메뉴 건너뛰기




Volumn , Issue , 2005, Pages 521-532

Privacy and ownership preserving of outsourced medical data

Author keywords

[No Author keywords available]

Indexed keywords

OUTSOURCED MEDICAL DATA; QUALITY HEALTH CARE;

EID: 28444478342     PISSN: 10844627     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDE.2005.111     Document Type: Conference Paper
Times cited : (121)

References (32)
  • 2
    • 18844365338 scopus 로고    scopus 로고
    • Watermarking relational databases
    • VLDB
    • R. Agrawal, J. Kiernan, Watermarking Relational Databases, Proc. VLDB, VLDB, pp.155-166, 2002.
    • (2002) Proc. VLDB , pp. 155-166
    • Agrawal, R.1    Kiernan, J.2
  • 3
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • R. Agrawal, R. Srikant, Privacy-preserving data mining, Proc. SIGMOD, pp. 439-450, 2000.
    • (2000) Proc. SIGMOD , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 4
    • 85012127915 scopus 로고    scopus 로고
    • Privacy-preserving indexing of documents on the network
    • M. Bawa, R. J. Bayardo Jr., R. Agrawal, Privacy-Preserving Indexing of Documents on the Network, Proc. VLDB, pp.922-933, 2003.
    • (2003) Proc. VLDB , pp. 922-933
    • Bawa, M.1    Bayardo Jr., R.J.2    Agrawal, R.3
  • 5
    • 16644396185 scopus 로고    scopus 로고
    • Chip-secured data access: Confidential data on untrusted servers
    • L. Bouganim, P. Pucheral, Chip-Secured Data Access: Confidential Data on Untrusted Servers, Proc. VLDB, pp. 131-142, 2002.
    • (2002) Proc. VLDB , pp. 131-142
    • Bouganim, L.1    Pucheral, P.2
  • 7
    • 6444233602 scopus 로고    scopus 로고
    • Query-preserving watermarking of relational databases and XML documents
    • D. G. Amblard, Query-preserving Watermarking of Relational Databases and XML documents. Proc. PODS, pp. 191-201, 2003.
    • (2003) Proc. PODS , pp. 191-201
    • Amblard, D.G.1
  • 8
    • 28444462239 scopus 로고    scopus 로고
    • Comparing SDC methods for microdata on the basis of information loss and disclosure risk
    • J. D. Ferrer, J. M. Sanz, and V. Torra, Comparing SDC Methods for Microdata on the Basis of Information Loss and Disclosure Risk, Proc. of NTTS and ETK, 2001.
    • (2001) Proc. of NTTS and ETK
    • Ferrer, J.D.1    Sanz, J.M.2    Torra, V.3
  • 10
    • 0036356364 scopus 로고    scopus 로고
    • A proposed key escrow system for secure patient information disclosure in biomedical research databases
    • T. A. Ferris, G. M Garrison, H. J. Lowe, A Proposed Key Escrow System for Secure Patient Information Disclosure in Biomedical Research Databases, Proc. AMIA Annual Symposium, pp. 245-249, 2002.
    • (2002) Proc. AMIA Annual Symposium , pp. 245-249
    • Ferris, T.A.1    Garrison, G.M.2    Lowe, H.J.3
  • 11
    • 0035873984 scopus 로고    scopus 로고
    • Statistical perspectives on confidentiality and data access in public health
    • S. E. Fienberg, Statistical Perspectives on Confidentiality and Data Access in Public Health, Stat Med, 20(9-10), pp. 1347-1356, 2001.
    • (2001) Stat Med , vol.20 , Issue.9-10 , pp. 1347-1356
    • Fienberg, S.E.1
  • 12
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • H. Hacigms, B. R. Iyer, C. Li, S. Mehrotra, Executing SQL Over Encrypted Data in the Database-service-provider Model. Proc. SIGMOD, pp. 216-227, 2002.
    • (2002) Proc. SIGMOD , pp. 216-227
    • Hacigms, H.1    Iyer, B.R.2    Li, C.3    Mehrotra, S.4
  • 14
    • 0242625276 scopus 로고    scopus 로고
    • Transforming data to satisfy privacy constraints
    • V. S. Iyengar, Transforming Data to Satisfy Privacy Constraints, Proc. SIGKDD, pp.279-288, 2002.
    • (2002) Proc. SIGKDD , pp. 279-288
    • Iyengar, V.S.1
  • 17
    • 0002640563 scopus 로고
    • Masking microdata files
    • ASA (American Statistical Association)
