- Sergio Martinez, David Sanchez,AidaValls, "A Semantic Framework to Protect the Privacy of Electronic Health Records with Non-numericalAttributes", Journal of Biomedical Informatics 46 (2013) 294–303.
- GPO, US: 45 C.F.R. 164 Security and Privacy 2008. http://www.access.gpo.gov/nara/cfr/waisidx_08/45cfr164_08.html.
- Abril D, Navarro-Arribas G, Torra V. Towards semantic microaggregation of categorical data for confidential documents. In: Proceedings ofthe 7th international conference on Modeling decisions for artificial intelligence. Perpignan (France): Springer-Verlag; 2010. p. 266–76.
- Batet M, Sanchez D, Valls A. An ontology-based measure to compute semantic similarity in biomedicine. J Biomed Inform 2011;44:118–25.
- Chen R, Mohammed N, Fung BCM, Desai BC, Xiong L. Publishing set-valued data via differential privacy. PVLDB 2011;4:1087–98.
- Domingo-Ferrer J. A survey of inference control methods for privacy preserving data mining. In: Aggarwal CC, Yu PS, editors. Privacypreservingdata mining. Springer US; 2008. p. 53–80.
- Domingo-Ferrer J, Martínez-Ballesté A, Mateo-Sanz J, Sebé F. Efficient multivariate data-oriented microaggregation. VLDB J 2006;15:355–69.
- Domingo-Ferrer J, Mateo-Sanz JM. Resampling for statistical confidentiality incontingency tables. Comput Math Appl 1999;38:13–32.
- Domingo-Ferrer J, Mateo-Sanz JM. Practical data-oriented microaggregation for statistical disclosure control. IEEE Trans Knowl and DataEng 2002;14:189–201.
- Domingo-Ferrer J, Torra V. Ordinal, continuous and heterogeneous kanonymity through microaggregation. Data Min KnowlDiscov 2005;11:195–212.
- Dwork C. Differential privacy. In: ICALP. Springer; 2006. p. 1–12.
- Elliot M, Purdam K, Smith D. Statistical disclosure control architectures for patient records in biomedical information systems. J BiomedInform 2008;41:58–64.
- He Y, Naughton J. Anonymization of set-valued data via top-down, local generalization, VLDB „09: the thirtieth international conference onvery large data bases. Lyon, France: VLDB Endowment; 2009.
- Jones DH, Adam NR. Disclosure avoidance using the bootstrap and other resampling schemes. In: Proceedings of the fifth annual researchconference. Washington (DC): U.S. Bureau of the Census; 1989. p. 446–55.
- Kullback S, Leibler R. On information and sufficiency. Ann Math Stat 1951;22:79–86.
- Lin J-L, Chang P-C, Liu JY-C, Wen T-H. Comparison of microaggregation approaches on anonymized data quality. ExpSystAppl2010;37:8161–5.
- Lin J-L, Wen T-H, Hsieh J-C, Chang P-C. Density-based microaggregation for statistical disclosure control. ExpSystAppl 2010;37:3256–63.
- Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M. L-diversity: privacy beyond k-anonymity. ACM Trans KnowlDiscov Data2007;1:3.
- Malin B, Sweeney L. How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and designanonymity protection systems. J Biomed Inform 2004;37:179–92.
- Martínez S, Sánchez D, Valls A. Semantic adaptive microaggregation of categorical microdata. ComputSecur 2012;31:653–72.
- Martínez S, Sánchez D, Valls A. Towards k-anonymous non-numerical data via semantic resampling. In: Greco S, et al., editors. Informationprocessing and management of uncertainty in knowledge-based systems. Catania, Italy; 2012. p. 519–28.
- Martinez S, Sanchez D, Valls A, Batet M. Privacy protection of textual attributes through a semantic-based masking method. Inf Fusion2011;13:304–14.
- Martínez S, Sánchez D, Valls A, Batet M. The role of ontologies in theanonymization of textual variables. In: Proceeding of the 2010conference on artificial intelligence research and development: proceedings of the 13th international conference of the Catalan association forArtificial intelligence. IOS Press; 2010. p. 153–62.
