It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_columbia

Record ID marc_columbia/Columbia-extract-20221130-034.mrc:6732948:11413
Source marc_columbia
Download Link /show-records/marc_columbia/Columbia-extract-20221130-034.mrc:6732948:11413?format=raw

LEADER: 11413cam a2200697 i 4500
001 16614129
005 20221119232829.0
006 m o d
007 cr |||||||||||
008 141124s2011 flua ob 001 0 eng d
035 $a(OCoLC)ocn896828448
035 $a(NNC)16614129
040 $aCUS$beng$erda$epn$cCUS$dCUS$dSINTU$dUA@$dOCLCF$dCRCPR$dN$T$dIDEBK$dYDXCP$dE7B$dEBLCP$dDEBSZ$dOCLCQ$dMERUC$dOCLCQ$dUAB$dSTF$dOCLCQ$dNLE$dINT$dOCLCQ$dUKMGB$dOCLCQ$dWYU$dYDX$dTYFRS$dLEAUB$dOCLCQ$dNLW$dOCLCO$dOCLCQ
066 $c(S
015 $aGBB7A9541$2bnb
016 7 $a018392140$2Uk
019 $a761169602$a899156452$a903972138$a1015208275$a1065711834
020 $a9781439803660$q(electronic bk.)
020 $a1439803668$q(electronic bk.)
020 $z9781439803653$q(hardback)
020 $z143980365X$q(hardback)
035 $a(OCoLC)896828448$z(OCoLC)761169602$z(OCoLC)899156452$z(OCoLC)903972138$z(OCoLC)1015208275$z(OCoLC)1065711834
037 $aTANDF_200236$bIngram Content Group
050 4 $aQA76.9.D314$bP75 2011
072 7 $aCOM$x000000$2bisacsh
082 04 $a006.312$bP961
084 $aCOM021000$aCOM021030$aCOM053000$2bisacsh
049 $aZCUA
245 00 $aPrivacy-aware knowledge discovery :$bnovel applications and new techniques /$cedited by Francesco Bonchi, Elena Ferrari.
264 1 $aBoca Raton, FL :$bCRC Press,$c2011.
300 $a1 online resource (xxvii, 514 pages) :$billustrations
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
490 1 $aChapman & Hall/CRC data mining and knowledge discovery series ;$v19
500 $a"A Chapman & Hall book."
520 $a"Covering research at the frontier of this field, PrivacyAware Knowledge Discovery: Novel Applications and New Techniques presents stateofthe-art privacy-preserving data mining techniques for application domains, such as medicine and social networks, that face the increasing heterogeneity and complexity of new forms of data. Renowned authorities from prominent organizations not only cover well-established results. they also explore complex domains where privacy issues are generally clear and well defined, but the solutions are still preliminary and in continuous development. Divided into seven parts, the book provides in-depth coverage of the most novel reference scenarios for privacy-preserving techniques. The first part gives general techniques that can be applied to various applications discussed in the rest of the book. The second section focuses on the sanitization of network traces and privacy in data stream mining. After the third part on privacy in spatio-temporal data mining and mobility data analysis, the book examines time series analysis in the fourth section, explaining how a perturbation method and a segment-based method can tackle privacy issues of time series data. The fifth section on biomedical data addresses genomic data as well as the problem of privacy-aware information sharing of health data. In the sixth section on web applications, the book deals with query log mining and web recommender systems. The final part on social networks analyzes privacy issues related to the management of social network data under different perspectives. While several new results have recently occurred in the privacy, database, and data mining research communities, a uniform presentation of up-to-date techniques and applications is lacking. Filling this void, Privacy-Aware Knowledge Discovery presents novel algorithms, patterns, and models, along with a significant collection of open problems for future investigation"--Provided by publisher
520 $a"Covering research at the frontier of this field, Privacy-Aware Knowledge Discovery presents state-of-the-art privacy-preserving data mining techniques for application domains, such as medicine and social networks, that face the increasing heterogeneity and complexity of new forms of data. Renowned authorities from prominent organizations not only cover well-established results; they also explore complex domains where privacy issues are generally clear and well defined, but the solutions are still preliminary and in continuous development. The book focuses on intricate, real-world applications in medicine, biology, the web, social networks, and mobility observation systems"--Provided by publisher
504 $aIncludes bibliographical references and index.
