Weiter zum Inhalt
UB der TUM
OPAC
Universitätsbibliothek
Technische Universität München
  • Temporäre Merkliste: 0 temporär gemerkt (Voll)
  • Hilfe
    • Kontakt
    • Suchtipps
    • Informationen Fernleihe
  • Chat
  • Tools
    • Suchhistorie
    • Freie Fernleihe
    • Erwerbungsvorschlag
  • English
  • Konto

    Konto

    • Ausgeliehen
    • Bestellt
    • Sperren/Gebühren
    • Profil
    • Suchhistorie
  • Log out
  • Login
  • Bücher & Journals
  • Papers
Erweitert
  • Privacy preserving data mining
  • Zitieren
  • Als E-Mail versenden
  • Drucken
  • Datensatz exportieren
    • Exportieren nach RefWorks
    • Exportieren nach EndNoteWeb
    • Exportieren nach EndNote
    • Exportieren nach BibTeX
    • Exportieren nach RIS
  • Zur Merkliste hinzufügen
  • Temporär merken Aus der temporären Merkliste entfernen
  • Permalink
Export abgeschlossen — 
Buchumschlag
Gespeichert in:
Bibliographische Detailangaben
Beteiligte Personen: Vaidya, Jaideep (VerfasserIn), Clifton, Christopher W. (VerfasserIn), Zhu, Yu Michael (VerfasserIn)
Format: Buch
Sprache:Englisch
Veröffentlicht: New York, NY Springer 2006
Schriftenreihe:Advances in information security 19
Schlagwörter:
Bases de données - Sécurité - Mesures
Exploration de données (Informatique)
Protection de l'information (Informatique)
Data mining
Data protection
Database security
Datenbank
Geheimhaltung
Recherche
Links:http://deposit.dnb.de/cgi-bin/dokserv?id=2739418&prov=M&dok_var=1&dok_ext=htm
http://www.gbv.de/dms/ilmenau/toc/492861021vaidy.PDF
http://www.loc.gov/catdir/toc/fy0613/2005934034.html
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015405248&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
Beschreibung:Literaturverz. S. [115] - 120
Umfang:120 S. graph. Darst.
ISBN:0387258868
9780387258867
Internformat

MARC

LEADER 00000nam a2200000 cb4500
001 BV022193699
003 DE-604
005 20070411
007 t|
008 061214s2006 xx d||| |||| 00||| eng d
010 |a 005934034 
020 |a 0387258868  |9 0-387-25886-8 
020 |a 9780387258867  |9 978-0-387-25886-7 
035 |a (OCoLC)61424926 
035 |a (DE-599)BVBBV022193699 
040 |a DE-604  |b ger 
041 0 |a eng 
049 |a DE-384  |a DE-355 
050 0 |a QA76.9.D343 
082 0 |a 006.312  |2 22 
082 0 |a 005.74  |2 22 
084 |a PZ 4800  |0 (DE-625)141183:  |2 rvk 
084 |a ST 530  |0 (DE-625)143679:  |2 rvk 
100 1 |a Vaidya, Jaideep  |e Verfasser  |4 aut 
245 1 0 |a Privacy preserving data mining  |c by Jaideep Vaidya ; Chris Clifton ; Michael Zhu 
264 1 |a New York, NY  |b Springer  |c 2006 
300 |a 120 S.  |b graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 1 |a Advances in information security  |v 19 
500 |a Literaturverz. S. [115] - 120 
650 4 |a Bases de données - Sécurité - Mesures 
650 4 |a Exploration de données (Informatique) 
650 4 |a Protection de l'information (Informatique) 
650 4 |a Data mining 
650 4 |a Data protection 
650 4 |a Database security 
650 0 7 |a Datenbank  |0 (DE-588)4011119-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Geheimhaltung  |0 (DE-588)4140232-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Recherche  |0 (DE-588)4121560-6  |2 gnd  |9 rswk-swf 
689 0 0 |a Datenbank  |0 (DE-588)4011119-2  |D s 
689 0 1 |a Recherche  |0 (DE-588)4121560-6  |D s 
689 0 2 |a Geheimhaltung  |0 (DE-588)4140232-7  |D s 
689 0 |5 DE-604 
700 1 |a Clifton, Christopher W.  |e Verfasser  |4 aut 
700 1 |a Zhu, Yu Michael  |e Verfasser  |4 aut 
830 0 |a Advances in information security  |v 19  |w (DE-604)BV014168308  |9 19 
856 4 |u http://deposit.dnb.de/cgi-bin/dokserv?id=2739418&prov=M&dok_var=1&dok_ext=htm 
856 4 |u http://www.gbv.de/dms/ilmenau/toc/492861021vaidy.PDF  |z lizenzfrei  |3 Inhaltsverzeichnis 
856 4 |u http://www.loc.gov/catdir/toc/fy0613/2005934034.html  |z lizenzfrei  |3 Inhaltsverzeichnis 
856 4 2 |m GBV Datenaustausch  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015405248&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
943 1 |a oai:aleph.bib-bvb.de:BVB01-015405248 

