메뉴 건너뛰기




Volumn 50, Issue , 2014, Pages 4-19

Publishing data from electronic health records while preserving privacy: A survey of algorithms

Author keywords

Algorithms; Anonymization; Electronic health records; Privacy; Survey

Indexed keywords

DATA PRIVACY; DISEASE CONTROL; HOSPITAL DATA PROCESSING; RECORDS MANAGEMENT; SURVEYING; SURVEYS;

EID: 84905223399     PISSN: 15320464     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jbi.2014.06.002     Document Type: Review
Times cited : (175)

References (131)
  • 1
    • 84905284950 scopus 로고
    • EU Data Protection Directive 95/46/ECK
    • EU Data Protection Directive 95/46/ECK; 1995.
    • (1995)
  • 2
    • 84905248987 scopus 로고    scopus 로고
    • UK Data Protection Act
    • UK Data Protection Act; 1998.
    • (1998)
  • 3
    • 84905230891 scopus 로고    scopus 로고
    • Personal Information Protection and Electronic Documents Act
    • Personal Information Protection and Electronic Documents Act; 2000.
    • (2000)
  • 4
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: a comparative study
    • Adam N.R., Worthmann J.C. Security-control methods for statistical databases: a comparative study. ACM Comput Surv 1989, 21(4):515-556.
    • (1989) ACM Comput Surv , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Worthmann, J.C.2
  • 7
    • 0002221136 scopus 로고
    • Fast algorithms for mining association rules in large databases
    • Agrawal R, Srikant R. Fast algorithms for mining association rules in large databases. In: VLDB; 1994. p. 487-99.
    • (1994) VLDB , pp. 487-499
    • Agrawal, R.1    Srikant, R.2
  • 9
    • 28444449426 scopus 로고    scopus 로고
    • Data privacy through optimal k-anonymization
    • Bayardo RJ, Agrawal R. Data privacy through optimal k-anonymization. In: 21st ICDE; 2005. p. 217-28.
    • (2005) 21st ICDE , pp. 217-228
    • Bayardo, R.J.1    Agrawal, R.2
  • 10
    • 78650942280 scopus 로고    scopus 로고
    • Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
    • Benitez K, Loukides G, Malin B. Beyond safe harbor: automatic discovery of health information de-identification policy alternatives. In: ACM international health informatics symposium; 2010. p. 163-72.
    • (2010) ACM international health informatics symposium , pp. 163-172
    • Benitez, K.1    Loukides, G.2    Malin, B.3
  • 11
    • 0037870443 scopus 로고    scopus 로고
    • The x-tree: an index structure for high-dimensional data
    • Berchtold S, Keim DA, Kriegel H. The x-tree: an index structure for high-dimensional data. In: VLDB; 1996. p. 28-39.
    • (1996) VLDB , pp. 28-39
    • Berchtold, S.1    Keim, D.A.2    Kriegel, H.3
  • 12
    • 0038580808 scopus 로고    scopus 로고
    • Concept-match medical data scrubbing
    • Berman J.J. Concept-match medical data scrubbing. Arch Pathol Lab Med 2003, 127(6):680-686.
    • (2003) Arch Pathol Lab Med , vol.127 , Issue.6 , pp. 680-686
    • Berman, J.J.1
  • 13
    • 84867261096 scopus 로고    scopus 로고
    • Recommendation-based de-identification: a practical systems approach towards de-identification of unstructured text in healthcare
    • SERVICES '12
    • Bhagwan V, Grandison T, Maltzahn C. Recommendation-based de-identification: a practical systems approach towards de-identification of unstructured text in healthcare. In: Proceedings of the 2012 IEEE eighth world congress on services, SERVICES '12; 2012. p. 155-62.
    • (2012) Proceedings of the 2012 IEEE eighth world congress on services , pp. 155-162
    • Bhagwan, V.1    Grandison, T.2    Maltzahn, C.3
  • 14
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • Burges C.J.C. A tutorial on support vector machines for pattern recognition. Data Min Knowl Discov 1998, 2(2):121-167.
    • (1998) Data Min Knowl Discov , vol.2 , Issue.2 , pp. 121-167
    • Burges, C.J.C.1
  • 15
    • 38049126170 scopus 로고    scopus 로고
    • Efficient k-anonymization using clustering techniques
    • Byun J, Kamra A, Bertino E, Li N. Efficient k-anonymization using clustering techniques. In: DASFAA; 2007. p. 188-200.
    • (2007) DASFAA , pp. 188-200
    • Byun, J.1    Kamra, A.2    Bertino, E.3    Li, N.4
  • 16
    • 79956041471 scopus 로고    scopus 로고
    • Rho-uncertainty: inference-proof transaction anonymization
    • Cao J., Karras P., Raïssi C., Tan K. rho-uncertainty: inference-proof transaction anonymization. Pvldb 2010, 3(1):1033-1044.
    • (2010) Pvldb , vol.3 , Issue.1 , pp. 1033-1044
    • Cao, J.1    Karras, P.2    Raïssi, C.3    Tan, K.4
  • 17
    • 66749192419 scopus 로고    scopus 로고
    • My sister's keeper? Genomic research and the identifiability of siblings
    • Cassa C.A., Schmidt B., Kohane I.S., Mandl K.D. My sister's keeper? Genomic research and the identifiability of siblings. BMC Med Genom 2008, 1:32.
