메뉴 건너뛰기




Volumn , Issue , 2009, Pages 197-225

Privacy-Preserving information discovery on EHRs

Author keywords

[No Author keywords available]

Indexed keywords


EID: 78650955531     PISSN: None     EISSN: None     Source Type: Book    
DOI: None     Document Type: Chapter
Times cited : (5)

References (80)
  • 1
    • 0036811662 scopus 로고    scopus 로고
    • Fc-anonymity: A model for protecting privacy
    • Fuzziness and Knowledge-Based Systems
    • Sweeney, L. 2002. fc-Anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems 10(5):557–570.
    • (2002) International Journal on Uncertainty , vol.10 , Issue.5 , pp. 557-570
    • Sweeney, L.1
  • 6
    • 35448967088 scopus 로고    scopus 로고
    • M-invariance: Towards privacy preserving republication of dynamic datasets
    • Xiao, X., and Tao, Y. 2007. M-invariance: towards privacy preserving republication of dynamic datasets. In Proceedings of the SIGMOD Conference, pp. 689–700.
    • (2007) Proceedings of the SIGMOD Conference , pp. 689-700
    • Xiao, X.1    Tao, Y.2
  • 14
    • 33644919398 scopus 로고    scopus 로고
    • Micro–views, or on how to protect privacy while enhancing data usability—concept and challenges
    • Byun, J., and Bertino, E. 2006. Micro-views, or on how to protect privacy while enhancing data usability—concept and challenges. SIGMOD Record 35(1): 9–13.
    • (2006) SIGMOD Record , vol.35 , Issue.1 , pp. 9-13
    • Byun, J.1    Bertino, E.2
  • 15
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • Adams, N. R., and Wortman, J. C. 1989. Security-control methods for statistical databases: a comparative study. ACM Computing Surveys 21(4):515–556.
    • (1989) ACM Computing Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adams, N.R.1    Wortman, J.C.2
  • 16
    • 77951201056 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: A survey on recent developments
    • Fung, B. C. M., Wang, K., Chen, R., and Yu, P. S. 2010. Privacy-preserving data publishing: a survey on recent developments. ACM Computing Surveys, 42 (4).
    • (2010) ACM Computing Surveys , vol.42 , Issue.4
    • Fung, B.C.M.1    Wang, K.2    Chen, R.3    Yu, P.S.4
  • 18
    • 19544380211 scopus 로고    scopus 로고
    • Bottom-up generalization: A data mining solution to privacy protection
    • Wang, K., Yu, P. S., and Chakraborty, S. 2004. Bottom–up generalization: a data mining solution to privacy protection. In Proceedings of ICDM.
    • (2004) Proceedings of ICDM
    • Wang, K.1    Yu, P.S.2    Chakraborty, S.3
  • 22
    • 28444499680 scopus 로고    scopus 로고
    • Top-down specialization for information and privacy preservation
    • Fung, B. C. M., Wang, K., and Yu, P. S. 2005. Top-down specialization for information and privacy preservation. In Proceedings of ICDE.
    • (2005) Proceedings of ICDE
    • Fung, B.C.M.1    Wang, K.2    Yu, P.S.3
  • 24
    • 33244463520 scopus 로고    scopus 로고
    • Privacy-enhancing k-anonymization of customer data
    • Zhong, S., Yang, Z., and Wright, R. N. 2005. Privacy-enhancing k-anonymization of customer data. In Proceedings of PODS, pp. 139–147.
    • (2005) Proceedings of PODS , pp. 139-147
    • Zhong, S.1    Yang, Z.2    Wright, R.N.3
  • 32
    • 0030333205 scopus 로고    scopus 로고
    • Replacing personally-identifying information in medical records, the scrub system
    • Sweeney, L. 1996. Replacing personally-identifying information in medical records, the scrub system. Journal of the American Informatics Association, 333–337.
    • (1996) Journal of the American Informatics Association , pp. 333-337
    • Sweeney, L.1
  • 33
    • 0344024833 scopus 로고    scopus 로고
    • Guaranteeing anonymity when sharing medical data, the datafly system
    • Sweeney, L. 1997. Guaranteeing anonymity when sharing medical data, the datafly system. In Proceedings of AMIA Annual Fall Symposium.
    • (1997) Proceedings Of
    • Sweeney, L.1
  • 34
    • 0036368242 scopus 로고    scopus 로고
    • A successful technique for removing names in pathology reports
    • Thomas, S. M., Mamlin, B., Schadow, G., and McDonald, C. 2002. A successful technique for removing names in pathology reports. In Proceedings of the Annual AMIA Symposium, pp. 777–781.
    • (2002) Proceedings of the Annual , pp. 777-781
    • Thomas, S.M.1    Mamlin, B.2    Schadow, G.3    McDonald, C.4
  • 35
    • 0036369895 scopus 로고    scopus 로고
    • Identification of patient name references within medical documents using semantic selectional restrictions
    • Taira, R. K., Bui, A. A., and Kangarloo, H. 2002. Identification of patient name references within medical documents using semantic selectional restrictions. In Proceedings of the AMIA Symposium.
    • (2002) Proceedings of the AMIA Symposium
    • Taira, R.K.1    Bui, A.A.2    Kangarloo, H.3
  • 36
    • 0942266011 scopus 로고    scopus 로고
    • Evaluation of a de-identification (De-id) software engine to share pathology reports and clinical documents for research
    • Gupta, D., Saul, M., and Gilbertson, J. 2004. Evaluation of a de-identification (De-id) software engine to share pathology reports and clinical documents for research. American Journal of Clinical Pathology 121(2):176–186.
    • (2004) American Journal of Clinical Pathology , vol.121 , Issue.2 , pp. 176-186