Datensatz im Suchindex

DE-BY-UBR_call_number 470/ST 530 V128
DE-BY-UBR_katkey 3828133
DE-BY-UBR_location UB Handapparat Recht/Wirtschaft Prof. Pernul
DE-BY-UBR_media_number TEMP12007976
_version_ 1835106118442942464
adam_text IMAGE 1 PRIVACY PRESERVING DATA MINING BY JAIDEEP VAIDYA RUTGERS UNIVERSITY, NEWURK, NJ CHRIS CLIFTON PURDUE, W. LAFAYETTE, IN, USA MICHAEL ZHU PURDUE, W, LAFAYETTE, IN, USA L SPRI NNEER IMAGE 2 CONTENTS 1 PRIVACY AND DATA MINING 1 2 W H AT IS PRIVACY? 7 2.1 INDIVIDUAL IDENTIFIABILITY 8 2.2 MEASURIIIG THE INTRUSIVENESS OF DISCIOSURE 11 3 SOLUTION APPROACHES / PROBLEMS 17 3.1 DATA PARTITIONING MODELS 18 3.2 PERTURBATION 19 3.3 SECURE MULTI-PARTY COMPUTATION 21 3.3.1 SECURE CIRCUIT EVALUATION 23 3.3.2 SECURE SUM 25 4 PREDICTIVE MODELING FOR CLASSIFICATION 29 4.1 DECISION TREE CLASSIFICATION 31 4.2 A PERTURBATION-BASED SOLUTION FOR ID3 34 4.3 A CRYPTOGRAPHIC SOLUTION FOR ID3 38 4.4 ID3 ON VERTICALLY PARTITIONED DATA 40 4.5 BAYESIAN METHODS 45 4.5.1 HORIZONTALLY PARTITIONED DATA 47 4.5.2 VERTICALLY PARTITIONED DATA 48 4.5.3 LEARNING BAYESIAN NETWORK STRUCTURE 50 4.6 SUMMARY 51 5 PREDICTIVE MODELING FOR REGRESSION 53 5.1 INTRODUCTION AND CASE STUDY 53 5.1.1 CASE STUDY 55 5.1.2 WHAT ARE THE PROBLEMS? 55 5.1.3 WEAK SECURE MODEL 58 5.2 VERTICALLY PARTITIONED DATA 60 5.2.1 SECURE ESTIIIIATION OF REGRESSION COEFFICICNTS 60 IMAGE 3 CONTENTS VIII 5.2.2 DIAGNOSTICS AND MODEL DETERMINATION 62 5.2.3 SECURITY ANALYSIS 63 5.2.4 AN ALTERNATIVE: SECURE POWELL S ALGORITHM 65 5.3 HORIZONTALLY PARTITIONED DATA 68 5.4 SUMMARY AND FUTURE RESEARCH 69 6 FINDING PATTERNS AND RULES (ASSOCIATION RULES) 71 6.1 RANDOMLXATION-BASED APPROACHES 72 6.1.1 RANDOMIZATION OPERATOR 73 6.1.2 SUPPORT ESTIMATION AND ALGORITHM 74 6.1.3 LIMITING PRIVAEY BREACH 75 6.1.4 OTHER WORK 7G 6.2 CRYPTOGRAPHY-HASED APPROACHES 79 6.2.1 HORIZONTALLY PARTITIONED DATA 79 6.2.2 VERTICALLY PARTITIONED DATA 80 6.3 INFERENCE FROM RESULTS 82 7 DESCRIPTIVE MODELING (CIUSTERING, OUTLIER DETECTION) 85 7.1 CIUSTERING 86 7.1.1 DATA PCRTURBATION FOR CIUSTERING 86 7.2 CRYPTOGRAPHY-BASED APPROACHES 91 7.2.1 EM-CLUSTERING FOR HORIZONTALLY PARTITIONED DATA 91 7.2.2 K-MEANS CIUSTERING FOR VERTICALLY PARTITIONED DATA . . .. 95 7.3 OUTLIER DETECTION 99 7.3.1 DISTANCE-BASED OUTLIERS 101 7.3.2 BASIC APPROACH 102 7.3.3 HORIZONTALLY PARTITIONED DATA 102 7.3.4 VERTICALLY PARTITIONED DATA 105 7.3.5 MODIFIED SECURE COMPARISON PROTOCOL 106 7.3.6 SECURITY ANALYSIS 107 7.3.7 COMPUTATION AND COMMUNICATION ANALYSIS 110 7.3.8 SNMMARY 111 8 FUTURE RESEARCH - PROBLEMS REMAINING 113 REFERENCES 115 INDEX 121
any_adam_object 1
author Vaidya, Jaideep
Clifton, Christopher W.
Zhu, Yu Michael
author_facet Vaidya, Jaideep
Clifton, Christopher W.
Zhu, Yu Michael
author_role aut
aut
aut
author_sort Vaidya, Jaideep
author_variant j v jv
c w c cw cwc
y m z ym ymz
building Verbundindex
bvnumber BV022193699
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.D343
callnumber-search QA76.9.D343
callnumber-sort QA 276.9 D343
callnumber-subject QA - Mathematics
classification_rvk PZ 4800
ST 530
ctrlnum (OCoLC)61424926
(DE-599)BVBBV022193699
dewey-full 006.312
005.74
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 006 - Special computer methods
005 - Computer programming, programs, data, security
dewey-raw 006.312
005.74
dewey-search 006.312
005.74
dewey-sort 16.312
dewey-tens 000 - Computer science, information, general works
discipline Rechtswissenschaft
Informatik
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02420nam a2200601 cb4500</leader><controlfield tag="001">BV022193699</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20070411 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">061214s2006 xx d||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">005934034</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0387258868</subfield><subfield code="9">0-387-25886-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387258867</subfield><subfield code="9">978-0-387-25886-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)61424926</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022193699</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.D343</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.312</subfield><subfield code="2">22</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.74</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 4800</subfield><subfield code="0">(DE-625)141183:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 530</subfield><subfield code="0">(DE-625)143679:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Vaidya, Jaideep</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Privacy