Author of the publication

Big Data Privacy Risk: Connecting Many Large Data Sets.

, and . CIC, page 86-91. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations., , , , and . DBSec, volume 7964 of Lecture Notes in Computer Science, page 97-112. Springer, (2013)Mobile Services for Enhancing Human Crowdsourcing with Computing Elements., , , , , and . IEEE MS, page 149-152. IEEE Computer Society, (2014)Security Usability Principles for Vulnerability Analysis and Risk Assessment., , , , and . ACSAC, page 269-278. IEEE Computer Society, (2007)Recommendation-Based De-identification: A Practical Systems Approach towards De-identification of Unstructured Text in Healthcare., , and . SERVICES, page 155-162. IEEE Computer Society, (2012)Specifying and Analysing Trust for Internet Applications, and . (2002)Regulatory Compliance and the Correlation to Privacy Protection in Healthcare., and . Int. J. Comput. Model. Algorithms Medicine, 1 (2): 37-52 (2010)Increasing the accessibility to Big Data systems via a common services API., , , , , , , , and . IEEE BigData, page 883-892. IEEE Computer Society, (2014)Big Data Privacy Risk: Connecting Many Large Data Sets., and . CIC, page 86-91. IEEE Computer Society, (2016)Combining human and machine computing elements for analysis via crowdsourcing., , , , , and . CollaborateCom, page 312-321. ICST / IEEE, (2014)An evaluation of feature sets and sampling techniques for de-identification of medical records., , , , , and . IHI, page 183-190. ACM, (2010)