Narrow your search

Library

VUB (6)

EhB (4)


Resource type

book (6)


Language

English (6)


Year
From To Submit

2014 (1)

2010 (1)

2009 (2)

2008 (1)

2007 (1)

Listing 1 - 6 of 6
Sort by

Book
Access control in data management systems
Author:
ISBN: 9781608453764 9781608453757 Year: 2010 Publisher: San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) Morgan & Claypool

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Security and trust in online social networks
Authors: --- ---
ISBN: 9781627052665 9781627052658 Year: 2014 Publisher: San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) Morgan & Claypool

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Privacy, Security, and Trust in KDD : First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers
Authors: --- --- --- ---
ISBN: 9783540784784 Year: 2008 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

Vast amounts of data are collected by service providers and system administ- tors, and are available in public information systems. Data mining technologies provide an ideal framework to assist in analyzing such collections for computer security and surveillance-related endeavors. For instance, system administrators can apply data mining to summarize activity patterns in access logs so that potential malicious incidents can be further investigated. Beyond computer - curity, data mining technology supports intelligence gathering and summari- tion for homeland security. For years, and most recently fueled by events such as September 11, 2001, government agencies have focused on developing and applying data mining technologies to monitor terrorist behaviors in public and private data collections. Theapplicationof data mining to person-speci?cdata raisesseriousconcerns regarding data con?dentiality and citizens' privacy rights. These concerns have led to the adoption of various legislation and policy controls. In 2005, the - ropean Union passed a data-retention directive that requires all telephone and Internetservice providersto store data ontheir consumers for up to two yearsto assist in the prevention of terrorismand organized crime. Similar data-retention regulationproposalsareunderheateddebateintheUnitedStatesCongress. Yet, the debate often focuses on ethical or policy aspects of the problem, such that resolutions have polarized consequences; e. g. , an organization can either share data for data mining purposes or it can not. Fortunately, computer scientists, and data mining researchers in particular, have recognized that technology can beconstructedtosupportlesspolarizedsolutions. Computerscientistsaredev- oping technologies that enable data mining goals without sacri?cing the privacy and security of the individuals to whom the data correspond.


Book
Privacy, Security, and Trust in KDD : Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, NV, USA, August 24, 2008, Revised Selected Papers
Authors: --- --- --- ---
ISBN: 9783642017186 Year: 2009 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-workshop proceedings of the Second International Workshop on Privacy, Security, and Trust in KDD, PinKDD 2008, held in Las Vegas, NV, USA, in March 2008 in conjunction with the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2008. The 5 revised full papers presented together with 1 invited keynote lecture and 2 invited panel sessions were carefully reviewed and selected from numerous submissions. The papers are extended versions of the workshop presentations and incorporate reviewers' comments and discussions at the workshop and represent the diversity of data mining research issues in privacy, security, and trust as well as current work on privacy issues in geographic data mining.


Book
Spatial Data on the Web : Modeling and Management
Authors: --- --- --- ---
ISBN: 9783540698784 Year: 2007 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

Spatial data is essential in a wide range of application domains today. While geographical applications remain the key target area, spatial properties are required in other contexts such as computer-aided design, robotics and image processing. Associated with these is the constantly growing number of distributed processing architectures, based on, for example, grid systems, sensor data networks, and personalized smart devices. Spatial Data on the Web links these two research streams, focusing on the modeling and management of spatial data in distributed systems. Belussi and his coeditors have structured the contributions from internationally renowned researchers into four parts. Part I presents models for representing semistructured, multiresolution and multiscale data; Part II deals with the integration of spatial data sources; Part III describes approaches to spatial data protection; and, finally, Part IV reports innovative applications for mobile devices. The book offers researchers in academia and industry an excellent overview of the state of the art in modeling and management of spatial data in distributed environments, while it may also be the basis of specialized courses on Web-based geographical information systems.


Book
Trust Management III : Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009. Proceedings
Authors: --- --- --- ---
ISBN: 9783642020568 Year: 2009 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, IFIPTM 2009, held in West Lafayette, IN, USA, in June 2009. The 17 revised full papers presented together with one invited paper and 5 demo descriptions were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on social aspects and usability, trust reasoning and processing, data security, enhancements to subjective logic, information sharing, risk assessment, and simulation of trust and reputation systems.

Listing 1 - 6 of 6
Sort by