-
2
-
-
84879885051
-
Standards for privacy of individually identifiable health information
-
Accessed February 20, 2012
-
Standards for privacy of individually identifiable health information. Final Rule, 45 CFR parts 160 and 164. Available at: http://www.hhs.gov/ocr/ privacy/hipaa/administrative/privacyrule/adminsimpregtext. pdf. Accessed February 20, 2012.
-
Final Rule, 45 CFR Parts 160 and 164
-
-
-
3
-
-
78650942280
-
Beyond safe harbor: Automatic discovery of health information de-identification policy alternatives
-
Paper presented
-
Benitez K, Loukides G, Malin BA. Beyond safe harbor: automatic discovery of health information de-identification policy alternatives. Paper presented at: The 1st ACM International Health Informatics Symposium, 2010.
-
(2010)
1st ACM International Health Informatics Symposium
-
-
Benitez, K.1
Loukides, G.2
Malin, B.A.3
-
6
-
-
33745647715
-
-
California HealthCare Foundation. Oakland, CA: California HealthCare Foundation
-
California HealthCare Foundation. National Consumer Health Privacy Survey. Oakland, CA: California HealthCare Foundation; 2005:1-5.
-
(2005)
National Consumer Health Privacy Survey
, pp. 1-5
-
-
-
7
-
-
84871866774
-
Building public trust in uses of Health Insurance Portability and Accountability Act de-identified data
-
McGraw D. Building public trust in uses of Health Insurance Portability and Accountability Act de-identified data. J Am Med Inform Assoc. 2012;20:29-34.
-
(2012)
J Am Med Inform Assoc
, vol.20
, pp. 29-34
-
-
McGraw, D.1
-
8
-
-
84869864446
-
Systematic reviews: CRD's guidance for undertaking reviews in health care
-
Tacconelli E. Systematic reviews: CRD's guidance for undertaking reviews in health care. Lancet Infect Dis. 2010;10:1-232.
-
(2010)
Lancet Infect Dis
, vol.10
, pp. 1-232
-
-
Tacconelli, E.1
-
9
-
-
84863552500
-
Strategies for maintaining patient privacy in i2b2
-
Murphy SN, Gainer V, Mendis M, et al. Strategies for maintaining patient privacy in i2b2. J Am Med Inform Assoc. 2011;18(suppl 1): 103-108.
-
(2011)
J Am Med Inform Assoc
, vol.18
, Issue.SUPPL. 1
, pp. 103-108
-
-
Murphy, S.N.1
Gainer, V.2
Mendis, M.3
-
11
-
-
29344461498
-
Confidentiality and confidence: Is data aggregation a means to achieve both?
-
DOI 10.1057/palgrave.jphp.3200029
-
Fefferman NH, O'Neil EA, Naumova EN. Confidentiality and confidence: is data aggregation a means to achieve both? J Public Health Policy. 2005;26:430-449. (Pubitemid 43003346)
-
(2005)
Journal of Public Health Policy
, vol.26
, Issue.4
, pp. 430-449
-
-
Fefferman, N.H.1
O'Neil, E.A.2
Naumova, E.N.3
-
12
-
-
84857264816
-
Data confidentiality: A review of methods for statistical disclosure limitation and methods for assessing privacy
-
Matthews GJ, Harel O. Data confidentiality: a review of methods for statistical disclosure limitation and methods for assessing privacy. Stat Surv. 2011;5:1-29.
-
(2011)
Stat Surv
, vol.5
, pp. 1-29
-
-
Matthews, G.J.1
Harel, O.2
-
13
-
-
78249243883
-
A survey on statistical disclosure control and micro-aggregation techniques for secure statistical databases
-
Fayyoumi E, Oommen BJ. A survey on statistical disclosure control and micro-aggregation techniques for secure statistical databases. Softw Pract Exper. 2010;40:1161-1188.
