4.4 Article

De-identifying a public use microdata file from the Canadian national discharge abstract database

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

Privacy-Preserving Data Publishing: A Survey of Recent Developments

Benjamin C. M. Fung et al.

ACM COMPUTING SURVEYS (2010)

Article Computer Science, Information Systems

Risk-Based De-Identification of Health Data

Khaled El Emam

IEEE SECURITY & PRIVACY (2010)

Article Computer Science, Information Systems

Evaluating re-identification risks with respect to the HIPAA privacy rule

Kathleen Benitez et al.

JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2010)

Article Computer Science, Information Systems

The disclosure of diagnosis codes can breach research participants' privacy

Grigorios Loukides et al.

JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2010)

Article Computer Science, Information Systems

Privacy Interests in Prescription Data, Part 2 Patient Privacy

Khaled El Emam et al.

IEEE SECURITY & PRIVACY (2009)

Article Computer Science, Artificial Intelligence

k-Anonymization with Minimal Loss of Information

Aristides Gionis et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2009)

Article Computer Science, Information Systems

A Globally Optimal k-Anonymity Method for the De-Identification of Health Data

Khaled El Emam et al.

JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2009)

Review Computer Science, Information Systems

Protecting privacy using k-anonymity

Khaled El Emam et al.

JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2008)

Article Computer Science, Artificial Intelligence

Thoughts on k-anonymization

M. Ercan Nergiz et al.

DATA & KNOWLEDGE ENGINEERING (2007)

Article Computer Science, Artificial Intelligence

Anonymizing classification data for privacy preservation

Benjamin C. M. Fung et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2007)

Article Health Care Sciences & Services

Evaluating common de-identification heuristics for personal health information

Khaled El Emam et al.

JOURNAL OF MEDICAL INTERNET RESEARCH (2006)

Article Computer Science, Artificial Intelligence

Ordinal, continuous and heterogeneous k-anonymity through microaggregation

J Domingo-Ferrer et al.

DATA MINING AND KNOWLEDGE DISCOVERY (2005)

Article Computer Science, Artificial Intelligence

Random-data perturbation techniques and privacy-preserving data mining

H Kargupta et al.

KNOWLEDGE AND INFORMATION SYSTEMS (2005)

Article Computer Science, Artificial Intelligence

k-anonymity:: A model for protecting privacy

L Sweeney

INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS (2002)

Article Computer Science, Artificial Intelligence

Achieving k-anonymity privacy protection using generalization and suppression

L Sweeney

INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS (2002)

Article Computer Science, Artificial Intelligence

Exact and approximate methods for data directed microaggregation in one or more dimensions

G Sande

INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS (2002)

Article Statistics & Probability

A measure of disclosure risk for microdata

CJ Skinner et al.

JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES B-STATISTICAL METHODOLOGY (2002)

Article Computer Science, Artificial Intelligence

Practical data-oriented microaggregation for statistical disclosure control

J Domingo-Ferrer et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2002)

Letter Medicine, General & Internal

Authors should make their data available

DG Altman et al.

BRITISH MEDICAL JOURNAL (2001)

Article Computer Science, Artificial Intelligence

Protecting respondents' identities in microdata release

P Samarati

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2001)

Article Medicine, General & Internal

Publishing raw data and real time statistical analysis on e-journals

DJR Hutchon

BRITISH MEDICAL JOURNAL (2001)