Review
References
Adam NR, Worthmann JC (1989). Security-control methods for statistical databases: A comparative study. ACM Computing Surveys (CSUR). 21(4):515-556. Crossref |
||||
Ahmed NS, Yasin NM (2012). Improvement the cooperation feature in distributed healthcare information systems based on the fractal approach: An empirical study. Adv. Mater. Res. 463:861-867. Crossref |
||||
Appari A, Johnson ME (2010). Information security and privacy in healthcare: current state of research. Int. J. Internet enterprise manage. 6(4):279-314. Crossref |
||||
Bertino E, Fovino IN, Provenza LP (2005a). A framework for evaluating privacy preserving data mining algorithms. Data Mining Knowledge Discovery. 11(2):121-154. doi: 10.1007/s10618-005-0006-6. Crossref |
||||
Bertino E, Fovino IN, Provenza LP (2005b). A framework for evaluating privacy preserving data mining algorithms*. Data Mining Knowledge Discovery. 11(2):121-154. Crossref |
||||
Bertino E, Sandhu R (2005). Database security - Concepts, approaches, and challenges. IEEE Trans. Dependable Secure Computing. 2(1):2-19. Crossref |
||||
Blum A, Dwork C, McSherry F, Nissim K (2005). Practical privacy: the SuLQ framework. In: Proceedings of the 24th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. pp. 128-138. Crossref |
||||
Blum A, Ligett K, Roth A (2008). A learning theory approach to non-interactive database privacy. In: Proceedings of the 40th ACM SIGACT Symposium on Thoery of Computing. pp. 609-618. Crossref |
||||
Bowman S (2012). Impact of Electronic Health Record Systems on Information Integrity: quality and safety implications. Perspectives in Health Information Management. P. 10. | ||||
Brand R (2002). Microdata protection through noise addition. Infer. Contr. Statistical Databases pp. 61-74. Crossref |
||||
Chaum DL (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM. 24(2):84-90. Crossref |
||||
Chen L, Yang JJ, Wang Q, Niu Y (2012). A framework for privacy-preserving healthcare data sharing. Paper presented at the e-Health Networking, Applications and Services (Healthcom), 2012 IEEE 14th International Conference on; 01/2012. Crossref |
||||
Clifton C, Kantarcioglu M, Vaidya J, Lin X, Zhu MY (2002). Tools for privacy preserving distributed data mining. ACM Sigkdd Explorations Newsletter 4(2):28-34. Crossref |
||||
Committee PITAC (2004). Revolutionizing health care through information technology. Report to the President of the United States. | ||||
Dalenius T (1977). Towards a methodology for statistical disclosure control. Statistik Tidskrift, 15(429-444):2-1. | ||||
Dinur I, Nissim K (2003). Revealing information while preserving privacy. In: Proceedings of ACM PODS, pp.202–210. Crossref |
||||
Dwork C (2008). Differential privacy: A survey of results. Theory Appli. Models Comput. pp.1-19. Crossref |
||||
Fung BCM, Wang K, Chen R, Yu PS (2010). Privacy-preserving data publishing: A survey on recent developments. Computing. 5(4):1-53. Crossref |
||||
Fung BCM, Wang K, Yu PS (2007). Anonymizing classification data for privacy preservation. IEEE Trans. Knowledge Data Eng. 19(5):711-725. doi: 10.1109/tkde.2007.1015. Crossref |
||||
Gehrke J (2006). Models and methods for privacy-preserving data analysis and publishing. In ICDE 2006: Proceedings Of The Twenty second International Conference on Data Engineering, P. 105. IEEE Computer Society, Washington, Dc, USA. | ||||
Gkoulalas-Divanis A, Loukides G (2011). Medical Data Sharing: Privacy Challenges and Solutions. Dublin, Ireland. https://books.google.com.ng/books?id=HFLXlOdkpD8C&pg=PR6&dq=2011.+Medical+Data+Sharing:+Privacy+Challenges+and+Solutions.&hl=en&sa=X&ei=QqMKVYfHEIfcatSdgcgF&ved=0CCQQ6AEwAA#v=onepage&q=2011.%20Medical%20Data%20Sharing%3A%20Privacy%20Challenges%20and%20Solutions.&f=false | ||||
Gkoulalas-Divanis A, Verykiosc VS (2009). An overview of privacy preserving data mining. Crossroads 15(4):6. Crossref |
||||
Jakobsson M, Juels A, Rivest RL (2002). Making mix nets robust for electronic voting by randomized partial checking. http://people.csail.mit.edu/rivest/JakobssonJuelsRivest-MakingMixNetsRobustForElectronicVotingByRandomizedPartialChecking.pdf | ||||
LeFevre K, DeWitt DJ, Ramakrishnan R (2006). Mondrian multidimensional k-anonymity. In: Proc. of the 22nd International conference on Data Engineering (ICDE, 2006). IEEE. pp. 25-35. | ||||
Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007). l-diversity: Privacy beyond k-anonymity. ACM Trans. Knowledge Discovery Data (TKDD). 1(1):3. Crossref |
||||
Ohno-Machado L (2013). Sharing data for the public good and protecting individual privacy: informatics solutions to combine different goals. J. Am. Medical Info. Association. 20(1):1-1. Crossref |
||||
Parmar AA, Rao UP, Patel DR (2011). Blocking based approach for classification Rule hiding to preserve the Privacy in Database. Paper presented at the Computer Science and Society (ISCCS), 2011 International Symposium on; 08/2011 Crossref |
||||
Qi X, Zong M (2012). An Overview of Privacy Preserving Data Mining. Procedia. Environ. Sci. 12:1341-1347. Crossref |
||||
Sweeney L (2002). k-anonymity: A model for protecting privacy. Int. J. Uncertainty Fuzziness Knowledge Based Syst. 10(5):557-570. Crossref |
||||
Warner SL (1965). Randomized response: A survey technique for eliminating evasive answer bias. J. Am. Statistical Association. 63-69. Crossref |
||||
Wu S, Chaudhry B, Wang J, Maglione M, Mojica W, Roth E, Shekelle PG (2006). Systematic review: Impact of health information technology on quality, efficiency, and costs of medical care. Annals internal medicine. 144(10):742-752. Crossref |
||||
Yang Z, Zhong S, Wright RN (2005). Anonymity-preserving data collection. In Proc. eleventh ACM SIGKDD int. Confer. Knowledge discovery data mining ACM. pp. 334-343. Crossref |
Copyright © 2024 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0