Privacy, Security, and Trust in KDD First ACM SIGKDD International W
- PDF / 7,001,620 Bytes
- 181 Pages / 430.15 x 660.926 pts Page_size
- 83 Downloads / 190 Views
Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany
4890
Francesco Bonchi Elena Ferrari Bradley Malin Yücel Saygin (Eds.)
Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007 San Jose, CA, USA, August 12, 2007 Revised Selected Papers
13
Volume Editors Francesco Bonchi Pisa KDD Laboratory ISTI - C.N.R, Pisa, Italy E-mail: [email protected] Elena Ferrari University of Insubria Department of Computer Science and Communication, Varese, Italy E-mail: [email protected] Bradley Malin Vanderbilt University Nashville, TN 37232, USA E-mail: [email protected] Yücel Saygin Sabanci University Istanbul, Turkey E-mail: [email protected]
Library of Congress Control Number: 2008922886 CR Subject Classification (1998): H.4, H.3, C.2, H.2, D.4.6, K.4-6 LNCS Sublibrary: SL 4 – Security and Cryptology ISSN ISBN-10 ISBN-13
0302-9743 3-540-78477-2 Springer Berlin Heidelberg New York 978-3-540-78477-7 Springer Berlin Heidelberg New York
This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springer.com © Springer-Verlag Berlin Heidelberg 2008 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 12236466 06/3180 543210
Preface
Vast amounts of data are collected by service providers and system administrators, and are available in public information systems. Data mining technologies provide an ideal framework to assist in analyzing such collections for computer security and surveillance-related endeavors. For instance, system administrators can apply data mining to summarize activity patterns in access logs so that
Data Loading...