    • (2008) BMC Med Genom , vol.1 , pp. 32
    • Cassa, C.A.1    Schmidt, B.2    Kohane, I.S.3    Mandl, K.D.4
  • 19
    • 85011039411 scopus 로고    scopus 로고
    • Privacy skyline: privacy with multidimensional adversarial knowledge
    • Chen B, Ramakrishnan R, LeFevre K. Privacy skyline: privacy with multidimensional adversarial knowledge. In: VLDB; 2007. p. 770-81.
    • (2007) VLDB , pp. 770-781
    • Chen, B.1    Ramakrishnan, R.2    LeFevre, K.3
  • 20
    • 84861595370 scopus 로고    scopus 로고
    • Publishing set-valued data via differential privacy
    • Chen R., Mohammed N., Fung B.C.M., Desai B.C., Xiong L. Publishing set-valued data via differential privacy. Pvldb 2011, 4(11):1087-1098.
    • (2011) Pvldb , vol.4 , Issue.11 , pp. 1087-1098
    • Chen, R.1    Mohammed, N.2    Fung, B.C.M.3    Desai, B.C.4    Xiong, L.5
  • 21
    • 80052688705 scopus 로고    scopus 로고
    • Personal privacy vs population privacy: learning to attack anonymization
    • Cormode G. Personal privacy vs population privacy: learning to attack anonymization. In: KDD; 2011. p. 1253-61.
    • (2011) KDD , pp. 1253-1261
    • Cormode, G.1
  • 22
    • 70449431315 scopus 로고    scopus 로고
    • Use of electronic medical records for health outcomes research: a literature review
    • Dean B.B., Lam J., Natoli J.L., Butler Q., Aguilar D., Nordyke R.J. Use of electronic medical records for health outcomes research: a literature review. Med Care Res Rev 2010, 66(6):611-638.
    • (2010) Med Care Res Rev , vol.66 , Issue.6 , pp. 611-638
    • Dean, B.B.1    Lam, J.2    Natoli, J.L.3    Butler, Q.4    Aguilar, D.5    Nordyke, R.J.6
  • 24
    • 0036190566 scopus 로고    scopus 로고
    • Practical data-oriented microaggregation for statistical disclosure control
    • Domingo-Ferrer J., Mateo-Sanz J.M. Practical data-oriented microaggregation for statistical disclosure control. IEEE Trans Knowl Data Eng 2002, 14(1):189-201.
    • (2002) IEEE Trans Knowl Data Eng , vol.14 , Issue.1 , pp. 189-201
    • Domingo-Ferrer, J.1    Mateo-Sanz, J.M.2
  • 25
    • 26944448516 scopus 로고    scopus 로고
    • Ordinal, continuous and heterogeneous k-anonymity through microaggregation
    • Domingo-Ferrer J., Torra V. Ordinal, continuous and heterogeneous k-anonymity through microaggregation. Dmkd 2005, 11(2):195-212.
    • (2005) Dmkd , vol.11 , Issue.2 , pp. 195-212
    • Domingo-Ferrer, J.1    Torra, V.2
  • 27
    • 57149146157 scopus 로고    scopus 로고
    • Privacy-maxent: integrating background knowledge in privacy quantification
    • Du W, Teng Z, Zhu Z. Privacy-maxent: integrating background knowledge in privacy quantification. In: SIGMOD; 2008. p. 459-72.
    • (2008) SIGMOD , pp. 459-472
    • Du, W.1    Teng, Z.2    Zhu, Z.3
  • 28
    • 34548748588 scopus 로고    scopus 로고
    • On multidimensional k-anonymity with local recoding generalization
    • Du Y, Xia T, Tao Y, Zhang D, Zhu F. On multidimensional k-anonymity with local recoding generalization. In: ICDE '07; 2007. p. 1422-4.
    • (2007) ICDE, '07 , pp. 1422-1424
    • Du, Y.1    Xia, T.2    Tao, Y.3    Zhang, D.4    Zhu, F.5
  • 29
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy
    • Dwork C. Differential privacy. In: ICALP; 2006. p. 1-12.
    • (2006) ICALP , pp. 1-12
    • Dwork, C.1
  • 30
    • 70349305273 scopus 로고    scopus 로고
    • Differential privacy: a survey of results
    • Dwork C.
    • Dwork C. Differential privacy: a survey of results. In: TAMC; 2008. p. 1-19.
    • (2008) TAMC , pp. 1-19
  • 32
    • 69549114557 scopus 로고    scopus 로고
    • A globally optimal k-anonymity method for the de-identification of health data
    • El Emam K., Dankar F., Issa R., Jonker E., et al. A globally optimal k-anonymity method for the de-identification of health data. J Am Med Informat Assoc 2009, 16(5):670-682.
    • (2009) J Am Med Informat Assoc , vol.16 , Issue.5 , pp. 670-682
    • El Emam, K.1    Dankar, F.2    Issa, R.3    Jonker, E.4
  • 33
    • 82555187188 scopus 로고    scopus 로고
    • A systematic review of re-identification attacks on health data
    • [e28071, 12]
    • El Emam K., Jonker E., Arbuckle L., Malin B. A systematic review of re-identification attacks on health data. PLoS ONE 2011, 6(12). [e28071, 12].
