-
1
-
-
0024914229
-
Security control methods for statistical databases
-
N. Adam and J. Wortman. Security control methods for statistical databases. ACM Comput. Surv., 21:515-556, 1989.
-
(1989)
ACM Comput. Surv.
, vol.21
, pp. 515-556
-
-
Adam, N.1
Wortman, J.2
-
2
-
-
78650941669
-
Health care databases under HIPAA: Statistical approaches to de-identification of protected health information
-
Presented at
-
J. Beach. Health care databases under HIPAA: statistical approaches to de-identification of protected health information. Presented at DIMACS Workshop on Privacy & Confidentiality of Health Data, 2003.
-
DIMACS Workshop on Privacy & Confidentiality of Health Data, 2003
-
-
Beach, J.1
-
4
-
-
68349094975
-
Musings on privacy issues in health research involving disaggregate geographic data about individuals
-
M. Boulos, A. Curtis, and P. AbdelMalik. Musings on privacy issues in health research involving disaggregate geographic data about individuals. International Journal of Health Geographics, 8:46, 2009.
-
(2009)
International Journal of Health Geographics
, vol.8
, pp. 46
-
-
Boulos, M.1
Curtis, A.2
AbdelMalik, P.3
-
5
-
-
60149102060
-
Size matters: Just how big is big?: Quantifying realistic sample size requirements for human genome epidemiology
-
P. Burton, A. Hansell, I. Fortier, et al. Size matters: just how big is big?: Quantifying realistic sample size requirements for human genome epidemiology. International Journal of Epidemiology, 38:263-273, 2008.
-
(2008)
International Journal of Epidemiology
, vol.38
, pp. 263-273
-
-
Burton, P.1
Hansell, A.2
Fortier, I.3
-
6
-
-
78650938596
-
Kaiser Permanente marks completion of its electronic health records implementation
-
March 8
-
R. Charette. Kaiser Permanente marks completion of its electronic health records implementation. IEEE Spectrum, March 8 2010.
-
(2010)
IEEE Spectrum
-
-
Charette, R.1
-
7
-
-
0042090221
-
Preserving confidentiality when sharing medical database with the cellsecu system
-
Y. Chiang, T. Hsu, S. Kuo, et al. Preserving confidentiality when sharing medical database with the cellsecu system. International Journal of Medical Informatics, 71:17-23, 2003.
-
(2003)
International Journal of Medical Informatics
, vol.71
, pp. 17-23
-
-
Chiang, Y.1
Hsu, T.2
Kuo, S.3
-
8
-
-
0000072558
-
Finding a needle in a haystack or identifying anonymous census records
-
T. Dalenius. Finding a needle in a haystack or identifying anonymous census records. Journal of Official Statistics, 2:329-336, 1986.
-
(1986)
Journal of Official Statistics
, vol.2
, pp. 329-336
-
-
Dalenius, T.1
-
11
-
-
69549114557
-
A globally optimal k-anonymity method for the de-identification of health data
-
K. El Emam, F. Dankar, R. Issa, et al. A globally optimal k-anonymity method for the de-identification of health data. Journal of the American Medical Informatics Association, 16(5):670-682, 2009.
-
(2009)
Journal of the American Medical Informatics Association
, vol.16
, Issue.5
, pp. 670-682
-
-
El Emam, K.1
Dankar, F.2
Issa, R.3
-
13
-
-
84885221014
-
Revisiting the uniqueness of simple demographics in the US population
-
P. Golle. Revisiting the uniqueness of simple demographics in the US population. In ACM WPES, pages 77-80, 2006.
-
(2006)
ACM WPES
, pp. 77-80
-
-
Golle, P.1
-
14
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
V. Iyengar. Transforming data to satisfy privacy constraints. In SIGKDD, pages 279-288, 2002.
-
(2002)
SIGKDD
, pp. 279-288
-
-
Iyengar, V.1
-
15
-
-
29844444250
-
Incognito: Efficient full-domain k-anonymity
-
K. LeFevre, D. DeWitt, and R. Ramakrishnan. Incognito: Efficient full-domain k-anonymity. In SIGMOD, pages 49-60, 2005.
-
(2005)
SIGMOD
, pp. 49-60
-
-
LeFevre, K.1
DeWitt, D.2
Ramakrishnan, R.3
-
16
-
-
33749606641
-
Mondrian multidimensional k-anonymity
-
K. LeFevre, D. DeWitt, and R. Ramakrishnan. Mondrian multidimensional k-anonymity. In ICDE, page 25, 2006.
-
(2006)
ICDE
, pp. 25
-
-
LeFevre, K.1
DeWitt, D.2
Ramakrishnan, R.3
-
17
-
-
34548805858
-
t-closeness: Privacy beyond k-anonymity and l-diversity
-
N. Li, T. Li, and S. Venkatasubramanian. t-closeness: privacy beyond k-anonymity and l-diversity. In ICDE, pages 106-115, 2007.
-
(2007)
ICDE
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
19
-
-
33749607006
-
l -diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l -diversity: privacy beyond k-anonymity. In ICDE, page 24, 2006.
-
(2006)
ICDE
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
20
-
-
33846667534
-
Code-based syndromic surveillance for influenzalike illness by international classification of diseases
-
N. Marsden-Haug, V. Foster, P. Gould, et al. Code-based syndromic surveillance for influenzalike illness by international classification of diseases. Emerging Infectious Diseases, 13:207-216, 2007.
-
(2007)
Emerging Infectious Diseases
, vol.13
, pp. 207-216
-
-
Marsden-Haug, N.1
Foster, V.2
Gould, P.3
-
21
-
-
0033715579
-
Genetic algorithm-based clustering technique
-
U. Maulik and S. Bandyopadhyay. Genetic algorithm-based clustering technique. Pattern Recognition, 33:1455-1465, 2000.
-
(2000)
Pattern Recognition
, vol.33
, pp. 1455-1465
-
-
Maulik, U.1
Bandyopadhyay, S.2
-
22
-
-
33845429600
-
Toward a national framework for the secondary use of health data
-
C. Safran, M. Bloomrosen, W. E. Hammond, et al. Toward a national framework for the secondary use of health data. Journal of the American Medical Informatics Association, 14:1-9, 2007.
-
(2007)
Journal of the American Medical Informatics Association
, vol.14
, pp. 1-9
-
-
Safran, C.1
Bloomrosen, M.2
Hammond, W.E.3
|