An innovative middle tier design for protecting federal privacy act data.
Thomas G. L. AllenPublished in: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security (2008)
Keyphrases
- data sets
- data analysis
- data collection
- raw data
- synthetic data
- data processing
- input data
- image data
- data structure
- privacy requirements
- data quality
- missing data
- probability distribution
- end users
- data sources
- training data
- data points
- database
- computer systems
- design process
- high dimensional
- original data
- data mining
- information management
- statistical databases
- personal data
- privacy preservation
- private data