Sciweavers

7163 search results - page 96 / 1433
» Privacy-Preserving Data Mining
Sort
View
SACMAT
2005
ACM
14 years 3 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li
TDSC
2011
13 years 5 months ago
CASTLE: Continuously Anonymizing Data Streams
— Most of existing privacy preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are cont...
Jianneng Cao, Barbara Carminati, Elena Ferrari, Ki...
ICDM
2005
IEEE
162views Data Mining» more  ICDM 2005»
14 years 3 months ago
Mining Patterns That Respond to Actions
Data mining focuses on patterns that summarize the data. In this paper, we focus on mining patterns that could change the state by responding to opportunities of actions.
Yuelong Jiang, Ke Wang, Alexander Tuzhilin, Ada Wa...