-
1
-
-
84905284950
-
-
EU Data Protection Directive 95/46/ECK
-
EU Data Protection Directive 95/46/ECK; 1995.
-
(1995)
-
-
-
2
-
-
84905248987
-
-
UK Data Protection Act
-
UK Data Protection Act; 1998.
-
(1998)
-
-
-
3
-
-
84905230891
-
-
Personal Information Protection and Electronic Documents Act
-
Personal Information Protection and Electronic Documents Act; 2000.
-
(2000)
-
-
-
4
-
-
0024914229
-
Security-control methods for statistical databases: a comparative study
-
Adam N.R., Worthmann J.C. Security-control methods for statistical databases: a comparative study. ACM Comput Surv 1989, 21(4):515-556.
-
(1989)
ACM Comput Surv
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Worthmann, J.C.2
-
6
-
-
33746711412
-
Approximation algorithms for k-anonymity
-
Aggarwal G., Kenthapadi F., Motwani K., Panigrahy R., Thomasand D., Zhu A. Approximation algorithms for k-anonymity. Journal of Privacy Technology 2005.
-
(2005)
Journal of Privacy Technology
-
-
Aggarwal, G.1
Kenthapadi, F.2
Motwani, K.3
Panigrahy, R.4
Thomasand, D.5
Zhu, A.6
-
7
-
-
0002221136
-
Fast algorithms for mining association rules in large databases
-
Agrawal R, Srikant R. Fast algorithms for mining association rules in large databases. In: VLDB; 1994. p. 487-99.
-
(1994)
VLDB
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
8
-
-
80755143980
-
Countering GATTACA: efficient and secure testing of fully-sequenced human genomes
-
CCS '11
-
Baldi P, Baronio R, De Cristofaro E, Gasti P, Tsudik G. Countering GATTACA: efficient and secure testing of fully-sequenced human genomes. In: Proceedings of the 18th ACM conference on computer and communications security, CCS '11; 2011. p. 691-702.
-
(2011)
Proceedings of the 18th ACM conference on computer and communications security
, pp. 691-702
-
-
Baldi, P.1
Baronio, R.2
De Cristofaro, E.3
Gasti, P.4
Tsudik, G.5
-
9
-
-
28444449426
-
Data privacy through optimal k-anonymization
-
Bayardo RJ, Agrawal R. Data privacy through optimal k-anonymization. In: 21st ICDE; 2005. p. 217-28.
-
(2005)
21st ICDE
, pp. 217-228
-
-
Bayardo, R.J.1
Agrawal, R.2
-
10
-
-
78650942280
-
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
-
Benitez K, Loukides G, Malin B. Beyond safe harbor: automatic discovery of health information de-identification policy alternatives. In: ACM international health informatics symposium; 2010. p. 163-72.
-
(2010)
ACM international health informatics symposium
, pp. 163-172
-
-
Benitez, K.1
Loukides, G.2
Malin, B.3
-
11
-
-
0037870443
-
The x-tree: an index structure for high-dimensional data
-
Berchtold S, Keim DA, Kriegel H. The x-tree: an index structure for high-dimensional data. In: VLDB; 1996. p. 28-39.
-
(1996)
VLDB
, pp. 28-39
-
-
Berchtold, S.1
Keim, D.A.2
Kriegel, H.3
-
12
-
-
0038580808
-
Concept-match medical data scrubbing
-
Berman J.J. Concept-match medical data scrubbing. Arch Pathol Lab Med 2003, 127(6):680-686.
-
(2003)
Arch Pathol Lab Med
, vol.127
, Issue.6
, pp. 680-686
-
-
Berman, J.J.1
-
13
-
-
84867261096
-
Recommendation-based de-identification: a practical systems approach towards de-identification of unstructured text in healthcare
-
SERVICES '12
-
Bhagwan V, Grandison T, Maltzahn C. Recommendation-based de-identification: a practical systems approach towards de-identification of unstructured text in healthcare. In: Proceedings of the 2012 IEEE eighth world congress on services, SERVICES '12; 2012. p. 155-62.
-
(2012)
Proceedings of the 2012 IEEE eighth world congress on services
, pp. 155-162
-
-
Bhagwan, V.1
Grandison, T.2
Maltzahn, C.3
-
14
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
Burges C.J.C. A tutorial on support vector machines for pattern recognition. Data Min Knowl Discov 1998, 2(2):121-167.
-
(1998)
Data Min Knowl Discov
, vol.2
, Issue.2
, pp. 121-167
-
-
Burges, C.J.C.1
-
15
-
-
38049126170
-
Efficient k-anonymization using clustering techniques
-
Byun J, Kamra A, Bertino E, Li N. Efficient k-anonymization using clustering techniques. In: DASFAA; 2007. p. 188-200.
-
(2007)
DASFAA
, pp. 188-200
-
-
Byun, J.1
Kamra, A.2
Bertino, E.3
Li, N.4
-
16
-
-
79956041471
-
Rho-uncertainty: inference-proof transaction anonymization
-
Cao J., Karras P., Raïssi C., Tan K. rho-uncertainty: inference-proof transaction anonymization. Pvldb 2010, 3(1):1033-1044.
-
(2010)
Pvldb
, vol.3
, Issue.1
, pp. 1033-1044
-
-
Cao, J.1
Karras, P.2
Raïssi, C.3
Tan, K.4
-
17
-
-
66749192419
-
My sister's keeper? Genomic research and the identifiability of siblings
-
Cassa C.A., Schmidt B., Kohane I.S., Mandl K.D. My sister's keeper? Genomic research and the identifiability of siblings. BMC Med Genom 2008, 1:32.
