-
1
-
-
77954718437
-
Privacy-Preserving Data Publishing
-
B.-C. Chen, D. Kifer, K. LeFevre, and A. Machanavajjhala, "Privacy-Preserving Data Publishing," Found. Trends databases, vol. 2, no. 1-2, pp. 1-167, 2009.
-
(2009)
Found. Trends Databases
, vol.2
, pp. 1-167
-
-
Chen, B.-C.1
Kifer, D.2
Lefevre, K.3
Machanavajjhala, A.4
-
2
-
-
0012793677
-
Towards a methodology for statistical disclosure control
-
T. Dalenius, "Towards a methodology for statistical disclosure control," Statistik Tidskrift, vol. 15, no. 429-444, pp. 2-1, 1977.
-
(1977)
Statistik Tidskrift
, vol.15
, Issue.429-444
, pp. 1-2
-
-
Dalenius, T.1
-
3
-
-
33746335051
-
Differential Privacy
-
M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg
-
C. Dwork, "Differential Privacy," in Automata, Languages and Programming, vol. 4052, M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006, pp. 1-12.
-
(2006)
Automata, Languages and Programming
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
4
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. Mcsherry, K. Nissim, and A. Smith, "Calibrating noise to sensitivity in private data analysis," in Lecture notes in computer science, pp. 265-284, 2006.
-
(2006)
Lecture Notes In Computer Science
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
5
-
-
56749152260
-
How Protective Are Synthetic Data?
-
Berlin, Heidelberg
-
J. M. Abowd and L. Vilhuber, "How Protective Are Synthetic Data?," in Proceedings of the UNESCO Chair in data privacy international conference on Privacy in Statistical Databases, Berlin, Heidelberg, 2008, pp. 239-246.
-
(2008)
Proceedings of the UNESCO Chair In Data Privacy International Conference On Privacy In Statistical Databases
, pp. 239-246
-
-
Abowd, J.M.1
Vilhuber, L.2
-
7
-
-
79953250055
-
Evaluating Laplace Noise Addition to Satisfy Differential Privacy for Numeric Data
-
R. Sarathy and K. Muralidhar, "Evaluating Laplace Noise Addition to Satisfy Differential Privacy for Numeric Data," Transactions on Data Privacy, vol. 4, no. 1, pp. 1-17, 2011.
-
(2011)
Transactions On Data Privacy
, vol.4
, Issue.1
, pp. 1-17
-
-
Sarathy, R.1
Muralidhar, K.2
-
8
-
-
46749128577
-
Mechanism Design via Differential Privacy
-
Washington, DC, USA
-
F. McSherry and K. Talwar, "Mechanism Design via Differential Privacy," in Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, Washington, DC, USA, 2007, pp. 94-103.
-
(2007)
Proceedings of the 48th Annual IEEE Symposium On Foundations of Computer Science
, pp. 94-103
-
-
McSherry, F.1
Talwar, K.2
-
10
-
-
79959540412
-
Differential privacy via wavelet transforms
-
X. Xiao, G. Wang, and J. Gehrke, "Differential privacy via wavelet transforms," Knowledge and Data Engineering, IEEE Transactions on, vol. 23, no. 8, pp. 1200-1214, 2011.
-
(2011)
Knowledge and Data Engineering, IEEE Transactions On
, vol.23
, Issue.8
, pp. 1200-1214
-
-
Xiao, X.1
Wang, G.2
Gehrke, J.3
-
11
-
-
84874886418
-
Provably private data anonymization: Or, k-anonymity meets differential privacy
-
abs/1101
-
N. Li, W. H. Qardaji, and D. Su, "Provably private data anonymization: Or, k-anonymity meets differential privacy," CoRR, abs/1101.2604, 2011.
-
(2011)
CoRR
, pp. 2604
-
-
Li, N.1
Qardaji, W.H.2
Su, D.3
-
13
-
-
80054806723
-
How Much Is Enough? Choosing epsilon for Differential Privacy
-
X. Lai, J. Zhou, and H. Li, Eds. Springer Berlin/Heidelberg
-
J. Lee and C. Clifton, "How Much Is Enough? Choosing epsilon for Differential Privacy," in Information Security, vol. 7001, X. Lai, J. Zhou, and H. Li, Eds. Springer Berlin/Heidelberg, 2011, pp. 325-340.