505 0 $6880-01$aAnonymity technologies for privacy-preserving data publishing and mining / Anna Monreale, Dino Pedreschi, and Ruggero G. Pensa -- Privacy preservation in the publication of sparse multidimensional data / Manolis Terrovitis, Nikos Mamoulis, and Panos Kalnis -- Knowledge hiding in emerging application domains / Osman Abul -- Condensation-based methods in emerging application domains / Yucel Saygin and Mehmet Ercan Nergiz -- Catch, clean, and release : a survey of obstacles and opportunities for network trace sanitization / Keren Tan [and others] -- Output privacy in stream mining / Ting Wang and Ling Liu -- Privacy issues in spatio-temporal data mining / Aris Gkoulalas-Divanis and Vassilios S. Verykios -- Probabilistic grid-based approaches for privacy-preserving data mining on moving object trajectories / Gyözö Gidófalvi, Xuegang Huang, and Torben Bach Pedersen -- Privacy and anonymity in location data management / Claudio Bettini [and others] -- Privacy preservation on time series / Spiros Papadimitriou [and others] -- A segment-based approach to preserve privacy in time series data mining / Yongjian Fu and Ye Zhu -- A survey of challenges and solutions for privacy in clinical genomics data mining / Bradley Malin, Christopher Cassa, and Murat Kantarcioglu -- Privacy-awareness health information sharing / Thomas Trojer [and others] -- Issues with privacy preservation in query log mining / Ricardo Baeza-Yates [and others] -- Preserving privacy in Web recommender systems / Ranieri Baraglia [and others] -- The social Web and privacy : practices, reciprocity and conflict detection in social networks / Seda Gürses and Bettina Berendt -- Privacy protection of personal data in social networks / Barbara Carminati [and others] -- Analyzing private network data / Michael Hay, Gerome Miklau, and David Jensen.
588 0 $aPrint version record.
650 0 $aDatabase security.
650 0 $aData mining.
650 0 $aConfidential communications.
650 6 $aBases de données$xSécurité$xMesures.
650 6 $aExploration de données (Informatique)
650 6 $aSecret professionnel.
650 7 $aCOMPUTERS$xDatabase Management$xGeneral.$2bisacsh
650 7 $aCOMPUTERS$xDatabase Management$xData Mining.$2bisacsh
650 7 $aCOMPUTERS$xSecurity$xGeneral.$2bisacsh
650 7 $aCOMPUTERS$xGeneral.$2bisacsh
650 7 $aConfidential communications.$2fast$0(OCoLC)fst00874701
650 7 $aData mining.$2fast$0(OCoLC)fst00887946
650 7 $aDatabase security.$2fast$0(OCoLC)fst00888063
700 1 $aBonchi, Francesco.
700 1 $aFerrari, Elena.
776 08 $iPrint version:$tPrivacy-aware knowledge discovery.$dBoca Raton, FL : CRC Press, 2011$z9781439803653$w(DLC) 2010043156$w(OCoLC)676922932
830 0 $aChapman & Hall/CRC data mining and knowledge discovery series.
