Author of the publication

A Theoretical Multi-level Privacy Protection Framework for Biomedical Data Warehouses.

, and . EUSPN/ICTH, volume 63 of Procedia Computer Science, page 569-574. Elsevier, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research Paper: A Globally Optimal k-Anonymity Method for the De-Identification of Health Data., , , , , , , , , and 2 other author(s). J. Am. Medical Informatics Assoc., 16 (5): 670-682 (2009)A theoretical model for obfuscating web navigation trails., and . EDBT/ICDT Workshops, page 137-144. ACM, (2013)Evaluating the risk of patient re-identification from adverse drug event reports., , , and . BMC Medical Informatics Decis. Mak., (2013)De-identifying a public use microdata file from the Canadian national discharge abstract database., , , and . BMC Medical Informatics Decis. Mak., (2011)A risk-based framework for biomedical data sharing., and . J. Biomed. Informatics, (2017)Research Paper: Protecting Privacy Using k-Anonymity., and . J. Am. Medical Informatics Assoc., 15 (5): 627-637 (2008)A method for evaluating marketer re-identification risk., and . EDBT/ICDT Workshops, ACM, (2010)A Theoretical Multi-level Privacy Protection Framework for Biomedical Data Warehouses., and . EUSPN/ICTH, volume 63 of Procedia Computer Science, page 569-574. Elsevier, (2015)Using Robust Estimation Theory to Design Efficient Secure Multiparty Linear Regression., , and . EDBT/ICDT Workshops, volume 1558 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)Secure Multi-Party linear Regression., , , and . EDBT/ICDT Workshops, volume 1133 of CEUR Workshop Proceedings, page 406-414. CEUR-WS.org, (2014)