-
(2011)
Information Security
, vol.7001
, pp. 325-340
-
-
Lee, J.1
Clifton, C.2
-
14
-
-
77954693385
-
The price of privately releasing contingency tables and the spectra of random matrices with correlated rows
-
New York, NY, USA
-
S. P. Kasiviswanathan, M. Rudelson, A. Smith, and J. Ullman, "The price of privately releasing contingency tables and the spectra of random matrices with correlated rows," in Proceedings of the 42nd ACM symposium on Theory of computing, New York, NY, USA, 2010, pp. 775-784.
-
(2010)
Proceedings of the 42nd ACM Symposium On Theory of Computing
, pp. 775-784
-
-
Kasiviswanathan, S.P.1
Rudelson, M.2
Smith, A.3
Ullman, J.4
-
15
-
-
84866008575
-
Differential identifiability
-
New York, NY, USA
-
J. Lee and C. Clifton, "Differential identifiability," in Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, New York, NY, USA, 2012, pp. 1041-1049.
-
(2012)
Proceedings of the 18th ACM SIGKDD International Conference On Knowledge Discovery and Data Mining
, pp. 1041-1049
-
-
Lee, J.1
Clifton, C.2
-
17
-
-
77954745685
-
Interactive privacy via the median mechanism
-
New York, NY, USA
-
A. Roth and T. Roughgarden, "Interactive privacy via the median mechanism," in Proceedings of the 42nd ACM symposium on Theory of computing, New York, NY, USA, 2010, pp. 765-774.
-
(2010)
Proceedings of the 42nd ACM Symposium On Theory of Computing
, pp. 765-774
-
-
Roth, A.1
Roughgarden, T.2
-
18
-
-
84863733988
-
An adaptive mechanism for accurate query answering under differential privacy
-
C. Li and G. Miklau, "An adaptive mechanism for accurate query answering under differential privacy," Proceedings of the VLDB Endowment, vol. 5, no. 6, pp. 514-525, 2012.
-
(2012)
Proceedings of the VLDB Endowment
, vol.5
, Issue.6
, pp. 514-525
-
-
Li, C.1
Miklau, G.2
-
19
-
-
57049136138
-
A learning theory approach to noninteractive database privacy
-
New York, NY, USA
-
A. Blum, K. Ligett, and A. Roth, "A learning theory approach to noninteractive database privacy," in Proceedings of the 40th annual ACM symposium on Theory of computing, New York, NY, USA, 2008, pp. 609-618.
-
(2008)
Proceedings of the 40th Annual ACM Symposium On Theory of Computing
, pp. 609-618
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
20
-
-
78649814930
-
Differentially private data release through multidimensional partitioning
-
Y. Xiao, L. Xiong, and C. Yuan, "Differentially private data release through multidimensional partitioning," Secure Data Management, pp. 150-168, 2010.
-
(2010)
Secure Data Management
, pp. 150-168
-
-
Xiao, Y.1
Xiong, L.2
Yuan, C.3
-
21
-
-
84979279259
-
-
ArXiv:1103.0825, Mar
-
G. Cormode, M. Procopiuc, D. Srivastava, and T. T. L. Tran, "Differentially Private Publication of Sparse Data," ArXiv:1103.0825, Mar. 2011.
-
(2011)
Differentially Private Publication of Sparse Data
-
-
Cormode, G.1
Procopiuc, M.2
Srivastava, D.3
Tran, T.T.L.4
-
22
-
-
79959954388
-
Differentially private data cubes: Optimizing noise sources and consistency
-
New York, NY, USA
-
B. Ding, M. Winslett, J. Han, and Z. Li, "Differentially private data cubes: optimizing noise sources and consistency," in Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, New York, NY, USA, 2011, pp. 217-228.
-
(2011)
Proceedings of the 2011 ACM SIGMOD International Conference On Management of Data
, pp. 217-228
-
-
Ding, B.1
Winslett, M.2
Han, J.3
Li, Z.4
-
24
-
-
80955157833
-
Compressive mechanism: Utilizing sparse representation in differential privacy
-
Y. D. Li, Z. Zhang, M. Winslett, and Y. Yang, "Compressive mechanism: Utilizing sparse representation in differential privacy," in Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011, pp. 177-182.
