2013
DOI: 10.1109/titb.2012.2212281
|View full text |Cite
|
Sign up to set email alerts
|

Utility-Aware Anonymization of Diagnosis Codes

Abstract: The growing need for performing large-scale and low-cost biomedical studies has led organizations to promote the reuse of patient data. For instance, the National Institutes of Health in the US requires patient-specific data collected and analyzed in the context of Genome-Wide Association Studies (GWAS) to be deposited into a biorepository and broadly disseminated. While essential to comply with regulations, disseminating such data risks privacy breaches, because patients genomic sequences can be linked to the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
35
0
7

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(42 citation statements)
references
References 31 publications
(93 reference statements)
0
35
0
7
Order By: Relevance
“…Incognito [38] k-anonymity Generalization/Suppression Genetic [34] k-anonymity Generalization Mondrian [39] k-anonymity Generalization TDS [20] k-anonymity Generalization Greedy [78] k-anonymity Generalization Hilb [21] k-anonymity Generalization MDAV [73] k-anonymity Microaggregation CBFS [37] k-anonymity Microaggregation Incognito with -diversity [51] -diversity Generalization / Suppression Mondrian with -diversity [77] -diversity Generalization Anatomize [76] -diversity Bucketization Incognito with τ -closeness [42] τ -closeness Generalization / Suppression Mondrian with τ -closeness [43] τ -closeness Generalization Apriori [71] k m -Anonymity Generalization Disassociation [50] k m -Anonymity Disassociation UGACLIP [46] Privacy-constrained anonymity Generalization/Suppression CBA [45] Privacy-constrained anonymity Generalization/Suppression Greedy [80] (h, k, p)-Coherence Suppression SuppressControl [5] ρ-Uncertainty Suppression TDControl [5] ρ-Uncertainty Generalization/Suppression RBAT [48] P S-rule based anonymity Generalization Tree-based [49] P S-rule based anonymity Generalization Sample-based [49] P S-rule based anonymity Generalization PartialSuppression [35] ρ-Uncertainty Suppression Table 2: Algorithms applicable on diagnosis codes.…”
Section: Principlementioning
confidence: 99%
See 4 more Smart Citations
“…Incognito [38] k-anonymity Generalization/Suppression Genetic [34] k-anonymity Generalization Mondrian [39] k-anonymity Generalization TDS [20] k-anonymity Generalization Greedy [78] k-anonymity Generalization Hilb [21] k-anonymity Generalization MDAV [73] k-anonymity Microaggregation CBFS [37] k-anonymity Microaggregation Incognito with -diversity [51] -diversity Generalization / Suppression Mondrian with -diversity [77] -diversity Generalization Anatomize [76] -diversity Bucketization Incognito with τ -closeness [42] τ -closeness Generalization / Suppression Mondrian with τ -closeness [43] τ -closeness Generalization Apriori [71] k m -Anonymity Generalization Disassociation [50] k m -Anonymity Disassociation UGACLIP [46] Privacy-constrained anonymity Generalization/Suppression CBA [45] Privacy-constrained anonymity Generalization/Suppression Greedy [80] (h, k, p)-Coherence Suppression SuppressControl [5] ρ-Uncertainty Suppression TDControl [5] ρ-Uncertainty Generalization/Suppression RBAT [48] P S-rule based anonymity Generalization Tree-based [49] P S-rule based anonymity Generalization Sample-based [49] P S-rule based anonymity Generalization PartialSuppression [35] ρ-Uncertainty Suppression Table 2: Algorithms applicable on diagnosis codes.…”
Section: Principlementioning
confidence: 99%
“…Loukides et al also proposed the UGACLIP and CBA algorithms in [46] and [45], respectively. These algorithms apply generalization and suppression, and they aim to prevent re-identification based on specific sets of diagnosis codes that are provided as input.…”
Section: Principlementioning
confidence: 99%
See 3 more Smart Citations