-
(2008)
BMC Med Genom
, vol.1
, pp. 32
-
-
Cassa, C.A.1
Schmidt, B.2
Kohane, I.S.3
Mandl, K.D.4
-
19
-
-
85011039411
-
Privacy skyline: privacy with multidimensional adversarial knowledge
-
Chen B, Ramakrishnan R, LeFevre K. Privacy skyline: privacy with multidimensional adversarial knowledge. In: VLDB; 2007. p. 770-81.
-
(2007)
VLDB
, pp. 770-781
-
-
Chen, B.1
Ramakrishnan, R.2
LeFevre, K.3
-
20
-
-
84861595370
-
Publishing set-valued data via differential privacy
-
Chen R., Mohammed N., Fung B.C.M., Desai B.C., Xiong L. Publishing set-valued data via differential privacy. Pvldb 2011, 4(11):1087-1098.
-
(2011)
Pvldb
, vol.4
, Issue.11
, pp. 1087-1098
-
-
Chen, R.1
Mohammed, N.2
Fung, B.C.M.3
Desai, B.C.4
Xiong, L.5
-
21
-
-
80052688705
-
Personal privacy vs population privacy: learning to attack anonymization
-
Cormode G. Personal privacy vs population privacy: learning to attack anonymization. In: KDD; 2011. p. 1253-61.
-
(2011)
KDD
, pp. 1253-1261
-
-
Cormode, G.1
-
22
-
-
70449431315
-
Use of electronic medical records for health outcomes research: a literature review
-
Dean B.B., Lam J., Natoli J.L., Butler Q., Aguilar D., Nordyke R.J. Use of electronic medical records for health outcomes research: a literature review. Med Care Res Rev 2010, 66(6):611-638.
-
(2010)
Med Care Res Rev
, vol.66
, Issue.6
, pp. 611-638
-
-
Dean, B.B.1
Lam, J.2
Natoli, J.L.3
Butler, Q.4
Aguilar, D.5
Nordyke, R.J.6
-
23
-
-
84870916549
-
Data privacy: definitions and techniques
-
De Capitani di Vimercati S., Foresti S., Livraga G., Samarati P. Data privacy: definitions and techniques. Int J Uncertainty, Fuzz Knowl-Based Syst 2012, 20(6):793-818.
-
(2012)
Int J Uncertainty, Fuzz Knowl-Based Syst
, vol.20
, Issue.6
, pp. 793-818
-
-
De Capitani di Vimercati, S.1
Foresti, S.2
Livraga, G.3
Samarati, P.4
-
24
-
-
0036190566
-
Practical data-oriented microaggregation for statistical disclosure control
-
Domingo-Ferrer J., Mateo-Sanz J.M. Practical data-oriented microaggregation for statistical disclosure control. IEEE Trans Knowl Data Eng 2002, 14(1):189-201.
-
(2002)
IEEE Trans Knowl Data Eng
, vol.14
, Issue.1
, pp. 189-201
-
-
Domingo-Ferrer, J.1
Mateo-Sanz, J.M.2
-
25
-
-
26944448516
-
Ordinal, continuous and heterogeneous k-anonymity through microaggregation
-
Domingo-Ferrer J., Torra V. Ordinal, continuous and heterogeneous k-anonymity through microaggregation. Dmkd 2005, 11(2):195-212.
-
(2005)
Dmkd
, vol.11
, Issue.2
, pp. 195-212
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
26
-
-
36048972384
-
Efficient multivariate data-oriented microaggregation
-
Domingo-Ferrer J., Martínez-Ballesté A., Mateo-Sanz J., Sebé F. Efficient multivariate data-oriented microaggregation. VLDB J 2006, 15(4):355-369.
-
(2006)
VLDB J
, vol.15
, Issue.4
, pp. 355-369
-
-
Domingo-Ferrer, J.1
Martínez-Ballesté, A.2
Mateo-Sanz, J.3
Sebé, F.4
-
27
-
-
57149146157
-
Privacy-maxent: integrating background knowledge in privacy quantification
-
Du W, Teng Z, Zhu Z. Privacy-maxent: integrating background knowledge in privacy quantification. In: SIGMOD; 2008. p. 459-72.
-
(2008)
SIGMOD
, pp. 459-472
-
-
Du, W.1
Teng, Z.2
Zhu, Z.3
-
28
-
-
34548748588
-
On multidimensional k-anonymity with local recoding generalization
-
Du Y, Xia T, Tao Y, Zhang D, Zhu F. On multidimensional k-anonymity with local recoding generalization. In: ICDE '07; 2007. p. 1422-4.
-
(2007)
ICDE, '07
, pp. 1422-1424
-
-
Du, Y.1
Xia, T.2
Tao, Y.3
Zhang, D.4
Zhu, F.5
-
29
-
-
33746335051
-
Differential privacy
-
Dwork C. Differential privacy. In: ICALP; 2006. p. 1-12.
-
(2006)
ICALP
, pp. 1-12
-
-
Dwork, C.1
-
30
-
-
70349305273
-
Differential privacy: a survey of results
-
Dwork C.
-
Dwork C. Differential privacy: a survey of results. In: TAMC; 2008. p. 1-19.