    • (2011) PLoS ONE , vol.6 , Issue.12
    • El Emam, K.1    Jonker, E.2    Arbuckle, L.3    Malin, B.4
  • 34
    • 49249103738 scopus 로고    scopus 로고
    • Protecting privacy using k-anonymity
    • El Emam K., Dankar F.K. Protecting privacy using k-anonymity. J Am Med Informat Assoc 2008, 15(5):627-637.
    • (2008) J Am Med Informat Assoc , vol.15 , Issue.5 , pp. 627-637
    • El Emam, K.1    Dankar, F.K.2
  • 36
    • 84878197970 scopus 로고    scopus 로고
    • Security and privacy in electronic health records: a systematic literature review
    • Fernandez-Aleman J., Senor I., Oliver Lozoya P.A., Toval A. Security and privacy in electronic health records: a systematic literature review. J Biomed Informat 2013, 46(3):541-562.
    • (2013) J Biomed Informat , vol.46 , Issue.3 , pp. 541-562
    • Fernandez-Aleman, J.1    Senor, I.2    Oliver Lozoya, P.A.3    Toval, A.4
  • 38
    • 0019637328 scopus 로고
    • Optimal choice of discriminators in a balanced k-d binary search tree
    • Filho Y.V. Optimal choice of discriminators in a balanced k-d binary search tree. Inf Process Lett 1981, 13(2):67-70.
    • (1981) Inf Process Lett , vol.13 , Issue.2 , pp. 67-70
    • Filho, Y.V.1
  • 39
    • 77951201056 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: a survey on recent developments
    • Fung B.C.M., Wang K., Chen R., Yu P.S. Privacy-preserving data publishing: a survey on recent developments. ACM Comput Surv 2010, 42.
    • (2010) ACM Comput Surv , vol.42
    • Fung, B.C.M.1    Wang, K.2    Chen, R.3    Yu, P.S.4
  • 40
    • 28444499680 scopus 로고    scopus 로고
    • Top-down specialization for information and privacy preservation
    • Fung BCM, Wang K, Yu PS. Top-down specialization for information and privacy preservation. In: ICDE; 2005. p. 205-16.
    • (2005) ICDE , pp. 205-216
    • Fung, B.C.M.1    Wang, K.2    Yu, P.S.3
  • 41
    • 64549145427 scopus 로고    scopus 로고
    • Privacy-preserving data publishing for cluster analysis
    • Fung B.C.M., Wang K., Wang L., Hung P.C.K. Privacy-preserving data publishing for cluster analysis. Data Knowl Eng 2009, 68(6):552-575.
    • (2009) Data Knowl Eng , vol.68 , Issue.6 , pp. 552-575
    • Fung, B.C.M.1    Wang, K.2    Wang, L.3    Hung, P.C.K.4
  • 42
    • 84871902175 scopus 로고    scopus 로고
    • Share: system design and case studies for statistical health information release
    • Gardner J.J., Xiong L., Xiao Y., Gao J., Post A.R., Jiang X., et al. Share: system design and case studies for statistical health information release. Jamia 2013, 20(1):109-116.
    • (2013) Jamia , vol.20 , Issue.1 , pp. 109-116
    • Gardner, J.J.1    Xiong, L.2    Xiao, Y.3    Gao, J.4    Post, A.R.5    Jiang, X.6
  • 45
    • 52649175334 scopus 로고    scopus 로고
    • k-Anonymization revisited
    • Gionis A, Mazza A, Tassa T. k-Anonymization revisited. In: ICDE; 2008. p. 744-53.
    • (2008) ICDE , pp. 744-753
    • Gionis, A.1    Mazza, A.2    Tassa, T.3
  • 46
    • 79955987566 scopus 로고    scopus 로고
    • PCTA: privacy-constrained clustering-based transaction data anonymization
    • Gkoulalas-Divanis A, Loukides G. PCTA: privacy-constrained clustering-based transaction data anonymization. In: EDBT PAIS; 2011. p. 5.
    • (2011) EDBT PAIS , pp. 5
    • Gkoulalas-Divanis, A.1    Loukides, G.2
  • 47
    • 80052662844 scopus 로고    scopus 로고
    • Revisiting sequential pattern hiding to enhance utility
    • Gkoulalas-Divanis A, Loukides G. Revisiting sequential pattern hiding to enhance utility. In: KDD; 2011. p. 1316-24.
    • (2011) KDD , pp. 1316-1324
    • Gkoulalas-Divanis, A.1    Loukides, G.2
  • 48
    • 69949190981 scopus 로고    scopus 로고
    • Hiding sensitive knowledge without side effects
    • Gkoulalas-Divanis A., Verykios V.S. Hiding sensitive knowledge without side effects. Knowl Inf Syst 2009, 20(3):263-299.
    • (2009) Knowl Inf Syst , vol.20 , Issue.3 , pp. 263-299
    • Gkoulalas-Divanis, A.1    Verykios, V.S.2
  • 49
    • 0032091595 scopus 로고    scopus 로고
    • Cure: an efficient clustering algorithm for large databases
    • Guha S, Rastogi R, Shim K. Cure: an efficient clustering algorithm for large databases. In: SIGMOD; 1998. p. 73-84.
