Academic literature on the topic 'Pseudonymisation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Pseudonymisation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Pseudonymisation"
Drąg, Paweł, and Mateusz Szymura. "TECHNICAL AND LEGAL ASPECTS OF DATABASE'S SECURITY IN THE LIGHT OF IMPLEMENTATION OF GENERAL DATA PROTECTION REGULATION." CBU International Conference Proceedings 6 (September 25, 2018): 1056–61. http://dx.doi.org/10.12955/cbup.v6.1294.
Full textClaerhout, B., F. De Meyer, and G. J. E. De Moor. "Privacy Enhancing Techniques." Methods of Information in Medicine 42, no. 02 (2003): 148–53. http://dx.doi.org/10.1055/s-0038-1634326.
Full textNoé, Paul-Gauthier, Andreas Nautsch, Nicholas Evans, Jose Patino, Jean-François Bonastre, Natalia Tomashenko, and Driss Matrouf. "Towards a unified assessment framework of speech pseudonymisation." Computer Speech & Language 72 (March 2022): 101299. http://dx.doi.org/10.1016/j.csl.2021.101299.
Full textGoldstein, Harvey, and Katie Harron. "‘Pseudonymisation at source’ undermines accuracy of record linkage." Journal of Public Health 40, no. 2 (May 15, 2018): 219–20. http://dx.doi.org/10.1093/pubmed/fdy083.
Full textSmith, D. "Secure pseudonymisation for privacy-preserving probabilistic record linkage." Journal of Information Security and Applications 34 (June 2017): 271–79. http://dx.doi.org/10.1016/j.jisa.2017.01.002.
Full textvan Gastel, Bernard E., Bart Jacobs, and Jean Popma. "Data Protection Using Polymorphic Pseudonymisation in a Large-Scale Parkinson’s Disease Study." Journal of Parkinson's Disease 11, s1 (July 16, 2021): S19—S25. http://dx.doi.org/10.3233/jpd-202431.
Full textHeurix, Johannes, Stefan Fenz, Antonio Rella, and Thomas Neubauer. "Recognition and pseudonymisation of medical records for secondary use." Medical & Biological Engineering & Computing 54, no. 2-3 (June 4, 2015): 371–83. http://dx.doi.org/10.1007/s11517-015-1322-7.
Full textMayfield, Kate. "Pseudonymisation: a 20-year-old idea never seemed so timely." Journal of Direct, Data and Digital Marketing Practice 17, no. 4 (June 2016): 222–26. http://dx.doi.org/10.1057/s41263-016-0005-x.
Full textVerhenneman, G., K. Claes, J. J. Derèze, P. Herijgers, C. Mathieu, F. E. Rademakers, R. Reyda, and M. Vanautgaerden. "How GDPR Enhances Transparency and Fosters Pseudonymisation in Academic Medical Research." European Journal of Health Law 27, no. 1 (March 4, 2020): 35–57. http://dx.doi.org/10.1163/15718093-12251009.
Full textBéguin-Faynel, Céline. "L’open data judiciaire et les données personnelles : pseudonymisation et risque de ré-identification." Archives de philosophie du droit Tome 60, no. 1 (May 20, 2018): 153–81. http://dx.doi.org/10.3917/apd.601.0168.
Full textDissertations / Theses on the topic "Pseudonymisation"
Vimalachandran, Pasupathy. "Privacy and Security of Storing Patients’ Data in the Cloud." Thesis, 2019. https://vuir.vu.edu.au/40598/.
Full textBook chapters on the topic "Pseudonymisation"
Murphy, Maria Helen. "Pseudonymisation and the smart city." In Creating Smart Cities, 182–93. Abingdon, Oxon ; New York, NY : Routledge, 2019. |Series: Regions and cities ; volume 131: Routledge, 2018. http://dx.doi.org/10.4324/9781351182409-14.
Full textVeeningen, Meilof, Benne de Weger, and Nicola Zannone. "Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy." In Security and Trust Management, 145–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38004-4_10.
Full textČtvrtník, Mikuláš. "Data Minimisation—Storage Limitation—Archiving." In Archives and Records, 197–240. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-18667-7_8.
Full textTosoni, Luca. "Article 4(5). Pseudonymisation." In The EU General Data Protection Regulation (GDPR). Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198826491.003.0011.
Full textBaumgartner, Martin, Günter Schreier, Dieter Hayn, Karl Kreiner, Lukas Haider, Fabian Wiesmüller, Luca Brunelli, and Gerhard Pölzl. "Impact Analysis of De-Identification in Clinical Notes Classification." In Studies in Health Technology and Informatics. IOS Press, 2022. http://dx.doi.org/10.3233/shti220368.
Full textTosoni, Luca. "Article 4(12). Personal data breach." In The EU General Data Protection Regulation (GDPR). Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198826491.003.0018.
Full textBygrave, Lee A., and Luca Tosoni. "Article 4(1). Personal data." In The EU General Data Protection Regulation (GDPR). Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198826491.003.0007.
Full textBygrave, Lee A. "Article 25 Data protection by design and by default." In The EU General Data Protection Regulation (GDPR). Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198826491.003.0060.
Full textConference papers on the topic "Pseudonymisation"
Noé, Paul-Gauthier, Jean-François Bonastre, Driss Matrouf, N. Tomashenko, Andreas Nautsch, and Nicholas Evans. "Speech Pseudonymisation Assessment Using Voice Similarity Matrices." In Interspeech 2020. ISCA: ISCA, 2020. http://dx.doi.org/10.21437/interspeech.2020-2720.
Full textNoumeir, Rita, Alain Lemay, and Jean-Marc Lina. "Pseudonymisation of radiology data for research purposes." In Medical Imaging, edited by Osman M. Ratib and Steven C. Horii. SPIE, 2005. http://dx.doi.org/10.1117/12.594696.
Full textKayem, Anne, Nikolai Podlesny, Christoph Meinel, and Anja Lehmann. "On Chameleon Pseudonymisation and Attribute Compartmentation-as-a-Service." In 18th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010552207040714.
Full textLimba, Tadas, and Aurimas Šidlauskas. "PERSONAL DATA PROCESSING IN EDUCATIONAL INSTITUTIONS: ANONYMISATION AND PSEUDONYMISATION." In 13th annual International Conference of Education, Research and Innovation. IATED, 2020. http://dx.doi.org/10.21125/iceri.2020.2262.
Full textKayem, Anne, Nikolai Podlesny, and Christoph Meinel. "On Chameleon Pseudonymisation and Attribute Compartmentation-as-a-Service." In 18th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010552200002998.
Full textPedrosa, Micael, Andre Zuquete, and Carlos Costa. "Pseudonymisation with Break-the-Glass Compatibility for Health Records in Federated Services." In 2019 IEEE 19th International Conference on Bioinformatics and Bioengineering (BIBE). IEEE, 2019. http://dx.doi.org/10.1109/bibe.2019.00056.
Full textBlokland, Rogier, Niko Partanen, and Michael Rießler. "A pseudonymisation method for language documentation corpora: An experiment with spoken Komi." In Proceedings of the Sixth International Workshop on Computational Linguistics of Uralic Languages. Stroudsburg, PA, USA: Association for Computational Linguistics, 2020. http://dx.doi.org/10.18653/v1/2020.iwclul-1.1.
Full textTinabo, R., F. Mtenzi, and B. O'Shea. "Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data." In 2009 4th International Conference for Internet Technology and Secured Transactions (ICITST 2009). IEEE, 2009. http://dx.doi.org/10.1109/icitst.2009.5402501.
Full text