-
(2008)
TAMC
, pp. 1-19
-
-
-
31
-
-
33746037200
-
Our data, ourselves: privacy via distributed noise generation
-
EUROCRYPT'06
-
Dwork C, Kenthapadi K, McSherry F, Mironov I, Naor M. Our data, ourselves: privacy via distributed noise generation. In: Proceedings of the 24th annual international conference on the theory and applications of cryptographic techniques, EUROCRYPT'06; 2006. p. 486-503.
-
(2006)
Proceedings of the 24th annual international conference on the theory and applications of cryptographic techniques
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
32
-
-
69549114557
-
A globally optimal k-anonymity method for the de-identification of health data
-
El Emam K., Dankar F., Issa R., Jonker E., et al. A globally optimal k-anonymity method for the de-identification of health data. J Am Med Informat Assoc 2009, 16(5):670-682.
-
(2009)
J Am Med Informat Assoc
, vol.16
, Issue.5
, pp. 670-682
-
-
El Emam, K.1
Dankar, F.2
Issa, R.3
Jonker, E.4
-
33
-
-
82555187188
-
A systematic review of re-identification attacks on health data
-
[e28071, 12]
-
El Emam K., Jonker E., Arbuckle L., Malin B. A systematic review of re-identification attacks on health data. PLoS ONE 2011, 6(12). [e28071, 12].
-
(2011)
PLoS ONE
, vol.6
, Issue.12
-
-
El Emam, K.1
Jonker, E.2
Arbuckle, L.3
Malin, B.4
-
34
-
-
49249103738
-
Protecting privacy using k-anonymity
-
El Emam K., Dankar F.K. Protecting privacy using k-anonymity. J Am Med Informat Assoc 2008, 15(5):627-637.
-
(2008)
J Am Med Informat Assoc
, vol.15
, Issue.5
, pp. 627-637
-
-
El Emam, K.1
Dankar, F.K.2
-
35
-
-
79959341747
-
The re-identification risk of canadians from longitudinal demographics
-
El Emam K., Buckeridge D., Tamblyn R., Neisa A., Jonker E., Verma A. The re-identification risk of canadians from longitudinal demographics. BMC Med Informat Dec Mak 2011, 11(46).
-
(2011)
BMC Med Informat Dec Mak
, vol.11
, Issue.46
-
-
El Emam, K.1
Buckeridge, D.2
Tamblyn, R.3
Neisa, A.4
Jonker, E.5
Verma, A.6
-
36
-
-
84878197970
-
Security and privacy in electronic health records: a systematic literature review
-
Fernandez-Aleman J., Senor I., Oliver Lozoya P.A., Toval A. Security and privacy in electronic health records: a systematic literature review. J Biomed Informat 2013, 46(3):541-562.
-
(2013)
J Biomed Informat
, vol.46
, Issue.3
, pp. 541-562
-
-
Fernandez-Aleman, J.1
Senor, I.2
Oliver Lozoya, P.A.3
Toval, A.4
-
38
-
-
0019637328
-
Optimal choice of discriminators in a balanced k-d binary search tree
-
Filho Y.V. Optimal choice of discriminators in a balanced k-d binary search tree. Inf Process Lett 1981, 13(2):67-70.
-
(1981)
Inf Process Lett
, vol.13
, Issue.2
, pp. 67-70
-
-
Filho, Y.V.1
-
39
-
-
77951201056
-
Privacy-preserving data publishing: a survey on recent developments
-
Fung B.C.M., Wang K., Chen R., Yu P.S. Privacy-preserving data publishing: a survey on recent developments. ACM Comput Surv 2010, 42.
-
(2010)
ACM Comput Surv
, vol.42
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
40
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
Fung BCM, Wang K, Yu PS. Top-down specialization for information and privacy preservation. In: ICDE; 2005. p. 205-16.
-
(2005)
ICDE
, pp. 205-216
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
41
-
-
64549145427
-
Privacy-preserving data publishing for cluster analysis
-
Fung B.C.M., Wang K., Wang L., Hung P.C.K. Privacy-preserving data publishing for cluster analysis. Data Knowl Eng 2009, 68(6):552-575.
-
(2009)
Data Knowl Eng
, vol.68
, Issue.6
, pp. 552-575
-
-
Fung, B.C.M.1
Wang, K.2
Wang, L.3
Hung, P.C.K.4
-
42
-
-
84871902175
-
Share: system design and case studies for statistical health information release
-
Gardner J.J., Xiong L., Xiao Y., Gao J., Post A.R., Jiang X., et al. Share: system design and case studies for statistical health information release. Jamia 2013, 20(1):109-116.
-
(2013)
Jamia
, vol.20
, Issue.1
, pp. 109-116
-
-
Gardner, J.J.1
Xiong, L.2
Xiao, Y.3
Gao, J.4
Post, A.R.5
Jiang, X.6
-
44
-
-
84988315609
-
Fast data anonymization with low information loss
-
Springer, M. Gertz, S. Jajodia (Eds.)
-
Ghinita G, Karras P, Kalnis P, Mamoulis N. Fast data anonymization with low information loss. In: Proceedings of the 33rd international conference on very large data bases, VLDB '07; 2007. p. 758-69.
-
(2007)
Proceedings of the 33rd international conference on very large data bases, VLDB '07
, pp. 758-769
-
-
Ghinita, G.1
Karras, P.2
Kalnis, P.3
Mamoulis, N.4
-
45
-
-
52649175334
-
k-Anonymization revisited
-
Gionis A, Mazza A, Tassa T. k-Anonymization revisited. In: ICDE; 2008. p. 744-53.
