• Nenhum resultado encontrado

A lista a seguir inclui os trabalhos publicados que serviram como suporte e fundamentação para esta dissertação. A maior parte deles é classificados pelo ranking brasileiro Qualis 2013-2016 (MEDEIROS; SOUZA, 2019), como mostrado a seguir:

Hebert de Oliveira Silva, Tânia Basso, Regina Moraes, Donatello Elia, Sandro Fi- ore: A Re-Identification Risk-Based Anonymization Framework for Data Analytics Plat- forms. EDCC 2018: 101-106 - Qualis B3 (Área: Ciências da Computação).

Hebert de Oliveira Silva, Tânia Basso, Regina Lúcia de Oliveira Moraes: Pri- vacy and Data Mining: Evaluating the Impact of Data Anonymization on Classification Algorithms. EDCC 2017: 111-116 - Qualis B3 (Área: Ciências da Computação).

Ferreira, André, Tania Basso, Hebert Silva, and Regina Moraes: Priva: a policybased anonymization library for cloud and big data platform. In XVIII Workshop de Testes e Tolerância a Falhas (WTF), pp. 1-11. 2017 - Qualis B5 (Área: Ciências da Computação). O artigo seguinte, foi submetido a edição especial do periódico International Journal of Critical Computer-Based Systems e está em revisão.

Tania Basso, Hebert Silva, and Regina Moraes: Extending a re-identification risk- based anonymizationframework and evaluating its impact on data mining classifiers, In- ternational Journal of Critical Computer-Based Systems, ISSN 1757-8779 - Fator de impacto 0,55 (RESEARCHGATE, 2015) (Área: Ciências da Computação).

Referências Bibliográficas

ARGUS. ARGUS ReleaseNoteTAU4.1.3.docx. [S.l.: s.n.], nov. 2015. http://neon.vb. cbs.nl/casc/Software/ReleaseNoteTAU4.1.3.pdf. (acesso em: 12/10/2018).

ARMERDING, T. The 18 biggest data breaches of the 21st century. [S.l.: s.n.], 2018. https://www.csoonline.com/article/2130877/data- breach/the- biggest- data- breaches-of-the-21st-century.html. (acesso em: 01/02/2019).

ARX. ARX Data Anonymization Tool. 2018. Disponível em: <http://arx.deidentifier. org/>.

BASSO, T.; MATSUNAGA, R. et al. Challenges on anonymity, privacy, and big data. In: IEEE. Dependable Computing (LADC), 2016 Seventh Latin-American Symposium on. [S.l.: s.n.], 2016. p. 164–171.

BASSO, T.; MORAES, R. et al. Requirements, design and evaluation of a privacy refe- rence architecture for web applications and services. In: ACM. Proceedings of the 30th Annual ACM Symposium on Applied Computing. [S.l.: s.n.], 2015. p. 1425–1432.

BBC. BBC NEWS | UK | England | Gloucestershire | Personnel records stolen from MoD. [S.l.: s.n.], 2008. http://news.bbc.co.uk/2/hi/uk_news/england/gloucestershire/ 7639006.stm. (acesso em: 12/13/2018).

— Entenda o escândalo de uso político de dados que derrubou valor do Facebook e o colocou na mira de autoridades. Mar. 2018. Disponível em: <https://g1.globo.com/ economia/tecnologia/noticia/entenda-o-escandalo-de-uso-politico-de-dados- que-derrubou-valor-do-facebook-e-o-colocou-na-mira-de-autoridades.ghtml>. BENITEZ, K.; MALIN, B. Evaluating re-identification risks with respect to the HIPAA privacy rule. Journal of the American Medical Informatics Association, BMJ Group BMA House, Tavistock Square, London, WC1H 9JR, v. 17, n. 2, p. 169–177, 2010.

BERTINO, E.; LIN, D.; JIANG, W. A survey of quantification of privacy preserving data mining algorithms. In: Privacy-preserving data mining. [S.l.]: Springer, 2008. p. 183–205. BRANCO JR, E. C.; MACHADO, J. C.; MONTEIRO, J. M. Estratégias para proteção da privacidade de dados armazenados na nuvem. Simpósio Brasileiro de Banco de Dados. Citado na pág, v. 6, 2014.

BRICKELL, J.; SHMATIKOV, V. The cost of privacy: destruction of data-mining uti- lity in anonymized data publishing. In: ACM. Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining. [S.l.: s.n.], 2008. p. 70– 78.

BRITÂNICO, P. Data protection act of 1998. [S.l.: s.n.], 1998.

BURATOVIĆ, I.; MILIČEVIĆ, M.; ŽUBRINIĆ, K. Effects of data anonymization on the data mining results. In: IEEE. MIPRO, 2012 Proceedings of the 35th International Convention. [S.l.: s.n.], 2012. p. 1619–1623.

