-
1
-
-
73449096462
-
-
National Institutes of Health. Final NIH statement on sharing research data. NOT-OD-03-032; February 2003.
-
National Institutes of Health. Final NIH statement on sharing research data. NOT-OD-03-032; February 2003.
-
-
-
-
2
-
-
0036363705
-
Future of security and privacy in medical information
-
Wiederhold G. Future of security and privacy in medical information. Stud Health Technol Inform 80 (2002) 213-229
-
(2002)
Stud Health Technol Inform
, vol.80
, pp. 213-229
-
-
Wiederhold, G.1
-
3
-
-
0036754633
-
Confidentiality issues for medical data miners
-
Berman J.J. Confidentiality issues for medical data miners. Artif Intell Med 26 1-2 (2002) 25-36
-
(2002)
Artif Intell Med
, vol.26
, Issue.1-2
, pp. 25-36
-
-
Berman, J.J.1
-
5
-
-
73449136180
-
-
National Institutes of Health. Policy for sharing of data obtained in NIH supported or conducted genome-wide association studies (GWAS). NOT-OD-07-088; August 2007.
-
National Institutes of Health. Policy for sharing of data obtained in NIH supported or conducted genome-wide association studies (GWAS). NOT-OD-07-088; August 2007.
-
-
-
-
6
-
-
33846936304
-
Evaluating common de-identification heuristics for personal health information
-
El Emam K., Jabbouri S., Sams S., Drouet Y., and Power M. Evaluating common de-identification heuristics for personal health information. J Med Internet Res 8 4 (2006) e28
-
(2006)
J Med Internet Res
, vol.8
, Issue.4
-
-
El Emam, K.1
Jabbouri, S.2
Sams, S.3
Drouet, Y.4
Power, M.5
-
7
-
-
26444473661
-
Messin' with Texas: deriving mother's maiden names using public records
-
Ioannidis J., Keromytis A., and Yung M. (Eds). New York, NY
-
Griffith V., and Jakobsson M. Messin' with Texas: deriving mother's maiden names using public records. In: Ioannidis J., Keromytis A., and Yung M. (Eds). Proceedings of the 3rd international conference on applied cryptography and network security. New York, NY (2005) 91-103
-
(2005)
Proceedings of the 3rd international conference on applied cryptography and network security
, pp. 91-103
-
-
Griffith, V.1
Jakobsson, M.2
-
8
-
-
11144348715
-
An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future
-
Malin B. An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future. J Am Med Inform Assoc 12 January-February (1) (2005) 28-34
-
(2005)
J Am Med Inform Assoc
, vol.12
, Issue.January-February 1
, pp. 28-34
-
-
Malin, B.1
-
9
-
-
50249142450
-
Robust de-anonymization of large sparse datasets
-
McDaniel P., and Rubin A. (Eds), ACM Press, New York
-
Narayanan A., and Shmatikov V. Robust de-anonymization of large sparse datasets. In: McDaniel P., and Rubin A. (Eds). Proceedings of the 29th IEEE symposium on security and privacy (2008), ACM Press, New York 111-125
-
(2008)
Proceedings of the 29th IEEE symposium on security and privacy
, pp. 111-125
-
-
Narayanan, A.1
Shmatikov, V.2
-
10
-
-
0031150446
-
Weaving technology and policy together to maintain confidentiality
-
Sweeney L. Weaving technology and policy together to maintain confidentiality. J Law Med Ethics 25 Summer-Fall (2-3) (1997) 98-110
-
(1997)
J Law Med Ethics
, vol.25
, Issue.Summer-Fall 2-3
, pp. 98-110
-
-
Sweeney, L.1
-
11
-
-
2942522665
-
How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems
-
Malin B., and Sweeney L. How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems. J Biomed Inform 37 3 (2004) 179-192
-
(2004)
J Biomed Inform
, vol.37
, Issue.3
, pp. 179-192
-
-
Malin, B.1
Sweeney, L.2
-
12
-
-
36049037582
-
K-unlinkability: a formal privacy protection model for distributed data
-
Malin B. K-unlinkability: a formal privacy protection model for distributed data. Data Knowledge Eng 64 (2008) 294-311
-
(2008)
Data Knowledge Eng
, vol.64
, pp. 294-311
-
-
Malin, B.1
-
13
-
-
34447262334
-
A computational model to protect patient data from location-based re-identification
-
Malin B. A computational model to protect patient data from location-based re-identification. Artif Intell Med 40 3 (2007) 223-239
-
(2007)
Artif Intell Med
, vol.40
, Issue.3
, pp. 223-239
-
-
Malin, B.1
-
14
-
-
39049178823
-
A secure protocol to distribute unlinkable health data
-
Malin B., and Sweeney L. A secure protocol to distribute unlinkable health data. AMIA Annu Symp Proc (2005) 485-489
-
(2005)
AMIA Annu Symp Proc
, pp. 485-489
-
-
Malin, B.1
Sweeney, L.2
-
15
-
-
33749641301
-
Composition and disclosure of unlinkable distributed databases
