Linking Sensitive Data Methods and Techniques for Practical Privacy-Preserving Information Sharing
This book provides modern technical answers to the legal requirements of pseudonymisation as recommended by privacy legislation. It covers topics such as modern regulatory frameworks for sharing and linking sensitive information, concepts and algorithms for privacy-preserving record linkage and thei...
Main Authors: | , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Cham
Springer International Publishing
2020, 2020
|
Edition: | 1st ed. 2020 |
Subjects: | |
Online Access: | |
Collection: | Springer eBooks 2005- - Collection details see MPG.ReNa |
Table of Contents:
- Part I: Introduction
- 1. Introduction
- 2. Regulatory Frameworks
- 3. Linking Sensitive Data Background
- Part II: Methods and Techniques
- 4. Private Information Sharing Protocols
- 5. Assessing Privacy and Risks
- 6. Building Blocks for Linking Sensitive Data
- 7 Encoding and Comparing Sensitive Values
- 8. Bloom Filter based Encoding Methods
- 9. Attacking and Hardening Bloom Filter Encoding
- 10. Computational Efficiency
- Part III: Practical Aspects, Evaluation, and Applications
- 11. Practical Considerations
- 12. Empirical Evaluation
- 13. Real-world Applications
- Part IV: Outlook
- 14. Future Research Challenges and Directions