{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:23:03Z","timestamp":1765545783863,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,3,30]],"date-time":"2012-03-30T00:00:00Z","timestamp":1333065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,3,30]]},"DOI":"10.1145\/2320765.2320816","type":"proceedings-article","created":{"date-parts":[[2012,7,3]],"date-time":"2012-07-03T11:53:15Z","timestamp":1341316395000},"page":"158-166","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":76,"title":["The application of differential privacy to health data"],"prefix":"10.1145","author":[{"given":"Fida Kamal","family":"Dankar","sequence":"first","affiliation":[{"name":"CHEO Research Institute, Ottawa, Ontario"}]},{"given":"Khaled","family":"El Emam","sequence":"additional","affiliation":[{"name":"CHEO Research Institute, Ottawa, Ontario"}]}],"member":"320","published-online":{"date-parts":[[2012,3,30]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1007\/978-3-540-87471-3_20"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/2063576.2063705"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/1265530.1265569"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/1374376.1374464"},{"doi-asserted-by":"crossref","unstructured":"Chen R. Mohammed N. Fung B. C. M. Desai B. C. Xiong L Publishing Set-Valued Data via Differential Privacy Proceedings of the VLDB Endowment 2011.  Chen R. Mohammed N. Fung B. C. M. Desai B. C. Xiong L Publishing Set-Valued Data via Differential Privacy Proceedings of the VLDB Endowment 2011.","key":"e_1_3_2_1_5_1","DOI":"10.14778\/3402707.3402744"},{"unstructured":"Dalenius T. Towards a Methodology for Statistical Disclosure Control Statistik Tidskrift 1977.  Dalenius T. Towards a Methodology for Statistical Disclosure Control Statistik Tidskrift 1977.","key":"e_1_3_2_1_6_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/773153.773173"},{"volume-title":"International Statistical Review","year":"2011","author":"Domingo-Ferrer J.","key":"e_1_3_2_1_8_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1007\/11681878_14"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_11_1","first-page":"4978","author":"Dwork C","year":"2008","journal-title":"LNCS"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/1536414.1536467"},{"unstructured":"Dwork C. An Ad Omnia Approach to Defining and Achieving Private Data Analysis PinKDD 2007.   Dwork C. An Ad Omnia Approach to Defining and Achieving Private Data Analysis PinKDD 2007.","key":"e_1_3_2_1_13_1"},{"unstructured":"El Emam K. Data Anonymization Practices in Clinical Research: A Descriptive Study. Health Canada Access to Information and Privacy Division: Ottawa 2006.  El Emam K. Data Anonymization Practices in Clinical Research: A Descriptive Study. Health Canada Access to Information and Privacy Division: Ottawa 2006.","key":"e_1_3_2_1_14_1"},{"volume-title":"Health Canada","year":"2006","author":"El Emam K.","key":"e_1_3_2_1_15_1"},{"volume-title":"Canada Health Infoway, 2010","year":"2010","author":"El Emam K.","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1197\/jamia.M2902"},{"issue":"4","key":"e_1_3_2_1_18_1","first-page":"307","article-title":"Evaluating patient re-identification risk from hospital prescription records","volume":"62","author":"El Emam K.","year":"2009","journal-title":"Canadian Journal of Hospital Pharmacy"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1186\/1471-2458-11-454"},{"doi-asserted-by":"crossref","unstructured":"El Emam K. Paton D. Dankar F. Koru G. De-identifying a Public Use Microdata File from the Canadian National Discharge Abstract Database. BMC Medical Informatics and Decision Making 11(53) 2011.  El Emam K. Paton D. Dankar F. Koru G. De-identifying a Public Use Microdata File from the Canadian National Discharge Abstract Database. BMC Medical Informatics and Decision Making 11(53) 2011.","key":"e_1_3_2_1_20_1","DOI":"10.1186\/1472-6947-11-53"},{"doi-asserted-by":"crossref","unstructured":"El Emam K. Arbuckle L. Koru G. Gaudette L. Neri E. Rose S. Howard J. Gluck J. De-Identification Methods for Open Health Data: The Case of the Heritage Health Prize Claims Data Set. Journal of Medical Internet Research (to appear) 2012.  