Sciweavers

2705 search results - page 25 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
ACSAC
1996
IEEE
13 years 12 months ago
Formal Techniques for an ITSEC-E4 Secure Gateway
In this paper we describe the method used to develop a gateway capable of meeting the ITSEC E4 requirements. The security policy was formally modelled and proven consistent with t...
Pierre Bieber
KDD
1997
ACM
208views Data Mining» more  KDD 1997»
13 years 11 months ago
Metarule-Guided Mining of Multi-Dimensional Association Rules Using Data Cubes
In this paper, we employ a novel approach to metarule-guided, multi-dimensional association rule mining which explores a data cube structure. We propose algorithms for metarule-gu...
Micheline Kamber, Jiawei Han, Jenny Chiang
IEEEARES
2010
IEEE
14 years 25 days ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
CIS
2005
Springer
14 years 1 months ago
A New Conceptual Framework Within Information Privacy: Meta Privacy
When considering information security and privacy issues most of the attention has previously focussed on data protection and the privacy of personally identifiable information (PI...
Geoff Skinner, Song Han, Elizabeth Chang
ICDM
2010
IEEE
157views Data Mining» more  ICDM 2010»
13 years 5 months ago
Privacy Violations Using Microtargeted Ads: A Case Study
In this paper we propose a new class of attacks that exploit advertising systems offering microtargeting capabilities in order to breach user privacy. We study the advertising syst...
Aleksandra Korolova