A globally optimal k-anonymity method for the de-identification of health data
Background: Explicit patient consent requirements in privacy laws can have a negative
impact on health research, leading to selection bias and reduced recruitment. Often …
impact on health research, leading to selection bias and reduced recruitment. Often …
Survey on privacy-preserving techniques for microdata publication
The exponential growth of collected, processed, and shared microdata has given rise to
concerns about individuals' privacy. As a result, laws and regulations have emerged to …
concerns about individuals' privacy. As a result, laws and regulations have emerged to …
Privacy and data protection by design-from policy to engineering
G Danezis, J Domingo-Ferrer, M Hansen… - arXiv preprint arXiv …, 2015 - arxiv.org
Privacy and data protection constitute core values of individuals and of democratic societies.
There have been decades of debate on how those values-and legal obligations-can be …
There have been decades of debate on how those values-and legal obligations-can be …
Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation
J Domingo-Ferrer, V Torra - Data Mining and Knowledge Discovery, 2005 - Springer
Abstract k-Anonymity is a useful concept to solve the tension between data utility and
respondent privacy in individual data (microdata) protection. However, the generalization …
respondent privacy in individual data (microdata) protection. However, the generalization …
[图书][B] Anonymizing health data: case studies and methods to get you started
K El Emam, L Arbuckle - 2013 - books.google.com
Updated as of August 2014, this practical book will demonstrate proven methods for
anonymizing health data to help your organization share meaningful datasets, without …
anonymizing health data to help your organization share meaningful datasets, without …
Privacy by design in big data: an overview of privacy enhancing technologies in the era of big data analytics
G D'Acquisto, J Domingo-Ferrer, P Kikiras… - arXiv preprint arXiv …, 2015 - arxiv.org
The extensive collection and processing of personal information in big data analytics has
given rise to serious privacy concerns, related to wide scale electronic surveillance, profiling …
given rise to serious privacy concerns, related to wide scale electronic surveillance, profiling …
Data swapping: Variations on a theme by dalenius and reiss
SE Fienberg, J McIntyre - Privacy in Statistical Databases: CASC Project …, 2004 - Springer
Data swapping, a term introduced in 1978 by Dalenius and Reiss for a new method of
statistical disclosure protection in confidential data bases, has taken on new meanings and …
statistical disclosure protection in confidential data bases, has taken on new meanings and …
An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future
BA Malin - Journal of the American Medical Informatics …, 2005 - academic.oup.com
The incorporation of genomic data into personal medical records poses many challenges to
patient privacy. In response, various systems for preserving patient privacy in shared …
patient privacy. In response, various systems for preserving patient privacy in shared …
Data confidentiality: A review of methods for statistical disclosure limitation and methods for assessing privacy
GJ Matthews, O Harel - Statistics Surveys, 2011 - projecteuclid.org
There is an ever increasing demand from researchers for access to useful microdata files.
However, there are also growing concerns regarding the privacy of the individuals contained …
However, there are also growing concerns regarding the privacy of the individuals contained …
Microaggregation for categorical variables: a median based approach
V Torra - Privacy in Statistical Databases: CASC Project Final …, 2004 - Springer
Microaggregation is a masking procedure used for protecting confidential data prior to their
public release. This technique, that relies on clustering and aggregation techniques, is …
public release. This technique, that relies on clustering and aggregation techniques, is …