856 40 $uhttp://www.columbia.edu/cgi-bin/cul/resolve?clio16614129$zTaylor & Francis eBooks
880 00 $6505-01/(S$gContents note continued:$g15.$tPreserving Privacy in Web Recommender Systems /$rFabrizio Silvestri --$g15.1.$tIntroduction --$g15.2.$tTaxonomy of Web Personalization and Recommendation --$g15.2.1.$tContent-Based Filtering --$g15.2.2.$tCollaborative Filtering --$g15.2.3.$tItem-Based Collaborative Filtering --$g15.2.4.$tRecommending by Clustering Unordered User Sessions --$g15.2.5.$tRecommending through Association Analysis of Unordered User Sessions/Profiles --$g15.2.6.$tRecommending by Clustering Ordered User Sessions --$g15.2.7.$tRecommending through Sequential Analysis of Ordered User Sessions/Profiles --$g15.3.$tπSUGGEST System --$g15.3.1.$tPrivacy-Preserving Features of πSUGGEST --$g15.4.$tπSUGGEST and Privacy --$g15.4.1.$tDiscussion --$g15.5.$tπSUGGEST Evaluation --$g15.6.$tConclusion --$tReferences --$gVII.$tSocial Networks --$g16.$tSocial Web and Privacy: Practices, Reciprocity and Conflict Detection in Social Networks /$rBettina Berendt --$g16.1.$tIntroduction --$g16.2.$tApproaching Privacy in Social Networks --$g16.2.1.$tData I: Personal Data --$g16.2.2.$tPrivacy as Hiding: Confidentiality --$g16.2.3.$tPrivacy as Control: Informational Self-Determination --$g16.2.4.$tPrivacy as Practice: Identity Construction --$g16.2.5.$tPrivacy in Social Network Sites: Deriving Requirements from Privacy Concerns --$g16.2.6.$tData II: Relational Information and Transitive Access Control --$g16.3.$tRelational Information, Transitive Access Control and Conflicts --$g16.3.1.$tTransitive Access Control and Relational Information --$g16.3.2.$tInconsistency and Reciprocity Conflicts with TAC and RI --$g16.3.3.$tFormal Definitions --$g16.4.$tSocial Network Construction and Conflict Analysis --$g16.4.1.$tConstructing the Graph with Tokens for Permissions --$g16.4.2.$tRelationship Building and Information Discovery in Different Types of Social Networks --$g16.4.3.$tComparing Models --$g16.5.$tData Mining and Feedback for Awareness Tools --$g16.5.1.$tToward Conflict Avoidance and Resolution: Feedback and Trust Mechanisms --$g16.5.2.$tDesing Choices in Feedback Mechanisms Based on Data Mining --$g16.6.$tConclusions and Outlook --$tReferences --$g17.$tPrivacy Protection of Personal Data in Social Networks /$rBahvani Thuraisingham --$g17.1.$tIntroduction --$g17.2.$tPrivacy Issues in Online Social Networks --$g17.3.$tAccess Control for Online Social Networks --$g17.3.1.$tChallenges in Access Control for Online Social Networks --$g17.3.2.$tOverview of the Literature --$g17.3.3.$tSemantic-Based Access Control in Online Social Networks --$g17.4.$tPrivacy Issues in Relationship-Based Access Control Enforcement --$g17.4.1.$tChallenges in Privacy-Aware Access Control in Online Social Networks --$g17.4.2.$tPrivacy-Aware Access Control in Online Social Networks --$g17.5.$tPreventing Private Infromation Inference --$g17.5.1.$tOverview of the Literatures --$g17.5.2.$tOverview of a Typical Inference Attack on Social Networks --$g17.6.$tConclusion and Research Challenges --$tReferences --$g18.$tAnalyzing Private Network Data /$rDavid Jensen --$g18.1.$tIntroduction --$g18.1.1.$tHow Are Networks Analyzed--$g18.1.2.$tWhy Should Network Data Be Kept Private--$g18.1.3.$tAre Privacy and Utility Compatible--$g18.1.4.$tOrganization --$g18.2.$tAttacks on Anonymized Networks --$g18.2.1.$tThreats: Re-Identification and Edge Disclosure --$g18.2.2.$tAdversary Knowledge --$g18.2.3.$tAttacks --$g18.2.4.$tAttack Effectiveness --$g18.3.$tAlgorithms for Private Data Publication --$g18.3.1.$tDirected Alteration of Networks --$g18.3.2.$tNetwork Generalization --$g18.3.3.$tRandomly Altering Networks --$g18.4.$tAlgorithms for Private Query Answering --$g18.4.1.$tDifferential Privacy --$g18.4.2.$tDifferential Privacy for Networks --$g18.4.3.$tAlgorithm for Differentially Private Query Answering --$g18.4.4.$tNetwork Analysis under Differential Privacy --$g18.5.$tConclusion and Future Issues --$tReferences.
852 8 $blweb$hEBOOKS