CAMENISCH, J.; FISCHER-HÜBNER, S.; RANNENBERG, K. Privacy and identity management for life. [S.l.]: Springer Science & Business Media, 2011.

CMCC. Ophidia - High Performance Data Mining & Analytics for eScience. [S.l.: s.n.], 2017. Disponível em: <http://ophidia.cmcc.it/>.

CONSTANTIN, L. Reborn LulzSec Claims Hack of Dating Site for Military Personnel | PCWorld. [S.l.: s.n.], 2012. https : / / www . pcworld . com / article / 252647 / reborn _ lulzsec_claims_hack_of_dating_site_for_military_personnel.html. (acesso em: 12/10/2018).

CORREIOS, B. Estrutura CEP. [S.l.: s.n.], 2018. https : / / www . correios . com . br / precisa-de-ajuda/o-que-e-cep-e-por-que-usa-lo/estrutura-do-cep. (acesso em: 12/10/2018).

COUNCIL, P. S. S. Data Security and Credit Card Security Standards. [S.l.: s.n.], 2006. (acesso em: 11/18/2018).

DANKAR, F. K. et al. Estimating the re-identification risk of clinical data sets. BMC medical informatics and decision making, BioMed Central, v. 12, n. 1, p. 66, 2012.

DROGKARIS, P.; GRITZALIS, A. A Privacy Preserving Framework for Big Data in e-Government Environments. In: SPRINGER. International Conference on Trust and Privacy in Digital Business. [S.l.: s.n.], 2015. p. 210–218.

EL EMAM, K. Guide to the de-identification of personal health information. [S.l.]: Auer- bach Publications, 2013.

EL EMAM, K.; DANKAR, F. K. Protecting Privacy Using k-Anonymity. Journal of the American Medical Informatics Association, v. 15, n. 5, p. 627–637, 2008. DOI: 10.1197/ jamia . M2716. eprint: /oup / backfile / content _ public / journal / jamia / 15 / 5 / 10 . 1197_jamia.m2716/2/15-5-627.pdf. Disponível em: <http://dx.doi.org/10.1197/ jamia.M2716>.

EL EMAM, K.; DANKAR, F. K. et al. Evaluating the risk of re-identification of patients from hospital prescription records. The Canadian journal of hospital pharmacy, Canadian Society Of Hospital Pharmacists, v. 62, n. 4, p. 307, 2009.

EL EMAM, K.; PATON, D. et al. De-identifying a public use microdata file from the Canadian national discharge abstract database. BMC medical informatics and decision making, BioMed Central, v. 11, n. 1, p. 53, 2011.

EUBRA-BIGSEA. D4.3-BIGSEA v1.0 final. [S.l.: s.n.], 2017. http : / / www . eubra - bigsea . eu / sites / default / files / D4 . 3 - BIGSEA _ v1 . 0 _ final . pdf. (acesso em: 01/02/2019).

— EUBra-BIGSEA. Europe - Brazil Collaboration of Big Data Scientific Research Th- rough Cloud-Centric Applications. [S.l.: s.n.], 2017. http : / / www . eubra - bigsea . eu/. Acesso em: 18 jan. 2017.

EUROPÉIA, U. EUGDPR – Information Portal. [S.l.: s.n.], 2018. https://eugdpr.org/. (acesso em: 12/10/2018).

EUROPEU, P. General Data Protection Regulation (GDPR) – Final text neatly arranged. [S.l.: s.n.], 2018. https://gdpr-info.eu/. (acesso em: 18/11/2018).

FERREIRA, A. et al. PRIVA: a policy-based anonymization library for cloud and big data platform. In: XVIII Workshop de Testes e Tolerancia a Falhas (WTF). [S.l.: s.n.], 2017. p. 1–11.

FIORE, S. et al. Ophidia: Toward big data analytics for escience. Procedia Computer Science, Elsevier, v. 18, p. 2376–2385, 2013.

GEOGRAFIA E ESTATÍSTICA - IBGE, I. B. de. Censo 2010, IBGE. [S.l.: s.n.], 2010. Disponível em: <http://www.censo2010.ibge.gov.br>.

HAND, D. J.; MANNILA, H.; SMYTH, P. Principles of data mining. [S.l.]: MIT press, 2001.

HHS, U. Health Information Privacy | HHS.gov. [S.l.: s.n.], 2017. https://www.hhs.gov/ hipaa/index.html. (acesso em: 11/18/2018).

HOWE, H. L.; LAKE, A. J.; SHEN, T. Method to assess identifiability in electronic data files. American Journal of Epidemiology, Oxford University Press, v. 165, n. 5, p. 597–601, 2006.

