-
1
-
-
84919412943
-
-
Accessed 22 Apr
-
Article 29 Data Protection Working Party: Opinion 05/2014 on anonymisation techniques. http://www.cnpd.public.lu/fr/publications/groupe-art29/wp216_en.pdf. Accessed 22 Apr (2014)
-
(2014)
Opinion 05/2014 on Anonymisation Techniques
-
-
-
2
-
-
84957041261
-
-
Accessed 06 May
-
ARX – Powerful Data Anonymization: http://arx.deidentifier.org/. Accessed 06 May (2015)
-
(2015)
Powerful Data Anonymization
-
-
-
4
-
-
33750732631
-
Secure anonymization for incremental datasets
-
Byun, J., Sohn, Y., Bertino, E., Li, N.: Secure anonymization for incremental datasets. In: Proceedings of VLDB Workshop Secure Data Management, 48–63 (2006)
-
(2006)
Proceedings of VLDB Workshop Secure Data Management
, pp. 48-63
-
-
Byun, J.1
Sohn, Y.2
Bertino, E.3
Li, N.4
-
5
-
-
84911949866
-
-
Privacy by Design, Ontario, Canada, Accessed 06 May (2015)
-
Cavoukian, A., Castro, D.: Big data and innovation, setting the record straight: de-identification does work. Privacy by Design, Ontario, Canada. http://www2.itif.org/2014-big-datadeidentification.pdf (2014). Accessed 06 May (2015)
-
(2014)
Big Data and Innovation, Setting the Record Straight: De-Identification Does Work
-
-
Cavoukian, A.1
Castro, D.2
-
6
-
-
0003157310
-
Estimation of identification disclosure risk in microdata
-
Chen, G., Keller-McNulty, S.: Estimation of identification disclosure risk in microdata. J. Off. Stat. 14, 79–95 (1998)
-
(1998)
J. Off. Stat
, vol.14
, pp. 79-95
-
-
Chen, G.1
Keller-McNulty, S.2
-
8
-
-
84882724877
-
Microdata protection
-
Yu, T., Jajodia, S. (eds.), Springer, Berlin
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Microdata protection. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems. Advances in Information Security, vol. 33, 291–321. Springer, Berlin (2007)
-
(2007)
Secure Data Management in Decentralized Systems. Advances in Information Security
, vol.33
, pp. 291-321
-
-
Ciriani, V.1
De Capitani, D.V.S.2
Foresti, S.3
Samarati, P.4
-
9
-
-
84868320000
-
TIAMAT: A tool for interactive analysis of microdata anonymization techniques
-
Dai, C., Ghinita, G., Bertino, E., Byun, J.W., Li, N.: TIAMAT: a tool for interactive analysis of microdata anonymization techniques. In: Proceedings of the VLDB Endowment (2009)
-
(2009)
Proceedings of the VLDB Endowment
-
-
Dai, C.1
Ghinita, G.2
Bertino, E.3
Byun, J.W.4
Li, N.5
-
10
-
-
84877081683
-
Practicing differential privacy in health care: A review. Trans
-
Dankar, F.K., Emam, K.E.: Practicing differential privacy in health care: a review. Trans. Data Privacy 6(1), 35–67 (2013)
-
(2013)
Data Privacy
, vol.6
, Issue.1
, pp. 35-67
-
-
Dankar, F.K.1
Emam, K.E.2
-
11
-
-
84863508974
-
Estimating the re-identification risk of clinical data sets
-
Dankar, F., Emam, K.E., Neisa, A., Roffey, T.: Estimating the re-identification risk of clinical data sets. BMC Med. Inform. Decis. Mak. 12(1), 66 (2012)
