-
1
-
-
84892160333
-
Bringing big data to personalized healthcare: A patientcentered framework
-
Chawla, N.V., Davis, D.A.: Bringing big data to personalized healthcare: A patientcentered framework. Journal of General Internal Medicine 28, S660-S665
-
Journal of General Internal Medicine
, vol.28
, pp. S660-S665
-
-
Chawla, N.V.1
Davis, D.A.2
-
3
-
-
84905228273
-
Knowledge discovery and interactive data mining in bioinformatics-state-of-the-art, future challenges and research directions
-
Holzinger, A., Dehmer, M., Jurisica, I.: Knowledge discovery and interactive data mining in bioinformatics-state-of-the-art, future challenges and research directions. BMC Bioinformatics 15(suppl. 6), I1 (2014)
-
(2014)
BMC Bioinformatics
, vol.15
, pp. 11
-
-
Holzinger, A.1
Dehmer, M.2
Jurisica, I.3
-
4
-
-
84988353097
-
Functional and genetic analysis of the colon cancer network
-
Emmert-Streib, F., de Matos Simoes, R., Glazko, G., McDade, S., Haibe-Kains, B., Holzinger, A., Dehmer, M., Campbell, F.: Functional and genetic analysis of the colon cancer network. BMC Bioinformatics 15(suppl. 6), S6 (2014)
-
(2014)
BMC Bioinformatics
, vol.15
, pp. S6
-
-
Emmert-Streib, F.1
de Matos Simoes, R.2
Glazko, G.3
McDade, S.4
Haibe-Kains, B.5
Holzinger, A.6
Dehmer, M.7
Campbell, F.8
-
5
-
-
69149090568
-
The pathologies of big data
-
Jacobs, A.: The pathologies of big data. Communications of the ACM 52(8), 36-44 (2009)
-
(2009)
Communications of the ACM
, vol.52
, Issue.8
, pp. 36-44
-
-
Jacobs, A.1
-
6
-
-
84870902757
-
-
Reilly Media, Inc., Beijing
-
Craig, T., Ludloff, M.E.: Privacy and Big Data: The Players, Regulators and Stakeholders. Reilly Media, Inc., Beijing (2011)
-
(2011)
Privacy and Big Data: The Players, Regulators and Stakeholders
-
-
Craig, T.1
Ludloff, M.E.2
-
7
-
-
33646711912
-
Security aspects of ubiquitous computing in health care
-
Weippl, E., Holzinger, A., Tjoa, A.M.: Security aspects of ubiquitous computing in health care. Springer Elektrotechnik & Informationstechnik, e&i 123(4), 156-162 (2006)
-
(2006)
Springer Elektrotechnik & Informationstechnik, E&I
, vol.123
, Issue.4
, pp. 156-162
-
-
Weippl, E.1
Holzinger, A.2
Tjoa, A.M.3
-
8
-
-
84902291045
-
Trends in research and publication: Science 2.0 and open access
-
Breivik, M., Hovland, G., From, P.J.: Trends in research and publication: Science 2.0 and open access. Modeling Identification and Control 30(3), 181-190 (2009)
-
(2009)
Modeling Identification and Control
, vol.30
, Issue.3
, pp. 181-190
-
-
Breivik, M.1
Hovland, G.2
From, P.J.3
-
9
-
-
84879868473
-
Bmj open data campaign: We need to move the debate on open clinical trial data forward
-
Thompson, M., Heneghan, C.: Bmj open data campaign: We need to move the debate on open clinical trial data forward. British Medical Journal 345 (2012)
-
(2012)
British Medical Journal
, pp. 345
-
-
Thompson, M.1
Heneghan, C.2
-
10
-
-
85066544973
-
-
Hobel, H., Schrittwieser, S., Kieseberg, P., Weippl, E.: Privacy, Anonymity, Pseudonymity and Data Disclosure in Data-Driven Science (2013)
-
(2013)
Privacy, Anonymity, Pseudonymity and Data Disclosure in Data-Driven Science
-
-
Hobel, H.1
Schrittwieser, S.2
Kieseberg, P.3
Weippl, E.4
-
11
-
-
84878356177
-
The science of guessing: Analyzing an anonymized corpus of 70 million passwords
-
IEEE
-
Bonneau, J.: The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 538-552. IEEE (2012)
-
(2012)
2012 IEEE Symposium on Security and Privacy (SP)
, pp. 538-552
-
-
Bonneau, J.1
-
12
-
-
84861302816
-