-
(2008)
ICDE
, pp. 744-753
-
-
Gionis, A.1
Mazza, A.2
Tassa, T.3
-
46
-
-
79955987566
-
PCTA: privacy-constrained clustering-based transaction data anonymization
-
Gkoulalas-Divanis A, Loukides G. PCTA: privacy-constrained clustering-based transaction data anonymization. In: EDBT PAIS; 2011. p. 5.
-
(2011)
EDBT PAIS
, pp. 5
-
-
Gkoulalas-Divanis, A.1
Loukides, G.2
-
47
-
-
80052662844
-
Revisiting sequential pattern hiding to enhance utility
-
Gkoulalas-Divanis A, Loukides G. Revisiting sequential pattern hiding to enhance utility. In: KDD; 2011. p. 1316-24.
-
(2011)
KDD
, pp. 1316-1324
-
-
Gkoulalas-Divanis, A.1
Loukides, G.2
-
48
-
-
69949190981
-
Hiding sensitive knowledge without side effects
-
Gkoulalas-Divanis A., Verykios V.S. Hiding sensitive knowledge without side effects. Knowl Inf Syst 2009, 20(3):263-299.
-
(2009)
Knowl Inf Syst
, vol.20
, Issue.3
, pp. 263-299
-
-
Gkoulalas-Divanis, A.1
Verykios, V.S.2
-
49
-
-
0032091595
-
Cure: an efficient clustering algorithm for large databases
-
Guha S, Rastogi R, Shim K. Cure: an efficient clustering algorithm for large databases. In: SIGMOD; 1998. p. 73-84.
-
(1998)
SIGMOD
, pp. 73-84
-
-
Guha, S.1
Rastogi, R.2
Shim, K.3
-
50
-
-
0942266011
-
Evaluation of a deidentification (De-Id) software engine to share pathology reports and clinical documents for research
-
Gupta D., Saul M., Gilbertson J. Evaluation of a deidentification (De-Id) software engine to share pathology reports and clinical documents for research. Am J Clin Pathol 2004, 121(2):176-186.
-
(2004)
Am J Clin Pathol
, vol.121
, Issue.2
, pp. 176-186
-
-
Gupta, D.1
Saul, M.2
Gilbertson, J.3
-
52
-
-
78049372159
-
Anonymization of set-valued data via top-down, local generalization
-
He Y., Naughton J.F. Anonymization of set-valued data via top-down, local generalization. Pvldb 2009, 2(1):934-945.
-
(2009)
Pvldb
, vol.2
, Issue.1
, pp. 934-945
-
-
He, Y.1
Naughton, J.F.2
-
53
-
-
84905248988
-
-
UCI repository of machine learning databases
-
Hettich S, Merz CJ. UCI repository of machine learning databases; 1998.
-
(1998)
-
-
Hettich, S.1
Merz, C.J.2
-
54
-
-
50849101381
-
Resolving individuals contributing trace amounts of dna to highly complex mixtures using high-density SNP genotyping microarrays
-
Homer N., Szelinger S., Redman M., et al. Resolving individuals contributing trace amounts of dna to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genet 2008, 4(8):e1000167.
-
(2008)
PLoS Genet
, vol.4
, Issue.8
-
-
Homer, N.1
Szelinger, S.2
Redman, M.3
-
55
-
-
85086421071
-
Flexible anonymization for privacy preserving data publishing: a systematic search based approach
-
Hore B, Jammalamadaka RC, Mehrotra S. Flexible anonymization for privacy preserving data publishing: a systematic search based approach. In: SDM; 2007.
-
(2007)
SDM
-
-
Hore, B.1
Jammalamadaka, R.C.2
Mehrotra, S.3
-
56
-
-
84871886070
-
-
Use and characteristics of electronic health record systems among office-based physician practices: United States 2001-2012.
-
Hsiao CJ, Hing E. Use and characteristics of electronic health record systems among office-based physician practices: United States, 2001-2012. NCHS data brief; 2012. p. 1-8.
-
(2012)
NCHS data brief
, pp. 1-8
-
-
Hsiao, C.J.1
Hing, E.2
-
57
-
-
85011028519
-
k-Anonymization as spatial indexing: toward scalable and incremental anonymization
-
Iwuchukwu T, Naughton JF. k-Anonymization as spatial indexing: toward scalable and incremental anonymization. In: VLDB; 2007. p. 746-57.
-
(2007)
VLDB
, pp. 746-757
-
-
Iwuchukwu, T.1
Naughton, J.F.2
-
58
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
Iyengar VS. Transforming data to satisfy privacy constraints. In: KDD; 2002. p. 279-88.
-
(2002)
KDD
, pp. 279-288
-
-
Iyengar, V.S.1
-
59
-
-
70849132623
-
t-Plausibility: semantic preserving text sanitization.
-
Jiang W, Murugesan M, Clifton C, Si L. t-Plausibility: semantic preserving text sanitization. In: CSE '09. International conference on computational science and engineering, 2009. vol. 3; 2009. p. 68-75.
-
(2009)
C.SE '09. International conference on computational scienceengineering, 2009.
, vol.3
, pp. 68-75
-
-
Jiang, W.1
Murugesan, M.2
Clifton, C.3
Si, L.4
-
62
-
-
22944452807
-
Minimum spanning tree partitioning algorithm for microaggregation
-
Laszlo M., Mukherjee S. Minimum spanning tree partitioning algorithm for microaggregation. IEEE Trans Knowl Data Eng 2005, 17(7):902-911.
