and civilization.
Computers--Law and legislation.
Information technology--Law and legislation.
Data and Information Security.
Computer and Information Systems Applications.
Data Mining and Knowledge Discovery.
Computer Communication Networks.
Computers and Society.
Legal Aspects of Computing.
QA76.9.A25
005.8
Invited Paper -- An Ad Omnia Approach to Defining and Achieving Private Data Analysis -- Contributed Papers -- Phoenix: Privacy Preserving Biclustering on Horizontally Partitioned Data -- Allowing Privacy Protection Algorithms to Jump Out of Local Optimums: An Ordered Greed Framework -- Probabilistic Anonymity -- Website Privacy Preservation for Query Log Publishing -- Privacy-Preserving Data Mining through Knowledge Model Sharing -- Privacy-Preserving Sharing of Horizontally-Distributed Private Data for Constructing Accurate Classifiers -- Towards Privacy-Preserving Model Selection -- Preserving the Privacy of Sensitive Relationships in Graph Data.
9783540784784
10.1007/978-3-540-78478-4 doi
Data protection.
Application software.
Data mining.
Computer networks .
Computers and civilization.
Computers--Law and legislation.
Information technology--Law and legislation.
Data and Information Security.
Computer and Information Systems Applications.
Data Mining and Knowledge Discovery.
Computer Communication Networks.
Computers and Society.
Legal Aspects of Computing.
QA76.9.A25
005.8