Is this app safe?: A large scale study on application permissions and risk signals
-
ACM
-
Chia, P.H., Yamamoto, Y., Asokan, N.: Is this app safe?: a large scale study on application permissions and risk signals. In: Proceedings of the 21st International Conference on World Wide Web, pp. 311-320. ACM (2012)
-
(2012)
Proceedings of the 21St International Conference on World Wide Web
, pp. 311-320
-
-
Chia, P.H.1
Yamamoto, Y.2
Asokan, N.3
-
13
-
-
84861541774
-
Facebook users have become much more private: A large-scale study
-
IEEE
-
Dey, R., Jelveh, Z., Ross, K.: Facebook users have become much more private: A large-scale study. In: 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 346-352. IEEE (2012)
-
(2012)
2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)
, pp. 346-352
-
-
Dey, R.1
Jelveh, Z.2
Ross, K.3
-
14
-
-
77954567494
-
How useful are your comments?: Analyzing and predicting youtube comments and comment ratings
-
ACM
-
Siersdorfer, S., Chelaru, S., Nejdl, W., San Pedro, J.: How useful are your comments?: analyzing and predicting youtube comments and comment ratings. In: Proceedings of the 19th International Conference on World Wide Web, pp. 891-900. ACM (2010)
-
(2010)
Proceedings of the 19Th International Conference on World Wide Web
, pp. 891-900
-
-
Siersdorfer, S.1
Chelaru, S.2
Nejdl, W.3
San Pedro, J.4
-
17
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty
-
Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(05), 571-588 (2002)
-
(2002)
Fuzziness and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
18
-
-
0036811662
-
K-anonymity: A model for protecting privacy. International Journal of Uncertainty
-
Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(05), 557-570 (2002)
-
(2002)
Fuzziness and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
19
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
Fung, B., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey of recent developments. ACM Computing Surveys (CSUR) 42(4), 14 (2010)
-
(2010)
ACM Computing Surveys (CSUR)
, vol.42
, Issue.4
, pp. 14
-
-
Fung, B.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
20
-
-
0000072558
-
Finding a needle in a haystack-or identifying anonymous census record
-
Dalenius, T.: Finding a needle in a haystack-or identifying anonymous census record. Journal of Official Statistics 2(3), 329-336 (1986)
-
(1986)
Journal of Official Statistics
, vol.2
, Issue.3
, pp. 329-336
-
-
Dalenius, T.1
-
21
-
-
84937564790
-
Anonymity, unobservability, and pseudonymity-A proposal for terminology
-
In: Federrath, H. (ed.), Springer, Heidelberg
-
Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity-A proposal for terminology. In: Federrath, H. (ed.) Anonymity 2000. LNCS, vol. 2009, pp. 1-9. Springer, Heidelberg (2001)
-
(2001)
Anonymity 2000. LNCS
, vol.2009
, pp. 1-9
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
22
-
-
84920867966
-
Towards security-enhanced and privacy-preserving mashup compositions
-
Janczewski, L.J.,Wolfe, H.B., Shenoi, S. (eds.), Springer, Heidelberg
-
Hobel, H., Heurix, J., Anjomshoaa, A., Weippl, E.: Towards security-enhanced and privacy-preserving mashup compositions. In: Janczewski, L.J.,Wolfe, H.B., Shenoi, S. (eds.) SEC 2013. IFIP AICT, vol. 405, pp. 286-299. Springer, Heidelberg (2013)
-
(2013)
SEC 2013. IFIP AICT
, vol.405
, pp. 286-299
-
-
Hobel, H.1
Heurix, J.2
Anjomshoaa, A.3
Weippl, E.4
-
23
-
-
34147125465
-
Handicapping attacker’s confidence: An alternative to k-anonymization
-