-
(2012)
BMC Med. Inform. Decis. Mak
, vol.12
, Issue.1
, pp. 66
-
-
Dankar, F.1
Emam, K.E.2
Neisa, A.3
Roffey, T.4
-
12
-
-
70350686247
-
An ad omnia approach to defining and achieving private data analysis
-
Dwork, C.: An ad omnia approach to defining and achieving private data analysis. In: Proceedings of PinKDD, 1–13 (2007)
-
(2007)
Proceedings of Pinkdd
, pp. 1-13
-
-
Dwork, C.1
-
14
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: privacy via distributed noise generation. In: Proceedings of EUROCRYPT 2006, 486–503 (2006)
-
(2006)
Proceedings of EUROCRYPT 2006
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
15
-
-
82555187188
-
A systematic review of re-identification attacks on health data
-
El Emam, K., Jonker, E., Arbuckle, L., Malin, B.: A systematic review of re-identification attacks on health data. PloS One 6(12), e28071 (2011)
-
(2011)
Plos One
, vol.6
, Issue.12
-
-
El Emam, K.1
Jonker, E.2
Arbuckle, L.3
Malin, B.4
-
16
-
-
69549114557
-
A globally optimal k-anonymity method for the de-identification of health data
-
Emam, K.E., Dankar, F.K., Issa, R., Jonker, E., Amyot, D., Cogo, E., Corriveau, J., Walker, M., Chowdhury, S., Vaillancourt, R., Roffey, T., Bottomley, J.: A globally optimal k-anonymity method for the de-identification of health data. J. Am. Med. Inform. Assoc. 16(5), 670–682 (2009)
-
(2009)
J. Am. Med. Inform. Assoc
, vol.16
, Issue.5
, pp. 670-682
-
-
Emam, K.E.1
Dankar, F.K.2
Issa, R.3
Jonker, E.4
Amyot, D.5
Cogo, E.6
Corriveau, J.7
Walker, M.8
Chowdhury, S.9
Vaillancourt, R.10
Roffey, T.11
Bottomley, J.12
-
17
-
-
85054263771
-
-
CRC Press, Hoboken
-
Fung, B., Wang, K., Fu, A., Yu, P.: Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques. CRC Press, Hoboken (2010)
-
(2010)
Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques
-
-
Fung, B.1
Wang, K.2
Fu, A.3
Yu, P.4
-
18
-
-
70349121193
-
HIDE: Heterogeneous information de-identification
-
Gardner, J.J., Xiong, L., Li, K., Lu, J.J.: HIDE: heterogeneous information de-identification. In: Proceedings of International Conference on Extending Database Technology, 1116–1119 (2009)
-
(2009)
Proceedings of International Conference on Extending Database Technology
, pp. 1116-1119
-
-
Gardner, J.J.1
Xiong, L.2
Li, K.3
Lu, J.J.4
-
19
-
-
84988315609
-
Kalnis, P., Mamoulis, N.: Fast data anonymization with low information loss
-
Ghinita, G., Karras, P., Kalnis, P., Mamoulis, N.: Fast data anonymization with low information loss. In: Proceedings of the VLDB Endowment, 758–769 (2007)
-
(2007)
Proceedings of the VLDB Endowment
, pp. 758-769
-
-
Ghinita, G.1
Karras, P.2
-
20
-
-
84905223399
-
Publishing data from electronic health records while preserving privacy: A survey of algorithms
-