preserving data mining</subfield><subfield code="c">by Jaideep Vaidya ; Chris Clifton ; Michael Zhu</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">120 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in information security</subfield><subfield code="v">19</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverz. S. [115] - 120</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Bases de données - Sécurité - Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Exploration de données (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data mining</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenbank</subfield><subfield code="0">(DE-588)4011119-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Geheimhaltung</subfield><subfield code="0">(DE-588)4140232-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Recherche</subfield><subfield code="0">(DE-588)4121560-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenbank</subfield><subfield code="0">(DE-588)4011119-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Recherche</subfield><subfield code="0">(DE-588)4121560-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Geheimhaltung</subfield><subfield code="0">(DE-588)4140232-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Clifton, Christopher W.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhu, Yu Michael</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in information security</subfield><subfield code="v">19</subfield><subfield code="w">(DE-604)BV014168308</subfield><subfield code="9">19</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=2739418&amp;prov=M&amp;dok_var=1&amp;dok_ext=htm</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.gbv.de/dms/ilmenau/toc/492861021vaidy.PDF</subfield><subfield code="z">lizenzfrei</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/fy0613/2005934034.html</subfield><subfield code="z">lizenzfrei</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=015405248&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015405248</subfield></datafield></record></collection>
id DE-604.BV022193699
illustrated Illustrated
indexdate 2024-12-20T12:49:47Z
institution BVB
isbn 0387258868
9780387258867
language English
lccn 005934034
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-015405248
oclc_num 61424926
open_access_boolean
owner DE-384
DE-355
DE-BY-UBR
owner_facet DE-384
DE-355
DE-BY-UBR
physical 120 S. graph. Darst.
publishDate 2006
publishDateSearch 2006
publishDateSort 2006
publisher Springer
record_format marc
series Advances in information security
series2 Advances in information security
spellingShingle Vaidya, Jaideep
Clifton, Christopher W.
Zhu, Yu Michael
Privacy preserving data mining
Advances in information security
Bases de données - Sécurité - Mesures
Exploration de données (Informatique)
Protection de l'information (Informatique)
Data mining
Data protection
Database security
Datenbank (DE-588)4011119-2 gnd
Geheimhaltung (DE-588)4140232-7 gnd
Recherche (DE-588)4121560-6 gnd
subject_GND (DE-588)4011119-2
(DE-588)4140232-7
(DE-588)4121560-6
title Privacy preserving data mining
title_auth Privacy preserving data mining
title_exact_search Privacy preserving data mining
title_full Privacy preserving data mining by Jaideep Vaidya ; Chris Clifton ; Michael Zhu
title_fullStr Privacy preserving data mining by Jaideep Vaidya ; Chris Clifton ; Michael Zhu
title_full_unstemmed Privacy preserving data mining by Jaideep Vaidya ; Chris Clifton ; Michael Zhu
title_short Privacy preserving data mining
title_sort privacy preserving data mining
topic Bases de données - Sécurité - Mesures
Exploration de données (Informatique)
Protection de l'information (Informatique)
Data mining
Data protection
Database security
Datenbank (DE-588)4011119-2 gnd
Geheimhaltung (DE-588)4140232-7 gnd
Recherche (DE-588)4121560-6 gnd
topic_facet Bases de données - Sécurité - Mesures
Exploration de données (Informatique)
Protection de l'information (Informatique)
Data mining
Data protection
Database security
Datenbank
Geheimhaltung
Recherche
url http://deposit.dnb.de/cgi-bin/dokserv?id=2739418&prov=M&dok_var=1&dok_ext=htm
http://www.gbv.de/dms/ilmenau/toc/492861021vaidy.PDF
http://www.loc.gov/catdir/toc/fy0613/2005934034.html
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015405248&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV014168308
work_keys_str_mv AT vaidyajaideep privacypreservingdatamining
AT cliftonchristopherw privacypreservingdatamining
AT zhuyumichael privacypreservingdatamining
  • Verfügbarkeit

‌

Per Fernleihe bestellen
Inhaltsverzeichnis
  • Impressum
  • Datenschutz
  • Barrierefreiheit
  • Kontakt