-
1
-
-
84905277867
-
-
B. Consortium Goals-International Cancer Genome Consortium.
-
B. Consortium Goals-International Cancer Genome Consortium. http://icgc.org/icgc/goals-structure-policies-guidelines/b-consortium-goals.
-
-
-
-
2
-
-
84905260031
-
BBMRI-LPC - a four-year project to help scientists to have better access to large European studies on health
-
Perola M, van Ommen G-J. BBMRI-LPC - a four-year project to help scientists to have better access to large European studies on health; 2013. http://www.bbmri-lpc.org/BBMRI-LPC_Press_release.pdf.
-
(2013)
-
-
Perola, M.1
van Ommen, G.-J.2
-
3
-
-
84905241715
-
-
Sharing research data to improve public health: full joint statement by funders of health research - Wellcome Trust.
-
Sharing research data to improve public health: full joint statement by funders of health research - Wellcome Trust. http://www.wellcome.ac.uk/About-us/Policy/Spotlight-issues/Data-sharing/Public-health-and-epidemiology/WTDV030690.htm.
-
-
-
-
4
-
-
84905277868
-
-
OECD Principles and Guidelines for Access to Research Data from Public Funding.
-
OECD Principles and Guidelines for Access to Research Data from Public Funding. http://www.oecd.org/science/sci-tech/oecdprinciplesandguidelinesforaccesstoresearchdatafrompublicfunding.htm.
-
-
-
-
5
-
-
72949114284
-
Translational informatics: enabling high-throughput research paradigms
-
Payne P., et al. Translational informatics: enabling high-throughput research paradigms. Physiol Genomics 2009, 39(3):131-140.
-
(2009)
Physiol Genomics
, vol.39
, Issue.3
, pp. 131-140
-
-
Payne, P.1
-
6
-
-
78650415869
-
Assessing the privacy risks of data sharing in genomics
-
Heeney C., et al. Assessing the privacy risks of data sharing in genomics. Public Health Genomics 2011, 14(1):17-25.
-
(2011)
Public Health Genomics
, vol.14
, Issue.1
, pp. 17-25
-
-
Heeney, C.1
-
7
-
-
84905277869
-
-
Health insurance portability and accountability act of 1996, Public Law Gazette
-
Health insurance portability and accountability act of 1996, Public Law Gazette; 1996. p. 1-349.
-
(1996)
, pp. 1-349
-
-
-
8
-
-
84905260027
-
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data.
-
Communities 38 (L. 281).
-
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data. Off. J. Eur. Communities 38 (L. 281).
-
Off. J. Eur.
-
-
-
9
-
-
84860789494
-
ELSI 2.0 for genomics and society
-
Kaye J., et al. ELSI 2.0 for genomics and society. Science 2012, 4-5.
-
(2012)
Science
, pp. 4-5
-
-
Kaye, J.1
-
10
-
-
33845354052
-
Trends in ethical and legal frameworks for the use of human biobanks
-
Cambon-Thomsen A., et al. Trends in ethical and legal frameworks for the use of human biobanks. Eur Respir J 2007, 30(2):373-382.
-
(2007)
Eur Respir J
, vol.30
, Issue.2
, pp. 373-382
-
-
Cambon-Thomsen, A.1
-
11
-
-
0003483188
-
Protecting privacy when disclosing information: k-, and its enforcement through generalization and suppression
-
Samarati P, Sweeney L. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: Proc IEEE symp on security and privacy; 1998.
-
(1998)
Proc IEEE symp on security and privacy
-
-
Samarati, P.1
Sweeney, L.2
-
12
-
-
0000072558
-
Finding a needle in a haystack or identifying anonymous census records
-
Dalenius T. Finding a needle in a haystack or identifying anonymous census records. J Off Stat 1986, 2(3):329-336.
-
(1986)
J Off Stat
, vol.2
, Issue.3
, pp. 329-336
-
-
Dalenius, T.1
-
13
-
-
84905277865
-
Rethinking the honest broker in the changing face of security and privacy.
