Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS

Files

Abstract

From the breakthrough research of Latanya Sweeney, we have learned that the secondary use of healthcare data may be privacy-revealing. Common techniques for ensuring privacy focus more on security and validation and are vulnerable to privacy attacks. Yet, it is only through the secondary use of healthcare data that we can ultimately achieve Elias Zerhouni’s vision to “Transform Medicine from Curative to Preemptive”. After all, it is the analysis and sharing of data that is crucial to understanding patterns within the healthcare population. But we cannot do this unless we can ensure the privacy of the individual patient. In this paper, we review some of the common methods used to ensure privacy, including the use of privacy algorithms, and emphasize the use of differential privacy algorithms and the application of differential privacy via Privacy Integrated Queries (PINQ).

Details

PDF

Statistics

from
to
Export
Download Full History