    • Gupta, D.1    Saul, M.2    Gilbertson, J.3
  • 38
    • 85057921906 scopus 로고    scopus 로고
    • Development and evaluation of an open source software tool for de-identification of pathology reports
    • Beckwith, B. A., Mahaadevan, R., Balis, U. J., and Kuo, F. 2006. Development and evaluation of an open source software tool for de-identification of pathology reports. BMC Medical Informatics and Decision Making 42(1):13–35.
    • (2006) BMC Medical Informatics and Decision Making , vol.42 , Issue.1 , pp. 13-35
    • Beckwith, B.A.1    Mahaadevan, R.2    Balis, U.J.3    Kuo, F.4
  • 43
    • 1142263341 scopus 로고    scopus 로고
    • Limiting privacy breaches in privacy preserving data mining
    • Evfimievski, A. V., Gehrke, J., and Srikant, R. 2003. Limiting privacy breaches in privacy preserving data mining. In Proceedings of PODS, pp. 211–222.
    • (2003) Proceedings of PODS , pp. 211-222
    • Evfimievski, A.V.1    Gehrke, J.2    Srikant, R.3
  • 45
    • 78149340011 scopus 로고    scopus 로고
    • On the privacy preserving properties of random data perturbation techniques
    • Kargupta, H., Datta, S., Wang, Q., and Sivakumar, K. 2003. On the privacy preserving properties of random data perturbation techniques. In Proceedings of the ICDM.
    • (2003) Proceedings of the ICDM
    • Kargupta, H.1    Datta, S.2    Wang, Q.3    Sivakumar, K.4
  • 47
    • 42149134082 scopus 로고    scopus 로고
    • Comparisons of k-anonymization and randomization schemes under linking attacks
    • Teng, Z., and Du, W. 2006. Comparisons of k-anonymization and randomization schemes under linking attacks. In Proceedings of the ICDM.
    • (2006) Proceedings of the ICDM
    • Teng, Z.1    Du, W.2
  • 48
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Lindell, Y., and Pinkas, B. 2002. Privacy preserving data mining. Journal of Cryptology 15(3):177–206.
    • (2002) Journal of Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 50
    • 4544361334 scopus 로고    scopus 로고
    • Privacy preserving data mining of association rules on horizontally partitioned data
    • Kantarcioglu, M., and Clifton, C. 2004. Privacy preserving data mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering 16(9):1026–1037.
    • (2004) IEEE Transactions on Knowledge and Data Engineering , vol.16 , Issue.9 , pp. 1026-1037
    • Kantarcioglu, M.1    Clifton, C.2
  • 53
    • 84880121624 scopus 로고    scopus 로고
    • Privacy-preserving classification of customer data without loss of accuracy
    • Yang, Z., Zhong, S., and Wright, R. N. 2005. Privacy-preserving classification of customer data without loss of accuracy. In Proceedings of SIAM SDM.
    • (2005) Proceedings of SIAM SDM
    • Yang, Z.1    Zhong, S.2    Wright, R.N.3
  • 54
    • 77952332120 scopus 로고    scopus 로고
    • Privacy-preserving fc-means clustering over vertically partitioned data
    • Vaidya, J., and Clifton, C. 2003. Privacy-preserving fc-means clustering over vertically partitioned data. In Proceedings of SIGKDD.
    • (2003) Proceedings of SIGKDD
    • Vaidya, J.1    Clifton, C.2
  • 64
    • 51849139562 scopus 로고    scopus 로고
    • Hide: An integrated system for health information de-identification
    • Gardner, J., and Xiong, L. 2008. HIDE: an integrated system for health information de-identification. In Proceedings of the IEEE CBMS.
    • (2008) Proceedings of the IEEE CBMS
    • Gardner, J.1    Xiong, L.2
  • 65
    • 71749103414 scopus 로고    scopus 로고
    • An integrated framework for anonymizing unstructured medical data
    • Gardner, J., and Xiong, L. 2009. An integrated framework for anonymizing unstructured medical data. Data and Knowledge Engineering (DKE), in press. Available online at doi:10.1016/j.datak.2009.07.006.
    • (2009) Data and Knowledge Engineering (DKE)
    • Gardner, J.1    Xiong, L.2
  • 67
    • 0038580808 scopus 로고    scopus 로고
    • Concept-match medical data scrubbing: How pathology text can be used in research
    • Berman, J. J. 2003. Concept-match medical data scrubbing: how pathology text can be used in research. Archives of Pathology and Laboratory Medicine 127(66):680–686.
    • (2003) Archives of Pathology and Laboratory Medicine , vol.127 , Issue.66 , pp. 680-686
    • Berman, J.J.1
  • 71
    • 23044454840 scopus 로고    scopus 로고
    • Secure multi-party computation. Working draft
    • Goldreich, O. 2001. Secure multi-party computation. Working Draft, Version 1.3.
    • (2001) Version , vol.1 , pp. 3
    • Goldreich, O.1
  • 72
    • 36048997303 scopus 로고    scopus 로고
    • A secure distributed framework for achieving k-anonymity
    • Jiang, W., and Clifton, C. 2006. A secure distributed framework for achieving k-anonymity. The VLDB Journal 15(4):316–333.
    • (2006) The VLDB Journal , vol.15 , Issue.4 , pp. 316-333
    • Jiang, W.1    Clifton, C.2
  • 79
    • 31344447750 scopus 로고    scopus 로고
    • Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
    • Liu, K., Kargupta, H., and Ryan, J. 2006. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Transactions on Knowledge and Data Engineering 18(1):92–106.
    • (2006) IEEE Transactions on Knowledge and Data Engineering , vol.18 , Issue.1 , pp. 92-106
    • Liu, K.1    Kargupta, H.2    Ryan, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.