Wang, K., Fung, B.C., Philip, S.Y.: Handicapping attacker’s confidence: an alternative to k-anonymization. Knowledge and Information Systems 11(3), 345-368 (2007)
-
(2007)
Knowledge and Information Systems
, vol.11
, Issue.3
, pp. 345-368
-
-
Wang, K.1
Fung, B.C.2
Philip, S.Y.3
-
25
-
-
29844444250
-
Incognito: Efficient full-domain kanonymity
-
ACM
-
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient full-domain kanonymity. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 49-60. ACM (2005)
-
(2005)
Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data
, pp. 49-60
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
26
-
-
33749606641
-
Mondrian multidimensional kanonymity
-
IEEE
-
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional kanonymity. In: Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006, pp. 25-25. IEEE (2006)
-
(2006)
Proceedings of the 22Nd International Conference on Data Engineering, ICDE 2006
, pp. 25
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
27
-
-
33749568323
-
Workload-aware anonymization
-
ACM
-
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Workload-aware anonymization. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 277-286. ACM (2006)
-
(2006)
Proceedings of the 12Th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 277-286
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
28
-
-
34248181923
-
Venkitasubramaniam, M.: L-diversity: Privacy beyond k-anonymity
-
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD) 1(1), 3 (2007)
-
(2007)
ACM Transactions on Knowledge Discovery from Data (TKDD)
, vol.1
, Issue.1
, pp. 3
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
-
29
-
-
34548805858
-
Venkatasubramanian, S.: T-closeness: Privacy beyond k-anonymity and l-diversity
-
Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: ICDE, vol. 7, pp. 106-115 (2007)
-
(2007)
ICDE
, vol.7
, pp. 106-115
-
-
Li, N.1
Li, T.2
-
30
-
-
57149132810
-
Preservation of proximity privacy in publishing numerical sensitive data
-
ACM
-
Li, J., Tao, Y., Xiao, X.: Preservation of proximity privacy in publishing numerical sensitive data. In: Proceedings of the 2008 ACMSIGMOD International Conference on Management of Data, pp. 473-486. ACM (2008)
-
(2008)
Proceedings of the 2008 ACMSIGMOD International Conference on Management of Data
, pp. 473-486
-
-
Li, J.1
Tao, Y.2
Xiao, X.3
-
31
-
-
84857972318
-
Pseudonymization with metadata encryption for privacy-preserving searchable documents
-
IEEE
-
Heurix, J., Karlinger, M., Neubauer, T.: Pseudonymization with metadata encryption for privacy-preserving searchable documents. In: 2012 45th Hawaii International Conference on System Science (HICSS), pp. 3011-3020. IEEE (2012)
-
(2012)
45Th Hawaii International Conference on System Science (HICSS)
, pp. 3011-3020
-
-
Heurix, J.1
Karlinger, M.2
Neubauer, T.3
-
33
-
-
80052810645
-
Privacy-preserving storage and access of medical data through pseudonymization and encryption
-
In: Furnell, S., Lambrinoudakis, C., Pernul, G. (eds.), Springer, Heidelberg
-
Heurix, J., Neubauer, T.: Privacy-preserving storage and access of medical data through pseudonymization and encryption. In: Furnell, S., Lambrinoudakis, C., Pernul, G. (eds.) TrustBus 2011. LNCS, vol. 6863, pp. 186-197. Springer, Heidelberg (2011)
-
(2011)
Trustbus 2011. LNCS
, vol.6863
, pp. 186-197
-
-
Heurix, J.1
Neubauer, T.2
-
34
-
-
35649000492
-
Pseudonymization of radiology data for research purposes
-
Noumeir, R., Lemay, A., Lina, J.M.: Pseudonymization of radiology data for research purposes. Journal of Digital Imaging 20(3), 284-295 (2007)