    • (1998) SIGMOD , pp. 73-84
    • Guha, S.1    Rastogi, R.2    Shim, K.3
  • 50
    • 0942266011 scopus 로고    scopus 로고
    • Evaluation of a deidentification (De-Id) software engine to share pathology reports and clinical documents for research
    • Gupta D., Saul M., Gilbertson J. Evaluation of a deidentification (De-Id) software engine to share pathology reports and clinical documents for research. Am J Clin Pathol 2004, 121(2):176-186.
    • (2004) Am J Clin Pathol , vol.121 , Issue.2 , pp. 176-186
    • Gupta, D.1    Saul, M.2    Gilbertson, J.3
  • 52
    • 78049372159 scopus 로고    scopus 로고
    • Anonymization of set-valued data via top-down, local generalization
    • He Y., Naughton J.F. Anonymization of set-valued data via top-down, local generalization. Pvldb 2009, 2(1):934-945.
    • (2009) Pvldb , vol.2 , Issue.1 , pp. 934-945
    • He, Y.1    Naughton, J.F.2
  • 53
    • 84905248988 scopus 로고    scopus 로고
    • UCI repository of machine learning databases
    • Hettich S, Merz CJ. UCI repository of machine learning databases; 1998.
    • (1998)
    • Hettich, S.1    Merz, C.J.2
  • 54
    • 50849101381 scopus 로고    scopus 로고
    • Resolving individuals contributing trace amounts of dna to highly complex mixtures using high-density SNP genotyping microarrays
    • Homer N., Szelinger S., Redman M., et al. Resolving individuals contributing trace amounts of dna to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genet 2008, 4(8):e1000167.
    • (2008) PLoS Genet , vol.4 , Issue.8
    • Homer, N.1    Szelinger, S.2    Redman, M.3
  • 55
    • 85086421071 scopus 로고    scopus 로고
    • Flexible anonymization for privacy preserving data publishing: a systematic search based approach
    • Hore B, Jammalamadaka RC, Mehrotra S. Flexible anonymization for privacy preserving data publishing: a systematic search based approach. In: SDM; 2007.
    • (2007) SDM
    • Hore, B.1    Jammalamadaka, R.C.2    Mehrotra, S.3
  • 56
    • 84871886070 scopus 로고    scopus 로고
    • Use and characteristics of electronic health record systems among office-based physician practices: United States 2001-2012.
    • Hsiao CJ, Hing E. Use and characteristics of electronic health record systems among office-based physician practices: United States, 2001-2012. NCHS data brief; 2012. p. 1-8.
    • (2012) NCHS data brief , pp. 1-8
    • Hsiao, C.J.1    Hing, E.2
  • 57
    • 85011028519 scopus 로고    scopus 로고
    • k-Anonymization as spatial indexing: toward scalable and incremental anonymization
    • Iwuchukwu T, Naughton JF. k-Anonymization as spatial indexing: toward scalable and incremental anonymization. In: VLDB; 2007. p. 746-57.
    • (2007) VLDB , pp. 746-757
    • Iwuchukwu, T.1    Naughton, J.F.2
  • 58
    • 0242625276 scopus 로고    scopus 로고
    • Transforming data to satisfy privacy constraints
    • Iyengar VS. Transforming data to satisfy privacy constraints. In: KDD; 2002. p. 279-88.
    • (2002) KDD , pp. 279-288
    • Iyengar, V.S.1
  • 60
    • 34548710709 scopus 로고    scopus 로고
    • Aggregate query answering on anonymized tables
    • Koudas N, Zhang Q, Srivastava D, Yu T. Aggregate query answering on anonymized tables. In: ICDE '07; 2007. p. 116-25.
    • (2007) ICDE '07 , pp. 116-125
    • Koudas, N.1    Zhang, Q.2    Srivastava, D.3    Yu, T.4
  • 62
    • 22944452807 scopus 로고    scopus 로고
    • Minimum spanning tree partitioning algorithm for microaggregation
    • Laszlo M., Mukherjee S. Minimum spanning tree partitioning algorithm for microaggregation. IEEE Trans Knowl Data Eng 2005, 17(7):902-911.
    • (2005) IEEE Trans Knowl Data Eng , vol.17 , Issue.7 , pp. 902-911
    • Laszlo, M.1    Mukherjee, S.2
  • 63
    • 80955124079 scopus 로고    scopus 로고
    • Use of electronic medical records (EMR) for oncology outcomes research: assessing the comparability of EMR information to patient registry and health claims data
    • Lau E.C., Mowat F.S., Kelsh M.A., Legg J.C., Engel-Nitz N.M., Watson H.N., et al. Use of electronic medical records (EMR) for oncology outcomes research: assessing the comparability of EMR information to patient registry and health claims data. Clin Epidemiol 2011, 3(1):259-272.
    • (2011) Clin Epidemiol , vol.3 , Issue.1 , pp. 259-272
    • Lau, E.C.1    Mowat, F.S.2    Kelsh, M.A.3    Legg, J.C.4    Engel-Nitz, N.M.5    Watson, H.N.6
  • 64
    • 51149098991 scopus 로고    scopus 로고
    • Workload-aware anonymization techniques for large-scale datasets
    • LeFevre K., DeWitt D.J., Ramakrishnan R. Workload-aware anonymization techniques for large-scale datasets. Tods 2008, 33(3).
