메뉴 건너뛰기




Volumn , Issue , 2010, Pages 163-172

Beyond safe harbor: Automatic discovery of health information de-identification policy alternatives

Author keywords

de identification; privacy; safe harbor

Indexed keywords

AUTOMATIC DISCOVERY; DATA SETS; DE-IDENTIFICATION; HEALTH INFORMATIONS; HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACTS; HEALTHCARE ORGANIZATIONS; MEDICAL CENTER; PATIENT RECORD; PRIVACY; PRIVACY RULE; SAFE HARBOR; SEARCH PROBLEM; UCI MACHINE LEARNING REPOSITORY; VANDERBILT UNIVERSITY;

EID: 78650942280     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1882992.1883017     Document Type: Conference Paper
Times cited : (18)

References (25)
  • 1
    • 0024914229 scopus 로고
    • Security control methods for statistical databases
    • N. Adam and J. Wortman. Security control methods for statistical databases. ACM Comput. Surv., 21:515-556, 1989.
    • (1989) ACM Comput. Surv. , vol.21 , pp. 515-556
    • Adam, N.1    Wortman, J.2
  • 2
    • 78650941669 scopus 로고    scopus 로고
    • Health care databases under HIPAA: Statistical approaches to de-identification of protected health information
    • Presented at
    • J. Beach. Health care databases under HIPAA: statistical approaches to de-identification of protected health information. Presented at DIMACS Workshop on Privacy & Confidentiality of Health Data, 2003.
    • DIMACS Workshop on Privacy & Confidentiality of Health Data, 2003
    • Beach, J.1
  • 3
    • 77953149045 scopus 로고    scopus 로고
    • Evaluating re-identification risks with respect to the HIPAA privacy rule
    • K. Benitez and B. Malin. Evaluating re-identification risks with respect to the HIPAA privacy rule. Journal of the American Medical Informatics Association, 17(2):169-177, 2010.
    • (2010) Journal of the American Medical Informatics Association , vol.17 , Issue.2 , pp. 169-177
    • Benitez, K.1    Malin, B.2
  • 4
    • 68349094975 scopus 로고    scopus 로고
    • Musings on privacy issues in health research involving disaggregate geographic data about individuals
    • M. Boulos, A. Curtis, and P. AbdelMalik. Musings on privacy issues in health research involving disaggregate geographic data about individuals. International Journal of Health Geographics, 8:46, 2009.
    • (2009) International Journal of Health Geographics , vol.8 , pp. 46
    • Boulos, M.1    Curtis, A.2    AbdelMalik, P.3
  • 5
    • 60149102060 scopus 로고    scopus 로고
    • Size matters: Just how big is big?: Quantifying realistic sample size requirements for human genome epidemiology
    • P. Burton, A. Hansell, I. Fortier, et al. Size matters: just how big is big?: Quantifying realistic sample size requirements for human genome epidemiology. International Journal of Epidemiology, 38:263-273, 2008.
    • (2008) International Journal of Epidemiology , vol.38 , pp. 263-273
    • Burton, P.1    Hansell, A.2    Fortier, I.3
  • 6
    • 78650938596 scopus 로고    scopus 로고
    • Kaiser Permanente marks completion of its electronic health records implementation
    • March 8
    • R. Charette. Kaiser Permanente marks completion of its electronic health records implementation. IEEE Spectrum, March 8 2010.
    • (2010) IEEE Spectrum
    • Charette, R.1
  • 7
    • 0042090221 scopus 로고    scopus 로고
    • Preserving confidentiality when sharing medical database with the cellsecu system
    • Y. Chiang, T. Hsu, S. Kuo, et al. Preserving confidentiality when sharing medical database with the cellsecu system. International Journal of Medical Informatics, 71:17-23, 2003.
    • (2003) International Journal of Medical Informatics , vol.71 , pp. 17-23
    • Chiang, Y.1    Hsu, T.2    Kuo, S.3
  • 8
    • 0000072558 scopus 로고
    • Finding a needle in a haystack or identifying anonymous census records
    • T. Dalenius. Finding a needle in a haystack or identifying anonymous census records. Journal of Official Statistics, 2:329-336, 1986.
    • (1986) Journal of Official Statistics , vol.2 , pp. 329-336
    • Dalenius, T.1
  • 13
    • 84885221014 scopus 로고    scopus 로고
    • Revisiting the uniqueness of simple demographics in the US population
    • P. Golle. Revisiting the uniqueness of simple demographics in the US population. In ACM WPES, pages 77-80, 2006.
    • (2006) ACM WPES , pp. 77-80
    • Golle, P.1
  • 14
    • 0242625276 scopus 로고    scopus 로고
    • Transforming data to satisfy privacy constraints
    • V. Iyengar. Transforming data to satisfy privacy constraints. In SIGKDD, pages 279-288, 2002.
    • (2002) SIGKDD , pp. 279-288
    • Iyengar, V.1
  • 15
    • 29844444250 scopus 로고    scopus 로고
    • Incognito: Efficient full-domain k-anonymity
    • K. LeFevre, D. DeWitt, and R. Ramakrishnan. Incognito: Efficient full-domain k-anonymity. In SIGMOD, pages 49-60, 2005.
    • (2005) SIGMOD , pp. 49-60
    • LeFevre, K.1    DeWitt, D.2    Ramakrishnan, R.3
  • 16
    • 33749606641 scopus 로고    scopus 로고
    • Mondrian multidimensional k-anonymity
    • K. LeFevre, D. DeWitt, and R. Ramakrishnan. Mondrian multidimensional k-anonymity. In ICDE, page 25, 2006.
    • (2006) ICDE , pp. 25
    • LeFevre, K.1    DeWitt, D.2    Ramakrishnan, R.3
  • 17
    • 34548805858 scopus 로고    scopus 로고
    • t-closeness: Privacy beyond k-anonymity and l-diversity
    • N. Li, T. Li, and S. Venkatasubramanian. t-closeness: privacy beyond k-anonymity and l-diversity. In ICDE, pages 106-115, 2007.
    • (2007) ICDE , pp. 106-115
    • Li, N.1    Li, T.2    Venkatasubramanian, S.3
  • 20
    • 33846667534 scopus 로고    scopus 로고
    • Code-based syndromic surveillance for influenzalike illness by international classification of diseases
    • N. Marsden-Haug, V. Foster, P. Gould, et al. Code-based syndromic surveillance for influenzalike illness by international classification of diseases. Emerging Infectious Diseases, 13:207-216, 2007.
    • (2007) Emerging Infectious Diseases , vol.13 , pp. 207-216
    • Marsden-Haug, N.1    Foster, V.2    Gould, P.3
  • 21
    • 0033715579 scopus 로고    scopus 로고
    • Genetic algorithm-based clustering technique
    • U. Maulik and S. Bandyopadhyay. Genetic algorithm-based clustering technique. Pattern Recognition, 33:1455-1465, 2000.
    • (2000) Pattern Recognition , vol.33 , pp. 1455-1465
    • Maulik, U.1    Bandyopadhyay, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.