Sciweavers

2705 search results - page 17 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
SEC
2008
13 years 9 months ago
Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Privat
Every time a user uses the Internet, a wealth of personal information is revealed, either voluntarily or involuntarily. This often causes privacy breaches, specially if the informa...
Indrajit Ray, Sudip Chakraborty
SIGKDD
2002
90views more  SIGKDD 2002»
13 years 7 months ago
Cryptographic Techniques for Privacy-Preserving Data Mining
Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that n...
Benny Pinkas
AUSDM
2006
Springer
122views Data Mining» more  AUSDM 2006»
13 years 11 months ago
Analysis of Breast Feeding Data Using Data Mining Methods
The purpose of this study is to demonstrate the benefit of using common data mining techniques on survey data where statistical analysis is routinely applied. The statistical surv...
Hongxing He, Huidong Jin, Jie Chen, Damien McAulla...
ADC
2007
Springer
145views Database» more  ADC 2007»
14 years 1 months ago
The Privacy of k-NN Retrieval for Horizontal Partitioned Data -- New Methods and Applications
Recently, privacy issues have become important in clustering analysis, especially when data is horizontally partitioned over several parties. Associative queries are the core retr...
Artak Amirbekyan, Vladimir Estivill-Castro
SDM
2008
SIAM
135views Data Mining» more  SDM 2008»
13 years 9 months ago
Preemptive Measures against Malicious Party in Privacy-Preserving Data Mining
Currently, many privacy-preserving data mining (PPDM) algorithms assume the semi-honest model and/or malicious model of multi-party interaction. However, both models are far from ...
Shuguo Han, Wee Keong Ng