Privacy Preserving Data Mining: Models and Algorithms (Record no. 117140)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | nam a22 4500 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 190913b ||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781441943712 |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.7422 |
| Item number | PRI |
| 245 ## - TITLE STATEMENT | |
| Title | Privacy Preserving Data Mining: Models and Algorithms |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Name of publisher, distributor, etc | Springer Science Business Media, LLC |
| Place of publication, distribution, etc | USA |
| Date of publication, distribution, etc | 2008 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 513p |
| 500 ## - GENERAL NOTE | |
| General note | An Introduction to Privacy Preserving Data Mining. <br/>A General Survey of Privacy Preserving Data Mining Models and Algorithms. <br/>A Survey of Inference Control Methods for Privacy Preserving Data Mining. <br/>Measures of Anonymity.<br/>K Anonymous Data Mining: A Survey. <br/>A Survey of Randomization Methods for Privacy Preserving Data Mining. <br/>A Survey of Multiplicative Perturbation for Privacy Preserving Data Mining. <br/>A Survey of Quantification of Privacy Preserving Data Mining Algorithms. <br/>A Survey of Utility based Privacy Preserving Data Transformation Methods. <br/>Mining Association Rules under Privacy Constraints. <br/>A Survey of Association Rule Hiding Methods for Privacy. <br/>A Survey of Statistical Approaches to Preserving Confidentiality of Contingency Table Entries. <br/>A Survey of Privacy Preserving Methods Across Horizontally Partitioned Data. <br/>Survey of Privacy Preserving Methods across Vertically Partitioned Data. <br/>A Survey of Attack Techniques on Privacy Preserving Data Perturbation Methods. <br/>Private Data Analysis via Output Perturbation. <br/>A Survey of Query Auditing Techniques for Data Privacy. <br/>Privacy and the Dimensionality Curse. <br/>Personalized Privacy Preservation . <br/>Privacy Preserving Data Stream Classification. <br/>Index. |
| 600 ## - SUBJECT ADDED ENTRY--PERSONAL NAME | |
| Personal name | Computer Engineering |
| 9 (RLIN) | 41795 |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Aggarwal, Charu C. |
| Relator term | Editor |
| 9 (RLIN) | 41796 |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Yu, Philip S. |
| Relator term | Editor |
| 9 (RLIN) | 41797 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Item type | Book |
No items available.