-
(2010)
Softw Pract Exper
, vol.40
, pp. 1161-1188
-
-
Fayyoumi, E.1
Oommen, B.J.2
-
14
-
-
3042715886
-
Protecting patient privacy by quantifiable control of disclosures in disseminated databases
-
DOI 10.1016/j.ijmedinf.2004.05.002, PII S1386505604000942
-
Ohno-Machado L, Silveira P, Vinterbo S. Protecting patient privacy by quantifiable control of disclosures in disseminated databases. Int J Med Inf. 2004;73:599-606. (Pubitemid 38891513)
-
(2004)
International Journal of Medical Informatics
, vol.73
, Issue.7-8
, pp. 599-606
-
-
Ohno-Machado, L.1
Silveira, P.S.P.2
Vinterbo, S.3
-
15
-
-
0033105319
-
Using Boolean reasoning to anonymize databases
-
DOI 10.1016/S0933-3657(98)00056-6, PII S0933365798000566
-
Ohrn A, Ohno-Machado L. Using Boolean reasoning to anonymize databases. Artif Intell Med. 1999;15:235-254. (Pubitemid 29136748)
-
(1999)
Artificial Intelligence in Medicine
, vol.15
, Issue.3
, pp. 235-254
-
-
Ohrn, A.1
Ohno-Machado, L.2
-
17
-
-
85206067367
-
Privacy-preserving data publishing
-
Fung BCM, Wang K, Chen R, et al. Privacy-preserving data publishing. ACM Comput Surv. 2010;42:1-53.
-
(2010)
ACM Comput Surv
, vol.42
, pp. 1-53
-
-
Bcm, F.1
Wang, K.2
Chen, R.3
-
18
-
-
70349305273
-
Differential privacy: A survey of results
-
Dwork C. Differential privacy: a survey of results. Theory Appl Models Comput. 2008;4978:1-19.
-
(2008)
Theory Appl Models Comput
, vol.4978
, pp. 1-19
-
-
Dwork, C.1
-
19
-
-
77951144748
-
A survey of quantification of privacy preserving data mining algorithms
-
Bertino E, Lin D, Jiang W. A survey of quantification of privacy preserving data mining algorithms. Privacy Preserving Data Mining. 2008;34:183-205.
-
(2008)
Privacy Preserving Data Mining
, vol.34
, pp. 183-205
-
-
Bertino, E.1
Lin, D.2
Jiang, W.3
-
26
-
-
84859258582
-
Minimizing minimality and maximizing utility: Analyzing method-based attacks on anonymized data
-
Cormode G, Srivastava D, Li N, et al. Minimizing minimality and maximizing utility: analyzing method-based attacks on anonymized data. Proc VLDB Endow. 2010;3:1045-1056.
-
(2010)
Proc VLDB Endow
, vol.3
, pp. 1045-1056
-
-
Cormode, G.1
Srivastava, D.2
Li, N.3
-
29
-
-
68549087035
-
Anonymization-based attacks in privacy-preserving data publishing
-
Wong RC-W, Fu AW-C, Wang K, et al. Anonymization-based attacks in privacy-preserving data publishing. ACM Trans Database Syst. 2009;34:1-46.
-
(2009)
ACM Trans Database Syst
, vol.34
, pp. 1-46
-
-
Rc-W, W.1
Aw-C, F.2
Wang, K.3
-
30
-
-
80052013720
-
Can the utility of anonymized data be used for privacy breaches?
-
Wong RC-W, Fu AW-C, Wang K, et al. Can the utility of anonymized data be used for privacy breaches? ACM Transact Knowl Discov Data (TKDD). 2011;5:1-24.
-
(2011)
ACM Transact Knowl Discov Data (TKDD)
, vol.5
, pp. 1-24
-
-
Rc-W, W.1
Aw-C, F.2
Wang, K.3
-
37
-
-
26944448516
-
Ordinal, continuous and heterogeneous k-anonymity through microaggregation
-
DOI 10.1007/s10618-005-0007-5
-
Domingo-Ferrer J, Torra V. Ordinal, continuous and heterogeneous k-anonymity through microaggregation. Data Mining Knowl Discov. 2005;11:195-212. (Pubitemid 41476765)
-
(2005)
Data Mining and Knowledge Discovery
, vol.11
, Issue.2
, pp. 195-212
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
40
-
-
84879881385
-
(a k)-anonymity
-
Paper presented, New York, NY
-
Chi-Wing R, Li J, AW-C Fu, et al. (a, k)-anonymity. Paper presented at: Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining-KDD'062006, New York, NY.
-
(2006)
Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data mining-KDD'06
-
-
Chi-Wing, R.1
Li, J.2
Fu, A.W.-C.3
-
41
-
-
68649129111
-
A framework for efficient data anonymization under privacy and accuracy constraints
-
Ghinita G, Karras P, Kalnis P, et al. A framework for efficient data anonymization under privacy and accuracy constraints. ACM Trans Database Syst. 2009;34:1-47.
