Introduction to privacy-preserving data publishing : concepts and techniques

"Gaining access to high-quality data is a vital necessity in knowledge-based decision making. But data in its raw form often contains sensitive information about individuals. Providing solutions to this problem, the methods and tools of privacy-preserving data publishing enable the publication...

Full description

Bibliographic Details
Main Author: Fung, Benjamin C. M. (Author)
Format: Book
Language:English
Published: Boca Raton, Florida : Chapman & Hall/CRC , 2011
Series:Data mining and knowledge discovery series
Subjects:

MARC

LEADER 00000cam a2200000 7i4500
001 0000074479
005 20120112.0
008 110621s2011 flu eng
020 |a 1420091484 (hardcover : alk. paper) 
020 |a 9781420091489 (hardcover : alk. paper) 
050 0 0 |a QA76.9.D314   |b I58 2011 
090 0 0 |a QA76.9.D314   |b I58 2011 
245 0 0 |a Introduction to privacy-preserving data publishing :   |b concepts and techniques   |c Benjamin C. M. Fung ... [et al.] 
260 |a Boca Raton, Florida :   |b Chapman & Hall/CRC ,   |c 2011 
300 |a xxxii, 344 p. :   |b ill. ;   |c 24 cm. 
490 1 |a Data mining and knowledge discovery series 
504 |a Includes bibliographical references (p. 319-340) and index 
505 0 |a 1. The fundamentals -- 2. Anonymization for data mining -- 3. Extended data publishing scenarios -- 4. Anonymizing complex data 
520 |a "Gaining access to high-quality data is a vital necessity in knowledge-based decision making. But data in its raw form often contains sensitive information about individuals. Providing solutions to this problem, the methods and tools of privacy-preserving data publishing enable the publication of useful information while protecting data privacy. Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques presents state-of-the-art information sharing and data integration methods that take into account privacy and data mining requirements." "The first part of the book discusses the fundamentals of the field. In the second part, the authors present anonymization methods for preserving information utility for specific data mining tasks. The third part examines the privacy issues, privacy models, and anonymization methods for realistic and challenging data publishing scenarios. While the first three parts focus on anonymizing relational data, the last part studies the privacy threats, privacy models, and anonymization methods for complex data, including transaction, trajectory, social network, and textual data." "This book not only explores privacy and information utility issues but also efficiency and scalability challenges. In many chapters, the authors highlight efficient and scalable methods and provide an analytical discussion to compare the strengths and weaknesses of different solutions."--BOOK JACKET 
650 0 |a Confidential communications 
650 0 |a Database security 
700 1 |a Fung, Benjamin C. M. ,   |e author 
999 |a 1000141733   |b Book   |c OPEN SHELF (30 DAYS)   |e Tembila Campus