In this chapter we describe several existing real-world applications where sensitive databases are being linked in a practical setting using privacy-preserving techniques. These examples come from different countries, where different privacy frameworks and legislation exist that either make the use of such approaches necessary, or where organisations are using privacypreserving linkage approaches to make their linkages more secure.
CITATION STYLE
Real-world applications. (2020). In Linking Sensitive Data: Methods and Techniques for Practical Privacy-Preserving Information Sharing (pp. 345–357). Springer International Publishing. https://doi.org/10.1007/978-3-030-59706-1_13
Mendeley helps you to discover research relevant for your work.