-
(2009)
ACM Trans Database Syst
, vol.34
, pp. 1-47
-
-
Ghinita, G.1
Karras, P.2
Kalnis, P.3
-
43
-
-
45749151381
-
Providing k-anonymity in data mining
-
Friedman A, Wolff R, Schuster A. Providing k-anonymity in data mining. VLDB J. 2007;17:789-804.
-
(2007)
VLDB J
, vol.17
, pp. 789-804
-
-
Friedman, A.1
Wolff, R.2
Schuster, A.3
-
45
-
-
78649431051
-
Privacy-preserving OLAP an information-theoretic approach
-
Zhang N, Zhao W. Privacy-preserving OLAP: an information-theoretic approach. IEEE Trans knowl Data Eng. 2011;23:122-138.
-
(2011)
IEEE Trans Knowl Data Eng
, vol.23
, pp. 122-138
-
-
Zhang, N.1
Zhao, W.2
-
47
-
-
41849097852
-
Removes search data on vast group of web users
-
Hansell S. Removes search data on vast group of web users. New York Times. 2006;8:C4.
-
(2006)
New York Times
, vol.8
-
-
Hansell, S.1
-
50
-
-
85206067367
-
Privacy-preserving data publishing: A survey of recent developments
-
Fung BCM, Wang K, Chen R, et al. Privacy-preserving data publishing: a survey of recent developments. ACM Comput Surv (CSUR). 2009;42:1-53.
-
(2009)
ACM Comput Surv (CSUR)
, vol.42
, pp. 1-53
-
-
Bcm, F.1
Wang, K.2
Chen, R.3
-
51
-
-
64549145427
-
Privacy-preserving data publishing for cluster analysis
-
Fung BCM, Wang K, Wang L, et al. Privacy-preserving data publishing for cluster analysis. Data Knowl Eng. 2009;68:552-575.
-
(2009)
Data Knowl Eng
, vol.68
, pp. 552-575
-
-
Bcm, F.1
Wang, K.2
Wang, L.3
-
52
-
-
69549114557
-
A globally optimal k-anonymity method for the de-identification of health data
-
El Emam K, Dankar FK, Issa R, et al. A globally optimal k-anonymity method for the de-identification of health data. J Am Med Inform Assoc. 2009;16:670-682.
-
(2009)
J Am Med Inform Assoc
, vol.16
, pp. 670-682
-
-
El Emam, K.1
Dankar, F.K.2
Issa, R.3
-
53
-
-
78149335185
-
Centralized and distributed anonymization for high-dimensional healthcare data
-
Mohammed N, Fung BCM, Hung PCK, et al. Centralized and distributed anonymization for high-dimensional healthcare data. ACM Trans Knowl Discov Data. 2010;4:18:11-18:33.
-
(2010)
ACM Trans Knowl Discov Data
, vol.4
, pp. 1811-1833
-
-
Mohammed, N.1
Bcm, F.2
Pck, H.3
-
55
-
-
25044433982
-
Effects of data anonymization by cell suppression on descriptive statistics and predictive modeling performance
-
Ohno-Machado L, Vinterbo S, Dreiseitl S. Effects of data anonymization by cell suppression on descriptive statistics and predictive modeling performance. J Am Med Inform Assoc. 2002;9:115S-119S.
-
(2002)
J Am Med Inform Assoc
, vol.9
-
-
Ohno-Machado, L.1
Vinterbo, S.2
Dreiseitl, S.3
-
56
-
-
0001582302
-
Post randomisation for statistical disclosure control: Theory and implementation
-
Gouweleeuw J, Kooiman P, Willenborg L, et al. Post randomisation for statistical disclosure control: theory and implementation. J Offical Stat. 1998;14:463-478.
-
(1998)
J Offical Stat
, vol.14
, pp. 463-478
-
-
Gouweleeuw, J.1
Kooiman, P.2
Willenborg, L.3
-
58
-
-
35448955720
-
Privacy, accuracy, and consistency too: A holistic solution to contingency table release
-
Paper presented Beijing
-
Barak B, Chaudhuri K, Dwork C, et al. Privacy, accuracy, and consistency too: a holistic solution to contingency table release. Paper presented at: Principles of Database Systems (PODS), 2007, Beijing.