    • (2008) Tods , vol.33 , Issue.3
    • LeFevre, K.1    DeWitt, D.J.2    Ramakrishnan, R.3
  • 65
    • 29844444250 scopus 로고    scopus 로고
    • Incognito: efficient full-domain k-anonymity.
    • LeFevre K, DeWitt DJ, Ramakrishnan R. Incognito: efficient full-domain k-anonymity. In: SIGMOD; 2005. p. 49-60
    • (2005) SIGMOD , pp. 49-60
    • LeFevre, K.1    DeWitt, D.J.2    Ramakrishnan, R.3
  • 68
    • 50649097562 scopus 로고    scopus 로고
    • Achieving -anonymity by clustering in attribute hierarchical structures.
    • Li J, Wong R, Fu A, Pei J, Achieving -anonymity by clustering in attribute hierarchical structures. In: DaWaK; 2006. p. 405-416.
    • (2006) DaWaK , pp. 405-416
    • Li, J.1    Wong, R.2    Fu, A.3    Pei, J.4
  • 69
    • 34548805858 scopus 로고    scopus 로고
    • t-Closeness: privacy beyond k-anonymity and l-diversity
    • Li N, Li T, Venkatasubramanian S. t-Closeness: privacy beyond k-anonymity and l-diversity. In: ICDE; 2007. p. 106-15.
    • (2007) ICDE , pp. 106-115
    • Li, N.1    Li, T.2    Venkatasubramanian, S.3
  • 70
    • 77952913726 scopus 로고    scopus 로고
    • Closeness: a new privacy measure for data publishing
    • Li N., Li T., Venkatasubramanian S. Closeness: a new privacy measure for data publishing. IEEE Trans Knowl Data Eng 2010, 22(7):943-956.
    • (2010) IEEE Trans Knowl Data Eng , vol.22 , Issue.7 , pp. 943-956
    • Li, N.1    Li, T.2    Venkatasubramanian, S.3
  • 71
    • 33845517298 scopus 로고    scopus 로고
    • Security analysis in role-based access control
    • Li N., Tripunitara M.V. Security analysis in role-based access control. ACM Trans Inf Syst Secur 2006, 9(4):391-420.
    • (2006) ACM Trans Inf Syst Secur , vol.9 , Issue.4 , pp. 391-420
    • Li, N.1    Tripunitara, M.V.2
  • 72
    • 52649086216 scopus 로고    scopus 로고
    • Injector: mining background knowledge for data anonymization.
    • Li T, Li N. Injector: mining background knowledge for data anonymization. In: ICDE; 2008. p. 446-55.
    • (2008) ICDE , pp. 446-455
    • Li, T.1    Li, N.2
  • 73
    • 84974555530 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Lindell Y, Pinkas B. Privacy preserving data mining. 2000. p. 36-54.
    • (2000) , pp. 36-54
    • Lindell, Y.1    Pinkas, B.2
  • 75
    • 77955283376 scopus 로고    scopus 로고
    • The disclosure of diagnosis codes can breach research participants' privacy
    • Loukides G., Denny J.C., Malin B. The disclosure of diagnosis codes can breach research participants' privacy. J Am Med Informat Assoc 2010, 17:322-327.
    • (2010) J Am Med Informat Assoc , vol.17 , pp. 322-327
    • Loukides, G.1    Denny, J.C.2    Malin, B.3
  • 76
    • 77952390550 scopus 로고    scopus 로고
    • Anonymization of electronic medical records for validating genome-wide association studies
    • Loukides G., Gkoulalas-Divanis A., Malin B. Anonymization of electronic medical records for validating genome-wide association studies. Proc Nat Acad Sci 2010, 17(107):7898-7903.
    • (2010) Proc Nat Acad Sci , vol.17 , Issue.107 , pp. 7898-7903
    • Loukides, G.1    Gkoulalas-Divanis, A.2    Malin, B.3
  • 78
    • 79961206921 scopus 로고    scopus 로고
    • COAT: constraint-based anonymization of transactions
    • Loukides G., Gkoulalas-Divanis A., Malin B. COAT: constraint-based anonymization of transactions. Knowl Inf Syst 2011, 28(2):251-282.
    • (2011) Knowl Inf Syst , vol.28 , Issue.2 , pp. 251-282
    • Loukides, G.1    Gkoulalas-Divanis, A.2    Malin, B.3
  • 79
    • 78049360732 scopus 로고    scopus 로고
    • Anonymizing transaction data to eliminate sensitive inferences
    • Loukides G, Gkoulalas-Divanis A, Shao J. Anonymizing transaction data to eliminate sensitive inferences. In: DEXA; 2010. p. 400-415.
    • (2010) DEXA , pp. 400-415
    • Loukides, G.1    Gkoulalas-Divanis, A.2    Shao, J.3
  • 80
    • 84878864234 scopus 로고    scopus 로고
    • Efficient and flexible anonymization of transaction data
    • Loukides G., Gkoulalas-Divanis A., Shao J. Efficient and flexible anonymization of transaction data. Knowl Inf Syst 2013, 36(1):153-210.