-
(2011)
Proceedings of the 10th Annual ACM Workshop On Privacy In the Electronic Society
, pp. 177-182
-
-
Li, Y.D.1
Zhang, Z.2
Winslett, M.3
Yang, Y.4
-
25
-
-
84877040185
-
Non-Interactive Differential Privacy: A Survey
-
Nantes, France
-
D. Leoni, "Non-Interactive Differential Privacy: a Survey," in Proc. of 1st Int. Workshop on Open Data, Nantes, France, 2012.
-
(2012)
Proc. of 1st Int. Workshop On Open Data
-
-
Leoni, D.1
-
27
-
-
84877078318
-
Fast Private Data Release Algorithms for Sparse Queries
-
Nov
-
A. Blum and A. Roth, "Fast Private Data Release Algorithms for Sparse Queries," CORD Conference Proceedings, Nov. 2011.
-
(2011)
CORD Conference Proceedings
-
-
Blum, A.1
Roth, A.2
-
28
-
-
1142275486
-
Revealing information while preserving privacy
-
New York, NY, USA
-
I. Dinur and K. Nissim, "Revealing information while preserving privacy," in Proceedings of the twenty-second ACM SIGMOD-SIGACTSIGART symposium on Principles of database systems, New York, NY, USA, 2003, pp. 202-210.
-
(2003)
Proceedings of the Twenty-second ACM SIGMOD-SIGACTSIGART Symposium On Principles of Database Systems
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
29
-
-
70350689921
-
On the complexity of differentially private data release: Efficient algorithms and hardness results
-
New York, NY, USA
-
C. Dwork, M. Naor, O. Reingold, G. N. Rothblum, and S. Vadhan, "On the complexity of differentially private data release: efficient algorithms and hardness results," in Proceedings of the 41st annual ACM symposium on Theory of computing, New York, NY, USA, 2009, pp. 381-390.
-
(2009)
Proceedings of the 41st Annual ACM Symposium On Theory of Computing
, pp. 381-390
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Rothblum, G.N.4
Vadhan, S.5
-
30
-
-
77954715960
-
Optimizing linear counting queries under differential privacy
-
New York, NY, USA
-
C. Li, M. Hay, V. Rastogi, G. Miklau, and A. McGregor, "Optimizing linear counting queries under differential privacy," in Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, New York, NY, USA, 2010, pp. 123-134.
-
(2010)
Proceedings of the Twenty-ninth ACM SIGMOD-SIGACT-SIGART Symposium On Principles of Database Systems
, pp. 123-134
-
-
Li, C.1
Hay, M.2
Rastogi, V.3
Miklau, G.4
McGregor, A.5
-
31
-
-
78751489078
-
A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis
-
Los Alamitos, CA, USA
-
M. Hardt and G. N. Rothblum, "A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis," in Foundations of Computer Science, IEEE Annual Symposium on, Los Alamitos, CA, USA, 2010, vol. 0, pp. 61-70.
-
(2010)
Foundations of Computer Science, IEEE Annual Symposium On
, vol.0
, pp. 61-70
-
-
Hardt, M.1
Rothblum, G.N.2
-
32
-
-
80052663001
-
Differentially private data release for data mining
-
New York, NY, USA
-
N. Mohammed, R. Chen, B. C. M. Fung, and P. S. Yu, "Differentially private data release for data mining," in Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, New York, NY, USA, 2011, pp. 493-501.
-
(2011)
Proceedings of the 17th ACM SIGKDD International Conference On Knowledge Discovery and Data Mining
, pp. 493-501
-
-
Mohammed, N.1
Chen, R.2
Fung, B.C.M.3
Yu, P.S.4
-
33
-
-
35448955720
-
Privacy, accuracy, and consistency too: A holistic solution to contingency table release
-
New York, NY, USA
-
B. Barak, K. Chaudhuri, C. Dwork, S. Kale, F. McSherry, and K. Talwar, "Privacy, accuracy, and consistency too: a holistic solution to contingency table release," in Proceedings of the twenty-sixth ACM SIGMOD-SIGACTSIGART symposium on Principles of database systems, New York, NY, USA, 2007, pp. 273-282.
