A method for evaluating marketer re-identification risk
Proceedings of the 2010 EDBT/ICDT Workshops
ADNTIIC'10 Proceedings of the First international conference on Advances in new technologies, interactive interfaces, and communicability
Efficient discovery of de-identification policy options through a risk-utility frontier
Proceedings of the third ACM conference on Data and application security and privacy
Hi-index | 0.00 |
Before releasing personal health information for secondary uses, such as research or public health monitoring, organizations must de-identify the data they've collected. Several common heuristics are useful for this purpose, but they also have limitations.