Book Details

Privacy, Security, and Trust in KDD : First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers

Publication year: 2008

ISBN: 978-3-540-78478-4

Internet Resource: Please Login to download book


Vast amounts of data are collected by service providers and system administ- tors, and are available in public information systems. Data mining technologies provide an ideal framework to assist in analyzing such collections for computer security and surveillance-related endeavors. For instance, system administrators can apply data mining to summarize activity patterns in access logs so that potential malicious incidents can be further investigated. Beyond computer - curity, data mining technology supports intelligence gathering and summari- tion for homeland security. For years, and most recently fueled by events such as September 11, 2001, government agencies have focused on developing and applying data mining technologies to monitor terrorist behaviors in public and private data collections. Theapplicationof data mining to person-specifc data raisesseriousconcerns regarding data con?dentiality and citizens’ privacy rights.


Subject: Computer Science, DOM, Ubiquitous Computing, access control, anonymity, anonymization, biometrics, data mining, graph data, intrusion detection, link mining, modeling, national securit, privacy, security, trust, Systems and Data Security, Information Systems Applications (incl. Internet), Data Mining and Knowledge Discovery, Computer Communication Networks, Computers and Society, Legal Aspects of Computing