Gkoulalas-Divanis, A., Loukides, G., Sun, J.: Publishing data from electronic health records while preserving privacy: a survey of algorithms. J. Biomed. Inform. 50, 4–19 (2014)
-
(2014)
J. Biomed. Inform
, vol.50
, pp. 4-19
-
-
Gkoulalas-Divanis, A.1
Loukides, G.2
Sun, J.3
-
21
-
-
84995020646
-
Strategies for measuring risk in public use micro-data files
-
Greenberg, B., Zayatz, L.: Strategies for measuring risk in public use micro-data files. Statistica Neerlandica 46(1), 33–48 (1992)
-
(1992)
Statistica Neerlandica
, vol.46
, Issue.1
, pp. 33-48
-
-
Greenberg, B.1
Zayatz, L.2
-
22
-
-
0347516378
-
Applying Pitman’s sampling formula to microdata disclosure risk assessment
-
Hoshino, N.: Applying Pitman’s sampling formula to microdata disclosure risk assessment. J. Off. Stat. 17(4), 499–520 (2001)
-
(2001)
J. Off. Stat
, vol.17
, Issue.4
, pp. 499-520
-
-
Hoshino, N.1
-
23
-
-
84956980065
-
-
Accessed 22 Apr
-
Hundepool, A., van deWetering, A., Ramaswamy, R., Franconi, L., Polettini, S., Capobianchi, A., deWolf, P.P., Domingo, J., Torra, V., Brand, R., Giessing, S.: ρ-Argus manual. http://neon.vb.cbs.nl/casc/Software/MuManual4.2.pdf. Accessed 22 Apr (2008)
-
(2008)
ρ-Argus Manual
-
-
Hundepool, A.1
Van Dewetering, A.2
Ramaswamy, R.3
Franconi, L.4
Polettini, S.5
Capobianchi, A.6
Dewolf, P.P.7
Domingo, J.8
Torra, V.9
Brand, R.10
Giessing, S.11
-
25
-
-
84964314885
-
De-identification of address, date, and alphanumeric identifiers in narrative clinical reports
-
Kayaalp, M., Browne, A.C., Dodd, Z., Sagan, P., McDonald, C.: De-identification of address, date, and alphanumeric identifiers in narrative clinical reports. In: AMIA Annual Symposium Proceedings, 767–776 (2014)
-
(2014)
AMIA Annual Symposium Proceedings
, pp. 767-776
-
-
Kayaalp, M.1
Browne, A.C.2
Dodd, Z.3
Sagan, P.4
McDonald, C.5
-
26
-
-
84873663513
-
Flash: Efficient, stable and optimal k-anonymity
-
Kohlmayer, F., Prasser, F., Eckert, C., Kemper, A., Kuhn, K.A.: Flash: efficient, stable and optimal k-anonymity. In: Proceedings of International Conference on Information Privacy, Security, Risk and Trust (2012)
-
(2012)
Proceedings of International Conference on Information Privacy, Security, Risk and Trust
-
-
Kohlmayer, F.1
Prasser, F.2
Eckert, C.3
Kemper, A.4
Kuhn, K.A.5
-
27
-
-
84867325726
-
Highly efficient optimal k-anonymity for biomedical datasets
-
Kohlmayer, F., Prasser, F., Eckert, C., Kemper, A., Kuhn, K.A.: Highly efficient optimal k-anonymity for biomedical datasets. In: Proceedings of International Symposium on Computer-Based Medical Systems (2012)
-
(2012)
Proceedings of International Symposium on Computer-Based Medical Systems
-
-
Kohlmayer, F.1
Prasser, F.2
Eckert, C.3
Kemper, A.4
Kuhn, K.A.5
-
28
-
-
84905263847
-
A flexible approach to distributed data anonymization
-
Kohlmayer, F., Prasser, F., Eckert, C., Kuhn, K.A.: A flexible approach to distributed data anonymization. J. Biomed. Inform. 50, 62–76 (2013).