-
(2005)
IEEE Trans Knowl Data Eng
, vol.17
, Issue.7
, pp. 902-911
-
-
Laszlo, M.1
Mukherjee, S.2
-
63
-
-
80955124079
-
Use of electronic medical records (EMR) for oncology outcomes research: assessing the comparability of EMR information to patient registry and health claims data
-
Lau E.C., Mowat F.S., Kelsh M.A., Legg J.C., Engel-Nitz N.M., Watson H.N., et al. Use of electronic medical records (EMR) for oncology outcomes research: assessing the comparability of EMR information to patient registry and health claims data. Clin Epidemiol 2011, 3(1):259-272.
-
(2011)
Clin Epidemiol
, vol.3
, Issue.1
, pp. 259-272
-
-
Lau, E.C.1
Mowat, F.S.2
Kelsh, M.A.3
Legg, J.C.4
Engel-Nitz, N.M.5
Watson, H.N.6
-
64
-
-
51149098991
-
Workload-aware anonymization techniques for large-scale datasets
-
LeFevre K., DeWitt D.J., Ramakrishnan R. Workload-aware anonymization techniques for large-scale datasets. Tods 2008, 33(3).
-
(2008)
Tods
, vol.33
, Issue.3
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
68
-
-
50649097562
-
Achieving -anonymity by clustering in attribute hierarchical structures.
-
Li J, Wong R, Fu A, Pei J, Achieving -anonymity by clustering in attribute hierarchical structures. In: DaWaK; 2006. p. 405-416.
-
(2006)
DaWaK
, pp. 405-416
-
-
Li, J.1
Wong, R.2
Fu, A.3
Pei, J.4
-
69
-
-
34548805858
-
t-Closeness: privacy beyond k-anonymity and l-diversity
-
Li N, Li T, Venkatasubramanian S. t-Closeness: privacy beyond k-anonymity and l-diversity. In: ICDE; 2007. p. 106-15.
-
(2007)
ICDE
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
71
-
-
33845517298
-
Security analysis in role-based access control
-
Li N., Tripunitara M.V. Security analysis in role-based access control. ACM Trans Inf Syst Secur 2006, 9(4):391-420.
-
(2006)
ACM Trans Inf Syst Secur
, vol.9
, Issue.4
, pp. 391-420
-
-
Li, N.1
Tripunitara, M.V.2
-
72
-
-
52649086216
-
Injector: mining background knowledge for data anonymization.
-
Li T, Li N. Injector: mining background knowledge for data anonymization. In: ICDE; 2008. p. 446-55.
-
(2008)
ICDE
, pp. 446-455
-
-
Li, T.1
Li, N.2
-
73
-
-
84974555530
-
Privacy preserving data mining
-
Lindell Y, Pinkas B. Privacy preserving data mining. 2000. p. 36-54.
-
(2000)
, pp. 36-54
-
-
Lindell, Y.1
Pinkas, B.2
-
75
-
-
77955283376
-
The disclosure of diagnosis codes can breach research participants' privacy
-
Loukides G., Denny J.C., Malin B. The disclosure of diagnosis codes can breach research participants' privacy. J Am Med Informat Assoc 2010, 17:322-327.
-
(2010)
J Am Med Informat Assoc
, vol.17
, pp. 322-327
-
-
Loukides, G.1
Denny, J.C.2
Malin, B.3
-
76
-
-
77952390550
-
Anonymization of electronic medical records for validating genome-wide association studies
-
Loukides G., Gkoulalas-Divanis A., Malin B. Anonymization of electronic medical records for validating genome-wide association studies. Proc Nat Acad Sci 2010, 17(107):7898-7903.
-
(2010)
Proc Nat Acad Sci
, vol.17
, Issue.107
, pp. 7898-7903
-
-
Loukides, G.1
Gkoulalas-Divanis, A.2
Malin, B.3
-
78
-
-
79961206921
-
COAT: constraint-based anonymization of transactions
-
Loukides G., Gkoulalas-Divanis A., Malin B. COAT: constraint-based anonymization of transactions. Knowl Inf Syst 2011, 28(2):251-282.
-
(2011)
Knowl Inf Syst
, vol.28
, Issue.2
, pp. 251-282
-
-
Loukides, G.1
Gkoulalas-Divanis, A.2
Malin, B.3
-
79
-
-
78049360732
-
Anonymizing transaction data to eliminate sensitive inferences
-
Loukides G, Gkoulalas-Divanis A, Shao J. Anonymizing transaction data to eliminate sensitive inferences. In: DEXA; 2010. p. 400-415.
-
(2010)
DEXA
, pp. 400-415
-
-
Loukides, G.1
Gkoulalas-Divanis, A.2
Shao, J.3
-
80
-
-
84878864234
-
Efficient and flexible anonymization of transaction data
-
Loukides G., Gkoulalas-Divanis A., Shao J. Efficient and flexible anonymization of transaction data. Knowl Inf Syst 2013, 36(1):153-210.
-
(2013)
Knowl Inf Syst
, vol.36
, Issue.1
, pp. 153-210
-
-
Loukides, G.1
Gkoulalas-Divanis, A.2
Shao, J.3
-
81
-
-
35248900307
-
Capturing data usefulness and privacy protection in k-anonymisation.
-
Loukides G, Shao J. Capturing data usefulness and privacy protection in k-anonymisation. In: SAC; 2007. p. 370-4.