-
(2007)
Principles of Database Systems (PODS)
-
-
Barak, B.1
Chaudhuri, K.2
Dwork, C.3
-
61
-
-
78049357399
-
Secure multiparty computation for privacypreserving data mining
-
Lindell Y, Pinkas B. Secure multiparty computation for privacypreserving data mining. J Privacy Confidentiality. 2009;1:59-98.
-
(2009)
J Privacy Confidentiality
, vol.1
, pp. 59-98
-
-
Lindell, Y.1
Pinkas, B.2
-
63
-
-
38649100979
-
Privacy-preserving SVM classification
-
Vaidya J, Yu H, Jiang X, et al. Privacy-preserving SVM classification. Knowl Inf Syst. 2008;14:161-178.
-
(2008)
Knowl Inf Syst
, vol.14
, pp. 161-178
-
-
Vaidya, J.1
Yu, H.2
Jiang, X.3
-
64
-
-
84871482758
-
Grid LOgistic REgression (GLORE): Building shared models without sharing data
-
Wu Y, Jiang X, Kim J, et al. Grid LOgistic REgression (GLORE): building shared models without sharing data. J Am Med Inform Assoc. 2012;19:758-764.
-
(2012)
J Am Med Inform Assoc
, vol.19
, pp. 758-764
-
-
Wu, Y.1
Jiang, X.2
Kim, J.3
-
65
-
-
34548668665
-
Privacy preserving clustering on horizontally partitioned data
-
DOI 10.1016/j.datak.2007.03.015, PII S0169023X0700047X
-
Inan A, Kaya SV, Saygin Y, et al. Privacy preserving clustering on horizontally partitioned data. Data Knowl Eng. 2007;63:646-666. (Pubitemid 47418333)
-
(2007)
Data and Knowledge Engineering
, vol.63
, Issue.3
, pp. 646-666
-
-
Inan, A.1
Kaya, S.V.2
Saygin, Y.3
Savas, E.4
Hintoglu, A.A.5
Levi, A.6
-
67
-
-
79958247462
-
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
-
El Emam K, Hu J, Mercer J, et al. A secure protocol for protecting the identity of providers when disclosing data for disease surveillance. J Am Med Inform Assoc. 2011;18:212-212.
-
(2011)
J Am Med Inform Assoc
, vol.18
, pp. 212-212
-
-
El Emam, K.1
Hu, J.2
Mercer, J.3
-
69
-
-
42949124901
-
Privacy-preserving collaborative data mining
-
DOI 10.1109/MCI.2008.919071, 4490259
-
Zhan J. Privacy-preserving collaborative data mining. IEEE Comput Intell Mag. 2008;3:31-41. (Pubitemid 351606018)
-
(2008)
IEEE Computational Intelligence Magazine
, vol.3
, Issue.2
, pp. 31-41
-
-
Zhan, J.1
-
73
-
-
33244468835
-
Practical privacy: The SuLQ framework
-
Paper presented New York, NY
-
Blum A, Dwork C, McSherry F, et al. Practical privacy: the SuLQ framework. Paper presented at: Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, 2005, New York, NY.
-
(2005)
Proceedings of the Twenty-fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
-
74
-
-
33746086554
-
Calibrating noise to sensitivity in private data analysis
-
Paper presented, New York, NY
-
Dwork C, McSherry F, Nissim K, et al. Calibrating noise to sensitivity in private data analysis. Paper presented at: Theory of Cryptography Conference (TCC), 2006, New York, NY.
-
(2006)
Theory of Cryptography Conference (TCC)
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
-
77
-
-
77956293777
-
Privacy integrated queries: An extensible platform for privacy-preserving data analysis
-
McSherry F. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. Commun ACM. 2010;53:89-89.
-
(2010)
Commun ACM
, vol.53
, pp. 89-89
-
-
McSherry, F.1
-
81
-
-
69949111709
-
(alpha k)-anonymous data publishing
-
Wong R, Li J, Fu A, et al. (alpha, k)-anonymous data publishing. J Intell Inf Syst. 2009;33:209-234.
-
(2009)
J Intell Inf Syst
, vol.33
, pp. 209-234
-
-
Wong, R.1
Li, J.2
Fu, A.3
-
82
-
-
77956224515
-
Versatile publishing for privacy preservation
-
Paper presented, New York, NY
-
Jin X, Zhang M, Zhang N, et al. Versatile publishing for privacy preservation. Paper presented at: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD), 2010, New York, NY.