-
(2007)
Proceedings of the Twenty-sixth ACM SIGMOD-SIGACTSIGART Symposium On Principles of Database Systems
, pp. 273-282
-
-
Barak, B.1
Chaudhuri, K.2
Dwork, C.3
Kale, S.4
McSherry, F.5
Talwar, K.6
-
34
-
-
78049389308
-
Differential privacy and the riskutility tradeoff for multi-dimensional contingency tables
-
Berlin, Heidelberg
-
S. E. Fienberg, A. Rinaldo, and X. Yang, "Differential privacy and the riskutility tradeoff for multi-dimensional contingency tables," in Proceedings of the 2010 international conference on Privacy in statistical databases, Berlin, Heidelberg, 2010, pp. 187-199.
-
(2010)
Proceedings of the 2010 International Conference On Privacy In Statistical Databases
, pp. 187-199
-
-
Fienberg, S.E.1
Rinaldo, A.2
Yang, X.3
-
36
-
-
77950916549
-
A Survey of Statistical Approaches to Preserving Confidentiality of Contingency Table Entries
-
C. C. Aggarwal and P. S. Yu, Eds. Boston, MA: Springer US
-
S. E. Fienberg and A. B. Slavkovic, "A Survey of Statistical Approaches to Preserving Confidentiality of Contingency Table Entries," in Privacy-Preserving Data Mining, vol. 34, C. C. Aggarwal and P. S. Yu, Eds. Boston, MA: Springer US, 2008, pp. 291-312.
-
(2008)
Privacy-Preserving Data Mining
, vol.34
, pp. 291-312
-
-
Fienberg, S.E.1
Slavkovic, A.B.2
-
37
-
-
56749093371
-
Albebraic Statistics and Contingency Table Problems: Log-Linear Models, Likelihood Estimation, and Disclosure Limitation
-
A. Dobra, S. E. Fienberg, A. Rinaldo, A. Slavkovic, and Y. Zhou, "Albebraic Statistics and Contingency Table Problems: Log-Linear Models, Likelihood Estimation, and Disclosure Limitation," Emerging applications of algebraic geometry, pp. 1-26, 2009.
-
(2009)
Emerging Applications of Algebraic Geometry
, pp. 1-26
-
-
Dobra, A.1
Fienberg, S.E.2
Rinaldo, A.3
Slavkovic, A.4
Zhou, Y.5
-
38
-
-
84861595370
-
Publishing Set-Valued Data via Differential Privacy
-
R. Chen, N. Mohammed, B. C. M. Fung, B. C. Desai, and L. Xiong, "Publishing Set-Valued Data via Differential Privacy.," PVLDB, vol. 4, no. 11, pp. 1087-1098, 2011.
-
(2011)
PVLDB
, vol.4
, Issue.11
, pp. 1087-1098
-
-
Chen, R.1
Mohammed, N.2
Fung, B.C.M.3
Desai, B.C.4
Xiong, L.5
-
39
-
-
34047165799
-
Anonymizing classification data for privacy preservation
-
B. C. M. Fung, K. Wang, and P. S. Yu, "Anonymizing classification data for privacy preservation," IEEE Transactions on Knowledge and Data Engineering, vol. 19, p. 2007, 2007.
-
(2007)
IEEE Transactions On Knowledge and Data Engineering
, vol.19
, pp. 2007
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
41
-
-
78649824255
-
-
ArXiv:0904.0682, Apr
-
M. Goetz, A. Machanavajjhala, G. Wang, X. Xiao, and J. Gehrke, "Privacy in Search Logs," ArXiv:0904.0682, Apr. 2009.
-
(2009)
Privacy in Search Logs
-
-
Goetz, M.1
Machanavajjhala, A.2
Wang, G.3
Xiao, X.4
Gehrke, J.5
-
42
-
-
84865663496
-
Releasing search queries and clicks privately
-
A. Korolova, K. Kenthapadi, N. Mishra, and A. Ntoulas, "Releasing search queries and clicks privately," in Proceedings of the 18th international conference on World wide web, 2009, pp. 171-180.
-
(2009)
Proceedings of the 18th International Conference On World Wide Web
, pp. 171-180
-
-
Korolova, A.1
Kenthapadi, K.2
Mishra, N.3
Ntoulas, A.4
-
45
-
-
77952279809
-
Private record matching using differential privacy
-
New York, NY, USA
-
A. Inan, M. Kantarcioglu, G. Ghinita, and E. Bertino, "Private record matching using differential privacy," in Proceedings of the 13th International Conference on Extending Database Technology, New York, NY, USA, 2010, pp. 123-134.
