28.10.2016 Views

gender differential paper IJCRB

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ijcrb.webs.com<br />

INTERDISCIPLINARY JOURNAL OF CONTEMPORARY RESEARCH IN BUSINESS<br />

JUNE 2011<br />

VOL 3, NO 2<br />

References<br />

L. Sweeney, 1997, “Guaranteeing Anonymity When Sharing Medical Data, The Data fly<br />

System” Proc. AMIA Annual Fall Symposium: 51-5.<br />

L. Sweeney, 2002, “Comments of L. Sweeney, Ph.D, to the Department of Health and Human<br />

Services On Standards of Privacy of Individually Identifiable Health Information”, Available at:<br />

privacy.cs.smu.edu/dataprivacy/HIPPA/HIPPAcomments.htm.<br />

L. Sweeney, 2002, “K-anonymity: A model for protecting Privacy”. International Journal on<br />

Uncertainty, Fuzziness and Knowledge-based Systems, 10(5): 557-570.<br />

N.R. Adam, and J.C. Wortman, 1989,” Security Control Methods for Statistical Databases: A<br />

Comparative Study”, ACM Computing Surveys, vol. 21, no.4.<br />

P. Samarati, 2001, “Protecting Respondents’ Identity in Microdata Release”. IEEE Transactions<br />

on Knowledge and Data Engineering, 13 (6), 1010-1027.<br />

L. Willenborg and T. DeWaal, 1996, “Statistical Disclosure Control in Practice” Lecture Notes<br />

in Statistics, Vol. 111, Springer,<br />

L. Sweeney, 2002,”Achieving K-anonymity Privacy Protection using generalization and<br />

suppression”. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems,<br />

10(5): 571-588.<br />

T. Dalenius, 1986, “Finding a needle in a haystack - or indentifying anonymous census record”.<br />

Journal of official Statistics, 2(3): 329-336.<br />

K.EI Eman, A. Brown and P. Abdelmalik, 2008, “Evaluating Predictors of Geographic Area<br />

Population Size Cutoffs to Manage Re-identification Risk”. Journal of the American Medical<br />

Informatics Association.<br />

K.EI Eman, S. Jabbours, S. Sams, Y. Drouet, and M. Power. 2006, “Evaluating common deidentification<br />

heuristics for personal health information”. Journal of Medical Internet Research;<br />

8(4):e28.<br />

K. Lefevre, D.J. DeWitt and R. Ramakrishnan, 2005, “Incognito: Efficient Full Domain K-<br />

Anonymity”, In Proc. of the ACM SIGMOD Conference on Management of Data (SIGMOD),<br />

Baltimore, Maryland, New York: ACM Press.<br />

Xiaoxun Sun, Hua Wang and Jiuyong Li, 2008, “Enhanced P -Sensitive K-Anonymity Model<br />

for Privacy Preserving Data Publishing”, Transactions on Data Privacy , ISSN 1888-5063<br />

Xiaoxun Sun, Lili Sun and Hua Wang, 2010 , “Extended k-anonymity models against sensitive<br />

attribute disclosure”, Computer Communication.<br />

J.Zhang, J.Yang, 2010, “KIDS: K-anonymization data stream base on sliding window, 2nd<br />

International Conference on Future Computer and Communication”, 978-1-4244-5824-0 IEEE.<br />

V. Ciriani, S. De Capitani di Vimercati, S. Foresti and P. Samarati, 2007, “K-anonymity. Secure<br />

Data Management in Decentralized Systems, Advances in Information Security”, Vol. 33,<br />

Springer, 323-353.<br />

COPY RIGHT © 2011 Institute of Interdisciplinary Business Research 313

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!