-
Rasmussen L., et al. Rethinking the honest broker in the changing face of security and privacy. In: Proc AMIA annu symp; 2012. p. 1554-6.
-
(2012)
Proc AMIA annu symp
, pp. 1554-1556
-
-
Rasmussen, L.1
-
14
-
-
69549114557
-
A globally optimal k-anonymity method for the de-identification of health data
-
Emam K.E., et al. A globally optimal k-anonymity method for the de-identification of health data. J Am Med Inform Assoc 2009, 16(5):670-682.
-
(2009)
J Am Med Inform Assoc
, vol.16
, Issue.5
, pp. 670-682
-
-
Emam, K.E.1
-
15
-
-
78651539208
-
Efficient anonymizations with enhanced utility
-
Goldberger J., Tassa T. Efficient anonymizations with enhanced utility. Trans Data Privacy 2010, 3(2):149-175.
-
(2010)
Trans Data Privacy
, vol.3
, Issue.2
, pp. 149-175
-
-
Goldberger, J.1
Tassa, T.2
-
17
-
-
79958053421
-
Anonymity in data publishing and distribution.
-
PhD thesis, Madison, WI, USA
-
Lefevre KR. Anonymity in data publishing and distribution. PhD thesis, Madison, WI, USA; 2007.
-
(2007)
-
-
Lefevre, K.R.1
-
18
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Samarati P. Protecting respondents' identities in microdata release. IEEE Trans Knowl Data Eng 2001, 13(6):1010-1027.
-
(2001)
IEEE Trans Knowl Data Eng
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
20
-
-
84873663513
-
Flash: efficient, stable and optimal k-anonymity.
-
Kohlmayer F, Prasser F, et al. Flash: efficient, stable and optimal k-anonymity. In: Proc int conf on privacy, security, risk and trust; 2012. p. 708-17.
-
(2012)
Proc int conf on privacy, security, risk and trust
, pp. 708-717
-
-
Kohlmayer, F.1
Prasser, F.2
-
21
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertain Fuzziness Knowl-Based Syst 2002, 10(5):571-588.
-
(2002)
Int J Uncertain Fuzziness Knowl-Based Syst
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
22
-
-
84874203892
-
Attribute utility motivated k-anonymization of datasets to support the heterogeneous needs of biomedical researchers.
-
Ye H, Chen ES. Attribute utility motivated k-anonymization of datasets to support the heterogeneous needs of biomedical researchers. AMIA ann symp proc; 2011. p. 1573-82.
-
(2011)
AMIA ann symp proc
, pp. 1573-1582
-
-
Ye, H.1
Chen, E.S.2
-
23
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
Fung B, et al. Top-down specialization for information and privacy preservation. In: Proc int conf on data engineering 2005. p. 205-16.
-
(2005)
Proc int conf on data engineering
, pp. 205-216
-
-
Fung, B.1
-
27
-
-
34548689125
-
Thoughts on k-anonymization
-
Nergiz M.E., Clifton C. Thoughts on k-anonymization. Data Knowl Eng 2007, 63(3):622-645.
-
(2007)
Data Knowl Eng
, vol.63
, Issue.3
, pp. 622-645
-
-
Nergiz, M.E.1
Clifton, C.2
-
29
-
-
34548805858
-
t-Closeness: privacy beyond k-anonymity and l-diversity
-
Li N, et al. t-Closeness: privacy beyond k-anonymity and l-diversity. In: Proc int conf on data engineering 2007. p. 106-15.
-
(2007)
Proc int conf on data engineering
, pp. 106-115
-
-
Li, N.1
-
30
-
-
78149335185
-
Centralized and distributed anonymization for high-dimensional healthcare data
-
Mohammed N., Fung B. Centralized and distributed anonymization for high-dimensional healthcare data. ACM Trans Knowl Discovery Data 2010, 4(4):1-33.