-
(2010)
Proceedings of the 13th International Conference On Extending Database Technology
, pp. 123-134
-
-
Inan, A.1
Kantarcioglu, M.2
Ghinita, G.3
Bertino, E.4
-
46
-
-
70350700899
-
Private coresets
-
D. Feldman, A. Fiat, H. Kaplan, and K. Nissim, "Private coresets," in Proceedings of the 41st annual ACM symposium on Theory of computing, 2009, pp. 361-370.
-
(2009)
Proceedings of the 41st Annual ACM Symposium On Theory of Computing
, pp. 361-370
-
-
Feldman, D.1
Fiat, A.2
Kaplan, H.3
Nissim, K.4
-
47
-
-
41849095625
-
An ad omnia approach to defining and achieving private data analysis
-
C. Dwork, "An ad omnia approach to defining and achieving private data analysis," in Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD, 2007, pp. 1-13.
-
(2007)
Proceedings of the 1st ACM SIGKDD International Conference On Privacy, Security, and Trust In KDD
, pp. 1-13
-
-
Dwork, C.1
-
48
-
-
78049388338
-
Does Differential Privacy Protect Terry Gross' Privacy?
-
J. Domingo-Ferrer and E. Magkos, Eds. Springer Berlin/Heidelberg
-
K. Muralidhar and R. Sarathy, "Does Differential Privacy Protect Terry Gross' Privacy?," in Privacy in Statistical Databases, vol. 6344, J. Domingo-Ferrer and E. Magkos, Eds. Springer Berlin/Heidelberg, 2011, pp. 200-209.
-
(2011)
Privacy In Statistical Databases
, vol.6344
, pp. 200-209
-
-
Muralidhar, K.1
Sarathy, R.2
-
49
-
-
83055187003
-
Cloning for privacy protection in multiple independent data publications
-
New York, NY, USA
-
M. M. Baig, J. Li, J. Liu, and H. Wang, "Cloning for privacy protection in multiple independent data publications," in Proceedings of the 20th ACM international conference on Information and knowledge management, New York, NY, USA, 2011, pp. 885-894.
-
(2011)
Proceedings of the 20th ACM International Conference On Information and Knowledge Management
, pp. 885-894
-
-
Baig, M.M.1
Li, J.2
Liu, J.3
Wang, H.4
-
50
-
-
79960976226
-
Risk-Utility Paradigms for Statistical Disclosure Limitation: How to Think, But Not How to Act-Discussion: A Science of Statistical Disclosure Limitation
-
J. Domingo-Ferrer, "Risk-Utility Paradigms for Statistical Disclosure Limitation: How to Think, But Not How to Act-Discussion: A Science of Statistical Disclosure Limitation," International Statistical Review, vol. 79, no. 2, pp. 184-186, 2011.
-
(2011)
International Statistical Review
, vol.79
, Issue.2
, pp. 184-186
-
-
-
51
-
-
78049411255
-
Some Additional Insights on Applying Differential Privacy for Numeric Data
-
J. Domingo-Ferrer and E. Magkos, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg
-
R. Sarathy and K. Muralidhar, "Some Additional Insights on Applying Differential Privacy for Numeric Data," in Privacy in Statistical Databases, vol. 6344, J. Domingo-Ferrer and E. Magkos, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 210-219.
-
(2010)
Privacy In Statistical Databases
, vol.6344
, pp. 210-219
-
-
Sarathy, R.1
Muralidhar, K.2
-
52
-
-
84877019725
-
-
M. yin
-
M. yin, "http://blog.myplaceinthecrowd.org/2010/05/26/recap-and-proposal-955-the-statistically-insignificant-privacy-guarantee/." 2010.
-
(2010)
-
-
-
53
-
-
84864197091
-
Differentially private spatial decompositions
-
G. Cormode, C. Procopiuc, D. Srivastava, E. Shen, and T. Yu, "Differentially private spatial decompositions," in Data Engineering (ICDE), 2012 IEEE 28th International Conference on, 2012, pp. 20-31.
-
(2012)
Data Engineering (ICDE), 2012 IEEE 28th International Conference On
, pp. 20-31
-
-
Cormode, G.1
Procopiuc, C.2
Srivastava, D.3
Shen, E.4
Yu, T.5
-
56
-
-
85075489334
-
Privacy-Preserving Aggregation of Time-Series Data
-
T.-H. H. C. Elaine Shi, "Privacy-Preserving Aggregation of Time-Series Data.," NDSS, 2011.
