[HTML][HTML] Publishing data from electronic health records while preserving privacy: A survey of algorithms

A Gkoulalas-Divanis, G Loukides, J Sun - Journal of biomedical informatics, 2014 - Elsevier
Abstract The dissemination of Electronic Health Records (EHRs) can be highly beneficial for
a range of medical studies, spanning from clinical trials to epidemic control studies, but it …

A globally optimal k-anonymity method for the de-identification of health data

K El Emam, FK Dankar, R Issa, E Jonker… - Journal of the …, 2009 - academic.oup.com
Background: Explicit patient consent requirements in privacy laws can have a negative
impact on health research, leading to selection bias and reduced recruitment. Often …

[PDF][PDF] 面向数据库应用的隐私保护研究综述

周水庚, 李丰, 陶宇飞, 肖小奎 - 计算机学报, 2009 - cjc.ict.ac.cn
摘要随着数据挖掘和数据发布等数据库应用的出现与发展, 如何保护隐私数据和防止敏感信息
泄露成为当前面临的重大挑战. 隐私保护技术需要在保护数据隐私的同时不影响数据应用 …

The SAIL Databank: building a national architecture for e-health research and evaluation

DV Ford, KH Jones, JP Verplancke, RA Lyons… - BMC health services …, 2009 - Springer
Background Vast quantities of electronic data are collected about patients and service users
as they pass through health service and other public sector organisations, and these data …

K-isomorphism: privacy preserving network publication against structural attacks

J Cheng, AW Fu, J Liu - Proceedings of the 2010 ACM SIGMOD …, 2010 - dl.acm.org
Serious concerns on privacy protection in social networks have been raised in recent years;
however, research in this area is still in its infancy. The problem is challenging due to the …

[PDF][PDF] 面向数据发布和分析的差分隐私保护

张啸剑, 孟小峰 - 计算机学报, 2014 - 159.226.43.17
摘要随着数据分析和发布等应用需求的出现和发展, 如何保护隐私数据和防止敏感信息泄露成为
当前面临的重大挑战. 基于k-匿名或者划分的隐私保护方法, 只适应特定背景知识下的攻击而 …

The cost of privacy: destruction of data-mining utility in anonymized data publishing

J Brickell, V Shmatikov - Proceedings of the 14th ACM SIGKDD …, 2008 - dl.acm.org
Re-identification is a major privacy threat to public datasets containing individual records.
Many privacy protection algorithms rely on generalization and suppression of" quasi …

Protecting privacy using k-anonymity

K El Emam, FK Dankar - Journal of the American Medical …, 2008 - academic.oup.com
Objective: There is increasing pressure to share health information and even make it
publicly available. However, such disclosures of personal health information raise serious …

Data and Structural k-Anonymity in Social Networks

A Campan, TM Truta - International Workshop on Privacy, Security, and …, 2008 - Springer
The advent of social network sites in the last years seems to be a trend that will likely
continue. What naive technology users may not realize is that the information they provide …

[PDF][PDF] Minimality attack in privacy preserving data publishing

RCW Wong, AWC Fu, K Wang, J Pei - Proceedings of the 33rd …, 2007 - cse.ust.hk
Data publishing generates much concern over the protection of individual privacy. Recent
studies consider cases where the adversary may possess different kinds of knowledge …