-
(2010)
ACM Trans Knowl Discovery Data
, vol.4
, Issue.4
, pp. 1-33
-
-
Mohammed, N.1
Fung, B.2
-
31
-
-
35448937300
-
Hiding the presence of individuals from shared databases
-
ACM
-
Nergiz M.E., et al. Hiding the presence of individuals from shared databases. Proc int conf on management of data (SIGMOD) 2007, 665-676. ACM.
-
(2007)
Proc int conf on management of data (SIGMOD)
, pp. 665-676
-
-
Nergiz, M.E.1
-
32
-
-
33749571958
-
(α,k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing
-
ACM
-
Wong R.C.-W., et al. (α,k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. Proc int conf on knowl disc data min (KDD) 2006, 754-759. ACM.
-
(2006)
Proc int conf on knowl disc data min (KDD)
, pp. 754-759
-
-
Wong, R.C.-W.1
-
34
-
-
34548710709
-
Aggregate query answering on anonymized tables
-
IEEE
-
Zhang Q., et al. Aggregate query answering on anonymized tables. Proc int conf on data engineering 2007, 116-125. IEEE.
-
(2007)
Proc int conf on data engineering
, pp. 116-125
-
-
Zhang, Q.1
-
35
-
-
57149132810
-
Preservation of proximity privacy in publishing numerical sensitive data
-
ACM
-
Li J., et al. Preservation of proximity privacy in publishing numerical sensitive data. Proc int conf on management of data (SIGMOD) 2008, 473-486. ACM.
-
(2008)
Proc int conf on management of data (SIGMOD)
, pp. 473-486
-
-
Li, J.1
-
36
-
-
67649655744
-
A general proximity privacy principle
-
IEEE
-
Wang T., et al. A general proximity privacy principle. Proc int conf on data engineering 2009, 1279-1282. IEEE.
-
(2009)
Proc int conf on data engineering
, pp. 1279-1282
-
-
Wang, T.1
-
37
-
-
35448967088
-
M-invariance: towards privacy preserving re-publication of dynamic datasets
-
ACM
-
Xiao X., Tao Y. M-invariance: towards privacy preserving re-publication of dynamic datasets. Proc int conf on management of data (SIGMOD) 2007, 689-700. ACM.
-
(2007)
Proc int conf on management of data (SIGMOD)
, pp. 689-700
-
-
Xiao, X.1
Tao, Y.2
-
40
-
-
36048997303
-
A secure distributed framework for achieving k-anonymity
-
Jiang W., Clifton C. A secure distributed framework for achieving k-anonymity. VLDB J 2006, 15(4):316.
-
(2006)
VLDB J
, vol.15
, Issue.4
, pp. 316
-
-
Jiang, W.1
Clifton, C.2
-
44
-
-
84863607195
-
Secure distributed computation of anonymized views of shared databases
-
11:1-11:43
-
Tassa T., Gudes E. Secure distributed computation of anonymized views of shared databases. ACM Trans Database Syst 2012, 37(2):11:1-11:43.
-
(2012)
ACM Trans Database Syst
, vol.37
, Issue.2
-
-
Tassa, T.1
Gudes, E.2
-
46
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
Kantarcioglu M., Clifton C. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans Knowl Data Eng 2004, 16(9):1026-1037.
-
(2004)
IEEE Trans Knowl Data Eng
, vol.16
, Issue.9
, pp. 1026-1037
-
-
Kantarcioglu, M.1
Clifton, C.2
-
48
-
-
84905277866
-
-
ANSI, ANSI X9.62:2005 Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA)
-
ANSI, ANSI X9.62:2005 Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA) (2005).
-
(2005)
-
-
-
49
-
-
33751508709
-
Recommendation for key management Part 1: General (revision 3).
-
NIST special publication
-
Barker E, et al. Recommendation for key management Part 1: General (revision 3). NIST special publication (July); 2011. p. 1-147.
-
(2011)
, Issue.JULY
, pp. 1-147
-
-
Barker, E.1
-
50
-
-
84905260025
-
-
The GNU Multiple Precision Arithmetic Library; August 2013.
