Loading…
Privacy preserving electronic data gathering
Most organizations, from private business to scientific institutes, own large information databases. Analysis of these databases can be very beneficial to the owner organizations, as it contributes to knowledge discovery. To extract broader and more accurate conclusions, knowledge discovery techniqu...
Saved in:
Published in: | Mathematical and computer modelling 2005-10, Vol.42 (7), p.739-746 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | cdi_FETCH-LOGICAL-c310t-ce9412e1a614db2c6635a092d3d12ebb0ba145f724edfb5cf97a88e25671ab353 |
container_end_page | 746 |
container_issue | 7 |
container_start_page | 739 |
container_title | Mathematical and computer modelling |
container_volume | 42 |
creator | Laskari, E.C. Meletiou, G.C. Tasoulis, D.K. Vrahatis, M.N. |
description | Most organizations, from private business to scientific institutes, own large information databases. Analysis of these databases can be very beneficial to the owner organizations, as it contributes to knowledge discovery. To extract broader and more accurate conclusions, knowledge discovery techniques need to be applied on a collection of databases of different organizations involved in the same field. This paper addresses two issues associated with electronic data gathering: confidentiality of the organization that supplies a particular database, and authentication of the provided data. |
doi_str_mv | 10.1016/j.mcm.2005.09.003 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_29513470</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0895717705003225</els_id><sourcerecordid>29513470</sourcerecordid><originalsourceid>FETCH-LOGICAL-c310t-ce9412e1a614db2c6635a092d3d12ebb0ba145f724edfb5cf97a88e25671ab353</originalsourceid><addsrcrecordid>eNp9kE1PwzAMhiMEEmPwA7j1AidanLRpGnFCE1_SJDjAOXJTd2Tq2pF0k_bvybRJ3DhZsp_Xlh_GrjlkHHh5v8xWdpUJAJmBzgDyEzbhlRKpLpQ-ZROotEwVV-qcXYSwhAhqqCbs7sO7LdpdsvYUyG9dv0ioIzv6oXc2aXDEZIHjN_k4uWRnLXaBro51yr6enz5nr-n8_eVt9jhPbc5hTC3pggviWPKiqYUty1wiaNHkTWzXNdTIC9kqUVDT1tK2WmFVkZCl4ljnMp-y28PetR9-NhRGs3LBUtdhT8MmGKElzwsFEeQH0PohBE-tWXu3Qr8zHMzei1ma6MXsvRjQJnqJmZvjcgwWu9Zjb134CypRlWVRRe7hwFH8dOvIm2Ad9ZYa56Mf0wzunyu_t3p3kw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>29513470</pqid></control><display><type>article</type><title>Privacy preserving electronic data gathering</title><source>ScienceDirect Freedom Collection 2022-2024</source><creator>Laskari, E.C. ; Meletiou, G.C. ; Tasoulis, D.K. ; Vrahatis, M.N.</creator><creatorcontrib>Laskari, E.C. ; Meletiou, G.C. ; Tasoulis, D.K. ; Vrahatis, M.N.</creatorcontrib><description>Most organizations, from private business to scientific institutes, own large information databases. Analysis of these databases can be very beneficial to the owner organizations, as it contributes to knowledge discovery. To extract broader and more accurate conclusions, knowledge discovery techniques need to be applied on a collection of databases of different organizations involved in the same field. This paper addresses two issues associated with electronic data gathering: confidentiality of the organization that supplies a particular database, and authentication of the provided data.</description><identifier>ISSN: 0895-7177</identifier><identifier>EISSN: 1872-9479</identifier><identifier>DOI: 10.1016/j.mcm.2005.09.003</identifier><language>eng</language><publisher>Oxford: Elsevier Ltd</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Discrete logarithm ; E-voting protocols ; Electronic data gathering ; Exact sciences and technology ; Information systems. Data bases ; Mathematics ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Methods of scientific computing (including symbolic computation, algebraic computation) ; Numerical analysis. Scientific computation ; Privacy ; Sciences and techniques of general use ; Software</subject><ispartof>Mathematical and computer modelling, 2005-10, Vol.42 (7), p.739-746</ispartof><rights>2005 Elsevier Ltd. All rights reserved</rights><rights>2006 INIST-CNRS</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c310t-ce9412e1a614db2c6635a092d3d12ebb0ba145f724edfb5cf97a88e25671ab353</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>309,310,314,780,784,789,790,23930,23931,25140,27924,27925</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=17286648$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Laskari, E.C.</creatorcontrib><creatorcontrib>Meletiou, G.C.</creatorcontrib><creatorcontrib>Tasoulis, D.K.</creatorcontrib><creatorcontrib>Vrahatis, M.N.</creatorcontrib><title>Privacy preserving electronic data gathering</title><title>Mathematical and computer modelling</title><description>Most organizations, from private business to scientific institutes, own large information databases. Analysis of these databases can be very beneficial to the owner organizations, as it contributes to knowledge discovery. To extract broader and more accurate conclusions, knowledge discovery techniques need to be applied on a collection of databases of different organizations involved in the same field. This paper addresses two issues associated with electronic data gathering: confidentiality of the organization that supplies a particular database, and authentication of the provided data.