:::

詳目顯示

回上一頁
題名:大數據之資料去識別的標準化進程初論:根基於ISO/IEC 2nd CD 20889:2017-10-23
書刊名:前瞻科技與管理
作者:樊國楨蔡昀臻
作者(外文):Farn, Kwo-jeanTsai, Yun-chen
出版日期:2017
卷期:7:2
頁次:頁55-98
主題關鍵詞:K-匿名模型個人資訊去識別化差分隱私模型統計揭露控制標準化K-anonymity modelPersonally information de-identificationDifferential privacy modelStatistical disclosure controlSDCStandardization
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(1) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:1
  • 共同引用共同引用:18
  • 點閱點閱:11
期刊論文
1.樊國楨、黃健誠、林樹國(20150500)。《個人資料保護法施行細則》第17條實作初論:根基於ISO/IEC 29100:2011-12-15標準系列。前瞻科技與管理,5(1),43-83。new window  延伸查詢new window
2.Sweeney, Latanya(2002)。k-anonymity: A model for protecting privacy。International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems,10(5),557-570。  new window
3.林真真(2002)。善盡企業責任 化解危機動員--關於財金公司人員疑似涉及信用卡偽造案件處理說明--肯定財金將欲火重生,重新站起...。財金資訊,24,10-13。  延伸查詢new window
4.樊國楨、蔡昀臻(20160500)。隱私防護資料發布資訊系統之保護剖繪初論:根基於個人資料去識別化的議題。前瞻科技與管理,6(1),47-114。new window  延伸查詢new window
5.蔡昀臻、樊國楨(20161100)。大數據資料發布系統要求事項標準化初論:根基於ISO/IEC 27009與個人資料匿名化、去識別化驗證之議題。前瞻科技與管理,6(2),1-61。new window  延伸查詢new window
6.蔡昀臻、樊國楨(20171000)。個人資料管理系統驗證要求事項標準化進程初探:根基於ISO/IEC JTC 1/SC 27在2017-01公布的框架。資訊安全通訊,23(4),1-36。new window  延伸查詢new window
7.Dwork, C.、Roth, A.(2014)。The Algorithmic Foundations of Differential Privacy。Foundation and Trends ® in Theoretical Computing Science,9(3/4),211-407。  new window
8.Ohm, Paul(2009)。Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization。UCLA Law Review,57,1701。  new window
9.楊智傑(20141000)。美國醫療資訊保護法規之初探--以HIPAA/HITECH之隱私規則與資安規則為中心。軍法專刊,60(5),79-116。new window  延伸查詢new window
圖書
1.McCallister, Erika、Grance, Tim、Scarfone, Karen A.(2010)。Guide to protecting the confidentiality of Personally Identifiable Information (PII)。U.S. Dept. of Commerce, National Institute of Standards and Technology。  new window
2.ENISA(2015)。Privacy by design in big data。  new window
3.European Union Agency for Network and Information Security(2014)。Privacy and Data Protection by Design-from policy to engineering。  new window
4.OMB(2016)。Annual Report to Congress: Federal Information Security Modernization Act, March 18, 2016。  new window
單篇論文
1.Narayanan, Arvind,Shmatikov, Vitaly(2007)。Robust De-anonymization of Large Datasets (How to Break Anonymity of the Netflix Prize Dataset),Cornell University。,http://arxiv.org/PS_cache/cs/pdf/0610/0610105v2.pdf。  new window
其他
1.丁麗萍,盧國慶(2014)。基於關聯規則滿足用戶隱私保護的個性化推薦方法及系統(104050267)。  延伸查詢new window
2.Malin, B.(2013)。A De-Identification Strategy Used for Sharing One Data Provider's Oncology Trials Data through the Project Daya Sphere® Repository,http://www.projectdatasphere.org/projectdatasphere/html/resources/PDF/DEIDENTIFICATION。  new window
3.財政部財政資訊中心(2016)。個人資料去識別化過程驗證案例報告。  延伸查詢new window
4.Malin, B.(2013)。Sharing Pre-Competitive Clinical Trials Data to Facilitate Cancer Research: The Data Sphere Experience,http://ottawagroup.ohri.ca/docs/Bradley_Malin_2013.pdf。  new window
5.OCR(2012)。Guidance Regarding Methods for De-identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule,https://www.hhs.gov/hipaa/for-professionals/privacy/special-topics/de-identification/index.html。  new window
圖書論文
1.Kung, A.(20160307)。PRIPARE (PReparing Industry to Privacy-by-design by supporting its Application in Research)。Handbook: Methodological Tools to implement privacy and foster compliance with the GDPR。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關書籍
 
無相關著作
 
QR Code
QRCODE