-
2
-
-
84871893686
-
t-plausibility: Generalizing words to desensitize text
-
Anandan, B., Clifton, C., Jiang, W., Murugesan, M., Pastrana-Camacho, P., … (2012). t-plausibility: Generalizing words to desensitize text. Transactions on Data Privacy, 5, 505–534.
-
(2012)
Transactions on Data Privacy
, vol.5
, pp. 505-534
-
-
Anandan, B.1
Clifton, C.2
Jiang, W.3
Murugesan, M.4
Pastrana-Camacho, P.5
-
3
-
-
84878111139
-
Utility preserving query log anonymization via semantic microaggregation
-
Batet, M., Erola, A., Sánchez, D., & Castellà-Roca, J. (2013). Utility preserving query log anonymization via semantic microaggregation. Information Sciences, 242, 49–63.
-
(2013)
Information Sciences
, vol.242
, pp. 49-63
-
-
Batet, M.1
Erola, A.2
Sánchez, D.3
Castellà-Roca, J.4
-
4
-
-
75149129552
-
The rules of redaction: Identify, protect, review (and repeat)
-
Bier, E., Chow, R., Golle, P., King, T.H., & Staddon, J. (2009). The rules of redaction: Identify, protect, review (and repeat). IEEE Security and Privacy Magazine, 7(6), 46–53.
-
(2009)
IEEE Security and Privacy Magazine
, vol.7
, Issue.6
, pp. 46-53
-
-
Bier, E.1
Chow, R.2
Golle, P.3
King, T.H.4
Staddon, J.5
-
5
-
-
78049256235
-
A relational model of semantic similarity between words using automatically extracted lexical pattern clusters from the web
-
Bollegala, D., Matsuo, Y., & Ishizuka, M. (2009). A relational model of semantic similarity between words using automatically extracted lexical pattern clusters from the web. Paper presented at the Conference on Empirical Methods in Natural Language Processing, EMNLP 2009, Singapore, Republic of Singapore.
-
(2009)
Paper presented at the Conference on Empirical Methods in Natural Language Processing, EMNLP 2009, Singapore, Republic of Singapore
-
-
Bollegala, D.1
Matsuo, Y.2
Ishizuka, M.3
-
6
-
-
70349242276
-
Efficient techniques for document sanitization
-
Chakaravarthy, V.T., Gupta, H., Roy, P., & Mohania, M.K. (2008). Efficient techniques for document sanitization. Paper presented at the 17th ACM Conference on Information and Knowledge Management (CIKM'08), Napa Valley, CA.
-
(2008)
Paper presented at the 17th ACM Conference on Information and Knowledge Management (CIKM'08), Napa Valley, CA
-
-
Chakaravarthy, V.T.1
Gupta, H.2
Roy, P.3
Mohania, M.K.4
-
7
-
-
65449137151
-
Detecting privacy leaks using corpus-based association rules
-
Chow, R., Golle, P., & Staddon, J. (2008). Detecting privacy leaks using corpus-based association rules. Paper presented at the 14th Conference on Knowledge Discovery and Data Mining, Las Vegas, NV.
-
(2008)
Paper presented at the 14th Conference on Knowledge Discovery and Data Mining, Las Vegas, NV
-
-
Chow, R.1
Golle, P.2
Staddon, J.3
-
8
-
-
84936824188
-
Word association norms, mutual information, and lexicography
-
Church, K.W., & Hanks, P. (1990). Word association norms, mutual information, and lexicography. Computational Linguistics, 16(1), 22–29.
-
(1990)
Computational Linguistics
, vol.16
, Issue.1
, pp. 22-29
-
-
Church, K.W.1
Hanks, P.2
-
9
-
-
33847710337
-
The Google similarity distance
-
Cilibrasi, R.L., & Vitányi, P.M.B. (2006). The Google similarity distance. IEEE Transactions on Knowledge and Data Engineering, 19(3), 370–383.