-
(2007)
SAC
, pp. 370-374
-
-
Loukides, G.1
Shao, J.2
-
82
-
-
38049092485
-
Clustering-based k-anonymisation algorithms
-
Loukides G, Shao J. Clustering-based k-anonymisation algorithms. In: DEXA; 2007. p. 761-71.
-
(2007)
DEXA
, pp. 761-771
-
-
Loukides, G.1
Shao, J.2
-
83
-
-
42149175998
-
An efficient clustering algorithm for - anonymisation
-
Loukides G., Shao J. An efficient clustering algorithm for - anonymisation. J Comput Sci Technol 2008, 23(2):188-202.
-
(2008)
J Comput Sci Technol
, vol.23
, Issue.2
, pp. 188-202
-
-
Loukides, G.1
Shao, J.2
-
84
-
-
78650700824
-
Preventing range disclosure in k-anonymised data
-
Loukides G., Shao J. Preventing range disclosure in k-anonymised data. Expert Syst Appl 2011, 38(4):4559-4574.
-
(2011)
Expert Syst Appl
, vol.38
, Issue.4
, pp. 4559-4574
-
-
Loukides, G.1
Shao, J.2
-
86
-
-
84859215377
-
Utility-preserving transaction data anonymization with low information loss
-
Loukides G., Gkoulalas-Divanis A. Utility-preserving transaction data anonymization with low information loss. Expert Syst Appl 2012, 39(10):9764-9777.
-
(2012)
Expert Syst Appl
, vol.39
, Issue.10
, pp. 9764-9777
-
-
Loukides, G.1
Gkoulalas-Divanis, A.2
-
89
-
-
34748848639
-
The NCBI dbGaP database of genotypes and phenotypes
-
Mailman M.D., Feolo M., Jin Y., Kimura M., Tryka K., Bagoutdinov R., et al. The NCBI dbGaP database of genotypes and phenotypes. Nat Genet 2007, 39:1181-1186.
-
(2007)
Nat Genet
, vol.39
, pp. 1181-1186
-
-
Mailman, M.D.1
Feolo, M.2
Jin, Y.3
Kimura, M.4
Tryka, K.5
Bagoutdinov, R.6
-
90
-
-
0035180346
-
The use of electronic medical records communication patterns in outpatient encounters
-
Makoul G., Curry R.H., Tang P.C. The use of electronic medical records communication patterns in outpatient encounters. J Am Med Informat Assoc 2001, 8(6):610-615.
-
(2001)
J Am Med Informat Assoc
, vol.8
, Issue.6
, pp. 610-615
-
-
Makoul, G.1
Curry, R.H.2
Tang, P.C.3
-
91
-
-
74249091457
-
Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research
-
Malin B., Karp D., Scheuermann R.H. Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research. J Invest Med: Off Pub Am Fed Clin Res 2010, 58(1):11-18.
-
(2010)
J Invest Med: Off Pub Am Fed Clin Res
, vol.58
, Issue.1
, pp. 11-18
-
-
Malin, B.1
Karp, D.2
Scheuermann, R.H.3
-
92
-
-
80053335117
-
Identifiability in biobanks: models, measures, and mitigation strategies
-
Malin B., Loukides G., Benitez K., Clayton E.W. Identifiability in biobanks: models, measures, and mitigation strategies. Hum Genet 2011, 130(3):383-392.
-
(2011)
Hum Genet
, vol.130
, Issue.3
, pp. 383-392
-
-
Malin, B.1
Loukides, G.2
Benitez, K.3
Clayton, E.W.4
-
93
-
-
80053335117
-
Identifiability in biobanks: models, measures, and mitigation strategies
-
Malin B., Loukides G., Benitez K., Clayton E.W. Identifiability in biobanks: models, measures, and mitigation strategies. Hum Genet 2011, 130(3):383-392.
-
(2011)
Hum Genet
, vol.130
, Issue.3
, pp. 383-392
-
-
Malin, B.1
Loukides, G.2
Benitez, K.3
Clayton, E.W.4
-
94
-
-
77955080124
-
Automatic de-identification of textual documents in the electronic health record: a review of recent research
-
Meystre S.M., Friedlin F.J., South B.R., Shen S., Samore M.H. Automatic de-identification of textual documents in the electronic health record: a review of recent research. BMC Med Res Methodol 2010, 10(70).
-
(2010)
BMC Med Res Methodol
, vol.10
, Issue.70
-
-
Meystre, S.M.1
Friedlin, F.J.2
South, B.R.3
Shen, S.4
Samore, M.H.5
-
96
-
-
80052663001
-
Differentially private data release for data mining
-
Mohammed N, Chen R, Fung BCM, Yu PS. Differentially private data release for data mining. In: KDD; 2011. p. 493-501.
-
(2011)
KDD
, pp. 493-501
-
-
Mohammed, N.1
Chen, R.2
Fung, B.C.M.3
Yu, P.S.4
-
97
-
-
0035049112
-
Analysis of the clustering properties of the hilbert space-filling curve
-
Moon B., Jagadish H.v., Faloutsos C., Saltz J.H. Analysis of the clustering properties of the hilbert space-filling curve. IEEE Trans Knowl Data Eng 2001, 13(1):124-141.
-
(2001)
IEEE Trans Knowl Data Eng
, vol.13
, Issue.1
, pp. 124-141
-
-
Moon, B.1
Jagadish, H.2
Faloutsos, C.3
Saltz, J.H.4
-
99
-
-
50249142450
-
Robust de-anonymization of large sparse datasets
-
Narayanan A, Shmatikov V. Robust de-anonymization of large sparse datasets. In: IEEE S&P, 2008, p. 111-125.
