Narrow your search

Library

KU Leuven (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

ULB (1)

ULiège (1)

VIVES (1)


Resource type

book (1)


Language

English (1)


Year
From To Submit

2009 (1)

Listing 1 - 1 of 1
Sort by

Book
Privacy, security, and trust in KDD : second ACM SIGKDD international workshop, PinKDD 2008, Las Vegas, NV, USA, August 24 - 27, 2008 : revised selected papers
Authors: ---
ISBN: 3642017177 3642017185 Year: 2009 Publisher: Berlin : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-workshop proceedings of the Second International Workshop on Privacy, Security, and Trust in KDD, PinKDD 2008, held in Las Vegas, NV, USA, in March 2008 in conjunction with the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2008. The 5 revised full papers presented together with 1 invited keynote lecture and 2 invited panel sessions were carefully reviewed and selected from numerous submissions. The papers are extended versions of the workshop presentations and incorporate reviewers' comments and discussions at the workshop and represent the diversity of data mining research issues in privacy, security, and trust as well as current work on privacy issues in geographic data mining.

Keywords

Data protection --- Internet --- Data mining --- Privacy, Right of --- Computer Science --- Engineering & Applied Sciences --- Security measures --- DARPA Internet --- Internet (Computer network) --- Computer science. --- Computer communication systems. --- Computer security. --- Data mining. --- Computers and civilization. --- Computers. --- Law and legislation. --- Computer Science. --- Systems and Data Security. --- Data Mining and Knowledge Discovery. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Computers and Society. --- Legal Aspects of Computing. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Civilization and computers --- Civilization --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Protection --- Distributed processing --- Wide area networks (Computer networks) --- World Wide Web --- Law and legislation --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software

Listing 1 - 1 of 1
Sort by