-
Liu L., Reuter A., Whang K.Y., and Zhang J. (Eds), IEEE CS Press, New York
-
Malin B., and Sweeney L. Composition and disclosure of unlinkable distributed databases. In: Liu L., Reuter A., Whang K.Y., and Zhang J. (Eds). Proceedings of 22nd IEEE international conference on data engineering (2006), IEEE CS Press, New York 118
-
(2006)
Proceedings of 22nd IEEE international conference on data engineering
, pp. 118
-
-
Malin, B.1
Sweeney, L.2
-
17
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertainty Fuzziness Knowledge-based Syst 10 5 (2002) 571-588
-
(2002)
Int J Uncertainty Fuzziness Knowledge-based Syst
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
18
-
-
0033105319
-
Using Boolean reasoning to anonymize databases
-
Øhrn A., and Ohno-Machado L. Using Boolean reasoning to anonymize databases. Artif Intell Med 15 (1999) 235-254
-
(1999)
Artif Intell Med
, vol.15
, pp. 235-254
-
-
Øhrn, A.1
Ohno-Machado, L.2
-
20
-
-
33947621113
-
Securing electronic health records without impeding the flow of information
-
Agrawal R., and Johnson C. Securing electronic health records without impeding the flow of information. Int J Med Inform 76 5-6 (2007) 471-479
-
(2007)
Int J Med Inform
, vol.76
, Issue.5-6
, pp. 471-479
-
-
Agrawal, R.1
Johnson, C.2
-
21
-
-
33845788271
-
An unsupervised classification method for inferring original case locations from low-resolution disease maps
-
Brownstein J., Cassa C., Kohane I., and Mandl K. An unsupervised classification method for inferring original case locations from low-resolution disease maps. Int J Health Geogr 6 (2006) 56
-
(2006)
Int J Health Geogr
, vol.6
, pp. 56
-
-
Brownstein, J.1
Cassa, C.2
Kohane, I.3
Mandl, K.4
-
22
-
-
33644669418
-
A context-sensitive approach to anonymizing spatial surveillance data: impact on outbreak detection
-
Cassa C., Grannis S., Overhage M., and Mandl K. A context-sensitive approach to anonymizing spatial surveillance data: impact on outbreak detection. J Am Med Inform Assoc 13 2 (2006) 160-165
-
(2006)
J Am Med Inform Assoc
, vol.13
, Issue.2
, pp. 160-165
-
-
Cassa, C.1
Grannis, S.2
Overhage, M.3
Mandl, K.4
-
23
-
-
33746711412
-
Proc approximation algorithms for k-anonymity
-
20051120001
-
Aggarwal G., Feder T., Kenthapadi K., Motwani R., Panigrahy R., Thomas D., et al. Proc approximation algorithms for k-anonymity. J Privacy Technol (2005) 20051120001
-
(2005)
J Privacy Technol
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
-
24
-
-
3142691086
-
On the complexity of optimal k-anonymity
-
Deutsch A. (Ed). Paris, France, ACM Press, New York
-
Meyerson A., and Williams R. On the complexity of optimal k-anonymity. In: Deutsch A. (Ed). Proceedings of the 23rd ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems. Paris, France (2004), ACM Press, New York 223-228
-
(2004)
Proceedings of the 23rd ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems
, pp. 223-228
-
-
Meyerson, A.1
Williams, R.2
-
25
-
-
3042797039
-
Privacy: a machine learning view
-
Vinterbo S. Privacy: a machine learning view. IEEE Trans Knowledge Data Eng 16 8 (2004) 939-948
-
(2004)
IEEE Trans Knowledge Data Eng
, vol.16
, Issue.8
, pp. 939-948
-
-
Vinterbo, S.1
-
26
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
Hand D., Keim D., and Ng R. (Eds). Edmonton, Canada, ACM Press, New York
-
Iyengar V. Transforming data to satisfy privacy constraints. In: Hand D., Keim D., and Ng R. (Eds). Proceedings of the 8th ACM SIGKDD international conference on data mining and knowledge discovery. Edmonton, Canada (2002), ACM Press, New York 279-288
-
(2002)
Proceedings of the 8th ACM SIGKDD international conference on data mining and knowledge discovery
, pp. 279-288
-
-
Iyengar, V.1
-
27
-
-
33749606641
-
Mondrian multidimensional k-anonymity
-
Liu L., Reuter A., Whang K.Y., and Zhang J. (Eds), IEEE CS Press, New York
-
Lefevre K., DeWitt D., and Ramakrishnan R. Mondrian multidimensional k-anonymity. In: Liu L., Reuter A., Whang K.Y., and Zhang J. (Eds). Proceedings of the 22nd IEEE international conference on data engineering (2006), IEEE CS Press, New York 25
-
(2006)
Proceedings of the 22nd IEEE international conference on data engineering
, pp. 25
-
-
Lefevre, K.1
DeWitt, D.2
Ramakrishnan, R.3
-
28
-
-
73449141494
-
-
Winkler W. Using simulated annealing for k-anonymity. Washington, DC: US Census Bureau Statistical Research Division. Technical Report 2002-07; 2002.
