TY - GEN AB - From the breakthrough research of Latanya Sweeney, we have learned that the secondary use of healthcare data may be privacy-revealing. Common techniques for ensuring privacy focus more on security and validation and are vulnerable to privacy attacks. Yet, it is only through the secondary use of healthcare data that we can ultimately achieve Elias Zerhouni’s vision to “Transform Medicine from Curative to Preemptive”. After all, it is the analysis and sharing of data that is crucial to understanding patterns within the healthcare population. But we cannot do this unless we can ensure the privacy of the individual patient. In this paper, we review some of the common methods used to ensure privacy, including the use of privacy algorithms, and emphasize the use of differential privacy algorithms and the application of differential privacy via Privacy Integrated Queries (PINQ). AD - Oregon Health and Science University AU - Lee, Denny DA - 2008 DO - 10.6083/M4BG2KZ3 DO - DOI ED - Logan, Judith ED - Advisor ID - 391 KW - Confidentiality KW - Privacy KW - Statistics as Topic L1 - https://digitalcollections.ohsu.edu/record/391/files/392_etd.pdf L2 - https://digitalcollections.ohsu.edu/record/391/files/392_etd.pdf L4 - https://digitalcollections.ohsu.edu/record/391/files/392_etd.pdf LK - https://digitalcollections.ohsu.edu/record/391/files/392_etd.pdf N2 - From the breakthrough research of Latanya Sweeney, we have learned that the secondary use of healthcare data may be privacy-revealing. Common techniques for ensuring privacy focus more on security and validation and are vulnerable to privacy attacks. Yet, it is only through the secondary use of healthcare data that we can ultimately achieve Elias Zerhouni’s vision to “Transform Medicine from Curative to Preemptive”. After all, it is the analysis and sharing of data that is crucial to understanding patterns within the healthcare population. But we cannot do this unless we can ensure the privacy of the individual patient. In this paper, we review some of the common methods used to ensure privacy, including the use of privacy algorithms, and emphasize the use of differential privacy algorithms and the application of differential privacy via Privacy Integrated Queries (PINQ). PB - Oregon Health and Science University PY - 2008 T1 - Protecting patient data confidentiality using differential privacy TI - Protecting patient data confidentiality using differential privacy UR - https://digitalcollections.ohsu.edu/record/391/files/392_etd.pdf Y1 - 2008 ER -