Privacy-preserving data mashup model for trading person-specific information
Tài liệu tham khảo
2014
Acquisti, A., Friedman, A., Telang, R., 2006. Is there a cost to privacy breaches? An event study. In: Proceedings of the 27th International Conference on Information.
Aljafer, 2014, A brief overview and an experimental evaluation of data confidentiality measures on the cloud, Journal of Innovation in Digital Ecosystems, 1, 1, 10.1016/j.jides.2015.02.001
Arafati, 2014, D-mash: a framework for privacy-preserving data-as-a-service mashups, 498
Backman, 2011
Bevitt, 2012
Boardman, 2006
Currie, W.L., Seddon, J.J.M., 2014. A cross-country study of cloud computing policy and regulation in healthcare. In: Proceedings of the 22nd European Conference on Information Systems.
Dalenius, 1982, Data-swapping: a technique for disclosure control, Journal of Statistical Planning and Inference, 6, 73, 10.1016/0378-3758(82)90058-1
Data Management Platforms Buyer’s Guide, 2013. Econsultancy Digital Marketing Excellence.
Data Partners, 2014. Seventh Point. Last accessed: June 11, 2015; URL http://www.seventhpoint.com/whitepaper/data-partners/.
Department of Health and Human Services, 2013. Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the HITECH Act and the GINA Act; other Modifications to the HIPAA Rules (78 FR 5565), pp. 5565–5702.
Domingo-Ferrer, 2002, Practical data-oriented microaggregation for statistical disclosure control, IEEE Transactions on Knowledge and Data Engineering, 14, 189, 10.1109/69.979982
Du, 2002, Building decision tree classifier on private data, vol. 14, 1
Dwork, 2006, Calibrating noise to sensitivity in private data analysis
Fung, 2007, Anonymizing classification data for privacy preservation, IEEE Transactions on Knowledge Data Engineering, 19, 711, 10.1109/TKDE.2007.1015
Fung, 2010, Privacy-preserving data publishing: a survey of recent developments, ACM Computing Survey, 42, 14:1, 10.1145/1749603.1749605
Fung, 2012, Service-oriented architecture for high-dimensional private data mashup, IEEE Transactions on Services Computing, 5, 373, 10.1109/TSC.2011.13
Gates, 2014, Data is the new currency, 105
Gehrke, 2010, Programming with differential privacy: technical perspective, Communications of the ACM, 53, 10.1145/1810891.1810915
Gwebu, K.L., Wang, J., Xie, W., 2014. Understanding the cost associated with data security breaches. In: Proceedings of the 18th Pacific Asia Conference on Information Systems.
Hore, B., Jammalamadaka, R.C., Mehrotra, S., 2007. Flexible anonymization for privacy preserving data publishing: a systematic search based approach. In: Proceedings of the Seventh SIAM International Conference on Data Mining.
Hirshleifer, 2005
Hu, 2012, Towards law-aware semantic cloud policies with exceptions for data integration and protection, 26:1
Jurczyk, 2009, Distributed anonymization: achieving privacy for both data subjects and data providers, 191
Khokhar, 2014, Quantifying the costs and benefits of privacy-preserving health data publishing, Journal of Biomedical Informatics, 50, 107, 10.1016/j.jbi.2014.04.012
Kifer, 2009, Attacks on privacy and deFinetti’s theoerm, 127
Kim, 1986, A method for limiting disclosure in microdata based on random noise and transformation, 303
Kooiman, 1997
Kuner, 2011
LeFevre, 2006, Workload-aware anonymization, 277
Li, 2014, A theory of pricing private data, ACM Transactions on Database Systems, 39, 34:1, 10.1145/2691190.2691191
Lindell, 2009, Secure multiparty computation for privacy-preserving data mining, Journal of Privacy and Confidentiality, 1, 59, 10.29012/jpc.v1i1.566
Little, 1993, Statistical analysis of masked data, Journal of Official Statistics, 9, 407
Machanavajjhala, 2007, ℓ-Diversity: privacy beyond k-anonymity, ACM Transactions on Knowledge Discovery from Data, 1, 10.1145/1217299.1217302
McSherry, 2007, Mechanism design via differential privacy, 94
Mohammed, 2009, Anonymizing healthcare data: a case study on the blood transfusion service, 1285
Mohammed, 2010, Centralized and distributed anonymization for high-dimensional healthcare data, ACM Transactions on Knowledge Discovery from Data, 4, 18:1, 10.1145/1857947.1857950
Mohammed, 2011, Differentially private data release for data mining, 493
Mohammed, 2014, Secure two-party differentially private data release for vertically partitioned data, IEEE Transactions on Dependable and Secure Computing, 11, 59, 10.1109/TDSC.2013.22
OECD, 2013, Exploring the economics of personal data: a survey of methodologies for measuring monetary value, OECD Digital Economy Papers, 220
Personal Data Privacy and Security Act, 2011. Bill S.1151 – 112th Congress in the Senate of the United States.
Quinlan, 1993
2009
Riederer, 2011, For sale: your data, 1
Roebuck, 2012
Romanosky, 2014, Privacy costs and personal data protection: economic and legal perspectives, Berkeley Technology Law Journal, 24
Romanosky, 2014, Empirical analysis of data breach litigation, Journal of Empirical Legal Studies, 11, 74, 10.1111/jels.12035
Samarati, 2001, Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, IEEE Transactions on Knowledge and Data Engineering
Skinner, 1994, Disclosure control for census microdata, Journal of Official Statistics, 10, 31
Takemura, 1999
Truta, 2003, Privacy and confidentiality management for the microaggregation disclosure control method: disclosure risk and information loss measures, 21
Waal, 1998, Optimal local suppression in microdata, Journal of Official Statistics, 14, 421
Waal, 1999, Information loss through global recoding and local suppression, Netherlands Official Statistics, 14, 17
Wixom, 2015
Wixom, 2015
Yao, 1982, Protocols for secure computations, 160