HUNDEPOOL, A.; VAN DE WETERING, A. et al. µ-ARGUS version 4.0 Software and User’s Manual. Statistics Netherlands, Voorburg NL, 2005.

HUNDEPOOL, A. The ARGUS-software. Monographs of official statistics, p. 347, 2004. HUNDEPOOL, A.; WETERING, A. van de et al. User’s Manual, 2004.

INAN, A.; KANTARCIOGLU, M.; BERTINO, E. Using anonymized data for classifica- tion. In: IEEE. Data Engineering, 2009. ICDE’09. IEEE 25th International Conference on. [S.l.: s.n.], 2009. p. 429–440.

INFORMATION technology - Security techniques - Information security management systems - Requirements. International Organization for Standardization. Out. 2013. KAMBER, M.; HAN, J.; PEI, J. Data mining: Concepts and techniques. [S.l.]: Elsevier, 2012.

KOHLMAYER, F.; PRASSER, F.; KUHN, K. A. The cost of quality: Implementing generalization and suppression for anonymizing biomedical data with minimal information loss. Journal of biomedical informatics, Elsevier, v. 58, p. 37–48, 2015.

LEE, Y. J.; LEE, K. H. Re-identification of medical records by optimum quasi-identifiers. In: IEEE. Advanced Communication Technology (ICACT), 2017 19th International Con- ference on. [S.l.: s.n.], 2017. p. 428–435.

LI, N.; LI, T.; V., S. t-closeness: Privacy beyond k-anonymity and l-diversity. In: IEEE. Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on. [S.l.: s.n.], 2007. p. 106–115.

LOCAL, O. Swedish authority handed over ’keys to the Kingdom’ in IT security slip-up. 2017. Disponível em: <https : / / www . thelocal . se / 20170717 / swedish - authority - handed-over-keys-to-the-kingdom-in-it-security-slip-up>.

LORDAN, F. et al. Servicess: An interoperable programming framework for the cloud. Journal of Grid Computing, Springer, v. 12, n. 1, p. 67–91, 2014.

MACHANAVAJJHALA, A. et al. ell-Diversity: Privacy Beyondkappa-Anonymity. In: IEEE. null. [S.l.: s.n.], 2006. p. 24.

MATSUNAGA, R. et al. Towards an ontology-based definition of data anonymization policy for cloud computing and big data. In: IEEE. Dependable Systems and Networks Workshop (DSN-W), 2017 47th Annual IEEE/IFIP International Conference on. [S.l.: s.n.], 2017. p. 75–82.

MCCANN, E. Walgreens company announces data breach | Healthcare IT News. [S.l.: s.n.], fev. 2013. https://www.healthcareitnews.com/news/walgreens-company-announces- data-breach. (Accessed on 12/10/2018).

MEDEIROS, J.; SOUZA, R. d. QUALIS. [S.l.: s.n.], 2019. http://qualis.ic.ufmt.br/. (Accessed on 01/17/2019).

MEINDL, B. A computational framework to protect tabular data-R-package sdcTable, 2011.

MELHORAMENTOS. Dicionário online Michaelis. [S.l.: s.n.], 2019. https://michaelis. uol.com.br/.

MERENER, M. M. Theoretical results on de-anonymization via linkage attacks. Transac- tions on Data Privacy, IIIA-CSIC, v. 5, n. 2, p. 377–402, 2012.

NYATI, A.; BHATNAGAR, D. Performance Evaluation of Anonymized Data Stream Classifiers. International Journal of Computer Science and Network-IJCSN, DLAR LABS, v. 5, n. 2, 2016.

OHM, P. Broken promises of privacy: Responding to the surprising failure of anonymiza- tion. UCLA Law Review, v. 57, p. 1701, 2009.

OLIVEIRA SILVA, H. de; BASSO, T.; OLIVEIRA MORAES, R. L. de. Privacy and Data Mining: Evaluating the Impact of Data Anonymization on Classification Algorithms. In: IEEE. 2017 13th European Dependable Computing Conference (EDCC). [S.l.: s.n.], 2017. p. 111–116.

ORACLE. Data Mining Concepts 11g Release 1 (11.1). Oracle Corp, v. 2005, 2008. — Java SE Development Kit 8 - Downloads. [S.l.: s.n.], 2018. https://www.oracle. com/technetwork/java/javase/downloads/jdk8- downloads- 2133151.html. (acesso em: 12/09/2018).

PANDURANGAN, V. On Taxis and Rainbows. [S.l.: s.n.], jun. 2014. https : / / tech . vijayp.ca/of-taxis-and-rainbows-f6bc289679a1. (acesso em: 12/10/2018).