- Martínez S, Valls A, Sánchez D. Semantically-grounded construction of centroids for datasets with textual attributes. Knowl Based Syst2012;35:160–72.
- Meystre S, Friedlin J, South B, Shen S, Samore M. Automatic de-identification of textual documents in the electronic health record: a reviewof recent research. BMC Med Res Methodol 2010;10:70.
- Mohammed N, Chen R, Fung BCM, Yu PS. Differentially private data release for data mining. In: Proceedings of the 17th ACM SIGKDDinternational conference on knowledge discovery and data mining. San Diego, California (USA): ACM; 2011. p. 493–501.
- Nelson SJ, Johnston D, Humphreys BL. Relationships in medical subject headings. In: Publishers KA, editor. Relationships in theorganization of knowledge. New York; 2001. p. 171–84.
- Nin J, Herranz J, Torra V. On the disclosure risk of multivariate microaggregation. Knowl Data Eng 2008;67:399–412.
- Ohno-Machado L, Silveira PSP, Vinterbo SA. Protecting patient privacy by quantifiable control of disclosures in disseminated databases. Int JMed Inform 2004;73:599–606.
- Pedersen T, Pakhomov SVS, Patwardhan S, Chute CG. Measures of semantic similarity and relatedness in the biomedical domain. J BiomedInform 2007;40:288–99.
- Purdam K, Elliot M. A case study of the impact of statistical disclosure control on data quality in the individual UK Samples of AnonymisedRecords. Environ Plan A 2007;39:1101–18.
- Rogers J. Publically reported breaches in EPR confidentiality; 2005.
- Samarati P, Sweeney L. Protecting privacy when disclosing Information: kanonymity and its enforcement through generalization andsuppression, technical report SRI-CSL-98-04, SRI Computer Science Laboratory; 1998.
- Sanchez D, Batet M. Semantic similarity estimation in the biomedical domain: an ontology-based information-theoretic perspective. J BiomedInform 2011;44:749–59.
- Sánchez D, Batet M, Isern D, Valls A. Ontology-based semantic similarity: a new feature-based approach. ExpSystAppl 2012;39:7718–28.
- Spackman KA, Campbell KE, Cote RA. SNOMED RT: a reference terminology forhealth care. Proc AMIA Annu Fall Symp 1997:640–4.
- Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertain Fuzz Knowl Based Syst2002;10:571–88.
- Sweeney L. K-anonymity: a model for protecting privacy. Int J Uncertain Fuzz Knowl Based Syst 2002;10:557–70.
- Torra V. Microaggregation for categorical variables: a median based approach.
- In: Domingo-Ferrer J, Torra V, editors. Privacy in statistical databases. Berlin (Heidelberg): Springer; 2004. p. 518.
- Torra V. Towards knowledge intensive data privacy. In: Proceedings of the 5th international workshop on data privacy management, and 3rdinternational conference on Autonomous spontaneous security. Athens (Greece): Springer- Verlag; 2011. p. 1–7.
- B.Powmeya , Nikita Mary Ablett ,V.Mohanapriya,S.Balamurugan,”An Object Oriented approach to Model the secure Health care Databasesystems,”In proceedings of International conference on computer , communication & signal processing(IC3SP)in association with IETEstudents forum and the society of digital information and wireless communication,SDIWC,2011,pp.2-3
- BalamuruganShanmugam, VisalakshiPalaniswami, “Modified Partitioning Algorithm for Privacy Preservation in Microdata Publishing withFull Functional Dependencies”, Australian Journal of Basic and Applied Sciences, 7(8): pp.316-323, July 2013
- BalamuruganShanmugam, VisalakshiPalaniswami, R.Santhya, R.S.Venkatesh “Strategies for Privacy Preserving Publishing of FunctionallyDependent Sensitive Data: A State-of-the-Art-Survey”, Australian Journal of Basic and Applied Sciences, 8(15) September 2014.
