Protecting privacy using k-anonymity

K El Emam, FK Dankar�- Journal of the American Medical�…, 2008 - academic.oup.com
Objective: There is increasing pressure to share health information and even make it
publicly available. However, such disclosures of personal health information raise serious�…

A globally optimal k-anonymity method for the de-identification of health data

K El Emam, FK Dankar, R Issa, E Jonker…�- Journal of the�…, 2009 - academic.oup.com
Background: Explicit patient consent requirements in privacy laws can have a negative
impact on health research, leading to selection bias and reduced recruitment. Often�…

[PDF][PDF] Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression

P Samarati, L Sweeney - 1998 - dataprivacylab.org
Today's globally networked society places great demand on the dissemination and sharing
of person-speci c data. Situations where aggregate statistical information was once the�…

An efficient privacy mechanism for electronic health records

A Anjum, KKR Choo, A Khan, A Haroon, S Khan…�- computers &�…, 2018 - Elsevier
Electronic health records (EHRs), digitization of patients' health record, offer many
advantages over traditional ways of keeping patients' records, such as easing data�…

Putting statistical disclosure control into practice: The ARX data anonymization tool

F Prasser, F Kohlmayer�- Medical data privacy handbook, 2015 - Springer
The sharing of sensitive personal data has become a core element of biomedical research.
To protect privacy, a broad spectrum of techniques must be implemented, including data�…

[HTML][HTML] Utility-preserving anonymization for health data publishing

H Lee, S Kim, JW Kim, YD Chung�- BMC medical informatics and decision�…, 2017 - Springer
Background Publishing raw electronic health records (EHRs) may be considered as a
breach of the privacy of individuals because they usually contain sensitive information. A�…

[BOOK][B] Anonymizing health data: case studies and methods to get you started

K El Emam, L Arbuckle - 2013 - books.google.com
Updated as of August 2014, this practical book will demonstrate proven methods for
anonymizing health data to help your organization share meaningful datasets, without�…

Thoughts on k-anonymization

ME Nergiz, C Clifton�- Data & Knowledge Engineering, 2007 - Elsevier
k-Anonymity is a method for providing privacy protection by ensuring that data cannot be
traced to an individual. In a k-anonymous dataset, any identifying information occurs in at�…

Can the utility of anonymized data be used for privacy breaches?

RCW Wong, AWC Fu, K Wang, PS Yu…�- ACM Transactions on�…, 2011 - dl.acm.org
Group based anonymization is the most widely studied approach for privacy-preserving data
publishing. Privacy models/definitions using group based anonymization includes k�…

Maintaining k-anonymity against incremental updates

J Pei, J Xu, Z Wang, W Wang…�- …�Conference on Scientific�…, 2007 - ieeexplore.ieee.org
K-anonymity is a simple yet practical mechanismto protect privacy against attacks of re-
identifying individuals by joining multiple public data sources. All existing methods achieving�…