<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stephen E. Fienberg</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Chen, Hsinchun</style></author><author><style face="normal" font="default" size="100%">Reid, Edna</style></author><author><style face="normal" font="default" size="100%">Sinai, Joshua</style></author><author><style face="normal" font="default" size="100%">Silke, Andrew</style></author><author><style face="normal" font="default" size="100%">Ganor, Boaz</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Homeland Insecurity</style></title><secondary-title><style face="normal" font="default" size="100%">Terrorism Informatics</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Integrated Series In Information Systems</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dx.doi.org/10.1007/978-0-387-71613-8_10</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Springer US</style></publisher><volume><style face="normal" font="default" size="100%">18</style></volume><pages><style face="normal" font="default" size="100%">197-218</style></pages><isbn><style face="normal" font="default" size="100%">978-0-387-71612-1</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Following the events of September 11, 2001, there has been heightened attention in the United States and elsewhere to the use of multiple government and private databases for the identification of possible perpetrators of future attacks, as well as an unprecedented expansion of federal government data mining activities, many involving databases containing personal information. There have also been claims that prospective datamining could be used to find the “signature” of terrorist cells embedded in larger networks. We present an overview of why the public has concerns about such activities and describe some proposals for the search of multiple databases which supposedly do not compromise possible pledges of confidentiality to the individuals whose data are included. We also explore their link to the related literatures on privacy-preserving data mining. In particular, we focus on the matching problem across databases and the concept of “selective revelation” and their confidentiality implications.&lt;/p&gt;
</style></abstract></record></records></xml>