    • J. Kim and W. Winkler, Masking Microdata Files, ASA (American Statistical Association) Proc. on Survey Research Methods, pp. 114-119, 1995.
    • (1995) Proc. on Survey Research Methods , pp. 114-119
    • Kim, J.1    Winkler, W.2
  • 18
    • 0000964471 scopus 로고
    • Measures of disclosure risk and harm
    • D. Lambert, Measures of Disclosure Risk and Harm, Journal of Official Statistics, 9(2), pp. 313-331, 1993.
    • (1993) Journal of Official Statistics , vol.9 , Issue.2 , pp. 313-331
    • Lambert, D.1
  • 21
    • 85009120801 scopus 로고    scopus 로고
    • Controlling access to published data using cryptography
    • G. Miklau, D. Suciu, Controlling Access to Published Data Using Cryptography, Proc. VLDB, pp. 898-909, 2003.
    • (2003) Proc. VLDB , pp. 898-909
    • Miklau, G.1    Suciu, D.2
  • 23
    • 2442531718 scopus 로고    scopus 로고
    • Proving ownership over categorical data
    • R. Sion, Proving Ownership over Categorical Data, Proc. ICDE, 2004.
    • (2004) Proc. ICDE
    • Sion, R.1
  • 24
    • 35248858328 scopus 로고    scopus 로고
    • On watermarking numeric sets
    • Proc. IWDW
    • R. Sion, M. Atallab, and S. Prabhakar, On Watermarking Numeric Sets. Proc. IWDW, LNCS 2613, pp. 130-146, 2002.
    • (2002) LNCS , vol.2613 , pp. 130-146
    • Sion, R.1    Atallab, M.2    Prabhakar, S.3
  • 26
    • 0242698173 scopus 로고    scopus 로고
    • Datafly: A system for providing anonymity in medical data
    • L. Sweeney, Datafly: A System for Providing Anonymity in Medical Data, Proc. Database Security, pp. 356-381, 1998.
    • (1998) Proc. Database Security , pp. 356-381
    • Sweeney, L.1
  • 27
    • 0004166728 scopus 로고    scopus 로고
    • Can invisible watermarks resolve rightful ownerships?
    • IBM Research Division
    • S. Craver, N. Memon, B. Yeo, and M. Yeung, Can Invisible Watermarks Resolve Rightful Ownerships? Technique Report RC 20509, IBM Research Division, 1996.
    • (1996) Technique Report , vol.RC 20509
    • Craver, S.1    Memon, N.2    Yeo, B.3    Yeung, M.4
  • 28
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • P. Samarati, Protecting Respondents' Identities in Microdata Release, IEEE Trans. Knowledge Engineering, 13(6), pp. 1010-1027, 2001.
    • (2001) IEEE Trans. Knowledge Engineering , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 29
    • 0003483188 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
    • SRI International
    • P. Samarati, L. Sweeney, Protecting Privacy when Disclosing Information: K-Anonymity and Its Enforcement Through Generalization and Suppression, Technical Report, SRI International, 1998.
    • (1998) Technical Report
    • Samarati, P.1    Sweeney, L.2
  • 30
    • 1142267351 scopus 로고    scopus 로고
    • Winnowing: Local algorithms for document fingerprinting
    • S. Schleimer, D. S. Wilkerson, A. Aiken, Winnowing: Local Algorithms for Document Fingerprinting, Proc. SIGMOD, pp. 76-85, 2003.
    • (2003) Proc. SIGMOD , pp. 76-85
    • Schleimer, S.1    Wilkerson, D.S.2    Aiken, A.3
  • 31
    • 0003229411 scopus 로고    scopus 로고
    • Statistical disclosure control in practice
    • Springer-Verlag
    • L. Willenborg and T. D. Waal, Statistical Disclosure Control in Practice, Lecture Notes in Statistics, Vol. 111, Springer-Verlag, 1996.
    • (1996) Lecture Notes in Statistics , vol.111
    • Willenborg, L.1    Waal, T.D.2
  • 32
    • 28444466660 scopus 로고    scopus 로고
    • Disclore risk assessment in perturbative microdata protection
    • Statistical Research Division, Bureau of the Census
    • W. Yancey, W. Winkler, R. Creecy, Disclore Risk Assessment in Perturbative Microdata Protection, Technical Report 2002-01, Statistical Research Division, Bureau of the Census.
    • Technical Report 2002-01
    • Yancey, W.1    Winkler, W.2    Creecy, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.