Introduction to privacy-preserving data publishing : concepts and techniques
"Gaining access to high-quality data is a vital necessity in knowledge-based decision making. But data in its raw form often contains sensitive information about individuals. Providing solutions to this problem, the methods and tools of privacy-preserving data publishing enable the publication...
| Main Author: | Fung, Benjamin C. M. (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boca Raton, Florida :
Chapman & Hall/CRC ,
2011
|
| Series: | Data mining and knowledge discovery series
|
| Subjects: |
Similar Items
Privacy-aware knowledge discovery novel applications and new techniques
by: Bonchi, Francesco, et al.
Published: (2011)
by: Bonchi, Francesco, et al.
Published: (2011)
Information privacy engineering and privacy by design understanding privacy threats, technology, and regulations based on standards and best practices
by: Stallings, William
Published: (2020)
by: Stallings, William
Published: (2020)
Privacy-preserving data mining models and algorithms
by: Aggarwal, Charu C., et al.
Published: (2008)
by: Aggarwal, Charu C., et al.
Published: (2008)
افشاء السر الطبي
by: احمد, علي محمد علي
Published: (2008)
by: احمد, علي محمد علي
Published: (2008)
Digital privacy theory, technologies, and practices
by: Acquisti, Alessandro
Published: (2008)
by: Acquisti, Alessandro
Published: (2008)
Statistical disclosure control
by: Hundepool, Anco
Published: (2012)
by: Hundepool, Anco
Published: (2012)
The law of privilege
by: Carpenter, Chloe 1978-, et al.
Published: (2006)
by: Carpenter, Chloe 1978-, et al.
Published: (2006)
Mastering SQL Server 2000 security
by: Young, Mike 1972-, et al.
Published: (2002)
by: Young, Mike 1972-, et al.
Published: (2002)
Information privacy concepts & applications
by: Courtney, Kylan
Published: (2014)
by: Courtney, Kylan
Published: (2014)
Applied Oracle security developing secure database and middleware environments
by: Knox, David (David C.)
Published: (2010)
by: Knox, David (David C.)
Published: (2010)
Confidential and other privileged communication
by: Weinberg, Roy D. (Roy David)
Published: (1967)
by: Weinberg, Roy D. (Roy David)
Published: (1967)
الحماية الجنائية لاسرار المهنة : اسرار المهن الحرة، اسرار الوظيفة العامة، اسرار الدولة
by: سلامه, احمد كامل
Published: (1988)
by: سلامه, احمد كامل
Published: (1988)
Secure data management 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings
by: Jonker, Willem 1962-, et al.
Published: (2007)
by: Jonker, Willem 1962-, et al.
Published: (2007)
Mobile and wireless network security and privacy
by: Makki, S. Kami
Published: (2007)
by: Makki, S. Kami
Published: (2007)
Computer forensics and privacy
by: Caloyannnides, Michael A.
Published: (2001)
by: Caloyannnides, Michael A.
Published: (2001)
Database security
by: Basta, Alfred, et al.
Published: (2012)
by: Basta, Alfred, et al.
Published: (2012)
Data warehouse : from architecture to implementation
by: Devlin, Barry
Published: (1997)
by: Devlin, Barry
Published: (1997)
Pengenalan kepada pangkalan data teori dan praktis
by: Md. Hafiz Selamat
Published: (2001)
by: Md. Hafiz Selamat
Published: (2001)
Pengenalan kepada pangkalan data
by: Fariza Hanum Md. Nasaruddin
Published: (2002)
by: Fariza Hanum Md. Nasaruddin
Published: (2002)
Effective data base design
by: Inmon, William H.
Published: (1981)
by: Inmon, William H.
Published: (1981)
Data management
by: Watson, Richard Thomas
Published: (1998)
by: Watson, Richard Thomas
Published: (1998)
Information security and privacy 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 proceedings
by: Dawson, Ed (Edward), et al.
Published: (2007)
by: Dawson, Ed (Edward), et al.
Published: (2007)
A practical guide to protecting confidential business information
by: Jackson, Margaret
Published: (2003)
by: Jackson, Margaret
Published: (2003)
Sistem pengkalan data konsep asas, reka bentuk dan pelaksanaan
by: Abdullah Embong
Published: (2000)
by: Abdullah Embong
Published: (2000)
Web data management
by: Abiteboul, S. (Serge)
Published: (2012)
by: Abiteboul, S. (Serge)
Published: (2012)
Sistem pangkalan data
by: Halina Mohamed Dahlan
Published: (2011)
by: Halina Mohamed Dahlan
Published: (2011)
Handbook of data management
by: Purba, Sanjiv
Published: (1999)
by: Purba, Sanjiv
Published: (1999)
Data Base management
by: McFadden, Fred R. 1933-, et al.
Published: (1988)
by: McFadden, Fred R. 1933-, et al.
Published: (1988)
Mergers and acquisition security corporate restructuring and security management
by: Halibozek, Edward P., et al.
Published: (2005)
by: Halibozek, Edward P., et al.
Published: (2005)
Law of privilege
by: McNicol, Suzanne B.
Published: (1992)
by: McNicol, Suzanne B.
Published: (1992)
Principles of data-base management
by: Martin, James 1933-2013
Published: (1976)
by: Martin, James 1933-2013
Published: (1976)
Computer data-base organization
by: Martin, James 1933-2013
Published: (1977)
by: Martin, James 1933-2013
Published: (1977)
An introduction to database systems
by: Date, C. J.
Published: (1995)
by: Date, C. J.
Published: (1995)
An Introduction to database systems
by: Date, C. J.
Published: (2004)
by: Date, C. J.
Published: (2004)
An introduction to database systems
by: Date, C. J.
Published: (2000)
by: Date, C. J.
Published: (2000)
An introduction to database systems
by: Date, C. J.
Published: (2000)
by: Date, C. J.
Published: (2000)
An introduction to database systems
by: Date, C. J.
Published: (1990)
by: Date, C. J.
Published: (1990)
Microsoft access 2007 data analysis
by: Alexander, Michael 1972-
Published: (2007)
by: Alexander, Michael 1972-
Published: (2007)
Data modeling a beginner's guide
by: Oppel, Andrew J.
Published: (2010)
by: Oppel, Andrew J.
Published: (2010)
The data warehouse ETL toolkit practical techniques for extracting, cleaning and delivering data
by: Kimball, Ralph 1916-2001, et al.
Published: (2004)
by: Kimball, Ralph 1916-2001, et al.
Published: (2004)
Similar Items
-
Privacy-aware knowledge discovery novel applications and new techniques
by: Bonchi, Francesco, et al.
Published: (2011) -
Information privacy engineering and privacy by design understanding privacy threats, technology, and regulations based on standards and best practices
by: Stallings, William
Published: (2020) -
Privacy-preserving data mining models and algorithms
by: Aggarwal, Charu C., et al.
Published: (2008) -
افشاء السر الطبي
by: احمد, علي محمد علي
Published: (2008) -
Digital privacy theory, technologies, and practices
by: Acquisti, Alessandro
Published: (2008)