Sciweavers

2705 search results - page 15 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
CSFW
2006
IEEE
14 years 1 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
DMIN
2006
115views Data Mining» more  DMIN 2006»
13 years 9 months ago
Privacy Preserving in Clustering using Fuzzy Sets
Data mining techniques, in spite of their benefit in a wide range of applications have also raised threat to privacy and data security. This paper addresses the problem of preservi...
S. Srinivasa Rao 0002, K. V. S. V. N. Raju, P. Kus...
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
14 years 2 months ago
Differential Privacy for Clinical Trial Data: Preliminary Evaluations
—The concept of differential privacy as a rigorous definition of privacy has emerged from the cryptographic community. However, further careful evaluation is needed before we ca...
Duy Vu, Aleksandra Slavkovic
CLA
2004
13 years 9 months ago
Binary Factor Analysis with Help of Formal Concepts
Binary factor analysis (BFA, also known as Boolean Factor Analysis) is a nonhierarchical analysis of binary data, based on reduction of binary space dimension. It allows us to find...
Ales Keprt, Václav Snásel
DMIN
2006
138views Data Mining» more  DMIN 2006»
13 years 9 months ago
Quantification of a Privacy Preserving Data Mining Transformation
Data mining, with its promise to extract valuable, previously unknown and potentially useful patterns or knowledge from large data sets that contain private information is vulnerab...
Mohammed Ketel