-
(2013)
J. Biomed. Inform
, vol.50
, pp. 62-76
-
-
Kohlmayer, F.1
Prasser, F.2
Eckert, C.3
Kuhn, K.A.4
-
29
-
-
29844444250
-
Incognito: Efficient full-domain k-anonymity
-
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: Proceedings of International Conference on Management of Data, 49–60 (2005)
-
(2005)
Proceedings of International Conference on Management of Data
, pp. 49-60
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
30
-
-
29844439016
-
Multidimensional k-anonymity (TR-1521)
-
University of Wisconsin
-
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Multidimensional k-anonymity (TR-1521). Tech. Rep., University of Wisconsin (2005)
-
(2005)
Tech. Rep
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
32
-
-
34548805858
-
T-closeness: Privacy beyond k-anonymity and `-diversity
-
Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and `-diversity. In: Proceedings of International Conference on Data Engineering, 106–115 (2007)
-
(2007)
Proceedings of International Conference on Data Engineering
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
33
-
-
84874886418
-
Provably private data anonymization: Or, k-anonymity meets differential privacy
-
Li, N., Qardaji, W.H., Su, D.: Provably private data anonymization: or, k-anonymity meets differential privacy. CoRR, abs/1101.2604 49, 55 (2011)
-
(2011)
Corr, Abs/1101
, vol.2604
, Issue.49
, pp. 55
-
-
Li, N.1
Qardaji, W.H.2
Su, D.3
-
34
-
-
84863050103
-
Slicing: A new approach for privacy preserving data publishing
-
Li, T., Li, N., Zhang, J., Molloy, I.: Slicing: a new approach for privacy preserving data publishing. Trans. Knowl. Data Eng. 24(3), 561–574 (2012)
-
(2012)
Trans. Knowl. Data Eng
, vol.24
, Issue.3
, pp. 561-574
-
-
Li, T.1
Li, N.2
Zhang, J.3
Molloy, I.4
-
35
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. Trans. Knowl. Discov. Data 1(1), 24–35 (2007)
-
(2007)
Trans. Knowl. Discov. Data
, vol.1
, Issue.1
, pp. 24-35
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
36
-
-
78650495084
-
Never too old for anonymity: A statistical standard for demographic data sharing via the HIPAA privacy rule
-
Malin, B., Benitez, K., Masys, D.: Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA privacy rule. J. Am. Med. Inform. Assoc. 18(1), 3–10 (2011)
-
(2011)
J. Am. Med. Inform. Assoc
, vol.18
, Issue.1
, pp. 3-10
-
-
Malin, B.1
Benitez, K.2
Masys, D.3
-
37
-
-
70849116921
-
Privacy integrated queries: An extensible platform for privacy-preserving data analysis
-
McSherry, F.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: Proceedings of International Conference on Management of Data, 19–30 (2009)
-
(2009)
Proceedings of International Conference on Management of Data
, pp. 19-30
-
-
McSherry, F.1
-
38
-
-
34247254718
-
-
Accessed 22 Apr
-
Minka, T.: Lightspeed Matlab toolbox. http://research.microsoft.com/en-us/um/people/minka/software/lightspeed/. Accessed 22 Apr (2014)
-
(2014)
Lightspeed Matlab Toolbox
-
-
Minka, T.1
-
40
-
-
35448937300
-
Hiding the presence of individuals from shared databases
-
Nergiz, M.E., Atzori, M., Clifton, C.: Hiding the presence of individuals from shared databases. In: Proceedings of International Conference on Management of Data, 665–676 (2007)
-
(2007)
Proceedings of International Conference on Management of Data
, pp. 665-676
-
-
Nergiz, M.E.1
Atzori, M.2
Clifton, C.3
-
41
-
-
84886568546
-
Anonymizing data with relational and transaction attributes
-
Poulis, G., Loukides, G., Gkoulalas-Divanis, A., Skiadopoulos, S.: Anonymizing data with relational and transaction attributes. In: Proceedings of ECML PKDD, 353–369 (2013)
-
(2013)
Proceedings of ECML PKDD
, pp. 353-369
-
-
Poulis, G.1
Loukides, G.2
Gkoulalas-Divanis, A.3
Skiadopoulos, S.4
-
42
-
-
85014400885
-
SECRETA: A system for evaluating and comparing relational and transaction anonymization algorithms
-
Poulis, G., Gkoulalas-Divanis, A., Loukides, G., Skiadopoulos, S., Tryfonopoulos, C.: SECRETA: a system for evaluating and comparing relational and transaction anonymization algorithms. In: Proceedings of International Conference on Extending Database Technology, 620–623 (2014)
-
(2014)
Proceedings of International Conference on Extending Database Technology
, pp. 620-623
-
-
Poulis, G.1
Gkoulalas-Divanis, A.2
Loukides, G.3
Skiadopoulos, S.4
Tryfonopoulos, C.5
-
45
-
-
84964315955
-
ARX: A comprehensive tool for anonymizing biomedical data
-
Prasser, F., Kohlmayer, F., Lautenschlaeger, R., Eckert, C., Kuhn, K.A.: ARX: a comprehensive tool for anonymizing biomedical data. In: AMIA Annual Symposium Proceedings (2014).
