Author of the publication

Assessing privacy risks in population health publications using a checklist-based approach.

, , , , , and . J. Am. Medical Informatics Assoc., 25 (3): 315-320 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Role and Expression of Consent in Web Services., and . ICWS, page 382-388. CSREA Press, (2003)Privacy and Confidentiality in Service Science and Big Data Analytics.. Privacy and Identity Management, volume 457 of IFIP Advances in Information and Communication Technology, page 54-70. Springer, (2014)Anonymization for outputs of population health and health services research conducted via an online data center., , , , and . JAMIA, 24 (3): 544-549 (2017)Confidentialising Maps of Mixed Point and Diffuse Spatial Data.. Privacy in Statistical Databases, volume 7556 of Lecture Notes in Computer Science, page 226-240. Springer, (2012)Triads, Flocks of Conics and Q., , and . Des. Codes Cryptogr., 18 (1/3): 63-70 (1999)Remote access methods for exploratory data analysis and statistical modelling: Privacy-Preserving Analytics®., , , , , , and . Comput. Methods Programs Biomed., 91 (3): 208-222 (2008)Optimal updating of ideal threshold schemes., , , and . Australas. J Comb., (2006)Signaling Potential Adverse Drug Reactions from Administrative Health Databases., , , , , and . IEEE Trans. Knowl. Data Eng., 22 (6): 839-853 (2010)Automorphism Groups of Generalized Quadrangles via an Unusual Action of P L (2, 2Sph)., and . Eur. J. Comb., 23 (2): 213-232 (2002)A Comparison of Key Distribution Patterns Constructed from Circle Geometries.. AUSCRYPT, volume 718 of Lecture Notes in Computer Science, page 517-527. Springer, (1992)