"Data structures (Computer science)" . . "Computer Communication Networks." . . "Computer Communication Networks" . "Database security." . . "Recherche." . . "Data protection." . . "Geheimhaltung." . . "COMPUTERS Desktop Applications Databases." . . "Data encryption." . . "Data Encryption." . "Data Encryption" . "Computer Science." . . "Computer science." . "Informatique." . . "Data structures." . . . . . . . . . . . . . . . . . "Online-Publikation" . . . . . . . "Privacy preserving data mining implies the \"mining\" of knowledge from distributed data without violating the privacy of the individual/corporations involved in contributing the data. This volume provides an overview of approaches, techniques and open problems in privacy preserving data mining. It is for industry practitioners and policy makers."@en . "Privacy preserving data mining implies the \"mining\" of knowledge from distributed data without violating the privacy of the individual/corporations involved in contributing the data. This volume provides an overview of approaches, techniques and open problems in privacy preserving data mining. It is for industry practitioners and policy makers." . . . . . . . . . . . . . . . . . "Electronic books" . "Electronic books"@en . "Ressources Internet" . . . . "Privacy preserving data mining"@en . . "Privacy preserving data mining" . . . . . "Privacy Preserving Data Mining" . . "Privacy Preserving Data Mining"@en . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . "\"Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a \"Data-Mining Moratorium Act\" introduced in the U.S. Senate that would have banned all data-mining programs (including research and development) by the U.S. Department of Defense. Privacy Preserving Data Mining provides a comprehensive overview of available approaches, techniques and open problems in privacy preserving data mining. This book demonstrates how these approaches can achieve data mining, while operating within legal and commercial restrictions that forbid release of data. Furthermore, this research crystallizes much of the underlying foundation, and inspires further research in the area. Privacy Preserving Data Mining is designed for a professional audience composed of practitioners and researchers in industry. This volume is also suitable for graduate-level students in computer science.\"--Publisher's website."@en . . . . . . . "COMPUTERS Database Management General." . . "Data mining." . . "Data Mining." . "Data Mining and Knowledge Discovery." . . "Data Mining and Knowledge Discovery" . "Datenbank." . . "Protección de la información (Informática)" . . "Information storage and retrieval systems." . . "COMPUTERS System Administration Storage & Retrieval." . . "Chiffrement (informatique)" . . . . "Exploration de données." . . "Computer Systems Organization and Communication Networks." . . "Computer network architectures." . . "Database Management." . . "Database management." . "Information Storage and Retrieval." . . "Information Storage and Retrieval" . "Electronic books." . . "Derecho a la vida privada." . . "Data encryption (Computer science)" . . "Recuperación de la información." . . "Minería de datos." . . "Data Structures, Cryptology and Information Theory." . . "Data Structures, Cryptology and Information Theory" . "Exploration de données (Informatique)" . . "Bases de données Sécurité Mesures." . . "Protection de l'information (Informatique)" . .