-
(2006)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.3
, pp. 370-383
-
-
Cilibrasi, R.L.1
Vitányi, P.M.B.2
-
11
-
-
0012793677
-
Towards a methodology for statistical disclosure control
-
Dalenius, T. (1977). Towards a methodology for statistical disclosure control. Statistik Tidskrift, 15, 429–444.
-
(1977)
Statistik Tidskrift
, vol.15
, pp. 429-444
-
-
Dalenius, T.1
-
12
-
-
84941615455
-
-
Retrieved from
-
Department for a Healthy New York. (2013). New York State Confidentiality Law. Retrieved from: http://www.lac.org/doc_library/lac/publications/HIPAA_and_Art_27F_Summary.pdf
-
(2013)
New York State Confidentiality Law
-
-
-
14
-
-
67650316377
-
A survey of inference control methods for privacy-preserving data mining
-
In, C.C. Aggarwal, P.S. Yu, (Eds.), Berlin, Springer
-
Domingo-Ferrer, J. (2008). A survey of inference control methods for privacy-preserving data mining. In C.C. Aggarwal, & P.S. Yu (Eds.), Privacy-preserving data mining (pp. 53–80). Berlin: Springer.
-
(2008)
Privacy-preserving data mining
, pp. 53-80
-
-
Domingo-Ferrer, J.1
-
15
-
-
33745562886
-
Assessing the difficulty and time cost of de-identification in clinical narratives
-
Dorr, D., Phillips, W., Phansalkar, S., Sims, S., & Hurdle, J. (2006). Assessing the difficulty and time cost of de-identification in clinical narratives. Methods of Information in Medicine, 45(3), 246–252.
-
(2006)
Methods of Information in Medicine
, vol.45
, Issue.3
, pp. 246-252
-
-
Dorr, D.1
Phillips, W.2
Phansalkar, S.3
Sims, S.4
Hurdle, J.5
-
20
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
Fung, B.C.M., Wang, K., Chen, R., & Yu, P.S. (2010). Privacy-preserving data publishing: A survey of recent developments. ACM Computer Surverys, 42(4), 14.
-
(2010)
ACM Computer Surverys
, vol.42
, Issue.4
, pp. 14
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
22
-
-
84904195511
-
-
Retrieved from
-
Health Privacy Project. (2013). State Privacy Protections. Retrieved from: https://www.cdt.org/issue/state-privacy-protections
-
(2013)
State Privacy Protections
-
-
-
23
-
-
84949807262
-
-
Hoboken, NJ, Wiley
-
Hundepool, A., Domingo-Ferrer, J., Franconi, L., Giessing, S., Nordholt, E.S., Spicer, K., … (2013). Statistical Disclosure Control. Hoboken, NJ: Wiley.
-
(2013)
Statistical Disclosure Control
-
-
Hundepool, A.1
Domingo-Ferrer, J.2
Franconi, L.3
Giessing, S.4
Nordholt, E.S.5
Spicer, K.6
-
25
-
-
85011396199
-
Effects of high-order co-occurrences on word semantic similarities. Current Psychology Letters—Behaviour
-
Lemaire, B., & Denhière, G. (2006). Effects of high-order co-occurrences on word semantic similarities. Current Psychology Letters—Behaviour, Brain and Cognition, 18(1), 1.
-
(2006)
Brain and Cognition
, vol.18
, Issue.1
, pp. 1
-
-
Lemaire, B.1
Denhière, G.2
-
27
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
Machanavajjhala, A., Kifer, D., Gehrke, J., & Venkitasubramaniam, M. (2007). L-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data, 1(1), 3.
-
(2007)
ACM Transactions on Knowledge Discovery from Data
, vol.1
, Issue.1
, pp. 3
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
28
-
-
84862317031
-
Evaluation of the disclosure risk of masking methods dealing with textual attributes. International Journal of Innovative Computing
-
Martínez, S., Sánchez, D., & Valls, A. (2012). Evaluation of the disclosure risk of masking methods dealing with textual attributes. International Journal of Innovative Computing, Information and Control, 8(7), 4869–4882.
