rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781420091502

Introduction to Privacy-Preserving Data Publishing

by ; ; ;
  • ISBN13:

    9781420091502

  • ISBN10:

    1420091506

  • Format: Nonspecific Binding
  • Copyright: 2010-08-02
  • Publisher: Taylor & Francis

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $170.00 Save up to $115.22
  • Rent Book $121.13
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-5 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

How To: Textbook Rental

Looking to rent a book? Rent Introduction to Privacy-Preserving Data Publishing [ISBN: 9781420091502] for the semester, quarter, and short term or search our site for other textbooks by Benjamin C.M. Fung; Ke Wang; Ada Wai-Chee Fu; Philip S. Yu. Renting a textbook can save you up to 90% from the cost of buying.

Table of Contents

The Fundamentals
Introduction
Data Collection and Data Publishing
What Is Privacy-Preserving Data Publishing?
Related Research Areas
Attack Models and Privacy Models
Record Linkage Model
Attribute Linkage Model
Table Linkage Model
Probabilistic Model
Modeling Adversary's Background Knowledge
Anonymization Operations
Generalization and Suppression
Anatomization and Permutation
Random Perturbation
Information Metrics
General Purpose Metrics
Special Purpose Metrics
Trade-Off Metrics
Anonymization Algorithms
Algorithms for the Record Linkage Model
Algorithms for the Attribute Linkage Model
Algorithms for the Table Linkage Model
Algorithms for the Probabilistic Attack
Attacks on Anonymous Data
Anonymization For Data Mining
Anonymization for Classification Analysis
Introduction
Anonymization Problems for Red Cross BTS
High-Dimensional Top-Down Specialization (HDTDS)
Workload-Aware Mondrian
Bottom-Up Generalization
Genetic Algorithm
Evaluation Methodology
Summary and Lesson Learned
Anonymization for Cluster Analysis
Introduction
Anonymization Framework for Cluster Analysis
Dimensionality Reduction-Based Transformation
Related Topics
Summary
Extended Data Publishing Scenarios
Multiple Views Publishing
Introduction
Checking Violations of k-Anonymity on Multiple Views
Checking Violations with Marginals
Multi-Relational k-Anonymity
Multi-Level Perturbation
Summary
Anonymizing Sequential Releases with New Attributes
Introduction
Monotonicity of Privacy
Anonymization Algorithm for Sequential Releases
Extensions
Summary
Anonymizing Incrementally Updated Data Records
Introduction
Continuous Data Publishing
Dynamic Data Republishing
HD-Composition
Summary
Collaborative Anonymization for Vertically Partitioned Data
Introduction
Privacy-Preserving Data Mashup
Cryptographic Approach
Summary and Lesson Learned
Collaborative Anonymization for Horizontally Partitioned Data
Introduction
Privacy Model
Overview of the Solution
Discussion
Anonymizing Complex Data
Anonymizing Transaction Data
Introduction
Cohesion Approach
Band Matrix Method
km-Anonymization
Transactional k-Anonymity
Anonymizing Query Logs
Summary
Anonymizing Trajectory Data
Introduction
LKC-Privacy
(k, δ)-Anonymity
MOB k-Anonymity
Other Spatio-Temporal Anonymization Methods
Summary
Anonymizing Social Networks
Introduction
General Privacy-Preserving Strategies
Anonymization Methods for Social Networks
Data Sets
Summary
Sanitizing Textual Data
Introduction
ERASE
Health Information DE-identification (HIDE)
Summary
Other Privacy-Preserving Techniques and Future Trends
Interactive Query Model
Privacy Threats Caused by Data Mining Results
Privacy-Preserving Distributed Data Mining
Future Directions
References
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program