메뉴 건너뛰기




Volumn , Issue , 2010, Pages 315-349

Privacy-aware health information sharing

Author keywords

[No Author keywords available]

Indexed keywords

DATA MINING; DATA PRIVACY; DECISION MAKING; HEALTH; HOSPITAL DATA PROCESSING;

EID: 78650777893     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1201/b10373     Document Type: Chapter
Times cited : (2)

References (35)
  • 1
    • 33745629638 scopus 로고    scopus 로고
    • On k-anonymity and the curse of dimensionality
    • C. C. Aggarwal. On k-anonymity and the curse of dimensionality. In Proc. of VLDB, 2005.
    • (2005) Proc. of VLDB
    • Aggarwal, C.C.1
  • 2
    • 0041783510 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Dallas, Texas, May
    • R. Agrawal and R. Srikant. Privacy preserving data mining. In Proc. of ACM SIGMOD, pages 439-450, Dallas, Texas, May 2000.
    • (2000) Proc. of ACM SIGMOD , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 5
    • 0042734800 scopus 로고    scopus 로고
    • The gene trustee: A universal identification system that ensures privacy and confidentiality for human genetic databases
    • L. Burnett, K. Barlow-Stewart, A. Pros, and H. Aizenberg. The gene trustee: A universal identification system that ensures privacy and confidentiality for human genetic databases. Journal of Law and Medicine, 10: 506-513, 2003.
    • (2003) Journal of Law and Medicine , vol.10 , pp. 506-513
    • Burnett, L.1    Barlow-Stewart, K.2    Pros, A.3    Aizenberg, H.4
  • 6
    • 0012793677 scopus 로고
    • Towards a methodology for statistical disclosure control
    • T. Dalenius. Towards a methodology for statistical disclosure control. Statistik Tidskrift, 15: 429-444, 1977.
    • (1977) Statistik Tidskrift , vol.15 , pp. 429-444
    • Dalenius, T.1
  • 9
    • 77951201056 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: A survey on recent developments
    • December
    • B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu. Privacy-preserving data publishing: A survey on recent developments. ACM Computing Surveys, 42(4), December 2010.
    • (2010) ACM Computing Surveys , vol.42 , Issue.4
    • Fung, B.C.M.1    Wang, K.2    Chen, R.3    Yu, P.S.4
  • 15
    • 0242625276 scopus 로고    scopus 로고
    • Transforming data to satisfy privacy constraints
    • Edmonton, AB, Canada
    • V. S. Iyengar. Transforming data to satisfy privacy constraints. In 8th ACM SIGKDD, pages 279-288, Edmonton, AB, Canada, 2002.
    • (2002) 8th ACM SIGKDD , pp. 279-288
    • Iyengar, V.S.1
  • 16
    • 29844444250 scopus 로고    scopus 로고
    • Incognito: Efficient full-domain k-anonymity
    • Baltimore, ML, USA
    • K. LeFevre, D. J. Dewitt, and R. Ramakrishnan. Incognito: Efficient full-domain k-anonymity. In Proc. of the ACM SIGMOD, pages 49-60, Baltimore, ML, USA, 2005.
    • (2005) Proc. of the ACM SIGMOD , pp. 49-60
    • LeFevre, K.1    Dewitt, D.J.2    Ramakrishnan, R.3
  • 20
    • 57149132810 scopus 로고    scopus 로고
    • Preservation of proximity privacy in publishing numerical sensitive data
    • Vancouver, Canada, June
    • J. Li, Y. Tao, and X. Xiao. Preservation of proximity privacy in publishing numerical sensitive data. In Proc. of the ACM Conference on Management of Data (SIGMOD), pages 437-486, Vancouver, Canada, June 2008.
    • (2008) Proc. of the ACM Conference on Management of Data (SIGMOD) , pp. 437-486
    • Li, J.1    Tao, Y.2    Xiao, X.3
  • 28
    • 0031632776 scopus 로고    scopus 로고
    • Generalizing data to provide anonymity when disclosing information
    • Seattle, WA, USA
    • P. Samarati and L. Sweeney. Generalizing data to provide anonymity when disclosing information. In Proc. of the 17th ACM SIGACTSIGMOD-SIGART PODS, page 188, Seattle, WA, USA, 1998.
    • (1998) Proc. of the 17th ACM SIGACTSIGMOD-SIGART PODS , pp. 188
    • Samarati, P.1    Sweeney, L.2
  • 29
    • 0003483188 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
    • SRI International
    • P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report, SRI International, 1998.
    • (1998) Technical Report
    • Samarati, P.1    Sweeney, L.2
  • 33
    • 34147125465 scopus 로고    scopus 로고
    • Handicapping attacker’s confidence: An alternative to k-anonymization
    • K. Wang, B. C. M. Fung, and P. S. Yu. Handicapping attacker’s confidence: An alternative to k-anonymization. Knowledge and Information Systems (KAIS), 11(3): 345-368, 2007.
    • (2007) Knowledge and Information Systems (KAIS) , vol.11 , Issue.3 , pp. 345-368
    • Wang, K.1    Fung, B.C.M.2    Yu, P.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.