    • (2013) Knowl Inf Syst , vol.36 , Issue.1 , pp. 153-210
    • Loukides, G.1    Gkoulalas-Divanis, A.2    Shao, J.3
  • 81
    • 35248900307 scopus 로고    scopus 로고
    • Capturing data usefulness and privacy protection in k-anonymisation.
    • Loukides G, Shao J. Capturing data usefulness and privacy protection in k-anonymisation. In: SAC; 2007. p. 370-4.
    • (2007) SAC , pp. 370-374
    • Loukides, G.1    Shao, J.2
  • 82
    • 38049092485 scopus 로고    scopus 로고
    • Clustering-based k-anonymisation algorithms
    • Loukides G, Shao J. Clustering-based k-anonymisation algorithms. In: DEXA; 2007. p. 761-71.
    • (2007) DEXA , pp. 761-771
    • Loukides, G.1    Shao, J.2
  • 83
    • 42149175998 scopus 로고    scopus 로고
    • An efficient clustering algorithm for - anonymisation
    • Loukides G., Shao J. An efficient clustering algorithm for - anonymisation. J Comput Sci Technol 2008, 23(2):188-202.
    • (2008) J Comput Sci Technol , vol.23 , Issue.2 , pp. 188-202
    • Loukides, G.1    Shao, J.2
  • 84
    • 78650700824 scopus 로고    scopus 로고
    • Preventing range disclosure in k-anonymised data
    • Loukides G., Shao J. Preventing range disclosure in k-anonymised data. Expert Syst Appl 2011, 38(4):4559-4574.
    • (2011) Expert Syst Appl , vol.38 , Issue.4 , pp. 4559-4574
    • Loukides, G.1    Shao, J.2
  • 86
    • 84859215377 scopus 로고    scopus 로고
    • Utility-preserving transaction data anonymization with low information loss
    • Loukides G., Gkoulalas-Divanis A. Utility-preserving transaction data anonymization with low information loss. Expert Syst Appl 2012, 39(10):9764-9777.
    • (2012) Expert Syst Appl , vol.39 , Issue.10 , pp. 9764-9777
    • Loukides, G.1    Gkoulalas-Divanis, A.2
  • 90
    • 0035180346 scopus 로고    scopus 로고
    • The use of electronic medical records communication patterns in outpatient encounters
    • Makoul G., Curry R.H., Tang P.C. The use of electronic medical records communication patterns in outpatient encounters. J Am Med Informat Assoc 2001, 8(6):610-615.
    • (2001) J Am Med Informat Assoc , vol.8 , Issue.6 , pp. 610-615
    • Makoul, G.1    Curry, R.H.2    Tang, P.C.3
  • 91
    • 74249091457 scopus 로고    scopus 로고
    • Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research
    • Malin B., Karp D., Scheuermann R.H. Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research. J Invest Med: Off Pub Am Fed Clin Res 2010, 58(1):11-18.
    • (2010) J Invest Med: Off Pub Am Fed Clin Res , vol.58 , Issue.1 , pp. 11-18
    • Malin, B.1    Karp, D.2    Scheuermann, R.H.3
  • 92
    • 80053335117 scopus 로고    scopus 로고
    • Identifiability in biobanks: models, measures, and mitigation strategies
    • Malin B., Loukides G., Benitez K., Clayton E.W. Identifiability in biobanks: models, measures, and mitigation strategies. Hum Genet 2011, 130(3):383-392.
    • (2011) Hum Genet , vol.130 , Issue.3 , pp. 383-392
    • Malin, B.1    Loukides, G.2    Benitez, K.3    Clayton, E.W.4
  • 93
    • 80053335117 scopus 로고    scopus 로고
    • Identifiability in biobanks: models, measures, and mitigation strategies
    • Malin B., Loukides G., Benitez K., Clayton E.W. Identifiability in biobanks: models, measures, and mitigation strategies. Hum Genet 2011, 130(3):383-392.
    • (2011) Hum Genet , vol.130 , Issue.3 , pp. 383-392
    • Malin, B.1    Loukides, G.2    Benitez, K.3    Clayton, E.W.4
  • 94
    • 77955080124 scopus 로고    scopus 로고
    • Automatic de-identification of textual documents in the electronic health record: a review of recent research
    • Meystre S.M., Friedlin F.J., South B.R., Shen S., Samore M.H. Automatic de-identification of textual documents in the electronic health record: a review of recent research. BMC Med Res Methodol 2010, 10(70).
    • (2010) BMC Med Res Methodol , vol.10 , Issue.70
    • Meystre, S.M.1    Friedlin, F.J.2    South, B.R.3    Shen, S.4    Samore, M.H.5
  • 96
    • 80052663001 scopus 로고    scopus 로고
    • Differentially private data release for data mining
    • Mohammed N, Chen R, Fung BCM, Yu PS. Differentially private data release for data mining. In: KDD; 2011. p. 493-501.
    • (2011) KDD , pp. 493-501
    • Mohammed, N.1    Chen, R.2    Fung, B.C.M.3    Yu, P.S.4
  • 97
    • 0035049112 scopus 로고    scopus 로고
    • Analysis of the clustering properties of the hilbert space-filling curve
    • Moon B., Jagadish H.v., Faloutsos C., Saltz J.H. Analysis of the clustering properties of the hilbert space-filling curve. IEEE Trans Knowl Data Eng 2001, 13(1):124-141.