-
(2008)
IEEE S&P
, pp. 111-125
-
-
Narayanan, A.1
Shmatikov, V.2
-
100
-
-
35448937300
-
Hiding the presence of individuals from shared databases
-
Nergiz ME, Atzori M, Clifton C. Hiding the presence of individuals from shared databases. In: SIGMOD '07; 2007. p. 665-676.
-
(2007)
SIGMOD '07
, pp. 665-676
-
-
Nergiz, M.E.1
Atzori, M.2
Clifton, C.3
-
101
-
-
77951765129
-
D-presence without complete world knowledge
-
Nergiz M.E., Clifton C. d-presence without complete world knowledge. Tkde 2010, 22(6):868-883.
-
(2010)
Tkde
, vol.22
, Issue.6
, pp. 868-883
-
-
Nergiz, M.E.1
Clifton, C.2
-
102
-
-
34548689125
-
Thoughts on k-anonymization
-
Nergiz M.E., Clifton C. Thoughts on k-anonymization. Dke 2007, 63(3):622-645.
-
(2007)
Dke
, vol.63
, Issue.3
, pp. 622-645
-
-
Nergiz, M.E.1
Clifton, C.2
-
103
-
-
77951765129
-
δ-presence without complete world knowledge
-
Nergiz M.E., Clifton C. δ-presence without complete world knowledge. IEEE Trans Knowl Data Eng 2010, 22(6):868-883.
-
(2010)
IEEE Trans Knowl Data Eng
, vol.22
, Issue.6
, pp. 868-883
-
-
Nergiz, M.E.1
Clifton, C.2
-
107
-
-
70349869210
-
Longitudinal histories as predictors of future diagnoses of domestic abuse: modelling study
-
Reis B.Y., Kohane I.S., Mandl K.D. Longitudinal histories as predictors of future diagnoses of domestic abuse: modelling study. Bmj 2009, 339(9).
-
(2009)
Bmj
, vol.339
, Issue.9
-
-
Reis, B.Y.1
Kohane, I.S.2
Mandl, K.D.3
-
108
-
-
0035286694
-
Ethical and legal implications of pharmacogenomics
-
Rothstein M., Epps P. Ethical and legal implications of pharmacogenomics. Nat Rev Genet 2001, 2:228-231.
-
(2001)
Nat Rev Genet
, vol.2
, pp. 228-231
-
-
Rothstein, M.1
Epps, P.2
-
109
-
-
0035517699
-
Protecting respondents identities in microdata release
-
Samarati P. Protecting respondents identities in microdata release. Tkde 2001, 13(9):1010-1027.
-
(2001)
Tkde
, vol.13
, Issue.9
, pp. 1010-1027
-
-
Samarati, P.1
-
110
-
-
0030086382
-
Role-based access control models
-
Sandhu R.S., Coyne E.J., Feinstein H.L., Youman C.E. Role-based access control models. IEEE Comput 1996, 29(2):38-47.
-
(1996)
IEEE Comput
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
111
-
-
0030333205
-
Replacing personally-identifying information in medical records, the scrub system
-
Sweeney L. Replacing personally-identifying information in medical records, the scrub system. In: Proceedings of the AMIA annual fall symposium; 1996. p. 333-7.
-
(1996)
Proceedings of the AMIA annual fall symposium
, pp. 333-337
-
-
Sweeney, L.1
-
112
-
-
0036811662
-
K-anonymity: a model for protecting privacy
-
Sweeney L. k-anonymity: a model for protecting privacy. Ijufks 2002, 10:557-570.
-
(2002)
Ijufks
, vol.10
, pp. 557-570
-
-
Sweeney, L.1
-
113
-
-
0003529621
-
Computational disclosure control: a primer on data privacy protection.
-
PhD thesis, AAI0803469
-
Sweeney L. Computational disclosure control: a primer on data privacy protection. PhD thesis, AAI0803469; 2001.
-
(2001)
-
-
Sweeney, L.1
-
114
-
-
52649134322
-
On anti-corruption privacy preserving publication
-
Tao Y, Xiao X, Li J, Zhang D. On anti-corruption privacy preserving publication. In: Proceedings of the 2008 IEEE 24th international conference on data engineering, ICDE '08; 2008. p. 725-34.
-
(2008)
Proceedings of the 2008 IEEE 24th international conference on data engineering, ICDE '08
, pp. 725-734
-
-
Tao, Y.1
Xiao, X.2
Li, J.3
Zhang, D.4
-
115
-
-
84859177489
-
Privacy-preserving anonymization of set-valued data
-
Terrovitis M., Mamoulis N., Kalnis P. Privacy-preserving anonymization of set-valued data. Pvldb 2008, 1(1):115-125.
-
(2008)
Pvldb
, vol.1
, Issue.1
, pp. 115-125
-
-
Terrovitis, M.1
Mamoulis, N.2
Kalnis, P.3
-
116
-
-
78751575731
-
Local and global recoding methods for anonymizing set-valued data
-
Terrovitis M., Mamoulis N., Kalnis P. Local and global recoding methods for anonymizing set-valued data. VLDB J 2011, 20(1):83-106.
-
(2011)
VLDB J
, vol.20
, Issue.1
, pp. 83-106
-
-
Terrovitis, M.1
Mamoulis, N.2
Kalnis, P.3
-
117
-
-
75749120261
-
Impact of spatial clustering on disease transmission and optimal control
-
Tildesley M.J., House T.A., Bruhn M.C., Curry R.J., ONeil M., Allpress J.L.E., et al. Impact of spatial clustering on disease transmission and optimal control. Proc Nat Acad Sci 2010, 107(3):1041-1046.
