-
1
-
-
84884917330
-
Information fusion: Methods and aggregation operators
-
Springer
-
V. Torra Information fusion: methods and aggregation operators Data Mining and Knowledge Discovery Handbook 2005 Springer 1005 1016
-
(2005)
Data Mining and Knowledge Discovery Handbook
, pp. 1005-1016
-
-
Torra, V.1
-
4
-
-
34748816024
-
Privacy-preserving data integration and sharing
-
C. Clifton, M. Kantarcioglu, A. Doan, G. Schadow, J. Vaidya, A. Elmagarmid, D. Suciu, Privacy-preserving data integration and sharing, in: Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, 2004, pp. 19-26.
-
(2004)
Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery
, pp. 19-26
-
-
Clifton, C.1
Kantarcioglu, M.2
Doan, A.3
Schadow, G.4
Vaidya, J.5
Elmagarmid, A.6
Suciu, D.7
-
5
-
-
33845429600
-
Toward a National Framework for the Secondary Use of Health Data: An American Medical Informatics Association White Paper
-
DOI 10.1197/jamia.M2273, PII S106750270600212X
-
C. Safran, M. Bloomrosen, W.E. Hammond, S. Labkoff, S. Markel-Fox, P.C. Tang, and D.E. Detmer Toward a national framework for the secondary use of health data: an American Medical Informatics Association white paper Journal of the American Medical Informatics Association 14 2007 1 9 (Pubitemid 44909487)
-
(2007)
Journal of the American Medical Informatics Association
, vol.14
, Issue.1
, pp. 1-9
-
-
Safran, C.1
Bloomrosen, M.2
Hammond, W.E.3
Labkoff, S.4
Markel-Fox, S.5
Tang, P.C.6
Detmer, D.E.7
-
7
-
-
2942522665
-
How (not) to protect genomic data privacy in a distributed network: Using trail re-identification to evaluate and design anonymity protection systems
-
DOI 10.1016/j.jbi.2004.04.005, PII S153204640400053X
-
B. Malin, and L. Sweeney How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems Journal of Biomedical Informatics 37 2004 179 192 (Pubitemid 38757792)
-
(2004)
Journal of Biomedical Informatics
, vol.37
, Issue.3
, pp. 179-192
-
-
Malin, B.1
Sweeney, L.2
-
9
-
-
84861641646
-
-
National Research Council, Protecting Individual Privacy in the Struggle Against Terrorists, The National Academies Press, Washington, DC
-
Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals, National Research Council, Protecting Individual Privacy in the Struggle Against Terrorists, The National Academies Press, Washington, DC, 2008.
-
(2008)
Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals
-
-
-
10
-
-
84861609093
-
Terrorist watchlist checks and air passenger prescreening
-
Congressional Research Service
-
W. Krouse, B. Elias, Terrorist watchlist checks and air passenger prescreening, Technical Report RL33645, Congressional Research Service, 2009.
-
(2009)
Technical Report RL33645
-
-
Krouse, W.1
Elias, B.2
-
11
-
-
84861641645
-
EU seeks privacy enforcement rights in US courts through diplomatic agreement
-
S. Fulton, EU seeks privacy enforcement rights in US courts through diplomatic agreement, International Business Times, 2010.
-
(2010)
International Business Times
-
-
Fulton, S.1
-
13
-
-
0031656168
-
Automatic record hash coding and linkage for epidemiological follow-up data confidentiality
-
C. Quantin, H. Bouzelat, F. Allaert, A. Benhamiche, J. Faivre, and L. Dusserre Automatic record hash coding and linkage for epidemiological follow-up data confidentiality Methods of Information in Medicine 1998 271 277 (Pubitemid 28450065)
-
(1998)
Methods of Information in Medicine
, vol.37
, Issue.3
, pp. 271-277
-
-
Quantin, C.1
Bouzelat, H.2
Allaert, F.A.3
Benhamiche, A.M.4
Faivre, J.5
Dusserre, L.6
-
14
-
-
1542374034
-
Zero-check: A zero-knowledge protocol for reconciling patient identities across institutions
-
J.J. Berman Zero-check: a zero-knowledge protocol for reconciling patient identities across institutions Archives of Pathology & Laboratory Medicine 128 2004 344 346 (Pubitemid 38316086)
-
(2004)
Archives of Pathology and Laboratory Medicine
, vol.128
, Issue.3
, pp. 344-346
-
-
Berman, J.J.1
-
15
-
-
1142303699
-
Information sharing across private databases
-
San Diego, CA
-
R. Agrawal, A. Evfimievski, R. Srikant, Information sharing across private databases, in: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, San Diego, CA, 2003, pp. 86-97.
