-
1
-
-
84907401575
-
Directive 95/46/ec of the european parliament and of the council of 24 october 1995
-
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995. Off. J. Eur. Communities, 38(L. 281), 1995.
-
(1995)
Off. J. Eur. Communities
, vol.38
, Issue.L. 281
-
-
-
2
-
-
84907406325
-
Health insurance portability and accountability act of 1996
-
Health insurance portability and accountability act of 1996. Public Law Gazette, pages 1-349, 1996.
-
(1996)
Public Law Gazette
, pp. 1-349
-
-
-
4
-
-
84907419559
-
-
Oct
-
ARX. arx.deidentifier.org, Oct. 2013.
-
(2013)
-
-
-
5
-
-
84907391744
-
-
Oct
-
ARX - Benchmark. arx.deidentifier.org/benchmark, Oct. 2013.
-
(2013)
ARX - Benchmark
-
-
-
6
-
-
84907405967
-
-
Oct
-
Sharing research data to improve public health. http://wellcome.ac.uk/ About-us/Policy/Spotlight-issues/Data-sharing/ Public-health-and-epidemiology/ WTDV030690.htm, Oct. 2013.
-
(2013)
Sharing Research Data to Improve Public Health
-
-
-
7
-
-
69549114557
-
A globally optimal k-anonymity method for the de-identification of health data
-
K. E. Emam et al. A globally optimal k-anonymity method for the de-identification of health data. J. Amer. Medical Informatics Assoc., 16(5):670-682, 2009.
-
(2009)
J. Amer. Medical Informatics Assoc
, vol.16
, Issue.5
, pp. 670-682
-
-
Emam, K.E.1
-
8
-
-
78650415869
-
Assessing the privacy risks of data sharing in genomics
-
C. Heeney et al. Assessing the privacy risks of data sharing in genomics. Public health genomics, 14(1):17-25, 2011.
-
(2011)
Public Health Genomics
, vol.14
, Issue.1
, pp. 17-25
-
-
Heeney, C.1
-
10
-
-
84873663513
-
Flash: Efficient, stable and optimal kanonymity
-
IEEE
-
F. Kohlmayer, F. Prasser, et al. Flash: Efficient, stable and optimal kanonymity. In 2012 Proc. Int. Conf. Privacy, Security, Risk and Trust, pages 708-717. IEEE, 2012.
-
(2012)
2012 Proc. Int. Conf. Privacy, Security, Risk and Trust
, pp. 708-717
-
-
Kohlmayer, F.1
Prasser, F.2
-
11
-
-
29844444250
-
Incognito: Efficient full-domain k-anonymity
-
K. LeFevre et al. Incognito: Efficient full-domain k-anonymity. In Proc. Int. Conf. on Management of Data, pages 49-60, 2005.
-
(2005)
Proc. Int. Conf. on Management of Data
, pp. 49-60
-
-
Lefevre, K.1
-
12
-
-
34548805858
-
T-closeness: Privacy beyond k-anonymity and l-diversity
-
N. Li et al. t-closeness: Privacy beyond k-anonymity and l-diversity. In 23rd Int. Conf. on Data Engineering, pages 106-115, 2007.
-
(2007)
23rd Int. Conf. on Data Engineering
, pp. 106-115
-
-
Li, N.1
-
13
-
-
84863050103
-
Slicing: A new approach for privacy preserving data publishing
-
T. Li et al. Slicing: A new approach for privacy preserving data publishing. IEEE Transactions on Knowledge and Data Engineering, 24(3):561-574, 2012.
-
(2012)
IEEE Transactions on Knowledge and Data Engineering
, vol.24
, Issue.3
, pp. 561-574
-
-
Li, T.1
-
16
-
-
35448937300
-
Hiding the presence of individuals from shared databases
-
M. Nergiz et al. Hiding the presence of individuals from shared databases. In Int. Conf. on Management of Data, pages 665-676, 2007.
-
(2007)
Int. Conf. on Management of Data
, pp. 665-676
-
-
Nergiz, M.1
-
19
-
-
84889059821
-
Identifying participants in the personal genome project by name
-
L. Sweeney et al. Identifying Participants in the Personal Genome Project by Name. SSRN Electronic Journal, pages 1-4, 2013.
-
(2013)
SSRN Electronic Journal
, pp. 1-4
-
-
Sweeney, L.1
|