A taxonomy of privacy-preserving record linkage techniques
Reads0
Chats0
TLDR
This paper presents an overview of techniques that allow the linking of databases between organizations while at the same time preserving the privacy of these data, and presents a taxonomy of PPRL techniques to characterize these techniques along 15 dimensions.About:
This article is published in Information Systems.The article was published on 2013-09-01 and is currently open access. It has received 241 citations till now. The article focuses on the topics: Record linkage & Data warehouse.read more
Citations
More filters
Book ChapterDOI
Privacy-Preserving Record Linkage with Block-Chains
TL;DR: In this article , the authors proposed a method for privacy-preserving record linkage of partially de-identified data using a block-chain to prevent privacy leaks even if all system databases and cryptographic protocols have been compromised by an adversary, including databases containing identifying information.
References
More filters
Book
Data Mining: Concepts and Techniques
TL;DR: This book presents dozens of algorithms and implementation examples, all in pseudo-code and suitable for use in real-world, large-scale data mining projects, and provides a comprehensive, practical look at the concepts and techniques you need to get the most out of real business data.
Journal ArticleDOI
Indexing by Latent Semantic Analysis
TL;DR: A new method for automatic indexing and retrieval to take advantage of implicit higher-order structure in the association of terms with documents (“semantic structure”) in order to improve the detection of relevant documents on the basis of terms found in queries.
Journal ArticleDOI
k -anonymity: a model for protecting privacy
TL;DR: The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment and examines re-identification attacks that can be realized on releases that adhere to k- anonymity unless accompanying policies are respected.
Journal ArticleDOI
Space/time trade-offs in hash coding with allowable errors
TL;DR: Analysis of the paradigm problem demonstrates that allowing a small number of test messages to be falsely identified as members of the given set will permit a much smaller hash area to be used without increasing reject time.