El Emam K. Arbuckle L. Koru G. Gaudette L. Neri E. Rose S. Howard J. Gluck J. De-Identification Methods for Open Health Data: The Case of the Heritage Health Prize Claims Data Set. Journal of Medical Internet Research (to appear) 2012.","key":"e_1_3_2_1_21_1","DOI":"10.2196\/jmir.2001"},{"doi-asserted-by":"crossref","unstructured":"El Emam K Jonker E Fineberg A. The case for de-identifying personal health information. Social Sciences Research Network 2011; Available from: {http:\/\/papers.ssrn.com\/abstract=1744038}  El Emam K Jonker E Fineberg A. The case for de-identifying personal health information. Social Sciences Research Network 2011; Available from: {http:\/\/papers.ssrn.com\/abstract=1744038}","key":"e_1_3_2_1_22_1","DOI":"10.2139\/ssrn.1744038"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/1536414.1536465"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.5555\/1888848.1888869"},{"volume-title":"Aggrawal, C., Yu, P. S. (eds.) Privacy Preserving Data Mining","year":"2008","author":"Fienberg S. E.","key":"e_1_3_2_1_25_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/1835804.1835868"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1109\/TKDE.2007.1015"},{"unstructured":"Gotz m. MachanavajjhalaA. Wang G. Xiao X. Gehrke J. Privacy in Search Logs CoRR 2009.  Gotz m. MachanavajjhalaA. Wang G. Xiao X. Gehrke J. Privacy in Search Logs CoRR 2009.","key":"e_1_3_2_1_28_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1145\/1806689.1806786"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1109\/FOCS.2010.85"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1145\/1739041.1739059"},{"volume-title":"CORR","year":"2008","author":"Kasiviswanathan S. P.","key":"e_1_3_2_1_32_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1145\/1989323.1989345"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/1526709.1526733"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1145\/1807085.1807104"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1109\/FOCS.2007.41"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1145\/1557019.1557090"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1145\/2020408.2020487"},{"doi-asserted-by":"crossref","unstructured":"Muralidhar K. Sarathy R. Does Differential Privacy Protect Terry Gross Privacy? Privacy in Statistical Databases 2011.   Muralidhar K. Sarathy R. Does Differential Privacy Protect Terry Gross Privacy? Privacy in Statistical Databases 2011.","key":"e_1_3_2_1_40_1","DOI":"10.1007\/978-3-642-15838-4_18"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1145\/1806689.1806794"},{"year":"2011","author":"Sarathy R.","journal-title":"Transactions on Data Privacy","key":"e_1_3_2_1_42_1"},{"doi-asserted-by":"crossref","unstructured":"Xiao X. Wang G. Gehrke J. Differential Privacy via Wavelet Transforms CoRR 2009.  Xiao X. Wang G. Gehrke J. Differential Privacy via Wavelet Transforms CoRR 2009.","key":"e_1_3_2_1_43_1","DOI":"10.1109\/ICDE.2010.5447831"},{"volume-title":"PVLDB","year":"2008","author":"Xiao X.","key":"e_1_3_2_1_44_1"},{"volume-title":"VLDB workshop on SDM","year":"2010","author":"Xiao Y.","key":"e_1_3_2_1_45_1"},{"unstructured":"Yin M. http:\/\/blog.myplaceinthecrowd.org\/2010\/05\/26\/recap-and-proposal-955-the-statistically-insignificant-privacy-guarantee\/2010.  Yin M. http:\/\/blog.myplaceinthecrowd.org\/2010\/05\/26\/recap-and-proposal-955-the-statistically-insignificant-privacy-guarantee\/2010.","key":"e_1_3_2_1_46_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_47_1","DOI":"10.1145\/2030613.2030630"}],"event":{"acronym":"ICDT '12","name":"ICDT '12: 15th International Conference on Database Theory","location":"Berlin Germany"},"container-title":["Proceedings of the 2012 Joint EDBT\/ICDT Workshops"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2320765.2320816","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2320765.2320816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:49Z","timestamp":1750277689000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2320765.2320816"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,30]]},"references-count":46,"alternative-id":["10.1145\/2320765.2320816","10.1145\/2320765"],"URL":"https:\/\/doi.org\/10.1145\/2320765.2320816","relation":{},"subject":[],"published":{"date-parts":[[2012,3,30]]},"assertion":[{"value":"2012-03-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}