    • (2001) IEEE Trans Knowl Data Eng , vol.13 , Issue.1 , pp. 124-141
    • Moon, B.1    Jagadish, H.2    Faloutsos, C.3    Saltz, J.H.4
  • 99
    • 50249142450 scopus 로고    scopus 로고
    • Robust de-anonymization of large sparse datasets
    • Narayanan A, Shmatikov V. Robust de-anonymization of large sparse datasets. In: IEEE S&P, 2008, p. 111-125.
    • (2008) IEEE S&P , pp. 111-125
    • Narayanan, A.1    Shmatikov, V.2
  • 100
    • 35448937300 scopus 로고    scopus 로고
    • Hiding the presence of individuals from shared databases
    • Nergiz ME, Atzori M, Clifton C. Hiding the presence of individuals from shared databases. In: SIGMOD '07; 2007. p. 665-676.
    • (2007) SIGMOD '07 , pp. 665-676
    • Nergiz, M.E.1    Atzori, M.2    Clifton, C.3
  • 101
    • 77951765129 scopus 로고    scopus 로고
    • D-presence without complete world knowledge
    • Nergiz M.E., Clifton C. d-presence without complete world knowledge. Tkde 2010, 22(6):868-883.
    • (2010) Tkde , vol.22 , Issue.6 , pp. 868-883
    • Nergiz, M.E.1    Clifton, C.2
  • 102
    • 34548689125 scopus 로고    scopus 로고
    • Thoughts on k-anonymization
    • Nergiz M.E., Clifton C. Thoughts on k-anonymization. Dke 2007, 63(3):622-645.
    • (2007) Dke , vol.63 , Issue.3 , pp. 622-645
    • Nergiz, M.E.1    Clifton, C.2
  • 103
    • 77951765129 scopus 로고    scopus 로고
    • δ-presence without complete world knowledge
    • Nergiz M.E., Clifton C. δ-presence without complete world knowledge. IEEE Trans Knowl Data Eng 2010, 22(6):868-883.
    • (2010) IEEE Trans Knowl Data Eng , vol.22 , Issue.6 , pp. 868-883
    • Nergiz, M.E.1    Clifton, C.2
  • 107
    • 70349869210 scopus 로고    scopus 로고
    • Longitudinal histories as predictors of future diagnoses of domestic abuse: modelling study
    • Reis B.Y., Kohane I.S., Mandl K.D. Longitudinal histories as predictors of future diagnoses of domestic abuse: modelling study. Bmj 2009, 339(9).
    • (2009) Bmj , vol.339 , Issue.9
    • Reis, B.Y.1    Kohane, I.S.2    Mandl, K.D.3
  • 108
    • 0035286694 scopus 로고    scopus 로고
    • Ethical and legal implications of pharmacogenomics
    • Rothstein M., Epps P. Ethical and legal implications of pharmacogenomics. Nat Rev Genet 2001, 2:228-231.
    • (2001) Nat Rev Genet , vol.2 , pp. 228-231
    • Rothstein, M.1    Epps, P.2
  • 109
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents identities in microdata release
    • Samarati P. Protecting respondents identities in microdata release. Tkde 2001, 13(9):1010-1027.
    • (2001) Tkde , vol.13 , Issue.9 , pp. 1010-1027
    • Samarati, P.1
  • 111
    • 0030333205 scopus 로고    scopus 로고
    • Replacing personally-identifying information in medical records, the scrub system
    • Sweeney L. Replacing personally-identifying information in medical records, the scrub system. In: Proceedings of the AMIA annual fall symposium; 1996. p. 333-7.
    • (1996) Proceedings of the AMIA annual fall symposium , pp. 333-337
    • Sweeney, L.1
  • 112
    • 0036811662 scopus 로고    scopus 로고
    • K-anonymity: a model for protecting privacy
    • Sweeney L. k-anonymity: a model for protecting privacy. Ijufks 2002, 10:557-570.
    • (2002) Ijufks , vol.10 , pp. 557-570
    • Sweeney, L.1
  • 113
    • 0003529621 scopus 로고    scopus 로고
    • Computational disclosure control: a primer on data privacy protection.
    • PhD thesis, AAI0803469
    • Sweeney L. Computational disclosure control: a primer on data privacy protection. PhD thesis, AAI0803469; 2001.
    • (2001)
    • Sweeney, L.1
  • 115
    • 84859177489 scopus 로고    scopus 로고
    • Privacy-preserving anonymization of set-valued data
    • Terrovitis M., Mamoulis N., Kalnis P. Privacy-preserving anonymization of set-valued data. Pvldb 2008, 1(1):115-125.
    • (2008) Pvldb , vol.1 , Issue.1 , pp. 115-125
    • Terrovitis, M.1    Mamoulis, N.2    Kalnis, P.3
  • 116
    • 78751575731 scopus 로고    scopus 로고
    • Local and global recoding methods for anonymizing set-valued data
    • Terrovitis M., Mamoulis N., Kalnis P. Local and global recoding methods for anonymizing set-valued data. VLDB J 2011, 20(1):83-106.
    • (2011) VLDB J , vol.20 , Issue.1 , pp. 83-106
    • Terrovitis, M.1    Mamoulis, N.2    Kalnis, P.3
  • 118
    • 84990966245 scopus 로고    scopus 로고
    • Privacy protection: p-sensitive k-anonymity property.