-
(2003)
Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data
, pp. 86-97
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
16
-
-
0034431889
-
Evaluation of the encryption procedure and record linkage in the Belgian national cancer registry
-
E.V. Eycken, K. Haustermans, F. Buntinx, A. Ceuppens, J. Weyler, E. Wauters, H.V. Oyen, M.D. Schaever, D.V. den Berge, and M. Haelterman Evaluation of the encryption procedure and record linkage in the belgian national cancer registry Archives of Public Health 58 2000 281 294 (Pubitemid 32798834)
-
(2000)
Archives of Public Health
, vol.58
, Issue.6
, pp. 281-294
-
-
Van Eycken, E.1
Haustermans, K.2
Buntinx, F.3
Ceuppens, A.4
Weyler, J.5
Wauters, E.6
Van Oyen, H.7
De Schaever, M.8
Van Den Berge, D.9
Haelterman, M.10
-
17
-
-
0032032036
-
How to ensure data security of an epidemiological follow-up:Quality assessment of an anonymous record linkage procedure
-
DOI 10.1016/S1386-5056(98)00019-7, PII S1386505698000197, Common Security Solutions for Communicating Patient Data
-
C. Quantin, H. Bouzelat, F. Allaert, A. Benhamiche, J. Faivre, and L. Dusserre How to ensure data security of an epidemiological follow-up: quality assessment of an anonymous record linkage procedure International Journal of Medical Informatics 49 1998 117 122 (Pubitemid 28353812)
-
(1998)
International Journal of Medical Informatics
, vol.49
, Issue.1
, pp. 117-122
-
-
Quantin, C.1
Bouzelat, H.2
Allaert, F.A.A.3
Benhamiche, A.M.4
Faivre, J.5
Dusserre, L.6
-
18
-
-
3142719079
-
Enabling sovereign information sharing using web services
-
R. Agrawal, D. Asonov, R. Srikant, Enabling sovereign information sharing using web services, in: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, 2004, pp. 873-877.
-
(2004)
Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data
, pp. 873-877
-
-
Agrawal, R.1
Asonov, D.2
Srikant, R.3
-
19
-
-
0013331361
-
Real-world data is dirty: Data cleansing and the merge/purge problem
-
M.A. Hernández, and S.J. Stolfo Real-world data is dirty: data cleansing and the merge/purge problem Data Mining and Knowledge Discovery 2 1998 9 37 (Pubitemid 128696797)
-
(1998)
Data Mining and Knowledge Discovery
, vol.2
, Issue.1
, pp. 9-37
-
-
Hernandez, M.A.1
Stolfo, S.J.2
-
20
-
-
79952193624
-
Cryptography and Network Security: Principles and Practice
-
fifth ed.
-
W. Stallings, Cryptography and Network Security: Principles and Practice, fifth ed., Pearson Education, 2002, p. 86.
-
(2002)
Pearson Education
, pp. 86
-
-
Stallings, W.1
-
22
-
-
0033705124
-
A. Perrig, Practical techniques for searches on encrypted data
-
Oakland, CA
-
D.X. Song, D. Wagner, A. Perrig, Practical techniques for searches on encrypted data, in: Proceedings of the 2000 IEEE Symposium on Security and Privacy, b, Oakland, CA, 2000, p. 44.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 44
-
-
Song, D.X.1
Wagner, D.2
-
23
-
-
24344459318
-
Approximate string comparison and its effect on an advanced record linkage system
-
US Census Bureau
-
E.H. Porter, W.E. Winkler, Approximate string comparison and its effect on an advanced record linkage system, Research Report RR97/02, US Census Bureau, 1997.
-
(1997)
Research Report RR97/02
-
-
Porter, E.H.1
Winkler, W.E.2
-
24
-
-
34748904043
-
Record linkage: Making the most out of errors in linking variables
-
M. Tromp, J. Reitsma, A. Ravelli, N. Meray, G. Bonsel, Record linkage: making the most out of errors in linking variables, in: Proceedings of the American Medical Informatics Association Annual Symposium, 2006, pp. 779-783.
