PPT-Medical data: privacy, anonymity,
Author : pamella-moone | Published Date : 2016-04-24
and security What can we learn from the furore around the NHS data sharing plans caredata Dr Eerke Boiten Director Interdisciplinary Centre for Cyber Security
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "Medical data: privacy, anonymity," is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Medical data: privacy, anonymity,: Transcript
and security What can we learn from the furore around the NHS data sharing plans caredata Dr Eerke Boiten Director Interdisciplinary Centre for Cyber Security University of Kent . Microdata. with a Robust Privacy Guarantee. Jianneng. Cao,. . National University of Singapore, now at I. 2. R. Panagiotis. . Karras. ,. Rutgers University. Table 2. . Voter registration list. Quasi-identifier (QI):. Ross Anderson. Cambridge University. Open Data Institute, 4/4/2014. Synopsis. Health data are moving to the cloud, causing serious tussles over safety and privacy. The extension of the open data idea to healthcare is now a slow-motion train wreck. CS 656 Spring 2009. Should We Be Worried?. Medical Records Misuse. Burlington Northern allegedly conducted genetic tests on employees who had filed worker’s compensation claims for carpal tunnel syndrome, without their knowledge. The company’s intention was presumably to be able to reject some claims because of genetic predisposition to the condition.. Carmela . Troncoso. , . Gradiant. PRIPARE Workshop on Privacy by Design. Ulm 9. th. -10. th. March 2015. 11/03/2015. 1. Privacy Enhancing Technologies. Outline. What are privacy enhancing technologies?. Topic: Privacy in Location Based Services. Wonsang Song. Columbia University. Agenda. Introduction of LBS. Threats to location privacy. Privacy protection techniques. Conclusion. What is LBS?. Location service, location-aware service, location-based service. Why Share Data?. Hospitals share data with researchers. Learn about disease causes, promising treatments, correlations between symptoms and outcomes. Merchants share data with advertisers/researchers/public. CompSci. 590.03. Instructor: . Ashwin. . Machanavajjhala. 1. Lecture 3 : 590.03 Fall 12. Announcements. Project ideas are posted on the site. . You are welcome to send me (or talk to me about) your own ideas.. By: . Abdelhamid. Elgzil. Advisor: Dr. Chow. Outline. Introduction. The problem. . The . i. ssue . of . Privacy . and . anonymity . TOR: The Onion Router Network . AirVpn. : Virtual Private Network. Why Share Data?. Hospitals share data with researchers. Learn about disease causes, promising treatments, correlations between symptoms and outcomes. Merchants share data with advertisers/researchers/public. Jules Polonetsky. Co-Chairman and Director, Future of Privacy Forum. The Future of Privacy Forum (FPF) is a Washington, DC based think tank that seeks to advance responsible data practices. The forum is led by Internet privacy experts Jules Polonetsky and Christopher Wolf and includes an advisory board comprised of leading figures from industry, academia, law and a. Prepared by: Eng. . Hiba. Ramadan. Supervised by: . Dr. . Rakan. . Razouk. . Outline. Introduction. key directions in the field of privacy-preserving data mining. Privacy-Preserving Data Publishing. Undetectability. , . Unobservability. , Pseudonymity and Identity Management – A Consolidated Proposal for Terminology. Authors: Andreas . Pfitzmann. and . Marit. Hansen. Presented by: Murtuza Jadliwala. George Danezis (. g.danezis@ucl.ac.uk. ). With help from:. Luca . Melis (. luca.melis.14@ucl.ac.uk. ). Steve . Dodier-Lazaro (. s.dodier-lazaro.12@ucl.ac.uk. ). Why anonymize data?. Raw data – use cases:. k-Anonymity, l-Diversity, t-Closeness, and . Reconstruction Attacks. 1. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. . Ninghui Li, . Tiancheng. Li, and Suresh . Venkatasubramanian. . In ICDE, April 2007.
Download Document
Here is the link to download the presentation.
"Medical data: privacy, anonymity,"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents