Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges

J Domingo-Ferrer, O Farras, J Ribes-González… - Computer …, 2019 - Elsevier
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …

[HTML][HTML] Publishing data from electronic health records while preserving privacy: A survey of algorithms

A Gkoulalas-Divanis, G Loukides, J Sun - Journal of biomedical informatics, 2014 - Elsevier
Abstract The dissemination of Electronic Health Records (EHRs) can be highly beneficial for
a range of medical studies, spanning from clinical trials to epidemic control studies, but it …

Privacy and data protection by design-from policy to engineering

G Danezis, J Domingo-Ferrer, M Hansen… - arXiv preprint arXiv …, 2015 - arxiv.org
Privacy and data protection constitute core values of individuals and of democratic societies.
There have been decades of debate on how those values-and legal obligations-can be …

[图书][B] A general survey of privacy-preserving data mining models and algorithms

CC Aggarwal, PS Yu - 2008 - Springer
In recent years, privacy-preserving data mining has been studied extensively, because of
the wide proliferation of sensitive information on the internet. A number of algorithmic …

A survey on privacy in mobile participatory sensing applications

D Christin, A Reinhardt, SS Kanhere… - Journal of systems and …, 2011 - Elsevier
The presence of multimodal sensors on current mobile phones enables a broad range of
novel mobile applications. Environmental and user-centric sensor data of unprecedented …

[图书][B] Data quality and record linkage techniques

TN Herzog, FJ Scheuren, WE Winkler - 2007 - Springer
This book helps practitioners gain a deeper understanding, at an applied level, of the issues
involved in improving data quality through editing, imputation, and record linkage. The first …

Information security and privacy in healthcare: current state of research

A Appari, ME Johnson - International journal of Internet and …, 2010 - inderscienceonline.com
Information security and privacy in the healthcare sector is an issue of growing importance.
The adoption of digital patient records, increased regulation, provider consolidation and the …

Never walk alone: Uncertainty for anonymity in moving objects databases

O Abul, F Bonchi, M Nanni - 2008 IEEE 24th international …, 2008 - ieeexplore.ieee.org
Preserving individual privacy when publishing data is a problem that is receiving increasing
attention. According to the fc-anonymity principle, each release of data must be such that …

Linking sensitive data

P Christen, T Ranbaduge, R Schnell - Methods and techniques for …, 2020 - Springer
Sensitive personal data are created in many application domains, and there is now an
increasing demand to share, integrate, and link such data within and across organisations in …

Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation

J Domingo-Ferrer, V Torra - Data Mining and Knowledge Discovery, 2005 - Springer
Abstract k-Anonymity is a useful concept to solve the tension between data utility and
respondent privacy in individual data (microdata) protection. However, the generalization …