-
(2007)
Journal of Digital Imaging
, vol.20
, Issue.3
, pp. 284-295
-
-
Noumeir, R.1
Lemay, A.2
Lina, J.M.3
-
37
-
-
84904502063
-
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata
-
Kieseberg, P., Schrittwieser, S., Mulazzani, M., Echizen, I., Weippl, E.: An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata. Electronic Markets-The International Journal on Networked Business (2014)
-
(2014)
Electronic Markets-The International Journal on Networked Business
-
-
Kieseberg, P.1
Schrittwieser, S.2
Mulazzani, M.3
Echizen, I.4
Weippl, E.5
-
38
-
-
84865694038
-
An algorithm for k-anonymity-based fingerprinting
-
In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.), Springer, Heidelberg
-
Schrittwieser, S., Kieseberg, P., Echizen, I., Wohlgemuth, S., Sonehara, N., Weippl, E.: An algorithm for k-anonymity-based fingerprinting. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 439-452. Springer, Heidelberg (2012)
-
(2012)
IWDW 2011. LNCS
, vol.7128
, pp. 439-452
-
-
Schrittwieser, S.1
Kieseberg, P.2
Echizen, I.3
Wohlgemuth, S.4
Sonehara, N.5
Weippl, E.6
-
39
-
-
85066554354
-
Automated transformation of semistructured text elements
-
August
-
Heurix, J., Rella, A., Fenz, S., Neubauer, T.: Automated transformation of semistructured text elements. In: AMCIS 2012 Proceedings, pp. 1-11 (August 2012)
-
(2012)
AMCIS 2012 Proceedings
, pp. 1-11
-
-
Heurix, J.1
Rella, A.2
Fenz, S.3
Neubauer, T.4
-
40
-
-
84876004764
-
A rule-based transformation system for converting semi-structured medical documents
-
March
-
Heurix, J., Rella, A., Fenz, S., Neubauer, T.: A rule-based transformation system for converting semi-structured medical documents. Health and Technology, 1-13 (March 2013)
-
(2013)
Health and Technology
, pp. 1-13
-
-
Heurix, J.1
Rella, A.2
Fenz, S.3
Neubauer, T.4
-
41
-
-
84873663513
-
Flash: Efficient, stable and optimal k-anonymity
-
IEEE
-
Kohlmayer, F., Prasser, F., Eckert, C., Kemper, A., Kuhn, K.A.: Flash: efficient, stable and optimal k-anonymity. In: 2012 International Conference on Privacy, Security, Risk and Trust (PASSAT), 2012 International Confernece on Social Computing (SocialCom), pp. 708-717. IEEE (2012)
-
(2012)
International Conference on Privacy, Security, Risk and Trust (PASSAT), 2012 International Confernece on Social Computing (Socialcom)
, pp. 708-717
-
-
Kohlmayer, F.1
Prasser, F.2
Eckert, C.3
Kemper, A.4
Kuhn, K.A.5
-
42
-
-
84867325726
-
Highly efficient optimal k-anonymity for biomedical datasets
-
IEEE
-
Kohlmayer, F., Prasser, F., Eckert, C., Kemper, A., Kuhn, K.A.: Highly efficient optimal k-anonymity for biomedical datasets. In: 2012 25th International Symposium on Computer-Based Medical Systems (CBMS), pp. 1-6. IEEE (2012)
-
(2012)
25Th International Symposium on Computer-Based Medical Systems (CBMS)
, pp. 1-6
-
-
Kohlmayer, F.1
Prasser, F.2
Eckert, C.3
Kemper, A.4
Kuhn, K.A.5
-
43
-
-
69549114557
-
A globally optimal kanonymity method for the de-identification of health data
-
El Emam, K., Dankar, F.K., Issa, R., Jonker, E., Amyot, D., Cogo, E., Corriveau, J.P., Walker, M., Chowdhury, S., Vaillancourt, R., et al.: A globally optimal kanonymity method for the de-identification of health data. Journal of the American Medical Informatics Association 16(5), 670-682 (2009)
-
(2009)
Journal of the American Medical Informatics Association
, vol.16
, Issue.5
, pp. 670-682
-
-
El Emam, K.1
Dankar, F.K.2
Issa, R.3
Jonker, E.4
Amyot, D.5
Cogo, E.6
Corriveau, J.P.7
Walker, M.8
Chowdhury, S.9
Vaillancourt, R.10
|