Related references
Note: Only part of the references are listed.Methods for the de-identification of electronic health records for genomic research
Khaled El Emam
GENOME MEDICINE (2011)
Privacy-Preserving Data Publishing: A Survey of Recent Developments
Benjamin C. M. Fung et al.
ACM COMPUTING SURVEYS (2010)
Risk-Based De-Identification of Health Data
Khaled El Emam
IEEE SECURITY & PRIVACY (2010)
Evaluating re-identification risks with respect to the HIPAA privacy rule
Kathleen Benitez et al.
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2010)
The disclosure of diagnosis codes can breach research participants' privacy
Grigorios Loukides et al.
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2010)
Privacy Interests in Prescription Data, Part 2 Patient Privacy
Khaled El Emam et al.
IEEE SECURITY & PRIVACY (2009)
k-Anonymization with Minimal Loss of Information
Aristides Gionis et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2009)
A Globally Optimal k-Anonymity Method for the De-Identification of Health Data
Khaled El Emam et al.
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2009)
Protecting privacy using k-anonymity
Khaled El Emam et al.
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2008)
Thoughts on k-anonymization
M. Ercan Nergiz et al.
DATA & KNOWLEDGE ENGINEERING (2007)
Anonymizing classification data for privacy preservation
Benjamin C. M. Fung et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2007)
Evaluating common de-identification heuristics for personal health information
Khaled El Emam et al.
JOURNAL OF MEDICAL INTERNET RESEARCH (2006)
Ordinal, continuous and heterogeneous k-anonymity through microaggregation
J Domingo-Ferrer et al.
DATA MINING AND KNOWLEDGE DISCOVERY (2005)
Random-data perturbation techniques and privacy-preserving data mining
H Kargupta et al.
KNOWLEDGE AND INFORMATION SYSTEMS (2005)
k-anonymity:: A model for protecting privacy
L Sweeney
INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS (2002)
Achieving k-anonymity privacy protection using generalization and suppression
L Sweeney
INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS (2002)
Exact and approximate methods for data directed microaggregation in one or more dimensions
G Sande
INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS (2002)
Confidentiality via camouflage: The CVC approach to disclosure limitation when answering queries to databases
R Gopal et al.
OPERATIONS RESEARCH (2002)
A measure of disclosure risk for microdata
CJ Skinner et al.
JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES B-STATISTICAL METHODOLOGY (2002)
Practical data-oriented microaggregation for statistical disclosure control
J Domingo-Ferrer et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2002)
Authors should make their data available
DG Altman et al.
BRITISH MEDICAL JOURNAL (2001)
Protecting respondents' identities in microdata release
P Samarati
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2001)
Publishing raw data and real time statistical analysis on e-journals
DJR Hutchon
BRITISH MEDICAL JOURNAL (2001)