References
- Abouelmehdi, Karim, Abderrahim Beni-Hessane, and Hayat Khaloufi. 2018. “Big Healthcare Data: Preserving Security and Privacy.” Journal of Big Data 5 (1): 1–18. doi:10.1186/s40537-017-0110-7.
- Aminifar, Amin, Yngve Lamo, Ka I. Pun, and Fazle Rabbi. 2019. “A Practical Methodology for Anonymization of Structured Health Data.”
- Anjum, Adeel, Kim-Kwang Raymond Choo, Abid Khan, Asma Haroon, Sangeen Khan, Samee U. Khan, Naveed Ahmad, and Basit Raza. 2018. “An Efficient Privacy Mechanism for Electronic Health Records.” Computers & Security 72: 196–211. doi:10.1016/j.cose.2017.09.014.
- Anjum, Adeel, Guillaume Raschia, Marc Gelgon, Abid Khan, Naveed Ahmad, Mansoor Ahmed, Sabah Suhail, and M. Masoom Alam. 2017. “τ-safety: A Privacy Model for Sequential Publication with Arbitrary Updates.” Computers & Security 66: 20–39. doi:10.1016/j.cose.2016.12.014.
- Attaullah, Hasina, Adeel Anjum, Tehsin Kanwal, Saif Ur Rehman Malik, Alia Asheralieva, Hassan Malik, Ahmed Zoha, Kamran Arshad, and Muhammad Ali Imran. 2021. “F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple Sensitive Attributes.” Sensors 21 (14): 4933. doi:10.3390/s21144933.
- Dwork, Cynthia. 2008, April 25-29. “Differential Privacy: A Survey of Results.” In Theory and Applications of Models of Computation: 5th International Conference, TAMC 2008, 1–19. Berlin, Heidelberg: Springer.
- El Emam, Khaled, and Luk Arbuckle. 2013. Anonymizing Health Data: Case Studies and Methods to Get You Started. O'Reilly Media, Inc.
- European Commission. 2014. Article 29 Working Party Opinion 05/2014 on Anonymisation Techniques.
- Gkoulalas-Divanis, Aris, Grigorios Loukides, and Jimeng Sun. 2014. “Publishing Data from Electronic Health Records While Preserving Privacy: A Survey of Algorithms.” Journal of Biomedical Informatics 50: 4–19. doi:10.1016/j.jbi.2014.06.002.
- Hsiao, Mei-Hui, Wen-Yang Lin, Kuang-Yung Hsu, and Zih-Xun Shen. 2019. “On Anonymizing Medical Microdata with Large-scale Missing Values-a Case Study with the Faers Dataset.” In 2019 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 6505–6508. IEEE.
- Iwendi, Celestine, Syed Atif Moqurrab, Adeel Anjum, Sangeen Khan, Senthilkumar Mohan, and Gautam Srivastava. 2020. “N-sanitization: A Semantic Privacy-Preserving Framework for Unstructured Medical Datasets.” Computer Communications 161: 160–171. doi:10.1016/j.comcom.2020.07.032.
- Jayabalan, Manoj, and Muhammad Ehsan Rana. 2018. “Anonymizing Healthcare Records: A Study of Privacy Preserving Data Publishing Techniques.” Advanced Science Letters 24 (3): 1694–1697. doi:10.1166/asl.2018.11139.
- Jayapradha, J., and M. Prakash. 2021. “f-Slip: An Efficient Privacy-Preserving Data Publishing Framework for 1: M Microdata with Multiple Sensitive Attributes.” Soft Computing, 1–18. doi:10.21203/rs.3.rs-660451/v1.
- Kanwal, Tehsin, Adeel Anjum, and Abid Khan. 2021. “Privacy Preservation in e-Health Cloud: Taxonomy, Privacy Requirements, Feasibility Analysis, and Opportunities.” Cluster Computing 24 (1): 293–317. doi:10.1007/s10586-020-03106-1.
