Abstract is missing.
- Introduction to Medical Data PrivacyAris Gkoulalas-Divanis, Grigorios Loukides. 1-14 [doi]
- A Survey of Anonymization Algorithms for Electronic Health RecordsAris Gkoulalas-Divanis, Grigorios Loukides. 17-34 [doi]
- Differentially Private Histogram and Synthetic Data PublicationHaoran Li, Li Xiong, Xiaoqian Jiang. 35-58 [doi]
- Evaluating the Utility of Differential Privacy: A Use Case Study of a Behavioral Science DatasetRaquel Hill. 59-82 [doi]
- SECRETA: A Tool for Anonymizing Relational, Transaction and RT-DatasetsGiorgos Poulis, Aris Gkoulalas-Divanis, Grigorios Loukides, Spiros Skiadopoulos, Christos Tryfonopoulos. 83-109 [doi]
- Putting Statistical Disclosure Control into Practice: The ARX Data Anonymization ToolFabian Prasser, Florian Kohlmayer. 111-148 [doi]
- Utility-Constrained Electronic Health Record Data Publishing Through Generalization and DisassociationGrigorios Loukides, John Liagouris, Aris Gkoulalas-Divanis, Manolis Terrovitis. 149-177 [doi]
- Methods to Mitigate Risk of Composition Attack in Independent Data PublicationsJiuyong Li, Sarowar A. Sattar, Muzammil M. Baig, Jixue Liu, Raymond Heatherly, Qiang Tang, Bradley Malin. 179-200 [doi]
- Statistical Disclosure Limitation for Health Data: A Statistical Agency PerspectiveNatalie Shlomo. 201-230 [doi]
- A Review of Privacy Preserving Mechanisms for Record LinkageLuca Bonomi, Liyue Fan, Li Xiong. 233-265 [doi]
- Application of Privacy-Preserving Techniques in Operational Record Linkage CentresJames H. Boyd, Sean M. Randall, Anna M. Ferrante. 267-287 [doi]
- Privacy Considerations for Health Information ExchangesDalvin Hill, Joseph Walker, John Hale. 289-311 [doi]
- Managing Access Control in Collaborative Processes for Healthcare ApplicationsXuan Hung Le, Dongwen Wang. 313-359 [doi]
- Automating Consent Management Lifecycle for Electronic Healthcare SystemsMuhammad Rizwan Asghar, Giovanni Russello. 361-387 [doi]
- e-Health Cloud: Privacy Concerns and Mitigation StrategiesAssad Abbas, Samee U. Khan. 389-421 [doi]
- Preserving Genome Privacy in Research StudiesShuang Wang, Xiaoqian Jiang, Dov Fox, Lucila Ohno-Machado. 425-441 [doi]
- Private Genome Data DisseminationNoman Mohammed, Shuang Wang, Rui Chen, Xiaoqian Jiang. 443-461 [doi]
- Threats and Solutions for Genomic Data PrivacyErman Ayday, Jean-Pierre Hubaux. 463-492 [doi]
- Encryption and Watermarking for medical Image ProtectionDalel Bouslimi, Gouenou Coatrieux. 493-526 [doi]
- Privacy Considerations and Techniques for NeuroimagesNakeisha Schimke, John Hale. 527-547 [doi]
- Data Privacy Issues with RFID in HealthcarePeter J. Hawrylak, John Hale. 549-567 [doi]
- Privacy Preserving Classification of ECG Signals in Mobile e-Health ApplicationsRiccardo Lazzeretti, Mauro Barni. 569-611 [doi]
- Strengthening Privacy in Healthcare Social NetworksMaria Bertsima, Iraklis Varlamis, Panagiotis Rizomiliotis. 613-635 [doi]
- Privacy Law, Data Sharing Policies, and Medical Data: A Comparative PerspectiveEdward S. Dove, Mark Phillips. 639-678 [doi]
- HIPAA and Human Error: The Role of Enhanced Situation Awareness in Protecting Health InformationDivakaran Liginlal. 679-696 [doi]
- De-identification of Unstructured Clinical Data for Patient Privacy ProtectionStéphane M. Meystre. 697-716 [doi]
- Challenges in Synthesizing Surrogate PHI in Narrative EMRsAmber Stubbs, Özlem Uzuner, Christopher Kotfila, Ira Goldstein, Peter Szolovits. 717-735 [doi]
- Building on Principles: The Case for Comprehensive, Proportionate Governance of Data AccessKimberlyn M. McGrail, Kaitlyn Gutteridge, Nancy L. Meagher. 737-764 [doi]
- EpilogueAris Gkoulalas-Divanis, Grigorios Loukides. 765-773 [doi]