-
(2010)
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)
-
-
Jin, X.1
Zhang, M.2
Zhang, N.3
-
83
-
-
79959964845
-
Data generation using declarative constraints
-
Paper presented, New York, NY
-
Arasu A, Kaushik R, Li J. Data generation using declarative constraints. Paper presented at: Proceedings of the 2011 international conference on Management of data (SIGMOD 2011), 2011, New York, NY.
-
(2011)
Proceedings of the 2011 International Conference on Management of Data (SIGMOD 2011)
-
-
Arasu, A.1
Kaushik, R.2
Li, J.3
-
85
-
-
78049302999
-
Hybrid microdata using microaggregation
-
Domingo-Ferrer J, González-Nicolás U. Hybrid microdata using microaggregation. Inf Sci. 2010;180:2834-2844.
-
(2010)
Inf Sci
, vol.180
, pp. 2834-2844
-
-
Domingo-Ferrer, J.1
González-Nicolás, U.2
-
86
-
-
78650518102
-
Boosting the accuracy of differentially private histograms through consistency
-
Hay M, Rastogi V, Miklau G, et al. Boosting the accuracy of differentially private histograms through consistency. VLDB Endow. 2010;3:1021-1032.
-
(2010)
VLDB Endow
, vol.3
, pp. 1021-1032
-
-
Hay, M.1
Rastogi, V.2
Miklau, G.3
-
87
-
-
35448955720
-
Privacy, accuracy, and consistency too: A holistic solution to contingency table release
-
Paper presented New York, NY
-
Barak B, Chaudhuri K, Dwork C, et al. Privacy, accuracy, and consistency too: a holistic solution to contingency table release. Paper presented at: Proceedings of the twenty-sixth ACM SIGMODSIGACT- SIGART symposium on Principles of database systems, 2007, New York, NY.
-
(2007)
Proceedings of the Twenty-sixth ACM SIGMODSIGACT- SIGART Symposium on Principles of Database Systems
-
-
Barak, B.1
Chaudhuri, K.2
Dwork, C.3
-
88
-
-
77954693385
-
The price of privately releasing contingency tables and the spectra of random matrices with correlated rows
-
Paper presented, New York, NY
-
Kasiviswanathan SP, Rudelson M, Smith A, et al. The price of privately releasing contingency tables and the spectra of random matrices with correlated rows. Paper presented at: Proceedings of the 42nd ACM symposium on Theory of computing (STOC'10), 2010, New York, NY.
-
(2010)
Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC'10)
-
-
Kasiviswanathan, S.P.1
Rudelson, M.2
Smith, A.3
-
89
-
-
84874044115
-
Compressive Mechanism: Utilizing sparse representation in differential privacy
-
Chicago, IL
-
Li Y, Zhang Z, Winslett M, et al. Compressive Mechanism: Utilizing sparse representation in differential privacy. Paper presented at: The Workshop on Privacy in the Electronic Society (WPES), 2011, Chicago, IL.
-
(2011)
Paper Presented At: The Workshop on Privacy in the Electronic Society (WPES)
-
-
Li, Y.1
Zhang, Z.2
Winslett, M.3
-
90
-
-
57049136138
-
A learning theory approach to noninteractive database privacy
-
Paper presented, New York, NY
-
Blum A, Ligett K, Roth A. A learning theory approach to noninteractive database privacy. Paper presented at: Proceedings of the 40th annual ACM symposium on Theory of computing, 2008, New York, NY.
-
(2008)
Proceedings of the 40th Annual ACM Symposium on Theory of Computing
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
91
-
-
77952555772
-
A statistical framework for differential privacy
-
Wasserman L, Zhou S. A statistical framework for differential privacy. J Am Stat Assoc. 2010;105:375-389.
-
(2010)
J Am Stat Assoc
, vol.105
, pp. 375-389
-
-
Wasserman, L.1
Zhou, S.2
-
92
-
-
80052663001
-
Differentially private data release for data mining
-
Paper presented, San Diego, CA
-
Mohammed N, Chen R, Fung BCM, et al. Differentially private data release for data mining. Paper presented at: International Conference on Knowledge Discovery and Data Mining (SIGKDD), 2011, San Diego, CA.
