Author of the publication

Confidentialising Survival Analysis Output in a Remote Data Access System.

, , , and . J. Priv. Confidentiality, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy and Confidentiality in Service Science and Big Data Analytics.. Privacy and Identity Management, volume 457 of IFIP Advances in Information and Communication Technology, page 54-70. Springer, (2014)Anonymization for outputs of population health and health services research conducted via an online data center., , , , and . JAMIA, 24 (3): 544-549 (2017)Triads, Flocks of Conics and Q., , and . Des. Codes Cryptogr., 18 (1/3): 63-70 (1999)Remote access methods for exploratory data analysis and statistical modelling: Privacy-Preserving Analytics®., , , , , , and . Comput. Methods Programs Biomed., 91 (3): 208-222 (2008)Optimal updating of ideal threshold schemes., , , and . Australas. J Comb., (2006)Confidentialising Maps of Mixed Point and Diffuse Spatial Data.. Privacy in Statistical Databases, volume 7556 of Lecture Notes in Computer Science, page 226-240. Springer, (2012)Role and Expression of Consent in Web Services., and . ICWS, page 382-388. CSREA Press, (2003)Signaling Potential Adverse Drug Reactions from Administrative Health Databases., , , , , and . IEEE Trans. Knowl. Data Eng., 22 (6): 839-853 (2010)Automorphism Groups of Generalized Quadrangles via an Unusual Action of P L (2, 2Sph)., and . Eur. J. Comb., 23 (2): 213-232 (2002)A Data Network for Health e-Research., , , , , , , and . ECEH, volume P-91 of LNI, page 215-226. GI, (2006)