메뉴 건너뛰기




Volumn 134, Issue , 2012, Pages 127-138

An iterative two-party protocol for scalable privacy-preserving record linkage

Author keywords

Approximate matching; Bloom filter; Data matching; Entity resolution; Privacy; Scalability

Indexed keywords

DATA HANDLING; DATA MINING; DATA PRIVACY; DATA STRUCTURES; FILTRATION; ITERATIVE METHODS; SCALABILITY;

EID: 84962835282     PISSN: 14451336     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (17)

References (45)
  • 4
    • 0014814325 scopus 로고
    • 'Space/time trade-offs in hash coding with allowable errors'
    • Bloom, B. (1970), 'Space/time trade-offs in hash coding with allowable errors', Communications of the ACM 13(7), 422-426
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 6
    • 67650258952 scopus 로고    scopus 로고
    • Privacy-preserving data linkage and geocoding: Current approaches and research directions
    • Hong Kong
    • Christen, P. (2006), Privacy-preserving data linkage and geocoding: Current approaches and research directions, in 'IEEE ICDM Workshop on Privacy Aspects of Data Mining', Hong Kong
    • (2006) 'IEEE ICDM Workshop on Privacy Aspects of Data Mining'
    • Christen, P.1
  • 14
    • 84903829375 scopus 로고    scopus 로고
    • 'Quantifying the correctness, computational complexity, and security of privacypreserving string comparators for record linkage'
    • Durham, E., Xue, Y., Kantarcioglu, M. & Malin, B. (2011), 'Quantifying the correctness, computational complexity, and security of privacypreserving string comparators for record linkage', Information Fusion
    • (2011) Information Fusion
    • Durham, E.1    Xue, Y.2    Kantarcioglu, M.3    Malin, B.4
  • 15
    • 18144444441 scopus 로고
    • 'A one way public key cryptosystem for the linkage of nominal files in epidemiological studies'
    • Dusserre, L., Quantin, C. & Bouzelat, H. (1995), 'A one way public key cryptosystem for the linkage of nominal files in epidemiological studies', Medinfo 8, 644-647
    • (1995) Medinfo , vol.8 , pp. 644-647
    • Dusserre, L.1    Quantin, C.2    Bouzelat, H.3
  • 22
    • 56749163236 scopus 로고    scopus 로고
    • A privacy-preserving framework for integrating person-specific databases
    • Springer
    • Kantarcioglu, M., Jiang, W. & Malin, B. (2008), A privacy-preserving framework for integrating person-specific databases, in 'Privacy in Statistical Databases', Springer, pp. 298-314
    • (2008) 'Privacy in Statistical Databases' , pp. 298-314
    • Kantarcioglu, M.1    Jiang, W.2    Malin, B.3
  • 28
    • 33745130929 scopus 로고    scopus 로고
    • Private and threshold set-intersection
    • Carnegie Mellon University
    • Kissner, L. & Song, D. (2004), Private and threshold set-intersection, in 'Technical Report', Carnegie Mellon University
    • (2004) 'Technical Report'
    • Kissner, L.1    Song, D.2
  • 29
    • 79961178764 scopus 로고    scopus 로고
    • A constraint satisfaction cryptanalysis of Bloom filters in private record linkage
    • Springer
    • Kuzu, M., Kantarcioglu, M., Durham, E. & Malin, B. (2011), A constraint satisfaction cryptanalysis of Bloom filters in private record linkage, in 'Privacy Enhancing Technologies', Springer, pp. 226-245
    • (2011) 'Privacy Enhancing Technologies' , pp. 226-245
    • Kuzu, M.1    Kantarcioglu, M.2    Durham, E.3    Malin, B.4
  • 31
    • 78049357399 scopus 로고    scopus 로고
    • 'Secure multiparty computation for privacy-preserving data mining'
    • Lindell, Y. & Pinkas, B. (2009), 'Secure multiparty computation for privacy-preserving data mining', Journal of Privacy and Confidentiality 1(1), 5
    • (2009) Journal of Privacy and Confidentiality , vol.1 , Issue.1 , pp. 5
    • Lindell, Y.1    Pinkas, B.2
  • 32
    • 79960442271 scopus 로고    scopus 로고
    • 'Anonymity meets game theory: secure data integration with malicious participants'
    • Mohammed, N., Fung, B. & Debbabi, M. (2011), 'Anonymity meets game theory: secure data integration with malicious participants', VLDB 20(4), 567-588
    • (2011) VLDB , vol.20 , Issue.4 , pp. 567-588
    • Mohammed, N.1    Fung, B.2    Debbabi, M.3
  • 34
    • 62249167366 scopus 로고    scopus 로고
    • 'Privacy-preserving fuzzy matching using a public reference table'
    • Pang, C., Gu, L., Hansen, D. & Maeder, A. (2009), 'Privacy-preserving fuzzy matching using a public reference table', Intelligent Patient Management pp. 71-89
    • (2009) Intelligent Patient Management , pp. 71-89
    • Pang, C.1    Gu, L.2    Hansen, D.3    Maeder, A.4
  • 39
    • 70349844175 scopus 로고    scopus 로고
    • 'Privacy-preserving string comparisons in record linkage systems: a review'
    • Trepetin, S. (2008), 'Privacy-preserving string comparisons in record linkage systems: a review', Information Security Journal: A Global Perspective 17(5), 253-266
    • (2008) Information Security Journal: A Global Perspective , vol.17 , Issue.5 , pp. 253-266
    • Trepetin, S.1
  • 41
    • 84870477881 scopus 로고    scopus 로고
    • An efficient two-party protocol for approximate matching in private record linkage
    • Vatsalan, D., Christen, P. & Verykios, V. (2011), An efficient two-party protocol for approximate matching in private record linkage, in 'AusDM, CRPIT 121'
    • (2011) 'AusDM, CRPIT 121'
    • Vatsalan, D.1    Christen, P.2    Verykios, V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.