-
The GNU Multiple Precision Arithmetic Library; August 2013. http://gmplib.org/.
-
-
-
-
51
-
-
84905223907
-
-
ARX - Powerful Data Anonymization; August 2013.
-
ARX - Powerful Data Anonymization; August 2013. http://arx.deidentifier.org/.
-
-
-
-
53
-
-
38149068986
-
Deterministic and efficiently searchable encryption
-
Springer
-
Bellare M., et al. Deterministic and efficiently searchable encryption. Advances in cryptology-CRYPTO 2007 2007, vol. 4622:535-552. Springer.
-
(2007)
Advances in cryptology-CRYPTO 2007
, vol.4622
, pp. 535-552
-
-
Bellare, M.1
-
54
-
-
84905236497
-
Health Insurance Portability and Accountability Act (HIPAA)
-
Health Insurance Portability and Accountability Act (HIPAA), Public Law; 1996. p. 1-349.
-
(1996)
Public Law
, pp. 1-349
-
-
-
55
-
-
79960442271
-
Anonymity meets game theory: secure data integration with malicious participants
-
Mohammed N., et al. Anonymity meets game theory: secure data integration with malicious participants. VLDB J 2011, 20(4):567-588.
-
(2011)
VLDB J
, vol.20
, Issue.4
, pp. 567-588
-
-
Mohammed, N.1
-
56
-
-
84873136644
-
Detecting inconsistencies in private data with secure function evaluation.
-
Tech rep 11-006, Purdue University
-
Talukder N, et al. Detecting inconsistencies in private data with secure function evaluation. Tech rep 11-006, Purdue University; 2011.
-
(2011)
-
-
Talukder, N.1
-
57
-
-
39749149272
-
Privacy-preserving imputation of missing data
-
Jagannathan G., Wright R. Privacy-preserving imputation of missing data. Data Knowl Eng 2008, 65(1):40-56.
-
(2008)
Data Knowl Eng
, vol.65
, Issue.1
, pp. 40-56
-
-
Jagannathan, G.1
Wright, R.2
-
58
-
-
84905241714
-
-
RFC 5246 - The Transport Layer Security (TLS) protocol version 1.2. Tech rep; August 2008.
-
Dierks T, Rescorla E. RFC 5246 - The Transport Layer Security (TLS) protocol version 1.2. Tech rep; August 2008.
-
-
-
Dierks, T.1
Rescorla, E.2
-
59
-
-
82555187188
-
A systematic review of re-identification attacks on health data.
-
El Emam K, et al. A systematic review of re-identification attacks on health data. PloS one 2011 6 (12).
-
(2011)
PloS one
, vol.6
, Issue.12
-
-
El Emam, K.1
-
60
-
-
74249091457
-
Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research
-
Malin B., et al. Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research. J Investig Med 2010, 58(1):11-18.
-
(2010)
J Investig Med
, vol.58
, Issue.1
, pp. 11-18
-
-
Malin, B.1
-
61
-
-
80053335117
-
And mitigation strategies
-
Malin B., et al. and mitigation strategies. Hum Genet 2011, 130(3):383-392.
-
(2011)
Hum Genet
, vol.130
, Issue.3
, pp. 383-392
-
-
Malin, B.1
-
62
-
-
84879459110
-
Use of generalised additive models to categorise continuous variables in clinical prediction
-
Barrio I., et al. Use of generalised additive models to categorise continuous variables in clinical prediction. BMC Med Res Methodol 2013, 13(1):83.
-
(2013)
BMC Med Res Methodol
, vol.13
, Issue.1
, pp. 83
-
-
Barrio, I.1
-
63
-
-
33745160750
-
Privacy-preserving set operations
-
Springer
-
Kissner L., Song D. Privacy-preserving set operations. Lect Notes Comput Sci 2005, 241-257. Springer.
-
(2005)
Lect Notes Comput Sci
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
|