![]() |
![]() |
Your cart is empty |
||
Showing 1 - 2 of 2 matches in All Departments
Gaining access to high-quality data is a vital necessity in knowledge-based decision making. But data in its raw form often contains sensitive information about individuals. Providing solutions to this problem, the methods and tools of privacy-preserving data publishing enable the publication of useful information while protecting data privacy. Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques presents state-of-the-art information sharing and data integration methods that take into account privacy and data mining requirements. The first part of the book discusses the fundamentals of the field. In the second part, the authors present anonymization methods for preserving information utility for specific data mining tasks. The third part examines the privacy issues, privacy models, and anonymization methods for realistic and challenging data publishing scenarios. While the first three parts focus on anonymizing relational data, the last part studies the privacy threats, privacy models, and anonymization methods for complex data, including transaction, trajectory, social network, and textual data. This book not only explores privacy and information utility issues but also efficiency and scalability challenges. In many chapters, the authors highlight efficient and scalable methods and provide an analytical discussion to compare the strengths and weaknesses of different solutions.
Gaining access to high-quality data is a vital necessity in knowledge-based decision making. But data in its raw form often contains sensitive information about individuals. Providing solutions to this problem, the methods and tools of privacy-preserving data publishing enable the publication of useful information while protecting data privacy. Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques presents state-of-the-art information sharing and data integration methods that take into account privacy and data mining requirements. The first part of the book discusses the fundamentals of the field. In the second part, the authors present anonymization methods for preserving information utility for specific data mining tasks. The third part examines the privacy issues, privacy models, and anonymization methods for realistic and challenging data publishing scenarios. While the first three parts focus on anonymizing relational data, the last part studies the privacy threats, privacy models, and anonymization methods for complex data, including transaction, trajectory, social network, and textual data. This book not only explores privacy and information utility issues but also efficiency and scalability challenges. In many chapters, the authors highlight efficient and scalable methods and provide an analytical discussion to compare the strengths and weaknesses of different solutions.
|
![]() ![]() You may like...
A Critical History of Psychotherapy…
Renato Foschi, Marco Innamorati
Hardcover
R7,072
Discovery Miles 70 720
Automatic Cyberbullying Detection…
Michal E Ptaszynski, Fumito Masui
Hardcover
R4,438
Discovery Miles 44 380
Foreign Crops and Markets, Vol. 47…
United States Department of Agriculture
Paperback
R397
Discovery Miles 3 970
Storage Management in Data Centers…
Volker Herminghaus, Albrecht Scriba
Hardcover
Guide to the Study of Insects; n.1
A S (Alpheus Spring) 1839 Packard
Hardcover
R971
Discovery Miles 9 710
Transformation of Rage - Mourning and…
Peggy Fitzhugh Johnstone
Hardcover
R3,088
Discovery Miles 30 880
|