Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation

Search Page

Filters

My NCBI Filters

Results by year

Table representation of search results timeline featuring number of search results per year.

Year Number of Results
2012 2
2013 1
2024 0

Text availability

Article attribute

Article type

Publication date

Search Results

2 results

Results by year

Citations

1 article found by citation matching

Search results

Filters applied: . Clear all
Page 1
Reducing patient re-identification risk for laboratory results within research datasets.
Atreya RV, Smith JC, McCoy AB, Malin B, Miller RA. Atreya RV, et al. J Am Med Inform Assoc. 2013 Jan 1;20(1):95-101. doi: 10.1136/amiajnl-2012-001026. Epub 2012 Jul 21. J Am Med Inform Assoc. 2013. PMID: 22822040 Free PMC article.
OBJECTIVE: To try to lower patient re-identification risks for biomedical research databases containing laboratory test results while also minimizing changes in clinical data interpretation. ...A rank-based re-identification
OBJECTIVE: To try to lower patient re-identification risks for biomedical research databases containing labor
De-identification methods for open health data: the case of the Heritage Health Prize claims dataset.
El Emam K, Arbuckle L, Koru G, Eze B, Gaudette L, Neri E, Rose S, Howard J, Gluck J. El Emam K, et al. J Med Internet Res. 2012 Feb 27;14(1):e33. doi: 10.2196/jmir.2001. J Med Internet Res. 2012. PMID: 22370452 Free PMC article.
For each attack the re-identification probability was evaluated. If it was deemed too high then a new de-identification algorithm was applied to reduce the risk to an acceptable level. We performed an actual evaluation of re-identification
For each attack the re-identification probability was evaluated. If it was deemed too high then a new de-identification algori …