Los puntos clave no están disponibles para este artículo en este momento.
Consider a data holder, such as a hospital or a bank, that has a privately held collection of person-specific, field structured data. Suppose the data holder wants to share a version of the data with researchers. How can a data holder release a version of its private data with scientific guarantees that the individuals who are the subjects of the data cannot be re-identified while the data remain practically useful? The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment. A release provides k-anonymity protection if the information for each person contained in the release cannot be distinguished from at least k-1 individuals whose information also appears in the release. This paper also examines re-identification attacks that can be realized on releases that adhere to k-anonymity unless accompanying policies are respected. The k-anonymity protection model is important because it forms the basis on which the real-world systems known as Datafly, μ-Argus and k-Similar provide guarantees of privacy protection.
Building similarity graph...
Analyzing shared references across papers
Loading...
Latanya Sweeney (Tue,) studied this question.
www.synapsesocial.com/papers/69da2abdb48bb130d46849f3 — DOI: https://doi.org/10.1142/s0218488502001648
Synapse has enriched 5 closely related papers on similar clinical questions. Consider them for comparative context:
Latanya Sweeney
International Journal of Uncertainty Fuzziness and Knowledge-Based Systems
Carnegie Mellon University
Building similarity graph...
Analyzing shared references across papers
Loading...