메뉴 건너뛰기




Volumn 18, Issue 1, 2007, Pages 23-41

Releasing individually identifiable microdata with privacy protection against stochastic threat: An application to health information

Author keywords

Data security; Health information; Optimization; Privacy

Indexed keywords

DATA PRIVACY; LAWS AND LEGISLATION; NATIONAL SECURITY; OPTIMIZATION; PUBLIC HEALTH; SECURITY OF DATA; STOCHASTIC SYSTEMS;

EID: 34247541615     PISSN: 10477047     EISSN: 15265536     Source Type: Journal    
DOI: 10.1287/isre.1070.0112     Document Type: Article
Times cited : (30)

References (36)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • Adam, N. R., J. C. Wortmann. 1989. Security-control methods for statistical databases: A comparative study. ACM Comput. Surveys 21 515-556.
    • (1989) ACM Comput. Surveys , vol.21 , pp. 515-556
    • Adam, N.R.1    Wortmann, J.C.2
  • 4
    • 21844517925 scopus 로고
    • Statistical disclosure in two-dimensional tables: General tables
    • Carvalho, F. D., N. Dellaert, M. S. Osorio. 1994. Statistical disclosure in two-dimensional tables: General tables. J. Amer. Statist. Assoc. 89 1547-1557.
    • (1994) J. Amer. Statist. Assoc , vol.89 , pp. 1547-1557
    • Carvalho, F.D.1    Dellaert, N.2    Osorio, M.S.3
  • 5
    • 0001147194 scopus 로고
    • Application of transportation thoery to statistical problems
    • Causey, B. D., L. H. Cox, L. R. Ernst. 1985. Application of transportation thoery to statistical problems. J. Amer. Statist. Assoc. 80 909.
    • (1985) J. Amer. Statist. Assoc , vol.80 , pp. 909
    • Causey, B.D.1    Cox, L.H.2    Ernst, L.R.3
  • 7
    • 0033349024 scopus 로고    scopus 로고
    • Disclosure detection in multivariate categorical databases: Auditing confidentiality protection through two new matrix operators
    • Chowdhury, S. D., G. T. Duncan, R. Krishnan, S. F. Roehrig, S. Mukherjee. 1999. Disclosure detection in multivariate categorical databases: Auditing confidentiality protection through two new matrix operators. Management Sci. 45 1710-1723.
    • (1999) Management Sci , vol.45 , pp. 1710-1723
    • Chowdhury, S.D.1    Duncan, G.T.2    Krishnan, R.3    Roehrig, S.F.4    Mukherjee, S.5
  • 8
    • 0000082189 scopus 로고
    • Suppression methodology and statistical disclosure control
    • Cox, L. H. 1980. Suppression methodology and statistical disclosure control. J. Amer. Statist. Assoc. 75 377-385.
    • (1980) J. Amer. Statist. Assoc , vol.75 , pp. 377-385
    • Cox, L.H.1
  • 9
    • 84876653615 scopus 로고    scopus 로고
    • Cox, L. H. 1992. Solving confidentiality protection problems in tabulations using network optimization: A network model for cell suppression in U.S. economic censuses. R. Mokken, ed. Internat. Sem. Statist. Confidentiality. Eurostat, Dublin, Ireland, 229-245.
    • Cox, L. H. 1992. Solving confidentiality protection problems in tabulations using network optimization: A network model for cell suppression in U.S. economic censuses. R. Mokken, ed. Internat. Sem. Statist. Confidentiality. Eurostat, Dublin, Ireland, 229-245.
  • 10
    • 20444440962 scopus 로고    scopus 로고
    • Assessing the risk of disclosure of confidential categorical data
    • J. M. Bernardo, M. J. Bayarri, J. O. Berger, A. P. Dawid, D. Heckerman, A. F. M. Smith, M. West, eds, Oxford University Press, Oxford, UK
    • Dobra, A., S. E. Fienberg, M. Trottini. 2003. Assessing the risk of disclosure of confidential categorical data. J. M. Bernardo, M. J. Bayarri, J. O. Berger, A. P. Dawid, D. Heckerman, A. F. M. Smith, M. West, eds. Bayesian Statistics 7. Oxford University Press, Oxford, UK, 125-144.
