000 03690nam a22005055i 4500
001 978-3-031-01834-3
003 DE-He213
005 20240730163727.0
007 cr nn 008mamaa
008 220601s2010 sz | s |||| 0|eng d
020 _a9783031018343
_9978-3-031-01834-3
024 7 _a10.1007/978-3-031-01834-3
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
100 1 _aWong, Raymond Chi-Wing.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_980221
245 1 0 _aPrivacy-Preserving Data Publishing
_h[electronic resource] /
_cby Raymond Chi-Wing Wong, Ada Wai-Chee Fu.
250 _a1st ed. 2010.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2010.
300 _aIX, 128 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSynthesis Lectures on Data Management,
_x2153-5426
505 0 _aIntroduction -- Fundamental Concepts -- One-Time Data Publishing -- Multiple-Time Data Publishing -- Graph Data -- Other Data Types -- Future Research Directions.
520 _aPrivacy preservation has become a major issue in many data analysis applications. When a data set is released to other parties for data analysis, privacy-preserving techniques are often required to reduce the possibility of identifying sensitive information about individuals. For example, in medical data, sensitive information can be the fact that a particular patient suffers from HIV. In spatial data, sensitive information can be a specific location of an individual. In web surfing data, the information that a user browses certain websites may be considered sensitive. Consider a dataset containing some sensitive information is to be released to the public. In order to protect sensitive information, the simplest solution is not to disclose the information. However, this would be an overkill since it will hinder the process of data analysis over the data from which we can find interesting patterns. Moreover, in some applications, the data must be disclosed under the government regulations. Alternatively, the data owner can first modify the data such that the modified data can guarantee privacy and, at the same time, the modified data retains sufficient utility and can be released to other parties safely. This process is usually called as privacy-preserving data publishing. In this monograph, we study how the data owner can modify the data and how the modified data can preserve privacy and protect sensitive information. Table of Contents: Introduction / Fundamental Concepts / One-Time Data Publishing / Multiple-Time Data Publishing / Graph Data / Other Data Types / Future Research Directions.
650 0 _aComputer networks .
_931572
650 0 _aData structures (Computer science).
_98188
650 0 _aInformation theory.
_914256
650 1 4 _aComputer Communication Networks.
_980222
650 2 4 _aData Structures and Information Theory.
_931923
700 1 _aWai-Chee Fu, Ada.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_980223
710 2 _aSpringerLink (Online service)
_980224
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031007064
776 0 8 _iPrinted edition:
_z9783031029622
830 0 _aSynthesis Lectures on Data Management,
_x2153-5426
_980225
856 4 0 _uhttps://doi.org/10.1007/978-3-031-01834-3
912 _aZDB-2-SXSC
942 _cEBK
999 _c84920
_d84920