-
(2011)
International Conference on Knowledge Discovery and Data Mining (SIGKDD)
-
-
Mohammed, N.1
Chen, R.2
Bcm, F.3
-
94
-
-
67749118306
-
ANGEL: Enhancing the utility of generalization for privacy preserving publication
-
Tao Y, Chen H, Xiao X, et al. ANGEL: enhancing the utility of generalization for privacy preserving publication. IEEE Trans Knowl Data Eng. 2009;21:1073-1087.
-
(2009)
IEEE Trans Knowl Data Eng
, vol.21
, pp. 1073-1087
-
-
Tao, Y.1
Chen, H.2
Xiao, X.3
-
98
-
-
80051799598
-
An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers
-
Rebollo-Monedero D, Forné J, Soriano M. An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers. Data Knowl Eng. 2011;70: 892-921.
-
(2011)
Data Knowl Eng
, vol.70
, pp. 892-921
-
-
Rebollo-Monedero, D.1
Forné, J.2
Soriano, M.3
-
99
-
-
0034567068
-
Determining the identifiability of DNA database entries
-
Los Angeles, CA
-
Malin BA, Sweeney LA. Determining the identifiability of DNA database entries. Proceedings AMIA Symposium. 2000; Los Angeles, CA: 537-541.
-
(2000)
Proceedings AMIA Symposium
, pp. 537-541
-
-
Malin, B.A.1
Sweeney, L.A.2
-
100
-
-
11144348715
-
An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future
-
DOI 10.1197/jamia.M1603, PII S1067502704001549
-
Malin BA. An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future. J Am Med Inform Assoc. 2005;12:28-34. (Pubitemid 40038620)
-
(2005)
Journal of the American Medical Informatics Association
, vol.12
, Issue.1
, pp. 28-34
-
-
Malin, B.A.1
-
101
-
-
2942522665
-
How (not) to protect genomic data privacy in a distributed network: Using trail re-identification to evaluate and design anonymity protection systems
-
Malin BA, Sweeney LA. How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems. J Biomed Inform. 2004;37:179-192.
-
(2004)
J Biomed Inform
, vol.37
, pp. 179-192
-
-
Malin, B.A.1
Sweeney, L.A.2
-
102
-
-
80053335117
-
Identifiability in biobanks: Models, measures, and mitigation strategies
-
Malin BA, Loukides G, Benitez K, et al. Identifiability in biobanks: models, measures, and mitigation strategies. Hum Genet. 2011;130: 383-392.
-
(2011)
Hum Genet
, vol.130
, pp. 383-392
-
-
Malin, B.A.1
Loukides, G.2
Benitez, K.3
-
103
-
-
0036359620
-
Inferring genotype from clinical phenotype through a knowledge based algorithm
-
Singapore
-
Malin BA, Sweeney LA. Inferring genotype from clinical phenotype through a knowledge based algorithm. Pac Symp Biocomput. 2002; Singapore: 41-52.
-
(2002)
Pac Symp Biocomput
, pp. 41-52
-
-
Malin, B.A.1
Sweeney, L.A.2
-
106
-
-
34548497406
-
State-of-The-art Anonymization of Medical Records Using an Iterative Machine Learning Framework
-
DOI 10.1197/j.jamia.M2441, PII S1067502707001776
-
Szarvas G, Farkas R, Busa-Fekete R. State-of-the-art anonymization of medical records using an iterative machine learning framework. J Am Med Inform Assoc. 2007;14:574-580. (Pubitemid 47379570)
-
(2007)
Journal of the American Medical Informatics Association
, vol.14
, Issue.5
, pp. 574-580
-
-
Szarvas, G.1
Farkas, R.2
Busa-Fekete, R.3
-
107
-
-
70349121193
-
HIDE: Heterogeneous information DEidentification
-
Paper presented, New York, NY
-
Gardner J, Xiong L, Li K, et al. HIDE: heterogeneous information DEidentification. Paper presented at: Proceedings of the 12th International Conference on Extending Database Technology Advances in Database Technology-EDBT'092009, New York, NY.
-
(2009)
Proceedings of the 12th International Conference on Extending Database Technology Advances in Database Technology-EDBT'09
-
-
Gardner, J.1
Xiong, L.2
Li, K.3
-
109
-
-
84879888144
-
-
National Opinion Research Center, Accessed May 23, 2012
-
National Opinion Research Center. Available at: http://www.norc.org/ Pages/default.aspx. Accessed May 23, 2012.
-
-
-
|