    • (2003) Bayesian Statistics 7 , pp. 125-144
    • Dobra, A.1    Fienberg, S.E.2    Trottini, M.3
  • 11
    • 0036190566 scopus 로고    scopus 로고
    • Practical data-oriented microaggregation for statistical disclosure control
    • Domingo-Ferrer, J., J. M. Mateo-Sanz. 2002. Practical data-oriented microaggregation for statistical disclosure control. IEEE Trans. Knowledge Data Engrg. 14(1) 189-201.
    • (2002) IEEE Trans. Knowledge Data Engrg , vol.14 , Issue.1 , pp. 189-201
    • Domingo-Ferrer, J.1    Mateo-Sanz, J.M.2
  • 12
    • 26944448516 scopus 로고    scopus 로고
    • Ordinal, continuous, and heterogeneous k-anonymity through microaggregation
    • Domingo-Ferrer, D., V. Torra. 2005. Ordinal, continuous, and heterogeneous k-anonymity through microaggregation. Data Mining Knowledge Discovery 11(2) 195-212.
    • (2005) Data Mining Knowledge Discovery , vol.11 , Issue.2 , pp. 195-212
    • Domingo-Ferrer, D.1    Torra, V.2
  • 13
    • 0011644131 scopus 로고    scopus 로고
    • Obtaining information while preserving privacy: A Markov perturbation method for tabular data
    • J. Domingo-Ferrer, ed, IDS Press, Amsterdam, The Netherlands
    • Duncan, G. T., S. Fienberg. 1999. Obtaining information while preserving privacy: A Markov perturbation method for tabular data. J. Domingo-Ferrer, ed. Statist. Data Protection (SDP 1998) Proc., IDS Press, Amsterdam, The Netherlands.
    • (1999) Statist. Data Protection (SDP 1998) Proc
    • Duncan, G.T.1    Fienberg, S.2
  • 15
    • 0011583645 scopus 로고    scopus 로고
    • Disclosure risk vs. data utility: The R-U confidentiality map
    • Technical Report 2003-6, Heinz School of Public Policy and Management, Carnegie Mellon University, Pittsburgh, PA
    • Duncan, G. T., S. Keller-McNulty, S. L. Stokes. 2003b. Disclosure risk vs. data utility: The R-U confidentiality map. Technical Report 2003-6, Heinz School of Public Policy and Management, Carnegie Mellon University, Pittsburgh, PA.
    • (2003)
    • Duncan, G.T.1    Keller-McNulty, S.2    Stokes, S.L.3
  • 16
    • 0035410523 scopus 로고    scopus 로고
    • Solving the cell suppression on tabular data with linear constraints
    • Fischetti, M., J. Salazar. 2001. Solving the cell suppression on tabular data with linear constraints. Management Sci. 47 1008-1027.
    • (2001) Management Sci , vol.47 , pp. 1008-1027
    • Fischetti, M.1    Salazar, J.2
  • 17
    • 0036602405 scopus 로고    scopus 로고
    • Privacy protection of binary confidential data against deterministic, stochastic, and insider threat
    • Garfinkel, R., R. D. Gopal, P. B. Goes. 2002. Privacy protection of binary confidential data against deterministic, stochastic, and insider threat. Management Sci. 48 749-764.
    • (2002) Management Sci , vol.48 , pp. 749-764
    • Garfinkel, R.1    Gopal, R.D.2    Goes, P.B.3
  • 20
    • 0000328477 scopus 로고    scopus 로고
    • Interval protection of confidential information in a database
    • Gopal, R. D., P. B. Goes, R. Garfinkel. 1998. Interval protection of confidential information in a database. INFORMS J. Comput. 10 309-322.
    • (1998) INFORMS J. Comput , vol.10 , pp. 309-322
    • Gopal, R.D.1    Goes, P.B.2    Garfinkel, R.3
  • 21
    • 85041841273 scopus 로고    scopus 로고
    • Health Insurance Portability and Accountability Act (HIPAA). 1996.
    • Health Insurance Portability and Accountability Act (HIPAA). 1996.
  • 25
    • 33748519577 scopus 로고    scopus 로고
    • Privacy protection in data mining: A perturbation approach for categorical data
