When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Pseudonymization - Wikipedia

    en.wikipedia.org/wiki/Pseudonymization

    The pseudonym allows tracking back of data to its origins, which distinguishes pseudonymization from anonymization, [9] where all person-related data that could allow backtracking has been purged. Pseudonymization is an issue in, for example, patient-related data that has to be passed on securely between clinical centers.

  3. Data anonymization - Wikipedia

    en.wikipedia.org/wiki/Data_anonymization

    Generalization and perturbation are the two popular anonymization approaches for relational data. [4] The process of obscuring data with the ability to re-identify it later is also called pseudonymization and is one way companies can store data in a way that is HIPAA compliant.

  4. De-identification - Wikipedia

    en.wikipedia.org/wiki/De-identification

    QI values are handled following specific standards. For example, the k-anonymization replaces some original data in the records with new range values and keep some values unchanged. New combination of QI values prevents the individual from being identified and also avoid destroying data records.

  5. Data re-identification - Wikipedia

    en.wikipedia.org/wiki/Data_re-identification

    Such data has proved to be very valuable for researchers, particularly in health care. GDPR-compliant pseudonymization seeks to reduce the risk of re-identification through the use of separately kept "additional information". The approach is based on an expert evaluation of a dataset to designate some identifiers as "direct" and some as "indirect."

  6. Statistical disclosure control - Wikipedia

    en.wikipedia.org/wiki/Statistical_disclosure_control

    SDC can also describe protection methods applied to the data: for example, removing names and addresses, limiting extreme values, or swapping problematic observations. This is sometimes referred to as 'input SDC', but is more commonly called anonymization, de-identification, or microdata protection.

  7. Data masking - Wikipedia

    en.wikipedia.org/wiki/Data_masking

    Data masking or data obfuscation is the process of modifying sensitive data in such a way that it is of no or little value to unauthorized intruders while still being usable by software or authorized personnel. Data masking can also be referred as anonymization, or tokenization, depending on different context.

  8. k-anonymity - Wikipedia

    en.wikipedia.org/wiki/K-anonymity

    Because k-anonymization does not include any randomization, attackers can make reliable, unambiguous inferences about data sets that may harm individuals. For example, if the 19-year-old John from Kerala is known to be in the database above, then it can be reliably said that he has either cancer, a heart-related disease, or a viral infection.

  9. Privacy-enhancing technologies - Wikipedia

    en.wikipedia.org/wiki/Privacy-enhancing_technologies

    Pseudonymization is a data management technique that replaces an individual's identity or personal information with an artificial identifiers known as Pseudonyms. This de-identification method enables contents and fields of information to be covered up so as to deter attacks and hackers from obtaining important information.