- Khan, Razaullah, Xiaofeng Tao, Adeel Anjum, Tehsin Kanwal, Abid Khan, and Carsten Maple. 2020. “θ-sensitive k-Anonymity: An Anonymization Model for IoT Based Electronic Health Records.” Electronics 9 (5): 716. doi:10.3390/electronics9050716.
- Kitchenham, Barbara, and Stuart Charters. 2007. “Guidelines for Performing Systematic Literature Reviews in Software Engineering.”
- Kumar, Anil, and Ravinder Kumar. 2020. “Privacy Preservation of Electronic Health Record: Current Status and Future Direction.” In Handbook of Computer Networks and Cyber Security: Principles and Paradigms, 715–739. Cham: Springer.
- Lee, Hyukki, and Yon Dohn Chung. 2020. “Differentially Private Release of Medical Microdata: An Efficient and Practical Approach for Preserving Informative Attribute Values.” BMC Medical Informatics and Decision Making 20 (1): 1–15. doi:10.1186/s12911-019-1002-x.
- Lee, Hyukki, Soohyung Kim, Jong Wook Kim, and Yon Dohn Chung. 2017. “Utility-Preserving Anonymization for Health Data Publishing.” BMC Medical Informatics and Decision Making 17 (1): 1–12. doi:10.1186/s12911-016-0389-x.
- Li, Hongtao, Feng Guo, Wenyin Zhang, Jie Wang, and Jinsheng Xing. 2018. “(a, k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-Based Healthcare Services Systems.” Journal of Medical Systems 42 (3): 1–9. doi:10.1007/s10916-018-0896-7.
- Li, Ninghui, Tiancheng Li, and Suresh Venkatasubramanian. 2007. “t-closeness: Privacy Beyond k-Anonymity and l-Diversity.” In 2007 IEEE 23rd International Conference on Data Engineering, 106–115. IEEE.
- Li, Xiao-Bai, and Jialun Qin. 2017. “Anonymizing and Sharing Medical Text Records.” Information Systems Research 28 (2): 332–352. doi:10.1287/isre.2016.0676.
- Lu, Yang, Richard O. Sinnott, Kain Verspoor, and Udaya Parampalli. 2018. “Privacy-preserving Access Control in Electronic Health Record Linkage.” In 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), 1079–1090. IEEE.
- Machanavajjhala, Ashwin, Daniel Kifer, Johannes Gehrke, and Muthuramakrishnan Venkitasubramaniam. 2007. “l-diversity: Privacy Beyond k-anonymity.” ACM Transactions on Knowledge Discovery from Data (TKDD) 1 (1): 3–es. doi:10.1145/1217299.1217302.
- Majeed, Abdul. 2019. “Attribute-centric Anonymization Scheme for Improving User Privacy and Utility of Publishing e-Health Data.” Journal of King Saud University – Computer and Information Sciences 31 (4): 426–435. doi:10.1016/j.jksuci.2018.03.014.
- Neumann, Geoffrey K., Paul Grace, Daniel Burns, and Mike Surridge. 2019. “Pseudonymization Risk Analysis in Distributed Systems.” Journal of Internet Services and Applications 10 (1): 1–16. doi:10.1186/s13174-018-0098-z.
- Pawar, Ambika, Swati Ahirrao, and Prathamesh P. Churi. 2018. “Anonymization Techniques for Protecting Privacy: A Survey.” In 2018 IEEE Punecon, 1–6. IEEE.
- Poulis, Giorgos, Grigorios Loukides, Spiros Skiadopoulos, and Aris Gkoulalas-Divanis. 2017. “Anonymizing Datasets with Demographics and Diagnosis Codes in the Presence of Utility Constraints.” Journal of Biomedical Informatics 65: 76–96. doi:10.1016/j.jbi.2016.11.001.
- Prasser, Fabian, Johanna Eicher, Raffael Bild, Helmut Spengler, and Klaus A. Kuhn. 2017. “A Tool for Optimizing de-Identified Health Data for use in Statistical Classification.” In 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS), 169–174. IEEE.
- Prasser, Fabian, Florian Kohlmayer, Helmut Spengler, and Klaus A. Kuhn. 2018. “A Scalable and Pragmatic Method for the Safe Sharing of High-Quality Health Data.” IEEE Journal of Biomedical and Health Informatics 22 (2): 611–622. doi:10.1109/JBHI.2017.2676880.