-
(2006)
Proceedings of the American Medical Informatics Association Annual Symposium
, pp. 779-783
-
-
Tromp, M.1
Reitsma, J.2
Ravelli, A.3
Meray, N.4
Bonsel, G.5
-
26
-
-
70349844175
-
Privacy-preserving string comparisons in record linkage systems: A review
-
S. Trepetin Privacy-preserving string comparisons in record linkage systems: a review Information Security Journal: A Global Perspective 17 2008 253 266
-
(2008)
Information Security Journal: A Global Perspective
, vol.17
, pp. 253-266
-
-
Trepetin, S.1
-
27
-
-
78049382188
-
Privacy-preserving record linkage
-
J. Domingo-Ferrer, E. Magkos, Lecture Notes in Computer Science Springer Berlin/Heidelberg
-
R. Hall, and S. Fienberg Privacy-preserving record linkage J. Domingo-Ferrer, E. Magkos, Privacy in Statistical Databases Lecture Notes in Computer Science vol. 6344 2011 Springer Berlin/Heidelberg 269 283
-
(2011)
Privacy in Statistical Databases
, vol.6344
, pp. 269-283
-
-
Hall, R.1
Fienberg, S.2
-
29
-
-
38549094551
-
Efficient privacy preserving distributed clustering based on secret sharing
-
Springer
-
S.V. Kaya, T.B. Pedersen, E. Savas,Y. Saygin, Efficient privacy preserving distributed clustering based on secret sharing, Lecture Notes in Computer Science, vol. 4819, Springer, pp. 280-291.
-
Lecture Notes in Computer Science
, vol.4819
, pp. 280-291
-
-
Kaya, S.V.1
Pedersen, T.B.2
Savas, E.3
Saygin, Y.4
-
30
-
-
34548668665
-
Privacy preserving clustering on horizontally partitioned data
-
DOI 10.1016/j.datak.2007.03.015, PII S0169023X0700047X
-
A. Inan, S. Kaya, Y. Saygin, E. Savas, A. Hintoglu, and A. Levi Privacy preserving clustering on horizontally partitioned data Data and Knowledge Engineering 63 2007 646 666 (Pubitemid 47418333)
-
(2007)
Data and Knowledge Engineering
, vol.63
, Issue.3
, pp. 646-666
-
-
Inan, A.1
Kaya, S.V.2
Saygin, Y.3
Savas, E.4
Hintoglu, A.A.5
Levi, A.6
-
31
-
-
33751069306
-
A secure protocol for computing string distance metrics
-
Brighton, England
-
P. Ravikumar, S.E. Fienberg, A secure protocol for computing string distance metrics, in: Proceedings of the IEEE Workshop on Privacy and Security Aspects of Data Mining, Brighton, England, 2004, pp. 40-46.
-
(2004)
Proceedings of the IEEE Workshop on Privacy and Security Aspects of Data Mining
, pp. 40-46
-
-
Ravikumar, P.1
Fienberg, S.E.2
-
33
-
-
0003897956
-
-
Master's thesis, Massachusetts Institute of Technology, Cambridge, Massachusetts
-
J.A. Hylton, Identifying and Merging Related Bibliographic Records, Master's thesis, Massachusetts Institute of Technology, Cambridge, Massachusetts, 1996.
-
(1996)
Identifying and Merging Related Bibliographic Records
-
-
Hylton, J.A.1
-
34
-
-
62249167366
-
Privacy-preserving fuzzy matching using a public reference table
-
Springer Berlin/Heidelberg
-
C. Pang, L. Gu, D. Hansen, and A. Maeder Privacy-preserving fuzzy matching using a public reference table Intelligent Patient Management vol. 189 2009 Springer Berlin/Heidelberg 71 89
-
(2009)
Intelligent Patient Management
, vol.189
, pp. 71-89
-
-
Pang, C.1
Gu, L.2
Hansen, D.3
Maeder, A.4
-
35
-
-
35448932873
-
Privacy preserving schema and data matching
-
DOI 10.1145/1247480.1247553, SIGMOD 2007: Proceedings of the ACM SIGMOD International Conference on Management of Data
-
M. Scannapieco, I. Figotin, E. Bertino, A. Elmagarmid, Privacy preserving schema and data matching, in: Proceedings of the ACM SIGMOD International Conference on Management of Data, Beijing, China, 2007, pp. 653-664. (Pubitemid 47630842)
-
(2007)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 653-664
-
-
Scannapieco, M.1
Figotin, I.2
Bertino, E.3
Elmagarmid, A.K.4
-
36
-
-
1642327704
-
Secure and private sequence comparisons
-
Washington, DC
-
M. Atallah, F. Kerschbaum, W. Du, Secure and private sequence comparisons, in: Proceedings of the ACM Workshop on Privacy in the Electronic Society, Washington, DC, 2003, pp. 39-44.
