A taxonomy of privacy-preserving record linkage techniques

D Vatsalan, P Christen, VS Verykios - Information Systems, 2013 - Elsevier
The process of identifying which records in two or more databases correspond to the same
entity is an important aspect of data quality activities such as data pre-processing and data …

A multi-site resting state fMRI study on the amplitude of low frequency fluctuations in schizophrenia

JA Turner, E Damaraju, TGM Van Erp… - Frontiers in …, 2013 - frontiersin.org
Background: This multi-site study compares resting state fMRI amplitude of low frequency
fluctuations (ALFF) and fractional ALFF (fALFF) between patients with schizophrenia (SZ) …

Outsourcing large matrix inversion computation to a public cloud

X Lei, X Liao, T Huang, H Li… - IEEE Transactions on cloud …, 2013 - ieeexplore.ieee.org
Cloud computing enables resource-constrained clients to economically outsource their huge
computation workloads to a cloud server with massive computational power. This promising …

Privacy technology to support data sharing for comparative effectiveness research: a systematic review

X Jiang, AD Sarwate, L Ohno-Machado - Medical care, 2013 - journals.lww.com
Objective: Effective data sharing is critical for comparative effectiveness research (CER), but
there are significant concerns about inappropriate disclosure of patient data. These …

Secure multiparty aggregation with differential privacy: A comparative study

S Goryczka, L Xiong, V Sunderam - Proceedings of the Joint EDBT/ICDT …, 2013 - dl.acm.org
This paper considers the problem of secure data aggregation in a distributed setting while
preserving differential privacy for the aggregated data. In particular, we focus on the secure …

-Privacy for Collaborative Data Publishing

S Goryczka, L Xiong, BCM Fung - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
In this paper, we consider the collaborative data publishing problem for anonymizing
horizontally partitioned data at multiple data providers. We consider a new type of “insider …

A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design

V Kolesnikov, AR Sadeghi… - Journal of Computer …, 2013 - content.iospress.com
Abstract General two-party Secure Function Evaluation (SFE) allows mutually distrusting
parties to correctly compute any function on their private input data, without revealing the …

Privacy-preserving data mining techniques: survey and challenges

S Matwin - Discrimination and privacy in the information society …, 2013 - Springer
This chapter presents a brief summary and review of Privacy-preserving Data Mining
(PPDM). The review of the existing approaches is structured along a tentative taxonomy of …

Faster secure two-party computation with less memory

W Henecka, T Schneider - Proceedings of the 8th ACM SIGSAC …, 2013 - dl.acm.org
Secure two-party computation is used as the basis for a large variety of privacy-preserving
protocols, but often concerns about the low performance hinder the move away from non …

Private proximity detection for convex polygons

B Mu, S Bakiras - Proceedings of the 12th International ACM Workshop …, 2013 - dl.acm.org
Proximity detection is an emerging technology in Geo-Social Networks that notifies mobile
users when they are in proximity. Nevertheless, users may be unwilling to participate in such …