Privacy-preserving data publishing: A survey of recent developments

BCM Fung, K Wang, R Chen, PS Yu - ACM Computing Surveys (Csur), 2010 - dl.acm.org
The collection of digital information by governments, corporations, and individuals has
created tremendous opportunities for knowledge-and information-based decision making …

[HTML][HTML] Publishing data from electronic health records while preserving privacy: A survey of algorithms

A Gkoulalas-Divanis, G Loukides, J Sun - Journal of biomedical informatics, 2014 - Elsevier
Abstract The dissemination of Electronic Health Records (EHRs) can be highly beneficial for
a range of medical studies, spanning from clinical trials to epidemic control studies, but it …

Protecting privacy using k-anonymity

K El Emam, FK Dankar - Journal of the American Medical …, 2008 - academic.oup.com
Objective: There is increasing pressure to share health information and even make it
publicly available. However, such disclosures of personal health information raise serious …

The cost of privacy: destruction of data-mining utility in anonymized data publishing

J Brickell, V Shmatikov - Proceedings of the 14th ACM SIGKDD …, 2008 - dl.acm.org
Re-identification is a major privacy threat to public datasets containing individual records.
Many privacy protection algorithms rely on generalization and suppression of" quasi …

Towards trajectory anonymization: a generalization-based approach

ME Nergiz, M Atzori, Y Saygin - … of the SIGSPATIAL ACM GIS 2008 …, 2008 - dl.acm.org
Trajectory datasets are becoming more and more popular due to the massive usage of GPS
and other location-based devices and services. In this paper, we address privacy issues …

Preserving the privacy of sensitive relationships in graph data

E Zheleva, L Getoor - International workshop on privacy, security, and trust …, 2007 - Springer
In this paper, we focus on the problem of preserving the privacy of sensitive relationships in
graph data. We refer to the problem of inferring sensitive relationships from anonymized …

[書籍][B] Data leakage detection/prevention solutions

A Shabtai, Y Elovici, L Rokach, A Shabtai, Y Elovici… - 2012 - Springer
Abstract According to the Forrester Wave report [Raschke, 2008], most early DLP solutions
focused on finding sensitive data as they left the organizational network by monitoring data …

On syntactic anonymity and differential privacy

C Clifton, T Tassa - 2013 IEEE 29th International Conference on …, 2013 - ieeexplore.ieee.org
Recently, there has been a growing debate over approaches for handling and analyzing
private data. Research has identified issues with syntactic anonymity models. Differential …

Hiding the presence of individuals from shared databases

ME Nergiz, M Atzori, C Clifton - Proceedings of the 2007 ACM SIGMOD …, 2007 - dl.acm.org
Advances in information technology, and its use in research, are increasing both the need
for anonymized data and the risks of poor anonymization. We present a metric, δ-presence …

Privacy-preserving anonymization of set-valued data

M Terrovitis, N Mamoulis, P Kalnis - Proceedings of the VLDB …, 2008 - dl.acm.org
In this paper we study the problem of protecting privacy in the publication of set-valued data.
Consider a collection of transactional data that contains detailed information about items …