-
(2003)
Proceedings of the ACM Workshop on Privacy in the Electronic Society
, pp. 39-44
-
-
Atallah, M.1
Kerschbaum, F.2
Du, W.3
-
37
-
-
77951169671
-
Privacy preserving record linkage using phonetic codes
-
A. Karakasidis, V.S. Verykios, Privacy preserving record linkage using phonetic codes, in: Proceedings of the 4th Balkan Conference in Informatics, Thessaloniki, Greece, 2009, pp. 101-106.
-
(2009)
Proceedings of the 4th Balkan Conference in Informatics, Thessaloniki, Greece
, pp. 101-106
-
-
Karakasidis, A.1
Verykios, V.S.2
-
39
-
-
70449677016
-
Protocols for Secure Remote Database Access with Approximate Matching
-
Purdue University
-
W. Du, M.J. Atallah, Protocols for Secure Remote Database Access with Approximate Matching, Technical Report, CERIAS, Purdue University, 2001.
-
(2001)
Technical Report, CERIAS
-
-
Du, W.1
Atallah, M.J.2
-
40
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B.H. Bloom Space/time trade-offs in hash coding with allowable errors Communications of the ACM 13 1970 422 426
-
(1970)
Communications of the ACM
, vol.13
, pp. 422-426
-
-
Bloom, B.H.1
-
41
-
-
33644905483
-
Network applications of bloom filters: A survey
-
A. Broder, and M. Mitzenmacher Network applications of bloom filters: a survey Internet Mathematics 1 2002 636 646
-
(2002)
Internet Mathematics
, vol.1
, pp. 636-646
-
-
Broder, A.1
Mitzenmacher, M.2
-
44
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions and reversals
-
V.I. Levenshtein Binary codes capable of correcting deletions, insertions and reversals Soviet Physics Doklady 10 1966 707
-
(1966)
Soviet Physics Doklady
, vol.10
, pp. 707
-
-
Levenshtein, V.I.1
-
47
-
-
0036371278
-
Analysis of identifier performance using a deterministic linkage algorithm
-
San Antonio, TX
-
S.J. Grannis, J.M. Overhage, C.J. McDonald, Analysis of identifier performance using a deterministic linkage algorithm, in: Proceedings of the American Medical Informatics Association Annual Symposium, San Antonio, TX, 2002, pp. 305-309.
-
(2002)
Proceedings of the American Medical Informatics Association Annual Symposium
, pp. 305-309
-
-
Grannis, S.J.1
Overhage, J.M.2
McDonald, C.J.3
-
48
-
-
11144240583
-
A comparison of string distance metrics for name-matching tasks
-
Mexico
-
W.W. Cohen, P. Ravikumar, S.E. Fienberg, A comparison of string distance metrics for name-matching tasks, in: Proceedings of IJCAI-03 Workshop on Information Integration, Acapulco, Mexico, 2003, pp. 73-78.
-
(2003)
Proceedings of IJCAI-03 Workshop on Information Integration, Acapulco
, pp. 73-78
-
-
Cohen, W.W.1
Ravikumar, P.2
Fienberg, S.E.3
-
49
-
-
69549083553
-
Real world performance of approximate string comparators for use in patient matching
-
San Francisco, CA
-
S.J. Grannis, J.M. Overhage, C. McDonald, Real world performance of approximate string comparators for use in patient matching, in: Proceedings of Medinfo, San Francisco, CA, 2004, pp. 43-47.
-
(2004)
Proceedings of Medinfo
, pp. 43-47
-
-
Grannis, S.J.1
Overhage, J.M.2
McDonald, C.3
-
50
-
-
16544379030
-
Analysis of a probabilistic record linkage technique without human review
-
Washington, DC
-
S.J. Grannis, J.M. Overhage, S. Hui, C.J. McDonald, Analysis of a probabilistic record linkage technique without human review, in: Proceedings of the American Medical Informatics Association Annual Symposium, Washington, DC, 2003, pp. 259-263.
