Background: Explicit patient consent requirements in privacy laws can have a negative impact on health research, leading to selection bias and reduced recruitment. Often legislative requirements to obtain consent are waived if the information collected or disclosed is de-identified. Objective: The authors developed and empirically evaluated a new globally optimal de-identification algorithm that satisfies the k-anonymity criterion and that is suitable for health datasets. Design: Authors compared OLA (Optimal Lattice Anonymization) empirically to three existing k-anonymity algorithms, Datafly, Samarati, and Incognito, on six public, hospital, and registry datasets for different values of k and suppression limits. Measurement: Three informat...
AbstractPrivacy has always been a great concern of patients and medical service providers. As a resu...
Most of the recent efforts addressing the issue of privacy have focused on devising algorithms for t...
Due to the wide deployment of sensitive information on the internet, privacy preserving data mining ...
K-anonymization is a wide-spread technique for the de-identification of biomedical datasets. To not ...
Data de-identification reconciles the demand for release of data for research purposes and the deman...
AbstractObjectiveWith the ARX data anonymization tool structured biomedical data can be de-identifie...
The vast amount of data being collected about individuals has brought new challenges in protecting t...
Objective: Evaluate the effectiveness and robustness of Anonym, a tool for de-identifying free-text ...
Thesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and P...
Advancements in smart technology, wearable and mobile devices, and Internet of Things, have made sma...
In order to support the increasing need to share electronic health data for research purposes, vario...
Data privacy has been an important area of research in recent years. Dataset often consists of sensi...
Often a data holder, such as a hospital or bank, needs to share person-specific records in such a wa...
AbstractBasing on the study of K-Anonymity algorithm in privacy protection issue, this paper propose...
Abstract Background Publishing raw electronic health records (EHRs) may be considered as a breach of...
AbstractPrivacy has always been a great concern of patients and medical service providers. As a resu...
Most of the recent efforts addressing the issue of privacy have focused on devising algorithms for t...
Due to the wide deployment of sensitive information on the internet, privacy preserving data mining ...
K-anonymization is a wide-spread technique for the de-identification of biomedical datasets. To not ...
Data de-identification reconciles the demand for release of data for research purposes and the deman...
AbstractObjectiveWith the ARX data anonymization tool structured biomedical data can be de-identifie...
The vast amount of data being collected about individuals has brought new challenges in protecting t...
Objective: Evaluate the effectiveness and robustness of Anonym, a tool for de-identifying free-text ...
Thesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and P...
Advancements in smart technology, wearable and mobile devices, and Internet of Things, have made sma...
In order to support the increasing need to share electronic health data for research purposes, vario...
Data privacy has been an important area of research in recent years. Dataset often consists of sensi...
Often a data holder, such as a hospital or bank, needs to share person-specific records in such a wa...
AbstractBasing on the study of K-Anonymity algorithm in privacy protection issue, this paper propose...
Abstract Background Publishing raw electronic health records (EHRs) may be considered as a breach of...
AbstractPrivacy has always been a great concern of patients and medical service providers. As a resu...
Most of the recent efforts addressing the issue of privacy have focused on devising algorithms for t...
Due to the wide deployment of sensitive information on the internet, privacy preserving data mining ...