    • Li, X., S. Sarkar. 2006a. Privacy protection in data mining: A perturbation approach for categorical data. Inform. Systems Res. 17(3) 254-270.
    • (2006) Inform. Systems Res , vol.17 , Issue.3 , pp. 254-270
    • Li, X.1    Sarkar, S.2
  • 26
    • 33746873290 scopus 로고    scopus 로고
    • A tree-based perturbation approach for privacy-preserving data mining
    • Li, X., S. Sarkar. 2006b. A tree-based perturbation approach for privacy-preserving data mining. IEEE Trans. Knowledge Data Engrg. 18(9) 1278-1283.
    • (2006) IEEE Trans. Knowledge Data Engrg , vol.18 , Issue.9 , pp. 1278-1283
    • Li, X.1    Sarkar, S.2
  • 27
    • 25844456648 scopus 로고    scopus 로고
    • Maximizing accuracy of shared databases when concealing sensitive patterns
    • Menon, S., S. Sarkar, S. Mukherjee. 2005. Maximizing accuracy of shared databases when concealing sensitive patterns. Inform. Systems Res. 16(3) 256-270.
    • (2005) Inform. Systems Res , vol.16 , Issue.3 , pp. 256-270
    • Menon, S.1    Sarkar, S.2    Mukherjee, S.3
  • 29
    • 0000610330 scopus 로고
    • Accessibility, security, and accuracy in statistical databases: The case for the multiplicative fixed data perturbation approach
    • Muralidhar, K., D. Batra, P. J. Kirs. 1995. Accessibility, security, and accuracy in statistical databases: The case for the multiplicative fixed data perturbation approach. Management Sci. 41 1549-1564.
    • (1995) Management Sci , vol.41 , pp. 1549-1564
    • Muralidhar, K.1    Batra, D.2    Kirs, P.J.3
  • 31
    • 85041851526 scopus 로고    scopus 로고
    • Guaranteeing anonymity when sharing medical data
    • Hanley & Belfus, Inc, Washington, D.C
    • Sweeney, L. 2002a. Guaranteeing anonymity when sharing medical data. Proc. J. Amer. Medical Inform. Assoc. Hanley & Belfus, Inc., Washington, D.C.
    • (2002) Proc. J. Amer. Medical Inform. Assoc
    • Sweeney, L.1
  • 32
    • 0036811143 scopus 로고    scopus 로고
    • Achieving k-anonymity privacy protection using generalization and suppression
    • Sweeney, L. 2002b. Achieving k-anonymity privacy protection using generalization and suppression. Internat. J. Uncertainty, Fuzziness Knowledge-Based Systems 10(5) 571-588.
    • (2002) Internat. J. Uncertainty, Fuzziness Knowledge-Based Systems , vol.10 , Issue.5 , pp. 571-588
    • Sweeney, L.1
  • 33
    • 34247533165 scopus 로고    scopus 로고
    • United States General Accounting Office, Report to congressional requesters: Medical records privacy, February
    • United States General Accounting Office. 1999. Report to congressional requesters: Medical records privacy. (February).
    • (1999)
  • 35
    • 34247549101 scopus 로고    scopus 로고
    • ARGUS for statistical disclosure control
    • J. Domingo-Ferrer, ed, IDS Press, Amsterdam, The Netherlands
    • Willenborg, L., A. Hundepool. 1998. ARGUS for statistical disclosure control. J. Domingo-Ferrer, ed. Statist. Data Protection (SDP 1998) Proc., IDS Press, Amsterdam, The Netherlands.
    • (1998) Statist. Data Protection (SDP 1998) Proc
    • Willenborg, L.1    Hundepool, A.2
  • 36
    • 34247490518 scopus 로고
    • Using linear programming methodology for disclosure avoidance purposes
    • Statistical Research Division, Bureau of the Census, Washington, D.C
    • Zayatz, L. 1992. Using linear programming methodology for disclosure avoidance purposes. Research report, Statistical Research Division, Bureau of the Census, Washington, D.C.
    • (1992) Research report
    • Zayatz, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.