Privacy-preserving data publishing: A survey of recent developments
The collection of digital information by governments, corporations, and individuals has
created tremendous opportunities for knowledge-and information-based decision making …
created tremendous opportunities for knowledge-and information-based decision making …
[HTML][HTML] Publishing data from electronic health records while preserving privacy: A survey of algorithms
Abstract The dissemination of Electronic Health Records (EHRs) can be highly beneficial for
a range of medical studies, spanning from clinical trials to epidemic control studies, but it …
a range of medical studies, spanning from clinical trials to epidemic control studies, but it …
Protecting privacy using k-anonymity
Objective: There is increasing pressure to share health information and even make it
publicly available. However, such disclosures of personal health information raise serious …
publicly available. However, such disclosures of personal health information raise serious …
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Re-identification is a major privacy threat to public datasets containing individual records.
Many privacy protection algorithms rely on generalization and suppression of" quasi …
Many privacy protection algorithms rely on generalization and suppression of" quasi …
Towards trajectory anonymization: a generalization-based approach
Trajectory datasets are becoming more and more popular due to the massive usage of GPS
and other location-based devices and services. In this paper, we address privacy issues …
and other location-based devices and services. In this paper, we address privacy issues …
Preserving the privacy of sensitive relationships in graph data
In this paper, we focus on the problem of preserving the privacy of sensitive relationships in
graph data. We refer to the problem of inferring sensitive relationships from anonymized …
graph data. We refer to the problem of inferring sensitive relationships from anonymized …
[書籍][B] Data leakage detection/prevention solutions
Abstract According to the Forrester Wave report [Raschke, 2008], most early DLP solutions
focused on finding sensitive data as they left the organizational network by monitoring data …
focused on finding sensitive data as they left the organizational network by monitoring data …
On syntactic anonymity and differential privacy
Recently, there has been a growing debate over approaches for handling and analyzing
private data. Research has identified issues with syntactic anonymity models. Differential …
private data. Research has identified issues with syntactic anonymity models. Differential …
Hiding the presence of individuals from shared databases
Advances in information technology, and its use in research, are increasing both the need
for anonymized data and the risks of poor anonymization. We present a metric, δ-presence …
for anonymized data and the risks of poor anonymization. We present a metric, δ-presence …
Privacy-preserving anonymization of set-valued data
In this paper we study the problem of protecting privacy in the publication of set-valued data.
Consider a collection of transactional data that contains detailed information about items …
Consider a collection of transactional data that contains detailed information about items …