A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is
Lecture Notes in Computer Science
In this paper, we show how to quantify the re-identification risk with measures for the individual uniqueness in event logs. ... We therefore argue that, when publishing event logs, the risk of such re-identification attacks must be considered. ... We thank Yves-Alexandre de Montjoye for providing his code to estimate data uniqueness, which we used in our evaluation. ...doi:10.1007/978-3-030-49435-3_16 fatcat:vp5ndlwhm5c7rgxcoszdvyfdui
All of the men were followed up to the time of their departure from mine service, relapse, or 20 December 1992 by the routine mine radiological surveillance for tuberculosis and by a central tuberculosis ... identification. ... Sedation for fibreoptic bronchoscopy has recognised risks and the benefit of the active drug in this study may not be sufficient to justify its use. ...doi:10.1136/thx.48.10.1052 fatcat:72y2odlae5gwzly5hpvmisghay
Facilitating use of sensitive data for research or commercial purposes, in a manner that preserves the privacy of participating entities, is an active area of study. ... In this dissertation, I examine the often conflicting goals of privacy and utility within the framework of differential privacy. ... by the empiricial risk of a predictor. ...fatcat:jsupm4u2tngefaqqe7qorbpg6a
I evaluate the tool-set with increasingly complex real CPS applications of smart agent systems. vi ... Cyber-physical systems (CPS) are an integration of computation with physical processes. ... Dustminer  collects system logs to look for sequences of events responsible for faulty interactions among sensors. ...doi:10.15781/t2nk5q fatcat:jfjxim7vdndmhdfyj2jjym5rwu