    • Truta TM, Vinay B. Privacy protection: p-sensitive k-anonymity property. In: ICDE workshops; 2006. p. 94.
    • (2006) ICDE workshops , pp. 94
    • Truta, T.M.1    Vinay, B.2
  • 119
    • 84905239790 scopus 로고    scopus 로고
    • Public Use Microdata
    • United States Census American Community Survey.
    • United States Census American Community Survey. Public Use Microdata; 2003.
    • (2003)
  • 120
    • 84905230893 scopus 로고    scopus 로고
    • U.S. Department of Health Human Services Office for Civil Rights. H.I.P.A.A administrative simplification regulation text.
    • U.S. Department of Health and Human Services Office for Civil Rights. HIPAA administrative simplification regulation text; 2006.
    • (2006)
  • 121
    • 77952332120 scopus 로고    scopus 로고
    • Privacy-preserving k-means clustering over vertically partitioned data
    • Vaidya J, Clifton C. Privacy-preserving k-means clustering over vertically partitioned data. In: KDD; 2003. p. 206-15.
    • (2003) KDD , pp. 206-215
    • Vaidya, J.1    Clifton, C.2
  • 123
    • 74049130896 scopus 로고    scopus 로고
    • Learning your identity and disease from research papers: information leaks in genome wide association study.
    • Butterworth-Heinemann, Newton, MA, USA
    • Wang R, Li YF, Wang X, Tang H, Zhou X. Learning your identity and disease from research papers: information leaks in genome wide association study. In: CCS; 2009. p. 534-44.
    • (2009) CCS , pp. 534-544
    • Wang, R.1    Li, Y.F.2    Wang, X.3    Tang, H.4    Zhou, X.5
  • 124
    • 74049087814 scopus 로고    scopus 로고
    • Privacy-preserving genomic computation through program specialization.
    • Proceedings of the 16th ACM conference on computer and communications security, CCS '09
    • Wang R, Wang X, Li Z, Tang H, Reiter MK, Dong Z. Privacy-preserving genomic computation through program specialization. In: Proceedings of the 16th ACM conference on computer and communications security, CCS '09; 2009. p. 338-47.
    • (2009) , pp. 338-347
    • Wang, R.1    Wang, X.2    Li, Z.3    Tang, H.4    Reiter, M.K.5    Dong, Z.6
  • 125
    • 85011016303 scopus 로고    scopus 로고
    • Minimality attack in privacy preserving data publishing
    • Wong RC, Fu A, Wang K, Pei J. Minimality attack in privacy preserving data publishing. In: VLDB; 2007. p. 543-54.
    • (2007) VLDB , pp. 543-554
    • Wong, R.C.1    Fu, A.2    Wang, K.3    Pei, J.4
  • 126
    • 33749571958 scopus 로고    scopus 로고
    • alpha-k-Anonymity: an enhanced k-anonymity model for privacy-preserving data publishing.
    • Wong RC, Li J, Fu A, Wang K. alpha-k-Anonymity: an enhanced k-anonymity model for privacy-preserving data publishing. In: KDD; 2006. p. 754-59.
    • (2006) KDD , pp. 754-759
    • Wong, R.C.1    Li, J.2    Fu, A.3    Wang, K.4
  • 127
    • 84893853914 scopus 로고    scopus 로고
    • Anatomy: simple and effective privacy preservation
    • Xiao X, Tao Y. Anatomy: simple and effective privacy preservation. In: VLDB; 2006. p. 139-50.
    • (2006) VLDB , pp. 139-150
    • Xiao, X.1    Tao, Y.2
  • 128
    • 34250680246 scopus 로고    scopus 로고
    • Personalized privacy preservation.
    • Xiao X, Tao Y. Personalized privacy preservation. In: SIGMOD; 2006. p. 229-40.
    • (2006) SIGMOD , pp. 229-240
    • Xiao, X.1    Tao, Y.2
  • 129
    • 33749582207 scopus 로고    scopus 로고
    • Utility-based anonymization using local recoding
    • Xu J, Wang W, Pei J, Wang X, Shi B, Fu AW-C. Utility-based anonymization using local recoding. In: KDD; 2006. p. 785-90.
    • (2006) KDD , pp. 785-790
    • Xu, J.1    Wang, W.2    Pei, J.3    Wang, X.4    Shi, B.5    Fu, A.W-C.6
  • 130
    • 65449148368 scopus 로고    scopus 로고
    • Anonymizing transaction databases for publication
    • Xu Y, Wang K, Fu AW-C, Yu PS. Anonymizing transaction databases for publication. In: KDD; 2008. p. 767-75.
    • (2008) KDD , pp. 767-775
    • Xu, Y.1    Wang, K.2    Fu, A.W-C.3    Yu, P.S.4
  • 131
    • 33745214431 scopus 로고    scopus 로고
    • Generalized multidimensional data mapping and query processing
    • Zhang R., Kalnis P., Ooi B., Tan K. Generalized multidimensional data mapping and query processing. ACM Trans Database Syst 2005, 30(3):661-697.
    • (2005) ACM Trans Database Syst , vol.30 , Issue.3 , pp. 661-697
    • Zhang, R.1    Kalnis, P.2    Ooi, B.3    Tan, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.