-
(2012)
Information and Control
, vol.8
, Issue.7
, pp. 4869-4882
-
-
Martínez, S.1
Sánchez, D.2
Valls, A.3
-
29
-
-
84875634268
-
A semantic framework to protect the privacy of electronic health records with non-numerical attributes
-
Martínez, S., Sánchez, D., & Valls, A. (2013). A semantic framework to protect the privacy of electronic health records with non-numerical attributes. Journal of Biomedical Informatics, 46(2), 294–303.
-
(2013)
Journal of Biomedical Informatics
, vol.46
, Issue.2
, pp. 294-303
-
-
Martínez, S.1
Sánchez, D.2
Valls, A.3
-
30
-
-
77955080124
-
Automatic de-identification of textual documents in the electronic health record: a review of recent research
-
Meystre, S.M., Friedlin, F.J., South, B.R., Shen, S., & Samore, M.H. (2010). Automatic de-identification of textual documents in the electronic health record: a review of recent research. BMC Medical Research Methodology, 10(70).
-
(2010)
BMC Medical Research Methodology
, vol.10
, Issue.70
-
-
Meystre, S.M.1
Friedlin, F.J.2
South, B.R.3
Shen, S.4
Samore, M.H.5
-
31
-
-
34250223098
-
Using lessons from health care to protect the privacy of library users: Guidelines for the de-identification of library data based on HIPAA
-
Nicholson, S., & Smith, C.A. (2007). Using lessons from health care to protect the privacy of library users: Guidelines for the de-identification of library data based on HIPAA. Journal of the American Society for Information Science and Technology, 58(8), 1198–1206.
-
(2007)
Journal of the American Society for Information Science and Technology
, vol.58
, Issue.8
, pp. 1198-1206
-
-
Nicholson, S.1
Smith, C.A.2
-
32
-
-
0003033112
-
Using information content to evalutate semantic similarity in a taxonomy
-
Resnik, P. (1995). Using information content to evalutate semantic similarity in a taxonomy. Paper presented at the 14th International Joint Conference on Artificial Intelligence, IJCAI 1995, Montreal, Quebec, Canada.
-
(1995)
Paper presented at the 14th International Joint Conference on Artificial Intelligence, IJCAI 1995, Montreal, Quebec, Canada
-
-
Resnik, P.1
-
33
-
-
84866480160
-
Entity disambiguation using semantic networks
-
Roman, J.H., Hulin, K.J., Collins, L.M., & Powell, J.E. (2012). Entity disambiguation using semantic networks. Journal of the American Society for Information Science and Technology, 63(10), 2087–2099.
-
(2012)
Journal of the American Society for Information Science and Technology
, vol.63
, Issue.10
, pp. 2087-2099
-
-
Roman, J.H.1
Hulin, K.J.2
Collins, L.M.3
Powell, J.E.4
-
34
-
-
78650843216
-
Ontology-based information content computation
-
Sánchez, D., Batet, M., & Isern, D. (2011). Ontology-based information content computation. Knowledge-based Systems, 24(2), 297–303.
-
(2011)
Knowledge-based Systems
, vol.24
, Issue.2
, pp. 297-303
-
-
Sánchez, D.1
Batet, M.2
Isern, D.3
-
35
-
-
78650169343
-
Ontology-driven web-based semantic similarity
-
Sánchez, D., Batet, M., Valls, A., & Gibert, K. (2010). Ontology-driven web-based semantic similarity. Journal of Intelligent Information Systems, 35(3), 383–413.
-
(2010)
Journal of Intelligent Information Systems
, vol.35
, Issue.3
, pp. 383-413
-
-
Sánchez, D.1
Batet, M.2
Valls, A.3
Gibert, K.4
-
36
-
-
84869481024
-
Detecting sensitive information from textual documents: an information-theoretic approach Modeling Decisions for Artificial Intelligence
-
Springer
-
Sánchez, D., Batet, M., & Viejo, A. (2012). Detecting sensitive information from textual documents: an information-theoretic approach Modeling Decisions for Artificial Intelligence. 9th International Conference, MDAI 2012 (Vol. 7647, pp. 173–184): Springer.
