System and method for optimizing the de-identification of data sets

作者: Fida Dankar , Khaled El Emam , Romeo Issa

DOI:

关键词:

摘要: A method, system and computer memory for optimally de-identifying a dataset is provided. The from storage device. equivalence classes within the determined. lattice determined defining anonymization strategies. solution set generated. Optimal node then de-identified using generalization defined by optimal can be stored on

参考文章(19)
Kepa Zubeldia, Gordon W. Romney, Anonymously linking a plurality of data records ,(2000)
B. A. Malin, Protecting Genomic Sequence Anonymity with Generalization Lattices Methods of Information in Medicine. ,vol. 44, pp. 687- 692 ,(2005) , 10.1055/S-0038-1634025
Donald J. Pettini, Lars Carl Erickson, Agneta Breitenstein, Data source privacy screening systems and methods ,(2002)
Manolis Terrovitis, Nikos Mamoulis, Panos Kalnis, Privacy-preserving anonymization of set-valued data very large data bases. ,vol. 1, pp. 115- 125 ,(2008) , 10.14778/1453856.1453874
Khaled El Emam, Fida Kamal Dankar, Romeo Issa, Elizabeth Jonker, Daniel Amyot, Elise Cogo, Jean-Pierre Corriveau, Mark Walker, Sadrul Chowdhury, Regis Vaillancourt, Tyson Roffey, Jim Bottomley, A Globally Optimal k-Anonymity Method for the De-Identification of Health Data Journal of the American Medical Informatics Association. ,vol. 16, pp. 670- 682 ,(2009) , 10.1197/JAMIA.M3144
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Jian Pei, Achieving k -anonymity by clustering in attribute hierarchical structures data warehousing and knowledge discovery. pp. 405- 416 ,(2006) , 10.1007/11823728_39
John Grubmuller, Thomas Gilbert, Randell Grenier, Kevin Barrett, Charles Wentworth, Erik Nordman, Steven Davis, Maureen Farrell, N. Stephen Ober, System and Method for Analyzing De-Identified Health Care Data ,(2000)