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Discrete logarithm</subject><subject>E-voting protocols</subject><subject>Electronic data gathering</subject><subject>Exact sciences and technology</subject><subject>Information systems. Data bases</subject><subject>Mathematics</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Methods of scientific computing (including symbolic computation, algebraic computation)</subject><subject>Numerical analysis. Scientific computation</subject><subject>Privacy</subject><subject>Sciences and techniques of general use</subject><subject>Software</subject><issn>0895-7177</issn><issn>1872-9479</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2005</creationdate><recordtype>article</recordtype><recordid>eNp9kE1PwzAMhiMEEmPwA7j1AidanLRpGnFCE1_SJDjAOXJTd2Tq2pF0k_bvybRJ3DhZsp_Xlh_GrjlkHHh5v8xWdpUJAJmBzgDyEzbhlRKpLpQ-ZROotEwVV-qcXYSwhAhqqCbs7sO7LdpdsvYUyG9dv0ioIzv6oXc2aXDEZIHjN_k4uWRnLXaBro51yr6enz5nr-n8_eVt9jhPbc5hTC3pggviWPKiqYUty1wiaNHkTWzXNdTIC9kqUVDT1tK2WmFVkZCl4ljnMp-y28PetR9-NhRGs3LBUtdhT8MmGKElzwsFEeQH0PohBE-tWXu3Qr8zHMzei1ma6MXsvRjQJnqJmZvjcgwWu9Zjb134CypRlWVRRe7hwFH8dOvIm2Ad9ZYa56Mf0wzunyu_t3p3kw</recordid><startdate>20051001</startdate><enddate>20051001</enddate><creator>Laskari, E.C.</creator><creator>Meletiou, G.C.</creator><creator>Tasoulis, D.K.</creator><creator>Vrahatis, M.N.</creator><general>Elsevier Ltd</general><general>Elsevier Science</general><scope>6I.</scope><scope>AAFTH</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20051001</creationdate><title>Privacy preserving electronic data gathering</title><author>Laskari, E.C. ; Meletiou, G.C. ; Tasoulis, D.K. ; Vrahatis, M.N.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c310t-ce9412e1a614db2c6635a092d3d12ebb0ba145f724edfb5cf97a88e25671ab353</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Discrete logarithm</topic><topic>E-voting protocols</topic><topic>Electronic data gathering</topic><topic>Exact sciences and technology</topic><topic>Information systems. Data bases</topic><topic>Mathematics</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Methods of scientific computing (including symbolic computation, algebraic computation)</topic><topic>Numerical analysis. Scientific computation</topic><topic>Privacy</topic><topic>Sciences and techniques of general use</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Laskari, E.C.</creatorcontrib><creatorcontrib>Meletiou, G.C.</creatorcontrib><creatorcontrib>Tasoulis, D.K.</creatorcontrib><creatorcontrib>Vrahatis, M.N.</creatorcontrib><collection>ScienceDirect Open Access Titles</collection><collection>Elsevier:ScienceDirect:Open Access</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Mathematical and computer modelling</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Laskari, E.C.</au><au>Meletiou, G.C.</au><au>Tasoulis, D.K.</au><au>Vrahatis, M.N.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Privacy preserving electronic data gathering</atitle><jtitle>Mathematical and computer modelling</jtitle><date>2005-10-01</date><risdate>2005</risdate><volume>42</volume><issue>7</issue><spage>739</spage><epage>746</epage><pages>739-746</pages><issn>0895-7177</issn><eissn>1872-9479</eissn><abstract>Most organizations, from private business to scientific institutes, own large information databases. Analysis of these databases can be very beneficial to the owner organizations, as it contributes to knowledge discovery. To extract broader and more accurate conclusions, knowledge discovery techniques need to be applied on a collection of databases of different organizations involved in the same field. This paper addresses two issues associated with electronic data gathering: confidentiality of the organization that supplies a particular database, and authentication of the provided data.</abstract><cop>Oxford</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.mcm.2005.09.003</doi><tpages>8</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0895-7177 |
ispartof | Mathematical and computer modelling, 2005-10, Vol.42 (7), p.739-746 |
issn | 0895-7177 1872-9479 |
language | eng |
recordid | cdi_proquest_miscellaneous_29513470 |
source | ScienceDirect Freedom Collection 2022-2024 |
subjects | Applied sciences Computer science control theory systems Discrete logarithm E-voting protocols Electronic data gathering Exact sciences and technology Information systems. Data bases Mathematics Memory and file management (including protection and security) Memory organisation. Data processing Methods of scientific computing (including symbolic computation, algebraic computation) Numerical analysis. Scientific computation Privacy Sciences and techniques of general use Software |
title | Privacy preserving electronic data gathering |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T21%3A36%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Privacy%20preserving%20electronic%20data%20gathering&rft.jtitle=Mathematical%20and%20computer%20modelling&rft.au=Laskari,%20E.C.&rft.date=2005-10-01&rft.volume=42&rft.issue=7&rft.spage=739&rft.epage=746&rft.pages=739-746&rft.issn=0895-7177&rft.eissn=1872-9479&rft_id=info:doi/10.1016/j.mcm.2005.09.003&rft_dat=%3Cproquest_cross%3E29513470%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c310t-ce9412e1a614db2c6635a092d3d12ebb0ba145f724edfb5cf97a88e25671ab353%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=29513470&rft_id=info:pmid/&rfr_iscdi=true |