Protecting Privacy without Shackling Providers
نویسندگان
چکیده
منابع مشابه
Protecting Privacy of Shared Epidemiologic Data without Compromising Analysis Potential
OBJECTIVE Ensuring privacy of research subjects when epidemiologic data are shared with outside collaborators involves masking (modifying) the data, but overmasking can compromise utility (analysis potential). Methods of statistical disclosure control for protecting privacy may be impractical for individual researchers involved in small-scale collaborations. METHODS We investigated a simple a...
متن کاملPrivacy Protecting Biometric Authentication Systems Privacy Protecting Biometric Authentication Systems
Privacy Protecting Biometric Authentication Systems As biometrics gains popularity and proliferates into the daily life, there is an increased concern over the loss of privacy and potential misuse of biometric data held in central repositories. The major concerns are about i) the use of biometrics to track people, ii) non-revocability of biometrics (eg. if a fingerprint is compromised it can no...
متن کاملProtecting Privacy of Genomic Information.
The ISO/IEC committee in charge of standardizing the well-known MPEG audiovisual standards has launched, in cooperation with the ISO committee on Biotechnology, a new activity for efficient compressed storage and transmission of genomic information. The paper presents proposals for adding privacy and security to such in-progress standards.
متن کاملPrivacy-Protecting Coupon System Revisited
At FC’05, Chen et al. introduced an elegant privacy protecting coupon (PPC) system, CESSS05 [13], in which users can purchase multi-coupons and redeem them unlinkably while being prevented from overspending or sharing the coupons. However, the costs for issuing and redeeming coupons are linear to the redeeming limit. Security of the system is not proved and only some arguments on system propert...
متن کاملXColor: Protecting General Proximity Privacy
As a severe threat in anonymized data publication, proximity breach is gaining increasing attention. Such breach occurs when an attacker learns with high confidence that the sensitive value of a targeted victim belongs to a set of semantically proximate values, even though not sure about the exact value. Focusing on tackling proximity breach under specific data models (e.g., categorical or nume...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Academic Medicine
سال: 2000
ISSN: 1040-2446
DOI: 10.1097/00001888-200001000-00005