|
![]() |
|||
|
||||
Overview"This book is dedicated to those who have something to hide. It is a book about """"privacy preserving data publishing"""" - the art of publishing sensitive personal data, collected from a group of individuals, in a form that does not violate their privacy. This problem has numerous and diverse areas of application, including releasing census data, search logs, medical records, and interactions on a social network. The purpose of this book is to provide a detailed overview of the current state of the art as well as open challenges, focusing particular attention on four key themes: Rigorous privacy policies: repeated and highly-publicized attacks on published data have demonstrated that simplistic approaches to data publishing do not work. Significant recent advances have exposed the shortcomings of naive (and not-so-naive) techniques. They have also led to the development of mathematically rigorous definitions of privacy that publishing techniques must satisfy. Metrics for data utility: while it is necessary to enforce stringent privacy policies, it is equally important to ensure that the published version of the data is useful for its intended purpose. The authors provide an overview of diverse approaches to measuring data utility. Enforcement mechanisms: describing in detail various key data publishing mechanisms that guarantee privacy and utility. Emerging applications: the problem of privacy-preserving data publishing arises in diverse application domains with unique privacy and utility requirements. The authors elaborate on the merits and limitations of existing solutions, based on which we expect to see many advances in years to come." Full Product DetailsAuthor: Bee-Chung Chen , Daniel Kifer , Kristen LeFevre , Ashwin MachanavajjhalaPublisher: now publishers Inc Imprint: now publishers Inc Volume: 5 Dimensions: Width: 15.60cm , Height: 1.00cm , Length: 23.40cm Weight: 0.265kg ISBN: 9781601982766ISBN 10: 1601982763 Pages: 182 Publication Date: 14 October 2009 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Out of print, replaced by POD ![]() We will order this item for you from a manufatured on demand supplier. Table of Contents1: Introduction 2: Privacy Definitions 3: Utility Metrics 4: Mechanisms and Algorithms 5: Using Sanitized Data 6: Attacking Sanitized Data 7: Challenges and Emerging Applications. Conclusions. Acknowledgments. ReferencesReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |