Proposal and Assessment of a De-Identification Strategy to Enhance Anonymity of the Observational Medical Outcomes Partnership Common Data Model (OMOP-CDM) in a Public Cloud-Computing Environment: Anonymization of Medical Data Using Privacy Models
暂无分享,去创建一个
Jongho Kim | Hyung Joon Joo | Seungho Jeon | Jongsub Moon | Jeongeun Seo | Sukyoung Kim | Jeongmoon Lee | Jangwook Sohn | Jong-Ho Kim | Jeongmoon Lee | J. Sohn | Hyung Joon Joo | Seungho Jeon | Jongsub Moon | Jeongeun Seo | Sukyoung Kim | H. J. Joo
[1] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[2] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[3] Khaled El Emam,et al. Guide to the De-Identification of Personal Health Information , 2013 .
[4] A. Meyer. The Health Insurance Portability and Accountability Act. , 1997, Tennessee medicine : journal of the Tennessee Medical Association.
[5] Fabian Prasser,et al. Putting Statistical Disclosure Control into Practice: The ARX Data Anonymization Tool , 2015, Medical Data Privacy Handbook.
[6] S. Papson. “Model” , 1981 .
[7] Barbara Pierscionek,et al. Contextual Anonymization for Secondary Use of Big Data in Biomedical Research: Proposal for an Anonymization Matrix , 2018, JMIR medical informatics.
[8] Anat Reiner Benaim,et al. Analyzing Medical Research Results Based on Synthetic Data and Their Relation to Real Data Results: Systematic Comparison From Five Observational Studies , 2020, JMIR medical informatics.
[9] Hans-Ulrich Prokosch,et al. A scoping review of cloud computing in healthcare , 2015, BMC Medical Informatics and Decision Making.
[10] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[11] Rebecca Herold,et al. The practical guide to HIPAA privacy and security compliance , 2003 .
[12] Rae Woong Park,et al. Sharing Clinical Big Data While Protecting Confidentiality and Security: Observational Health Data Sciences and Informatics , 2017, Healthcare informatics research.
[13] Cord Spreckelsen,et al. Privacy-Preserving Record Grouping and Consent Management Based on a Public-Private Key Signature Scheme: Theoretical Analysis and Feasibility Study , 2019, Journal of medical Internet research.