-
(2003)
Proceedings of the American Medical Informatics Association Annual Symposium
, pp. 259-263
-
-
Grannis, S.J.1
Overhage, J.M.2
Hui, S.3
McDonald, C.J.4
-
52
-
-
33846411033
-
Using the em algorithm for weight computation in the Fellegi-Sunter model of record linkage
-
US Census Bureau
-
W.E. Winkler, Using the EM algorithm for weight computation in the Fellegi-Sunter model of record linkage, Research Report RR00/05, US Census Bureau, 2000.
-
(2000)
Research Report RR00/05
-
-
Winkler, W.E.1
-
54
-
-
85055359400
-
Measuring the disclosure protection of micro aggregated business microdata. An analysis taking as an example the german structure of costs survey
-
R. Lenz Measuring the disclosure protection of micro aggregated business microdata. An analysis taking as an example the german structure of costs survey Journal of Official Statistics 22 2006 681 710
-
(2006)
Journal of Official Statistics
, vol.22
, pp. 681-710
-
-
Lenz, R.1
-
56
-
-
67650700151
-
Accurate synthetic generation of realistic personal information
-
Bangkok, Thailand
-
P. Christen, A. Pudjijono, Accurate synthetic generation of realistic personal information, in: Proceedings of the 13th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, Bangkok, Thailand, 2009, pp. 507-514.
-
(2009)
Proceedings of the 13th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining
, pp. 507-514
-
-
Christen, P.1
Pudjijono, A.2
-
57
-
-
84910067661
-
-
last accessed 02.06.10
-
Massmind Nicknames Database. < http://techref.massmind.org/techref/ ecommerce/nicknames.htm > (last accessed 02.06.10).
-
Massmind Nicknames Database
-
-
-
58
-
-
84861583198
-
-
US Census Bureau, Population Division. < > (last accessed 02.06.10)
-
US Census Bureau, Population Division. < http://www.census.gov/ genealogy/names/names-files.html > (last accessed 02.06.10).
-
-
-
-
59
-
-
0037198576
-
An empirical comparison of record linkage procedures
-
DOI 10.1002/sim.1147
-
S. Gomatam, R. Carter, M. Ariet, and G. Mitchell An empirical comparison of record linkage procedures Statistics in Medicine 21 2002 1485 1496 (Pubitemid 34495613)
-
(2002)
Statistics in Medicine
, vol.21
, Issue.10
, pp. 1485-1496
-
-
Gomatam, S.1
Carter, R.2
Ariet, M.3
Mitchell, G.4
-
61
-
-
84964941330
-
Private medical record linkage with approximate matching
-
E. Durham, Y. Xue, M. Kantarcioglu, B. Malin, Private medical record linkage with approximate matching, in: Proceedings of the American Medical Informatics Association Annual Symposium, 2010.
-
(2010)
Proceedings of the American Medical Informatics Association Annual Symposium
-
-
Durham, E.1
Xue, Y.2
Kantarcioglu, M.3
Malin, B.4
-
62
-
-
5444258997
-
A comparison of fast blocking methods for record linkage
-
Washington, DC
-
R. Baxter, P. Christen, T. Churches, A comparison of fast blocking methods for record linkage, in: Proceedings of the ACM SIGKDD Workshop on Data Cleaning, Record Linkage and Object Consolidation, Washington, DC, 2003, pp. 25 - 27.
-
(2003)
Proceedings of the ACM SIGKDD Workshop on Data Cleaning, Record Linkage and Object Consolidation
, pp. 25-27
-
-
Baxter, R.1
Christen, P.2
Churches, T.3
-
63
-
-
77952259855
-
Blocking-aware private record linkage
-
Baltimore, MD
-
A. Al-Lawati, D. Lee, P. McDaniel, Blocking-aware private record linkage, in: Proceedings of the International Workshop on Information Quality in Information Systems, Baltimore, MD, 2005, pp. 59-68.
-
(2005)
Proceedings of the International Workshop on Information Quality in Information Systems
, pp. 59-68
-
-
Al-Lawati, A.1
Lee, D.2
McDaniel, P.3
-
65
-
-
77952279809
-
Private record matching using differential privacy
-
ACM New York, NY, USA
-
A. Inan, M. Kantarcioglu, G. Ghinita, and E. Bertino Private record matching using differential privacy Proceedings of the 13th International Conference on Extending Database Technology, EDBT '10 2010 ACM New York, NY, USA 123 134
-
(2010)
Proceedings of the 13th International Conference on Extending Database Technology, EDBT '10
, pp. 123-134
-
-
Inan, A.1
Kantarcioglu, M.2
Ghinita, G.3
Bertino, E.4
|