- S.Balamurugan, P.Visalakshi, V.M.Prabhakaran, S.Chranyaa, S.Sankaranarayanan, "Strategies for Solving the NP-Hard Workflow SchedulingProblems in Cloud Computing Environments", Australian Journal of Basic and Applied Sciences, 8(15) October 2014.
- Charanyaa, S., et. al., , A Survey on Attack Prevention and Handling Strategies in Graph Based Data Anonymization. International Journal ofAdvanced Research in Computer and Communication Engineering, 2(10): 5722-5728, 2013.
- Charanyaa, S., et. al., Certain Investigations on Approaches forProtecting Graph Privacy in Data Anonymization. International Journal ofAdvanced Research in Computer and Communication Engineering, 1(8): 5722-5728, 2013.
- Charanyaa, S., et. al., Proposing a Novel Synergized K-Degree L-Diversity T-Closeness Model for Graph Based Data Anonymization.International Journal of Innovative Research in Computer and Communication Engineering, 2(3): 3554-3561, 2014.
- Charanyaa, S., et. al., , Strategies for Knowledge Based Attack Detection in Graphical Data Anonymization. International Journal ofAdvanced Research in Computer and Communication Engineering, 3(2): 5722-5728, 2014.
- Charanyaa, S., et. al., Term Frequency Based Sequence Generation Algorithm for Graph Based Data Anonymization International Journal ofInnovative Research in Computer and Communication Engineering, 2(2): 3033-3040, 2014.
- V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa," Certain Investigations on Strategies for Protecting Medical Data in Cloud",International Journal of Innovative Research in Computer and Communication Engineering Vol 2, Issue 10, October 2014
- V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa," Investigations on Remote Virtual Machine to Secure Lifetime PHR in Cloud ",International Journal of Innovative Research in Computer and Communication Engineering Vol 2, Issue 10, October 2014
- V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa," Privacy Preserving Personal Health Care Data in Cloud" , International AdvancedResearch Journal in Science, Engineering and Technology Vol 1, Issue 2, October 2014
- P.Andrew, J.Anish Kumar, R.Santhya, Prof.S.Balamurugan, S.Charanyaa, "Investigations on Evolution of Strategies to Preserve Privacy ofMoving Data Objects" International Journal of Innovative Research in Computer and Communication Engineering, 2(2): 3033-3040, 2014.
- P.Andrew, J.Anish Kumar, R.Santhya, Prof.S.Balamurugan, S.Charanyaa, " Certain Investigations on Securing Moving Data Objects"International Journal of Innovative Research in Computer and Communication Engineering, 2(2): 3033-3040, 2014.
- P.Andrew, J.Anish Kumar, R.Santhya, Prof.S.Balamurugan, S.Charanyaa, " Survey on Approaches Developed for Preserving Privacy of DataObjects" International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 2, October 2014
- S.Jeevitha, R.Santhya, Prof.S.Balamurugan, S.Charanyaa, " Privacy Preserving Personal Health Care Data in Cloud" International AdvancedResearch Journal in Science, Engineering and Technology Vol 1, Issue 2, October 2014.
- K.Deepika, P.Andrew, R.Santhya, S.Balamurugan, S.Charanyaa, "Investigations on Methods Evolved for Protecting Sensitive Data",International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 4, Decermber 2014.
- K.Deepika, P.Andrew, R.Santhya, S.Balamurugan, S.Charanyaa, "A Survey on Approaches Developed for Data Anonymization",International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 4, Decermber 2014.
- S.Balamurugan, S.Charanyaa, "Principles of Social Network Data Security" LAP Verlag, Germany, ISBN: 978-3-659-61207-7, 2014
- S.Balamurugan, ,M.Sowmiya and S.Charanyaa, "Principles of Scheduling in Cloud Computing" Scholars' Press, Germany,, ISBN: 978-3-639-66950-3, 2014
- S.Balamurugan, S.Charanyaa, "Principles of Database Security" Scholars' Press, Germany, ISBN: 978-3-639-76030-9, 2014
|