-
Winkler W. Using simulated annealing for k-anonymity. Washington, DC: US Census Bureau Statistical Research Division. Technical Report 2002-07; 2002.
-
-
-
-
29
-
-
41849147857
-
Allowing privacy problems to jump out of local optimums: an ordered greed framework
-
Bonchi F., Ferrari E., Malin B., and Saygin Y. (Eds), Springer
-
Chaytor R. Allowing privacy problems to jump out of local optimums: an ordered greed framework. In: Bonchi F., Ferrari E., Malin B., and Saygin Y. (Eds). Proceedings of the 1st ACM SIGKDD workshop on privacy, security, and trust in KDD (2008), Springer 33-55
-
(2008)
Proceedings of the 1st ACM SIGKDD workshop on privacy, security, and trust in KDD
, pp. 33-55
-
-
Chaytor, R.1
-
31
-
-
12244296735
-
When do data mining results violate privacy?
-
Kim W., Kohavi R., Gehrke J., and DuMouchel W. (Eds). Seattle, WA, ACM Press, New York
-
Kantarcioglu M., Jin J., and Clifton C. When do data mining results violate privacy?. In: Kim W., Kohavi R., Gehrke J., and DuMouchel W. (Eds). Proceedings of the 10th ACM SIGKDD international conference on data mining and knowledge discovery. Seattle, WA (2004), ACM Press, New York 599-604
-
(2004)
Proceedings of the 10th ACM SIGKDD international conference on data mining and knowledge discovery
, pp. 599-604
-
-
Kantarcioglu, M.1
Jin, J.2
Clifton, C.3
-
32
-
-
36048997303
-
A secure distributed framework for achieving k-anonymity
-
Jiang W., and Clifton C. A secure distributed framework for achieving k-anonymity. VLDB J 15 4 (2006) 316-333
-
(2006)
VLDB J
, vol.15
, Issue.4
, pp. 316-333
-
-
Jiang, W.1
Clifton, C.2
-
34
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
Pohlig S., and Hellman M. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans Information Theory 24 (1978) 106-110
-
(1978)
IEEE Trans Information Theory
, vol.24
, pp. 106-110
-
-
Pohlig, S.1
Hellman, M.2
-
35
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest R., Shamir A., and Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21 2 (1978) 120-126
-
(1978)
Commun ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
36
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
Kantarcioglu M., and Clifton C. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans Knowledge Data Eng 16 9 (2004) 1026-1037
-
(2004)
IEEE Trans Knowledge Data Eng
, vol.16
, Issue.9
, pp. 1026-1037
-
-
Kantarcioglu, M.1
Clifton, C.2
-
37
-
-
28444494676
-
Configurable security protocols for multi-party data analysis with malicious participants
-
Aberer K., Franklin M., and Nishio S. (Eds), IEEE CS Press, New York
-
Malin B., Airoldi E., Edoho-Eket S., and Li Y. Configurable security protocols for multi-party data analysis with malicious participants. In: Aberer K., Franklin M., and Nishio S. (Eds). Proceedings of the 21st IEEE international conference on data engineering (2005), IEEE CS Press, New York 533-544
-
(2005)
Proceedings of the 21st IEEE international conference on data engineering
, pp. 533-544
-
-
Malin, B.1
Airoldi, E.2
Edoho-Eket, S.3
Li, Y.4
-
38
-
-
2942627386
-
-
State of Illinois Health Care Cost Containment Council, Springfield, IL: State of Illinois Health Care Cost Containment Council; March
-
State of Illinois Health Care Cost Containment Council. Data release overview. Springfield, IL: State of Illinois Health Care Cost Containment Council; March 1998.
-
(1998)
Data release overview
-
-
-
40
-
-
0036038991
-
Universally composable two-party and multi-party secure computation
-
Montreal, Canada
-
Canetti R., Lindell Y., Ostrovsky R., and Sahai A. Universally composable two-party and multi-party secure computation. Proceedings of the 34th symposium on theory of computing. Montreal, Canada (2002) 494-503
-
(2002)
Proceedings of the 34th symposium on theory of computing
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
41
-
-
1542374034
-
Zero-check: a zero-knowledge protocol for reconciling patient identities across institutions
-
Berman J.J. Zero-check: a zero-knowledge protocol for reconciling patient identities across institutions. Arch Pathol Lab Med 128 March (3) (2004) 344-346
-
(2004)
Arch Pathol Lab Med
, vol.128
, Issue.March 3
, pp. 344-346
-
-
Berman, J.J.1
-
42
-
-
0642275698
-
A proposed architecture and method of operation for improving the protection of privacy and confidentiality in disease registers
-
Churches T. A proposed architecture and method of operation for improving the protection of privacy and confidentiality in disease registers. BMC Med Res Methodol 3 1 (2003) 1
-
(2003)
BMC Med Res Methodol
, vol.3
, Issue.1
, pp. 1
-
-
Churches, T.1
-
43
-
-
0037768626
-
Privacy enhancing technologies: the key to secure communication and management of clinical and genomic data
-
de Moor G., Claerhout B., and de Meyer F. Privacy enhancing technologies: the key to secure communication and management of clinical and genomic data. Methods Inf Med 42 (2003) 148-153
-
(2003)
Methods Inf Med
, vol.42
, pp. 148-153
-
-
de Moor, G.1
Claerhout, B.2
de Meyer, F.3
-
45
-
-
14844352151
-
Ethical and legal aspects of applied genomic technologies: practical solutions
-
Manasco P. Ethical and legal aspects of applied genomic technologies: practical solutions. Curr Mol Med 5 February (2005) 23-28
-
(2005)
Curr Mol Med
, vol.5
, Issue.February
, pp. 23-28
-
-
Manasco, P.1
-
46
-
-
15544384731
-
Security infrastructure services for electronic archives and electronic health records
-
Pharow P., and Blobel B. Security infrastructure services for electronic archives and electronic health records. Stud Health Technol Inform 103 (2004) 434-440
-
(2004)
Stud Health Technol Inform
, vol.103
, pp. 434-440
-
-
Pharow, P.1
Blobel, B.2
-
47
-
-
77952259855
-
Blocking aware private record linkage
-
Berti-Equille L., Batini C., and Srivastava D. (Eds), ACM Press, New York
-
Al-Lawati A., Lee D., and McDaniel P. Blocking aware private record linkage. In: Berti-Equille L., Batini C., and Srivastava D. (Eds). Proceedings of the 2nd ACM international workshop on information quality in information systems (2005), ACM Press, New York 59-68
-
(2005)
Proceedings of the 2nd ACM international workshop on information quality in information systems
, pp. 59-68
-
-
Al-Lawati, A.1
Lee, D.2
McDaniel, P.3
-
48
-
-
1642327704
-
Secure and private sequence computations
-
Jajodia S., Samarati P., and Syverson P. (Eds), ACM Press, New York
-
Atallah M., Kerschbaum F., and Du W. Secure and private sequence computations. In: Jajodia S., Samarati P., and Syverson P. (Eds). Proceedings of the 2nd ACM workshop on privacy in the electronic society (2003), ACM Press, New York 39-44
-
(2003)
Proceedings of the 2nd ACM workshop on privacy in the electronic society
, pp. 39-44
-
-
Atallah, M.1
Kerschbaum, F.2
Du, W.3
-
49
-
-
13444256330
-
Some methods for blindfolded record linkage
-
Churches T., and Christen P. Some methods for blindfolded record linkage. BMC Med Inform Decis Mak 4 June (2004) 9
-
(2004)
BMC Med Inform Decis Mak
, vol.4
, Issue.June
, pp. 9
-
-
Churches, T.1
Christen, P.2
|