Protecting privacy using k-anonymity
Objective: There is increasing pressure to share health information and even make it
publicly available. However, such disclosures of personal health information raise serious�…
publicly available. However, such disclosures of personal health information raise serious�…
A globally optimal k-anonymity method for the de-identification of health data
Background: Explicit patient consent requirements in privacy laws can have a negative
impact on health research, leading to selection bias and reduced recruitment. Often�…
impact on health research, leading to selection bias and reduced recruitment. Often�…
[PDF][PDF] Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression
P Samarati, L Sweeney - 1998 - dataprivacylab.org
Today's globally networked society places great demand on the dissemination and sharing
of person-speci c data. Situations where aggregate statistical information was once the�…
of person-speci c data. Situations where aggregate statistical information was once the�…
An efficient privacy mechanism for electronic health records
Electronic health records (EHRs), digitization of patients' health record, offer many
advantages over traditional ways of keeping patients' records, such as easing data�…
advantages over traditional ways of keeping patients' records, such as easing data�…
Putting statistical disclosure control into practice: The ARX data anonymization tool
F Prasser, F Kohlmayer�- Medical data privacy handbook, 2015 - Springer
The sharing of sensitive personal data has become a core element of biomedical research.
To protect privacy, a broad spectrum of techniques must be implemented, including data�…
To protect privacy, a broad spectrum of techniques must be implemented, including data�…
[HTML][HTML] Utility-preserving anonymization for health data publishing
Background Publishing raw electronic health records (EHRs) may be considered as a
breach of the privacy of individuals because they usually contain sensitive information. A�…
breach of the privacy of individuals because they usually contain sensitive information. A�…
[BOOK][B] Anonymizing health data: case studies and methods to get you started
K El Emam, L Arbuckle - 2013 - books.google.com
Updated as of August 2014, this practical book will demonstrate proven methods for
anonymizing health data to help your organization share meaningful datasets, without�…
anonymizing health data to help your organization share meaningful datasets, without�…
Thoughts on k-anonymization
k-Anonymity is a method for providing privacy protection by ensuring that data cannot be
traced to an individual. In a k-anonymous dataset, any identifying information occurs in at�…
traced to an individual. In a k-anonymous dataset, any identifying information occurs in at�…
Can the utility of anonymized data be used for privacy breaches?
Group based anonymization is the most widely studied approach for privacy-preserving data
publishing. Privacy models/definitions using group based anonymization includes k�…
publishing. Privacy models/definitions using group based anonymization includes k�…
Maintaining k-anonymity against incremental updates
K-anonymity is a simple yet practical mechanismto protect privacy against attacks of re-
identifying individuals by joining multiple public data sources. All existing methods achieving�…
identifying individuals by joining multiple public data sources. All existing methods achieving�…