메뉴 건너뛰기




Volumn 32, Issue 2, 2004, Pages 137-149

Medical privacy protection based on granular computing

Author keywords

Data table; Granular computing; Privacy

Indexed keywords

DATA ACQUISITION; DIAGNOSIS; HEALTH CARE; INFORMATION RETRIEVAL; PATIENT TREATMENT;

EID: 4444358211     PISSN: 09333657     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.artmed.2004.03.002     Document Type: Article
Times cited : (23)

References (30)
  • 3
    • 0018160897 scopus 로고
    • Access to social security microdata files for research and statistical purposes
    • Alexander L, Jabine T. Access to social security microdata files for research and statistical purposes. Soc Secur Bull 1978;41(8).
    • (1978) Soc Secur Bull , vol.41 , Issue.8
    • Alexander, L.1    Jabine, T.2
  • 4
    • 0041446760 scopus 로고    scopus 로고
    • Guaranteeing anonymity when sharing medical data, the Datafly system
    • AIWP-WP344. MIT AI Lab.
    • Sweeney L. Guaranteeing anonymity when sharing medical data, the Datafly system. A.I. Working Paper, AIWP-WP344. MIT AI Lab. 1997.
    • (1997) A.I. Working Paper
    • Sweeney, L.1
  • 10
    • 0042090221 scopus 로고    scopus 로고
    • Preserving confidentiality when sharing medical database with the Cellsecu system
    • Chiang Y.C., Hsu T.-s., Kuo S., Liau C.J., Wang D.W. Preserving confidentiality when sharing medical database with the Cellsecu system. Int. J. Med. Inform. 71:2003;17-23
    • (2003) Int. J. Med. Inform. , vol.71 , pp. 17-23
    • Chiang, Y.C.1    Hsu, T.-S.2    Kuo, S.3    Liau, C.J.4    Wang, D.W.5
  • 11
    • 0005616406 scopus 로고
    • Getting a personal dossier from a statistical data bank
    • Hoffman L.J., Miller W.F. Getting a personal dossier from a statistical data bank. Datamation. 16(5):1970;74
    • (1970) Datamation , vol.16 , Issue.5 , pp. 74
    • Hoffman, L.J.1    Miller, W.F.2
  • 12
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • Adam NR, Wortmann JC. Security-control methods for statistical databases: a comparative study. ACM Comput. Surveys 1989;21(4).
    • (1989) ACM Comput. Surveys , vol.21 , Issue.4
    • Adam, N.R.1    Wortmann, J.C.2
  • 17
    • 0022583507 scopus 로고
    • Security of statistical databases compromise through attribute correlational modeling
    • Palley MA. Security of statistical databases compromise through attribute correlational modeling. In: Proceedings of IEEE Conference on Data Engineering, 1986. pp. 67-74.
    • (1986) Proceedings of IEEE Conference on Data Engineering , pp. 67-74
    • Palley, M.A.1
  • 20
    • 0033105319 scopus 로고    scopus 로고
    • Using Boolean reasoning to anonymize databases
    • Øhrn A., Ohno-Machado L. Using Boolean reasoning to anonymize databases. Artif. Intell. Med. 15:1999;235-254
    • (1999) Artif. Intell. Med. , vol.15 , pp. 235-254
    • Øhrn, A.1    Ohno-Machado, L.2
  • 23
    • 0000313665 scopus 로고    scopus 로고
    • Granular computing on binary relations. I. Data mining and neighborhood systems
    • Skoworn A, Polkowski L, editors. Physica-Verlag
    • Lin TY. Granular computing on binary relations. I. Data mining and neighborhood systems. In: Skoworn A, Polkowski L, editors. Rough sets in knowledge discovery, vol. 1: methodology and applications. Physica-Verlag, 1998. p. 107-21.
    • (1998) Rough Sets in Knowledge Discovery, Vol. 1: Methodology and Applications , vol.1 , pp. 107-121
    • Lin, T.Y.1
  • 24
    • 1642469977 scopus 로고    scopus 로고
    • Toward a theory of fuzzy information granulation and its centrality in haman reasoning and fuzzy logic
    • Zadeh L.A. Toward a theory of fuzzy information granulation and its centrality in haman reasoning and fuzzy logic. Fuzzy Sets Syst. 90:1997;111-127
    • (1997) Fuzzy Sets Syst. , vol.90 , pp. 111-127
    • Zadeh, L.A.1
  • 25
    • 0036811143 scopus 로고    scopus 로고
    • Achieving k-anonymity privacy protection using generalization and suppression
    • Sweeney L. Achieving. k -anonymity privacy protection using generalization and suppression Int. J. Uncertain. Fuzz. Knowledge-based Syst. 10(5):2002;571-588
    • (2002) Int. J. Uncertain. Fuzz. Knowledge-based Syst. , vol.10 , Issue.5 , pp. 571-588
    • Sweeney, L.1
  • 28
    • 0000682065 scopus 로고
    • Network flow and testing graph connectivity
    • Even S., Tarjan R.E. Network flow and testing graph connectivity. SIAM J. Comput. 4:1975;507-518
    • (1975) SIAM J. Comput. , vol.4 , pp. 507-518
    • Even, S.1    Tarjan, R.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.