-
(2012)
9th International Conference, MDAI 2012
, vol.7647
, pp. 173-184
-
-
Sánchez, D.1
Batet, M.2
Viejo, A.3
-
37
-
-
84878271942
-
Automatic general-purpose sanitization of textual documents
-
Sánchez, D., Batet, M., & Viejo, A. (2013a). Automatic general-purpose sanitization of textual documents. IEEE Transactions on Information Forensics and Security, 8(6), 853–862.
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.6
, pp. 853-862
-
-
Sánchez, D.1
Batet, M.2
Viejo, A.3
-
38
-
-
84928501004
-
Detecting term relationships to improve textual document sanitization
-
Sánchez, D., Batet, M., & Viejo, A. (2013b). Detecting term relationships to improve textual document sanitization. Paper presented at the 17th Pacific Asia Conference on Information Systems, Jeju Island, South Korea.
-
(2013)
Paper presented at the 17th Pacific Asia Conference on Information Systems, Jeju Island, South Korea
-
-
Sánchez, D.1
Batet, M.2
Viejo, A.3
-
39
-
-
84883183011
-
Minimizing the disclosure risk of semantic correlations in document sanitization
-
Sánchez, D., Batet, M., & Viejo, A. (2013c). Minimizing the disclosure risk of semantic correlations in document sanitization. Information Sciences, 249, 110–123.
-
(2013)
Information Sciences
, vol.249
, pp. 110-123
-
-
Sánchez, D.1
Batet, M.2
Viejo, A.3
-
40
-
-
84901826979
-
Utility-preserving sanitization of semantically correlated terms in textual documents
-
Sánchez, D., Batet, M., & Viejo, A. (2014). Utility-preserving sanitization of semantically correlated terms in textual documents. Information Sciences, 279, 77–93.
-
(2014)
Information Sciences
, vol.279
, pp. 77-93
-
-
Sánchez, D.1
Batet, M.2
Viejo, A.3
-
41
-
-
84867404543
-
Knowledge-based scheme to create privacy-preserving but semantically-related queries for web search engines
-
Sánchez, D., Castellà-Roca, J., & Viejo, A. (2013). Knowledge-based scheme to create privacy-preserving but semantically-related queries for web search engines. Information Sciences, 218, 17–30.
-
(2013)
Information Sciences
, vol.218
, pp. 17-30
-
-
Sánchez, D.1
Castellà-Roca, J.2
Viejo, A.3
-
42
-
-
84908118056
-
Enhancing data utility in differential privacy via microaggregation-based k-anonymity
-
Soria-Comas, J., Domingo-Ferrer, J., Sánchez, D., & Martínez, S. (2014). Enhancing data utility in differential privacy via microaggregation-based k-anonymity. VLDB Journal, 23(5), 771–794.
-
(2014)
VLDB Journal
, vol.23
, Issue.5
, pp. 771-794
-
-
Soria-Comas, J.1
Domingo-Ferrer, J.2
Sánchez, D.3
Martínez, S.4
-
44
-
-
84975072616
-
-
Retrieved from
-
State of California Office of Satewide Health Planning & Development. (2013). Medical information reporting for California hospitals. Retrieved from: http://www.oshpd.ca.gov/hid/mircal/
-
(2013)
Medical information reporting for California hospitals
-
-
-
47
-
-
34247468572
-
Ensuring the privacy and confidentiality of electronic health records
-
Terry, N., & Francis, L. (2007). Ensuring the privacy and confidentiality of electronic health records. University of Illinois Law Review, 2007, 681–735.
-
(2007)
University of Illinois Law Review
, vol.2007
, pp. 681-735
-
-
Terry, N.1
Francis, L.2
|