A game theoretic framework for analyzing re-identification risk.
Given the potential wealth of insights in personal data the big databases can provide, many organizations aim to share data while protecting privacy by sharing de-identified data, but are concerned because various demonstrations show such data can be re-identified. Yet these investigations focus on...
Main Authors: | Zhiyu Wan, Yevgeniy Vorobeychik, Weiyi Xia, Ellen Wright Clayton, Murat Kantarcioglu, Ranjit Ganta, Raymond Heatherly, Bradley A Malin |
---|---|
Format: | Article |
Language: | English |
Published: |
Public Library of Science (PLoS)
2015-01-01
|
Series: | PLoS ONE |
Online Access: | http://europepmc.org/articles/PMC4373733?pdf=render |
Similar Items
-
Controlling the signal: Practical privacy protection of genomic data sharing through Beacon services
by: Zhiyu Wan, et al.
Published: (2017-07-01) -
Leveraging blockchain for immutable logging and querying across multiple sites
by: Mustafa Safa Ozdayi, et al.
Published: (2020-07-01) -
Predicting Human Cooperation.
by: John J Nay, et al.
Published: (2016-01-01) -
Does communication help people coordinate?
by: Yevgeniy Vorobeychik, et al.
Published: (2017-01-01) - Surrealism 2.0/Contemporary Games Analyzing Contemporary Games as a Re-emergence of Surrealism