Contextual Anonymization for Secondary Use of Big Data in Biomedical Research: Proposal for an Anonymization Matrix

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Guided Research Proposal Anonymization of SNMP traces

Simple Network Management Protocol (SNMP) is a protocol to access management and control information of network devices. It is a very lightweight protocol capable of easily monitoring thousands of devices simultaneously. Therefore, SNMP is used extensively in enterprise networks and by ISPs, especially for monitoring purposes. It is believed that SNMP is used differently in different environmen...

متن کامل

Big Data Anonymization Method for Demand Response Services

A demand response services as smart grid application produces and requires large amount of information about electric power consumption. This data can be regarded as big data and is needed to be anonymized for preserving privacy and reducing the amount. Electric power consumption data must be used carefully because it contains private information. The proposed method can convert data to existen...

متن کامل

Data Anonymization for Privacy Protection

Social networks have become the universal consumer phenomena and have emerged with increasing popularity nowadays. The amount of network data grows enormously due to the increase of networking websites. The development of social networks has led to the increasing demand for the protection of privacy in publishing the social network data as the social network sites are accumulated with large amo...

متن کامل

Research on Anonymization and De-anonymization in the Bitcoin System

The Bitcoin system is an anonymous, decentralized crypto-currency. There are some deanonymizating techniques to cluster Bitcoin addresses and to map them to users’ identifications in the two research directions of Analysis of Transaction Chain (ATC) and Analysis of Bitcoin Protocol and Network (ABPN). Nowadays, there are also some anonymization methods such as coin-mixing and transaction remote...

متن کامل

Anonymization of Trajectory Data

Trajectories of mobile objects, are automatically collected in huge quantities. Publishing and exploiting such data is essential to improve planning, but it threatens the privacy of individuals: re-identification of the individual behind a trajectory is easy unless precautions are taken. We present two heuristics for privacy-preserving publication of trajectories. Both of them publish only true...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: JMIR Medical Informatics

سال: 2018

ISSN: 2291-9694

DOI: 10.2196/medinform.7096