-
(2014)
AMIA Annual Symposium Proceedings
-
-
Prasser, F.1
Kohlmayer, F.2
Lautenschlaeger, R.3
Eckert, C.4
Kuhn, K.A.5
-
46
-
-
84957028076
-
-
Accessed 22 Apr
-
Privacy Analytics Inc.: About PARAT de-identification software. http://www.privacyanalytics.ca/software/parat/. Accessed 22 Apr (2015)
-
(2015)
About PARAT De-Identification Software
-
-
-
50
-
-
0003529621
-
Computational disclosure control: A primer on data privacy protection
-
MIT
-
Sweeney, L.: Computational disclosure control: a primer on data privacy protection. Ph.D. Thesis, MIT (2001)
-
(2001)
Ph.D. Thesis
-
-
Sweeney, L.1
-
51
-
-
68949164027
-
Statistical disclosure control for microdata using the r-package sdcmicro
-
Templ, M.: Statistical disclosure control for microdata using the r-package sdcmicro. Trans. Data Privacy 1(2), 67–85 (2008)
-
(2008)
Trans. Data Privacy
, vol.1
, Issue.2
, pp. 67-85
-
-
Templ, M.1
-
53
-
-
85032525172
-
-
U.S. Health Insurance Portability and Accountability Act of 1996. Public Law 1-349 (1996)
-
(1996)
Public Law
, pp. 1-349
-
-
-
54
-
-
84881188576
-
-
Accessed 10 June
-
UTD Data Security and Privacy Lab: UTD anonymization toolbox. http://www.cs.utdallas.edu/dspl/cgi-bin/toolbox/index.php. Accessed 10 June (2012)
-
(2012)
UTD Anonymization Toolbox
-
-
-
55
-
-
84956988673
-
-
Accessed 22 Apr
-
Wikipedia: Hasse diagram. https://en.wikipedia.org/wiki/Hasse_diagram. Accessed 22 Apr (2015)
-
(2015)
Hasse Diagram
-
-
-
56
-
-
84957033884
-
-
Accessed 22 Apr
-
Wikipedia: Newton’s method. https://en.wikipedia.org/wiki/Newton’s_method. Accessed 22 Apr (2015)
-
(2015)
Newton’s Method
-
-
-
57
-
-
84956979867
-
-
Accessed 22 Apr
-
Wikipedia: Polygamma function. https://en.wikipedia.org/wiki/Polygamma_function. Accessed 22 Apr (2015)
-
(2015)
Polygamma Function
-
-
-
58
-
-
84893853914
-
Anatomy: Simple and effective privacy preservation
-
Xiao, X., Tao, Y.: Anatomy: simple and effective privacy preservation. In: Proceedings of the VLDB Endowment, 139–150 (2006)
-
(2006)
Proceedings of the VLDB Endowment
, pp. 139-150
-
-
Xiao, X.1
Tao, Y.2
-
59
-
-
70849123504
-
Interactive anonymization of sensitive data
-
Xiao, X., Wang, G., Gehrke, J.: Interactive anonymization of sensitive data. In: Proceedings of International Conference on Management of Data, 1051–1054 (2009)
-
(2009)
Proceedings of International Conference on Management of Data
, pp. 1051-1054
-
-
Xiao, X.1
Wang, G.2
Gehrke, J.3
-
60
-
-
33749582207
-
Utility-based anonymization using local recoding
-
Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.W.: Utility-based anonymization using local recoding. In: Proceedings of International Conference on Knowledge Discovery and Data Mining, 785–790 (2006)
-
(2006)
Proceedings of International Conference on Knowledge Discovery and Data Mining
, pp. 785-790
-
-
Xu, J.1
Wang, W.2
Pei, J.3
Wang, X.4
Shi, B.5
Fu, A.W.6
|