PARANTHAMAN, J.; VICTOIRE, T. A. A. Performance Evaluation of K-Anonymized Data. Global Journal of Computer Science and Technology, 2013.

PONEMON, L. 2018 Cost of a Data Breach Study: Global Overview. Benchmark research sponsored by IBM Security Independently conducted by Ponemon Institute LLC, 2018. PRASSER, F. Configuration | ARX - Data Anonymization Tool. [S.l.: s.n.], 2018. https: //arx.deidentifier.org/anonymization-tool/configuration/. (acesso em: 12/09/2018). PRASSER, F.; KOHLMAYER, F. Putting statistical disclosure control into practice: The ARX data anonymization tool. In: Medical Data Privacy Handbook. [S.l.]: Springer, 2015. p. 111–148.

PRESS, A. Facebook é multado no Reino Unido por violação de dados de usuários | Tecnologia | G1. [S.l.: s.n.], 2018. https : / / g1 . globo . com / economia / tecnologia / noticia/2018/10/25/facebook- e- multado- no- reino- unido- por- violacao- de- dados-de-usuarios.ghtml. (acesso em: 12/19/2018).

QUICK, M. et al. World’s Biggest Data Breaches and Hacks. [S.l.: s.n.], 2018. http://www. informationisbeautiful . net / visualizations / worlds - biggest - data - breaches - hacks/. (acesso em: 19/11/2018).

REPÚBLICA, P. da. LEI No 13.709 - Lei Geral de Proteção de Dados". 2018. Disponível em: <http://www.planalto.gov.br/ccivil_03/_Ato2015-2018/2018/Lei/L13709. htm>.

RESEARCHGATE. International Journal of Critical Computer-Based Systems | RG Im- pact Rankings 2018 and 2019. [S.l.: s.n.], 2015. https : / / www . researchgate . net / journal / 1757 - 8779 _ International _ Journal _ of _ Critical _ Computer - Based _ Systems. (Accessed on 01/17/2019).

SAMARATI, P.; SWEENEY, L. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. [S.l.], 1998.

SAYAD, S. An Introduction to Data Mining. 2017. Disponível em: <http://www.saedsayad. com>.

SUMATHIE, S. apresentação da Tese Sumathie Sundaresan. [S.l.: s.n.], 2016. https : //slideplayer.com/slide/9180203/. (acesso em: 12/20/2018).

SWEENEY, L. k-anonymity: A model for protecting privacy. International Journal of Un- certainty, Fuzziness and Knowledge-Based Systems, World Scientific, v. 10, n. 05, p. 557– 570, 2002.

TABLEAU. 10 Pricipais Tendências de Big Data. [S.l.: s.n.], 2018. https : / / www . tableau . com / sites / default / files / whitepapers / 849188 _ big _ data _ trends _ _slideshare_edits_pt-br.pdf?ref=lp&signin=001c4307e8838b35616b169d17530616. (acessso em 11/18/2018).

TEMPL, M. CRAN - Package sdcTable. [S.l.: s.n.], 2018. https://cran.r- project. org/web/packages/sdcTable/index.html. (acesso em: 12/10/2018).

— Data Utility and Information Loss. In: Statistical Disclosure Control for Microdata. [S.l.]: Springer, 2017. p. 133–156.

TEMPL, M.; KOWARIK, A.; MEINDL, B. Statistical Disclosure Control for Micro-Data Using the R Package sdcMicro. Journal of Statistical Software, v. 67, n. 1, p. 1–36, 2015. TEMPL, M.; MEIND, B. l.; KOWARIK, A. CRAN - Package sdcMicro. [S.l.: s.n.], 2018. https : / / cran . r - project . org / web / packages / sdcMicro / index . html. (acesso em: 12/10/2018).

WANG, H.; LEE, M. K.; WANG, C. Consumer privacy concerns about Internet marketing. Communications of the ACM, ACM, v. 41, n. 3, p. 63–70, 1998.

WARREN, S. D.; BRANDEIS, L. D. The right to privacy. Harvard law review, JSTOR, p. 193–220, 1890.

WEKA. Classifiers. [S.l.: s.n.], out. 2008. http://weka.sourceforge.net/doc.dev/ weka/classifiers/functions/SGD.html. (Accessed on 10/01/2019).

WITTEN, I. H. et al. Data Mining: Practical machine learning tools and techniques. [S.l.]: Morgan Kaufmann, 2016.

WORKS, C. FakenameGenerator. [S.l.: s.n.], 2011. www.fakenamegenerator.com/. AL-ZOBBI, M.; SHAHRESTANI, S.; RUAN, C. Implementing A Framework for Big Data Anonymity and Analytics Access Control. In: IEEE. Trustcom/BigDataSE/ICESS, 2017 IEEE. [S.l.: s.n.], 2017. p. 873–880.