-
(2011)
NDSS
-
-
Elaine, S.T.-H.H.C.1
-
57
-
-
84886641482
-
Secured histories: Computing group statistics on encrypted data while preserving individual privacy
-
E. Rieffel, J. Biehl, W. van Melle, and A. J. Lee, "Secured histories: computing group statistics on encrypted data while preserving individual privacy," ArXiv preprint arXiv:1012.2152, 2010.
-
(2010)
ArXiv Preprint ArXiv
, vol.1012
, pp. 2152
-
-
Rieffel, E.1
Biehl, J.2
van Melle, W.3
Lee, A.J.4
-
58
-
-
84863508974
-
Estimating the reidentification risk of clinical data sets
-
Jul
-
F. Dankar, K. E. Emam, A. Neisa, and T. Roffey, "Estimating the reidentification risk of clinical data sets," BMC Medical Informatics and Decision Making, vol. 12, no. 1, p. 66, Jul. 2012.
-
(2012)
BMC Medical Informatics and Decision Making
, vol.12
, Issue.1
, pp. 66
-
-
Dankar, F.1
Emam, K.E.2
Neisa, A.3
Roffey, T.4
-
59
-
-
80052038363
-
De-identifying a Public Use Microdata File from the Canadian National Discharge Abstract Database
-
K. El Emam, D. Paton, F. Dankar, and G. Koru, "De-identifying a Public Use Microdata File from the Canadian National Discharge Abstract Database," BMC Medical Informatics and Decision Making, vol. 11, no. 53, 2011.
-
(2011)
BMC Medical Informatics and Decision Making
, vol.11
, Issue.53
-
-
El Emam, K.1
Paton, D.2
Dankar, F.3
Koru, G.4
-
60
-
-
69549114557
-
A Globally Optimal k-Anonymity Method for the Deidentification of Health Data
-
K. El Emam, F. Dankar, R. Issa, E. Jonker, D. Amyot, E. Cogo, J.-P. Corriveau, M. Walker, S. Chowdhury, R. Vaillancourt, T. Roffey, and J. Bottomley, "A Globally Optimal k-Anonymity Method for the Deidentification of Health Data," Journal of the American Medical Informatics Association, vol. 16, no. 5, pp. 670-682, 2009.
-
(2009)
Journal of the American Medical Informatics Association
, vol.16
, Issue.5
, pp. 670-682
-
-
El Emam, K.1
Dankar, F.2
Issa, R.3
Jonker, E.4
Amyot, D.5
Cogo, E.6
Corriveau, J.-P.7
Walker, M.8
Chowdhury, S.9
Vaillancourt, R.10
Roffey, T.11
Bottomley, J.12
-
61
-
-
69549117388
-
Evaluating Patient Re-identification Risk from Hospital Prescription Records
-
K. El Emam, F. Dankar, R. Vaillancourt, T. Roffey, and M. Lysyk, "Evaluating Patient Re-identification Risk from Hospital Prescription Records," Canadian Journal of Hospital Pharmacy, vol. 62, no. 4, pp. 307-319, 2009.
-
(2009)
Canadian Journal of Hospital Pharmacy
, vol.62
, Issue.4
, pp. 307-319
-
-
El Emam, K.1
Dankar, F.2
Vaillancourt, R.3
Roffey, T.4
Lysyk, M.5
-
63
-
-
84863614598
-
A Protocol for the Secure Linking of Registries for HPV Surveillance
-
K. El Emam, J. Hu, S. Samet, L. Peyton, C. Earle, G. Jayaraman, T. Wong, M. Kantarcioglu, and F. Dankar, "A Protocol for the Secure Linking of Registries for HPV Surveillance," PLoS ONE, vol. 7, no. 7, 2012.
-
(2012)
PLoS ONE
, vol.7
, Issue.7
-
-
El Emam, K.1
Hu, J.2
Samet, S.3
Peyton, L.4
Earle, C.5
Jayaraman, G.6
Wong, T.7
Kantarcioglu, M.8
Dankar, F.9
-
64
-
-
49249103738
-
Protecting Privacy Using k-Anonymity
-
K. El Emam and F. K. Dankar, "Protecting Privacy Using k-Anonymity," J Am Med Inform Assoc, vol. 15, no. 5, pp. 627-637, 2008.