- Rajendran, Keerthana, Manoj Jayabalan, and Muhammad Ehsan Rana. 2017. “A Study on k-Anonymity, l-Diversity, and t-Closeness Techniques.” IJCSNS 17 (12): 172.
- Ribeiro, Sérgio Luís, and Emilio Tissato Nakamura. 2019. “Privacy Protection with Pseudonymization and Anonymization in a Health IoT System: Results from Ocariot.” In 2019 IEEE 19th International Conference on Bioinformatics and Bioengineering (BIBE), 904–908. IEEE.
- Rohilla, Shivani, and Manish Bhardwaj. 2017. “Efficient Anonymization Algorithms to Prevent Generalized Losses and Membership Disclosure in Microdata.” American Journal of Data Mining and Knowledge Discovery 2 (2): 54–61. doi:10.11648/j.ajdmkd.20170202.13.
- Saeed, Rashad, and Azhar Rauf. 2018. “Anatomization Through Generalization (AG): A Hybrid Privacy-Preserving Approach to Prevent Membership, Identity and Semantic Similarity Disclosure Attacks.” In 2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), 1–7. IEEE.
- Sweeney, Latanya. 2002. “k-anonymity: A Model for Protecting Privacy.” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10 (05): 557–570. doi:10.1142/S0218488502001648.
- Tsai, Yu-Chuan, Shyue-Liang Wang, I-Hsien Ting, and Tzung-Pei Hong. 2020. “Flexible Sensitive K-Anonymization on Transactions.” World Wide Web 23 (4): 2391–2406. doi:10.1007/s11280-020-00798-8.
- Tsou, Yao-Tung, Mansour Naser Alraja, Li-Sheng Chen, Yu-Hsiang Chang, Yung-Li Hu, Yennun Huang, Chia-Mu Yu, and Pei-Yuan Tsai. 2021. “($$ k, $$ k, ϵ, δ)-Anonymization: Privacy-preserving Data Release Based on k-anonymity and Differential Privacy.” Service Oriented Computing and Applications 15 (3): 175–185. doi:10.1007/s11761-021-00324-2.
- Vardalachakis, Marios, Haridimos Kondylakis, Lefteris Koumakis, Angelina Kouroubali, and Dimitrios G. Katehakis. 2019. “ShinyAnonymizer: A Tool for Anonymizing Health Data.” In ICT4AWE, 325–332.
- Vovk, Olga, Gunnar Piho, and Peeter Ross. 2021a, June 21-23. “Anonymization Methods of Structured Health Care Data: A Literature Review.” In Model and Data Engineering: 10th International Conference, MEDI 2021, 175–189. Cham: Springer International Publishing.
- Vovk, Olga, Gunnar Piho, and Peeter Ross. 2021b. “Evaluation of Anonymization Tools for Health Data.” In International Conference on Model and Data Engineering, 302–313. Cham: Springer.
- Wang, Xuerui, and Andrew McCallum. 2006. “Topics Over Time: A non-Markov Continuous-Time Model of Topical Trends.” In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 424–433.
- Wong, Raymond Chi-Wing, Ada Wai-Chee Fu, Ke Wang, and Jian Pei. 2007. “Minimality Attack in Privacy Preserving Data Publishing.” In Proceedings of the 33rd International Conference on Very Large Data Bases, 543–554.
- Yan, Yan, Eyeleko Anselme Herman, Adnan Mahmood, Tao Feng, and Pengshou Xie. 2021. “A Weighted K-Member Clustering Algorithm for K-Anonymization.” Computing, 1–23. doi:10.1007/s00607-021-00922-0.
- Yao, Lin, Zhenyu Chen, Haibo Hu, Guowei Wu, and Bin Wu. 2021. “Sensitive Attribute Privacy Preservation of Trajectory Data Publishing Based on l-Diversity.” Distributed and Parallel Databases 39 (3): 785–811. doi:10.1007/s10619-020-07318-7.