-
(2010)
Proc Nat Acad Sci
, vol.107
, Issue.3
, pp. 1041-1046
-
-
Tildesley, M.J.1
House, T.A.2
Bruhn, M.C.3
Curry, R.J.4
ONeil, M.5
Allpress, J.L.E.6
-
118
-
-
84990966245
-
Privacy protection: p-sensitive k-anonymity property.
-
Truta TM, Vinay B. Privacy protection: p-sensitive k-anonymity property. In: ICDE workshops; 2006. p. 94.
-
(2006)
ICDE workshops
, pp. 94
-
-
Truta, T.M.1
Vinay, B.2
-
119
-
-
84905239790
-
Public Use Microdata
-
United States Census American Community Survey.
-
United States Census American Community Survey. Public Use Microdata; 2003.
-
(2003)
-
-
-
120
-
-
84905230893
-
-
U.S. Department of Health Human Services Office for Civil Rights. H.I.P.A.A administrative simplification regulation text.
-
U.S. Department of Health and Human Services Office for Civil Rights. HIPAA administrative simplification regulation text; 2006.
-
(2006)
-
-
-
121
-
-
77952332120
-
Privacy-preserving k-means clustering over vertically partitioned data
-
Vaidya J, Clifton C. Privacy-preserving k-means clustering over vertically partitioned data. In: KDD; 2003. p. 206-15.
-
(2003)
KDD
, pp. 206-215
-
-
Vaidya, J.1
Clifton, C.2
-
123
-
-
74049130896
-
Learning your identity and disease from research papers: information leaks in genome wide association study.
-
Butterworth-Heinemann, Newton, MA, USA
-
Wang R, Li YF, Wang X, Tang H, Zhou X. Learning your identity and disease from research papers: information leaks in genome wide association study. In: CCS; 2009. p. 534-44.
-
(2009)
CCS
, pp. 534-544
-
-
Wang, R.1
Li, Y.F.2
Wang, X.3
Tang, H.4
Zhou, X.5
-
124
-
-
74049087814
-
Privacy-preserving genomic computation through program specialization.
-
Proceedings of the 16th ACM conference on computer and communications security, CCS '09
-
Wang R, Wang X, Li Z, Tang H, Reiter MK, Dong Z. Privacy-preserving genomic computation through program specialization. In: Proceedings of the 16th ACM conference on computer and communications security, CCS '09; 2009. p. 338-47.
-
(2009)
, pp. 338-347
-
-
Wang, R.1
Wang, X.2
Li, Z.3
Tang, H.4
Reiter, M.K.5
Dong, Z.6
-
125
-
-
85011016303
-
Minimality attack in privacy preserving data publishing
-
Wong RC, Fu A, Wang K, Pei J. Minimality attack in privacy preserving data publishing. In: VLDB; 2007. p. 543-54.
-
(2007)
VLDB
, pp. 543-554
-
-
Wong, R.C.1
Fu, A.2
Wang, K.3
Pei, J.4
-
126
-
-
33749571958
-
alpha-k-Anonymity: an enhanced k-anonymity model for privacy-preserving data publishing.
-
Wong RC, Li J, Fu A, Wang K. alpha-k-Anonymity: an enhanced k-anonymity model for privacy-preserving data publishing. In: KDD; 2006. p. 754-59.
-
(2006)
KDD
, pp. 754-759
-
-
Wong, R.C.1
Li, J.2
Fu, A.3
Wang, K.4
-
127
-
-
84893853914
-
Anatomy: simple and effective privacy preservation
-
Xiao X, Tao Y. Anatomy: simple and effective privacy preservation. In: VLDB; 2006. p. 139-50.
-
(2006)
VLDB
, pp. 139-150
-
-
Xiao, X.1
Tao, Y.2
-
128
-
-
34250680246
-
Personalized privacy preservation.
-
Xiao X, Tao Y. Personalized privacy preservation. In: SIGMOD; 2006. p. 229-40.
-
(2006)
SIGMOD
, pp. 229-240
-
-
Xiao, X.1
Tao, Y.2
-
129
-
-
33749582207
-
Utility-based anonymization using local recoding
-
Xu J, Wang W, Pei J, Wang X, Shi B, Fu AW-C. Utility-based anonymization using local recoding. In: KDD; 2006. p. 785-90.
-
(2006)
KDD
, pp. 785-790
-
-
Xu, J.1
Wang, W.2
Pei, J.3
Wang, X.4
Shi, B.5
Fu, A.W-C.6
-
130
-
-
65449148368
-
Anonymizing transaction databases for publication
-
Xu Y, Wang K, Fu AW-C, Yu PS. Anonymizing transaction databases for publication. In: KDD; 2008. p. 767-75.
-
(2008)
KDD
, pp. 767-775
-
-
Xu, Y.1
Wang, K.2
Fu, A.W-C.3
Yu, P.S.4
-
131
-
-
33745214431
-
Generalized multidimensional data mapping and query processing
-
Zhang R., Kalnis P., Ooi B., Tan K. Generalized multidimensional data mapping and query processing. ACM Trans Database Syst 2005, 30(3):661-697.
-
(2005)
ACM Trans Database Syst
, vol.30
, Issue.3
, pp. 661-697
-
-
Zhang, R.1
Kalnis, P.2
Ooi, B.3
Tan, K.4
|