-
(2008)
J Am Med Inform Assoc
, vol.15
, Issue.5
, pp. 627-637
-
-
El Emam, K.1
Dankar, F.K.2
-
65
-
-
79958039212
-
Physician privacy concerns when disclosing patient data for public health purposes during a pandemic influenza outbreak
-
Jun
-
K. E. Emam, J. Mercer, K. Moreau, I. Grava-Gubins, D. Buckeridge, and E. Jonker, "Physician privacy concerns when disclosing patient data for public health purposes during a pandemic influenza outbreak," BMC Public Health, vol. 11, no. 1, p. 454, Jun. 2011.
-
(2011)
BMC Public Health
, vol.11
, Issue.1
, pp. 454
-
-
Emam, K.E.1
Mercer, J.2
Moreau, K.3
Buckeridge, D.4
Jonker, E.5
-
66
-
-
60549085042
-
Evaluating predictors of geographic area population size cut-offs to manage re-identification risk
-
K. El Emam, A. Brown, and P. AbdelMalik, "Evaluating predictors of geographic area population size cut-offs to manage re-identification risk," Journal of the American Medical Informatics Association, vol. 16, no. 2, pp. 256-266, 2009.
-
(2009)
Journal of the American Medical Informatics Association
, vol.16
, Issue.2
, pp. 256-266
-
-
El Emam, K.1
Brown, A.2
Abdelmalik, P.3
-
67
-
-
49249087521
-
Heuristics for de-identifying health data
-
K. El Emam, "Heuristics for de-identifying health data," IEEE Security and Privacy, pp. 72-75, 2008.
-
(2008)
IEEE Security and Privacy
, pp. 72-75
-
-
El Emam, K.1
-
70
-
-
84855549380
-
Reinventing clinical trials
-
Jan
-
M. Allison, "Reinventing clinical trials," Nature Biotechnology, vol. 30, no. 1, pp. 41-49, Jan. 2012.
-
(2012)
Nature Biotechnology
, vol.30
, Issue.1
, pp. 41-49
-
-
Allison, M.1
-
72
-
-
58849156962
-
Clinical Trials: The Muddled Canadian Landscape
-
Jan
-
A. Silversides, "Clinical Trials: The Muddled Canadian Landscape," CMAJ, vol. 180, no. 1, pp. 20-22, Jan. 2009.
-
(2009)
CMAJ
, vol.180
, Issue.1
, pp. 20-22
-
-
Silversides, A.1
-
74
-
-
37749010578
-
Trends in the globalization of clinical trials
-
Jan
-
F. A. Thiers, A. J. Sinskey, and E. R. Berndt, "Trends in the globalization of clinical trials," Nature Reviews Drug Discovery, vol. 7, no. 1, pp. 13-14, Jan. 2008.
-
(2008)
Nature Reviews Drug Discovery
, vol.7
, Issue.1
, pp. 13-14
-
-
Thiers, F.A.1
Sinskey, A.J.2
Berndt, E.R.3
-
75
-
-
34748833432
-
Integration of Clinical and Genetic Data in the i2b2 Architecture
-
S. N. Murphy, M. E. Mendis, D. A. Berkowitz, I. Kohane, and H. C. Chueh, "Integration of Clinical and Genetic Data in the i2b2 Architecture," AMIA Annu Symp Proc, vol. 2006, p. 1040, 2006.
-
(2006)
AMIA Annu Symp Proc
, vol.2006
, pp. 1040
-
-
Murphy, S.N.1
Mendis, M.E.2
Berkowitz, D.A.3
Kohane, I.4
Chueh, H.C.5
-
76
-
-
77958007735
-
STRIDE - An Integrated Standards-Based Translational Research Informatics Platform
-
H. J. Lowe, T. A. Ferris, P. M. Hernandez, and S. C. Weber, "STRIDE - An Integrated Standards-Based Translational Research Informatics Platform," AMIA Annu Symp Proc, vol. 2009, pp. 391-395, 2009.
-
(2009)
AMIA Annu Symp Proc
, vol.2009
, pp. 391-395
-
-
Lowe, H.J.1
Ferris, T.A.2
Hernandez, P.M.3
Weber, S.C.4
|