Medical Data Privacy Handbook 2015
DOI: 10.1007/978-3-319-23633-9_5
|View full text |Cite
|
Sign up to set email alerts
|

SECRETA: A Tool for Anonymizing Relational, Transaction and RT-Datasets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(15 citation statements)
references
References 18 publications
0
15
0
Order By: Relevance
“…Randomized, or stochastic, privacy-preserving policies have been shown to cause problems, such as un-truthfulness [33], which can be undesirable in practice [34]. This is perhaps one of the reason behind low popularity of randomized privacy-2 Popularity of these methods is somehwat evident from the sheer number of available toolboxes for implementation https://arx.deidentifier.org/overview/related-software/ preserving policies, such as differential privacy, within the financial or health sectors [33].…”
Section: Introductionmentioning
confidence: 99%
“…Randomized, or stochastic, privacy-preserving policies have been shown to cause problems, such as un-truthfulness [33], which can be undesirable in practice [34]. This is perhaps one of the reason behind low popularity of randomized privacy-2 Popularity of these methods is somehwat evident from the sheer number of available toolboxes for implementation https://arx.deidentifier.org/overview/related-software/ preserving policies, such as differential privacy, within the financial or health sectors [33].…”
Section: Introductionmentioning
confidence: 99%
“…• Subtree generalization: In this method, if a value of an attribute is generalized to its parent node, all other child nodes of that parent node need to be replaced with the parent node as well [17], [18].…”
Section: Generalization Techniquementioning
confidence: 99%
“…Second, we plan to improve the utility of output data in high‐dimensional settings by implementing methods to better handle complex inter‐attribute relationships . One possible solution to this problem is to treat the data as transactional, that is, set‐valued, and to employ specific privacy models, such as k m ‐anonymity, which is implemented by Anamnesia and SECRETA …”
Section: Limitations and Challenges Aheadmentioning
confidence: 99%
“…The current landscape of open source anonymization software basically consists of three types of solutions: First, there are tools originating from the computer science community (typically research prototypes), such as the UTD Anonymization Toolbox , the Cornell Anonymization Toolkit , TIAMAT , Anamnesia or SECRETA and source code published as supplementary material to articles (eg, References and ). These solutions are able to automatically enforce privacy guarantees specified by users a priori.…”
Section: Introductionmentioning
confidence: 99%