TY - JOUR AU - Malin, B. AU - Karp, D. AU - Scheuermann, R. H. PY - 2010 DA - 2010// TI - Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research JO - J Investig Med VL - 58 ID - Malin2010 ER - TY - STD TI - Health Insurance Portability and Accountability Act of 1996, Public Law No. 104-191, 110 Stat. 1936, codified in Titles 29, 42, 18, and 26 of the U.S. Code, short title at 42 U.S.C. §201. https://www.gpo.gov/fdsys/pkg/PLAW-104publ191/pdf/PLAW-104publ191.pdf. UR - https://www.gpo.gov/fdsys/pkg/PLAW-104publ191/pdf/PLAW-104publ191.pdf ID - ref2 ER - TY - STD TI - Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal L 281, 23/11/1995 P. 0031 - 0050. ID - ref3 ER - TY - STD TI - U.S. Department of Health and Human Services. Office for Civil Rights. HIPAA Administrative Simplification Regulation Text. 45 C.F.R. Parts 160, 162, and 164 (2013). www.hhs.gov/sites/default/files/hipaa-simplification-201303.pdf. UR - http://www.hhs.gov/sites/default/files/hipaa-simplification-201303.pdf ID - ref4 ER - TY - JOUR AU - Xia, W. AU - Heatherly, R. AU - Ding, X. AU - Li, J. AU - Malin, B. A. PY - 2015 DA - 2015// TI - R-u policy frontiers for health data de-identification JO - J Am Med Inform Assoc VL - 22 UR - https://doi.org/10.1093/jamia/ocv004 DO - 10.1093/jamia/ocv004 ID - Xia2015 ER - TY - JOUR AU - Emam, K. E. AU - Dankar, F. K. AU - Issa, R. AU - Jonker, E. AU - Amyot, D. AU - Cogo, E. PY - 2009 DA - 2009// TI - A globally optimal k-anonymity method for the de-identification of health data JO - J Am Med Inform Assoc VL - 16 UR - https://doi.org/10.1197/jamia.M3144 DO - 10.1197/jamia.M3144 ID - Emam2009 ER - TY - CHAP AU - Prasser, F. AU - Kohlmayer, F. AU - Kuhn, K. A. PY - 2014 DA - 2014// TI - A benchmark of globally-optimal anonymization methods for biomedical data BT - Proc Int Symp Comp Med Sys ID - Prasser2014 ER - TY - STD TI - Kohlmayer F, Prasser F, Kuhn K. The cost of quality: Implementing generalization and suppression for anonymizing biomedical data with minimal loss of information. J Biomed Inform (Epub ahead of print). 2015. doi:10.1016/j.jbi.2015.09.007. UR - http://dx.doi.org/10.1016/j.jbi.2015.09.007 ID - ref8 ER - TY - CHAP AU - Samarati, P. AU - Sweeney, L. PY - 1998 DA - 1998// TI - Generalizing data to provide anonymity when disclosing information BT - Proc Symp Principles Database Sys PB - ACM CY - New York ID - Samarati1998 ER - TY - JOUR AU - Samarati, P. PY - 2001 DA - 2001// TI - Protecting respondents’ identities in microdata release JO - Trans Knowl Data Eng VL - 13 UR - https://doi.org/10.1109/69.971193 DO - 10.1109/69.971193 ID - Samarati2001 ER - TY - BOOK AU - El Emam, K. AU - Arbuckle, L. PY - 2014 DA - 2014// TI - Anonymizing health data: Case studies and methods to get you started PB - O’Reilly and Associates CY - Sebastopol ID - El Emam2014 ER - TY - CHAP AU - Iyengar, V. PY - 2002 DA - 2002// TI - Transforming data to satisfy privacy constraints BT - Proc Int Conf Knowl Disc Data Mining PB - ACM CY - Edmonton, Alberta, Canada ID - Iyengar2002 ER - TY - CHAP AU - Kohlmayer, F. AU - Prasser, F. AU - Eckert, C. AU - Kemper, A. AU - Kuhn, K. A. PY - 2012 DA - 2012// TI - Flash: Efficient, stable and optimal k-anonymity BT - Proc Int Conf Priv Secur Risk Trust PB - IEEE CY - Amsterdam, The Netherlands ID - Kohlmayer2012 ER - TY - JOUR AU - Wan, Z. AU - Vorobeychik, Y. AU - Xia, W. AU - Clayton, E. W. AU - Kantarcioglu, M. AU - Ganta, R. AU - Heatherly, R. AU - Malin, B. A. PY - 2015 DA - 2015// TI - A game theoretic framework for analyzing re-identification risk JO - PloS one VL - 10 ID - Wan2015 ER - TY - CHAP AU - Sweeney, L. PY - 1997 DA - 1997// TI - Datafly: A system for providing anonymity in medical data BT - Proc Int Conf Database Secur PB - Hall CY - London, United Kingdom ID - Sweeney1997 ER - TY - JOUR AU - Babu, K. AU - Reddy, N. AU - Kumar, N. AU - Elliot, M. AU - Jena, S. PY - 2013 DA - 2013// TI - Achieving k-anonymity using improved greedy heuristics for very large relational databases JO - Trans Data Priv VL - 6 ID - Babu2013 ER - TY - CHAP AU - Prasser, F. AU - Kohlmayer, F. ED - Gkoulalas-Divanis, A. ED - Loukides, G. PY - 2015 DA - 2015// TI - Putting statistical disclosure control into practice: The ARX data anonymization tool BT - Medical Data Privacy Handbook PB - Springer International Publishing CY - Switzerland ID - Prasser2015 ER - TY - JOUR AU - Lautenschläger, R. AU - Kohlmayer, F. AU - Prasser, F. AU - Kuhn, K. A. PY - 2015 DA - 2015// TI - A generic solution for web-based management of pseudonymized data JO - BMC Med Inform Decis Mak VL - 15 UR - https://doi.org/10.1186/s12911-015-0222-y DO - 10.1186/s12911-015-0222-y ID - Lautenschläger2015 ER - TY - BOOK AU - Davey, B. AU - Priestley, H. PY - 2002 DA - 2002// TI - Introduction to lattices and order PB - Cambridge University Press CY - Cambridge UR - https://doi.org/10.1017/CBO9780511809088 DO - 10.1017/CBO9780511809088 ID - Davey2002 ER - TY - STD TI - Sweeney L. Computational disclosure control – a primer on data privacy protection. 2001. Ph.D. dissertation, Massachusetts Institute of Technology, Cambridge. ID - ref20 ER - TY - CHAP AU - LeFevre, K. AU - DeWitt, D. J. AU - Ramakrishnan, R. PY - 2005 DA - 2005// TI - Incognito: Efficient full-domain k-anonymity BT - Proc Int Conf Manag Data PB - ACM CY - Chicago, USA ID - LeFevre2005 ER - TY - CHAP AU - Li, N. AU - Li, T. AU - Venkatasubramanian, S. PY - 2007 DA - 2007// TI - t-Closeness: Privacy beyond k-anonymity and ℓ-diversity BT - Proc Int Conf Data Eng PB - IEEE CY - Istanbul, Turkey ID - Li2007 ER - TY - CHAP AU - Nergiz, M. AU - Atzori, M. AU - Clifton, C. PY - 2007 DA - 2007// TI - Hiding the presence of individuals from shared databases BT - Proc Int Conf Manag Data PB - ACM CY - Beijing, China ID - Nergiz2007 ER - TY - CHAP AU - Bayardo, R. J. AU - Agrawal, R. PY - 2005 DA - 2005// TI - Data privacy through optimal k-anonymization BT - Proc Int Conf Data Eng PB - IEEE CY - Tokyo, Japan ID - Bayardo2005 ER - TY - CHAP AU - Prasser, F. AU - Kohlmayer, F. AU - Lautenschlaeger, R. AU - Eckert, C. AU - Kuhn, K. A. PY - 2014 DA - 2014// TI - Arx – a comprehensive tool for anonymizing biomedical data BT - AMIA Annu Symp Proc PB - AMIA CY - Washington (DC), USA ID - Prasser2014 ER - TY - JOUR AU - El Emam, K. AU - Álvarez, C. PY - 2015 DA - 2015// TI - A critical appraisal of the article 29 working party opinion 05/2014 on data anonymization techniques JO - Int Data Priv Law VL - 5 UR - https://doi.org/10.1093/idpl/ipu033 DO - 10.1093/idpl/ipu033 ID - El Emam2015 ER - TY - JOUR AU - El Emam, K. AU - Dankar, F. K. PY - 2008 DA - 2008// TI - Protecting privacy using k-anonymity JO - J Am Med Inform Assoc VL - 15 UR - https://doi.org/10.1197/jamia.M2716 DO - 10.1197/jamia.M2716 ID - El Emam2008 ER - TY - STD TI - American Community Survey Main - U.S. Census Bureau. http://www.census.gov/acs/www/. Accessed 01 Oct 2015. UR - http://www.census.gov/acs/www/ ID - ref28 ER - TY - JOUR AU - Dankar, F. K. AU - Emam, K. E. PY - 2013 DA - 2013// TI - Practicing differential privacy in health care: A review JO - Trans Data Priv VL - 6 ID - Dankar2013 ER - TY - STD TI - Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M. ℓ-Diversity: Privacy beyond k-anonymity. Trans Knowl Discov Data. 2007;1(1). Article 3 (March 2007), 52 pages. ID - ref30 ER - TY - BOOK AU - El Emam, K. PY - 2013 DA - 2013// TI - Guide to the de-identification of personal health information PB - CRC Press CY - Boca Raton UR - https://doi.org/10.1201/b14764 DO - 10.1201/b14764 ID - El Emam2013 ER - TY - BOOK AU - Fung, B. AU - Wang, K. AU - Fu, A. AU - Yu, P. PY - 2010 DA - 2010// TI - Introduction to privacy-preserving data publishing: Concepts and techniques PB - CRC Press CY - Boca Raton UR - https://doi.org/10.1201/9781420091502 DO - 10.1201/9781420091502 ID - Fung2010 ER - TY - CHAP AU - Fung, B. C. M. AU - Wang, K. AU - Yu, P. S. PY - 2005 DA - 2005// TI - Top-down specialization for information and privacy preservation BT - Proc Int Conf Data Eng PB - IEEE CY - Tokyo, Japan ID - Fung2005 ER - TY - JOUR AU - Soria-Comas, J. AU - Domingo-Ferrer, J. AU - Sanchez, D. AU - Martinez, S. PY - 2015 DA - 2015// TI - t-closeness through microaggregation: Strict privacy with enhanced utility preservation JO - Trans Knowl Data Eng VL - 27 UR - https://doi.org/10.1109/TKDE.2015.2435777 DO - 10.1109/TKDE.2015.2435777 ID - Soria-Comas2015 ER - TY - JOUR AU - Cox, L. H. AU - Karr, A. F. AU - Kinney, S. K. PY - 2011 DA - 2011// TI - Risk-utility paradigms for statistical disclosure limitation: How to think, but not how to act JO - Int Stat Rev VL - 79 UR - https://doi.org/10.1111/j.1751-5823.2011.00140.x DO - 10.1111/j.1751-5823.2011.00140.x ID - Cox2011 ER - TY - JOUR AU - Domingo-Ferrer, J. AU - Torra, V. PY - 2005 DA - 2005// TI - Ordinal, continuous and heterogeneous k-anonymity through microaggregation JO - Data Min Knowl Disc VL - 11 UR - https://doi.org/10.1007/s10618-005-0007-5 DO - 10.1007/s10618-005-0007-5 ID - Domingo-Ferrer2005 ER - TY - JOUR AU - Goldberger, J. AU - Tassa, T. PY - 2010 DA - 2010// TI - Efficient anonymizations with enhanced utility JO - Trans Data Priv VL - 3 ID - Goldberger2010 ER - TY - STD TI - Carroll T, Cooper J, Tetali P. Counting antichains and linear extensions in generalizations of the boolean lattice. 2013. http://people.math.gatech.edu/~tetali/PUBLIS/CCT.pdf. Preprint. UR - http://people.math.gatech.edu/~tetali/PUBLIS/CCT.pdf ID - ref38 ER - TY - JOUR AU - Mattner, L. AU - Roos, B. PY - 2008 DA - 2008// TI - Maximal probabilities of convolution powers of discrete uniform distributions JO - Statist Probab Lett VL - 78 UR - https://doi.org/10.1016/j.spl.2008.05.005 DO - 10.1016/j.spl.2008.05.005 ID - Mattner2008 ER - TY - JOUR AU - Maass, M. PY - 2006 DA - 2006// TI - Average-case analysis of approximate trie search JO - Algorithmica VL - 46 UR - https://doi.org/10.1007/s00453-006-0126-4 DO - 10.1007/s00453-006-0126-4 ID - Maass2006 ER - TY - STD TI - Eckhardt BS. Complexity analysis of tries and spanning tree problems. 2009. PhD thesis, Technical University of Munich. ID - ref41 ER - TY - JOUR AU - Willard, D. E. PY - 1983 DA - 1983// TI - Log-logarithmic worst-case range queries are possible in space θ(n) JO - Inform Process Lett VL - 78 UR - https://doi.org/10.1016/0020-0190(83)90075-3 DO - 10.1016/0020-0190(83)90075-3 ID - Willard1983 ER - TY - JOUR AU - Bose, P. AU - Douieb, K. AU - Dujmovic, V. AU - Howat, J. AU - Morin, P. PY - 2013 DA - 2013// TI - Fast local searches and updates in bounded universes JO - Comput Geom VL - 46 UR - https://doi.org/10.1016/j.comgeo.2012.01.002 DO - 10.1016/j.comgeo.2012.01.002 ID - Bose2013 ER - TY - CHAP AU - Aggarwal, C. C. PY - 2005 DA - 2005// TI - On k-anonymity and the curse of dimensionality BT - Proc Int Conf Very Large Databases PB - ACM CY - Trondheim, Norway ID - Aggarwal2005 ER - TY - STD TI - Terrovitis M, Mamoulis N, Kalnis P. Privacy-preserving anonymization of set-valued data. Proc VLDB Endowment. 2008 Aug 1; 1(1):115–25. ID - ref45 ER - TY - CHAP AU - Poulis, G. AU - Loukides, G. AU - Gkoulalas-Divanis, A. AU - Skiadopoulos, S. PY - 2013 DA - 2013// TI - Anonymizing data with relational and transaction attributes BT - Proc Europ Conf Mach Learn Princ Pract Knowl Disc Databases PB - Springer CY - Berlin/Heidelberg, Germany ID - Poulis2013 ER -