Christine M. O'Keefe

According to our database1, Christine M. O'Keefe
  • authored at least 56 papers between 1990 and 2017.
  • has a "Dijkstra number"2 of four.



In proceedings 
PhD thesis 





Perturbed robust linear estimating equations for confidentiality protection in remote analysis.
Statistics and Computing, 2017

Anonymization for outputs of population health and health services research conducted via an online data center.
JAMIA, 2017

Disclosure risk reduction for generalized linear model output in a remote analysis system.
Data Knowl. Eng., 2017

Decentralised scheduling with confidentiality protection.
Oper. Res. Lett., 2016

A Bootstrap Mechanism for Response Masking in Remote Analysis Systems.
Decision Sciences, 2015

Applicability of Confidentiality Methods to Personal and Business Data.
Proceedings of the Privacy in Statistical Databases, 2014

Comparison of Two Remote Access Systems Recently Developed and Implemented in Australia.
Proceedings of the Privacy in Statistical Databases, 2014

Privacy and Confidentiality in Service Science and Big Data Analytics.
Proceedings of the Privacy and Identity Management for the Future Internet in the Age of Globalisation, 2014

Biomedical data privacy: problems, perspectives, and recent advances.
JAMIA, 2013

Comparison of Remote Analysis with Statistical Disclosure Control for Protecting the Confidentiality of Business Data.
Trans. Data Privacy, 2012

Confidentialising Maps of Mixed Point and Diffuse Spatial Data.
Proceedings of the Privacy in Statistical Databases, 2012

Applicability of Regression-Tree-Based Synthetic Data Methods for Business Data.
Proceedings of the Data Mining Workshops (ICDMW), 2011

Signaling Potential Adverse Drug Reactions from Administrative Health Databases.
IEEE Trans. Knowl. Data Eng., 2010

Mining consequence events in temporal health data.
Intell. Data Anal., 2010

Data Privacy and Patient Consent.
Proceedings of the Encyclopedia of Database Systems, 2009

Regression output from a remote analysis server.
Data Knowl. Eng., 2009

Mining Unexpected Temporal Associations: Applications in Detecting Adverse Drug Reactions.
IEEE Trans. Information Technology in Biomedicine, 2008

Remote access methods for exploratory data analysis and statistical modelling: Privacy-Preserving Analytics®.
Computer Methods and Programs in Biomedicine, 2008

A Remote Analysis Server - What Does Regression Output Look Like?.
Proceedings of the Privacy in Statistical Databases, 2008

Privacy-Preserving Sequential Pattern Release.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

Optimal updating of ideal threshold schemes.
Australasian J. Combinatorics, 2006

Mining Unexpected Associations for Signalling Potential Adverse Drug Reactions from Administrative Health Databases.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2006

A Data Network for Health e-Research.
Proceedings of the European Conference on eHealth 2006, 2006

A Decentralised Approach to Electronic Consent and Health Information Access Control.
Journal of Research and Practice in Information Technology, 2005

Optimal Updating of Ideal Threshold Schemes.
IACR Cryptology ePrint Archive, 2004

Spreads of T2(o), alpha-flocks and Ovals.
Des. Codes Cryptography, 2004

Privacy-preserving data linkage protocols.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

A Service Oriented Architecture for a Health Research Data Network.
Proceedings of the 16th International Conference on Scientific and Statistical Database Management (SSDBM 2004), 2004

Providing Anonymity in Unconditionally Secure Secret Sharing Schemes.
Des. Codes Cryptography, 2003

Role and Expression of Consent in Web Services.
Proceedings of the International Conference on Web Services, ICWS '03, June 23, 2003

Automorphism Groups of Generalized Quadrangles via an Unusual Action of P L (2, 2Sph).
Eur. J. Comb., 2002

Subquadrangles of Generalized Quadrangles of Order (q2, q), q Even.
J. Comb. Theory, Ser. A, 2001

Quasi-quadrics and related structures.
Australasian J. Combinatorics, 2000

On deriving unitals.
Discrete Mathematics, 1999

Triads, Flocks of Conics and Q.
Des. Codes Cryptography, 1999

On Unitals with Many Baer Sublines.
Des. Codes Cryptography, 1999

Mutually Trusted Authority-Free Secret Sharing Schemes.
J. Cryptology, 1997

Ovals in Translation Hyperovals and Ovoids.
Eur. J. Comb., 1997

Ideal Secret Sharing Schemes with Multiple Secrets.
J. Cryptology, 1996

Images of conics under derivation.
Discrete Mathematics, 1996

Ovoids in PG(3, q): a survey.
Discrete Mathematics, 1996

A Construction for Multisecret Threshold Schemes.
Des. Codes Cryptography, 1996

Ovoids of the quadric Q(2n, q).
Eur. J. Comb., 1995

Key Distribution Patterns Using Minkowski Planes.
Des. Codes Cryptography, 1995

Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract).
Proceedings of the Advances in Cryptology, 1995

Symmetries of Arcs.
J. Comb. Theory, Ser. A, 1994

On Sharing Many Secrets (Extended Abstract).
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

Block-transitive, point-imprimitive designs with lambda = 1.
Discrete Mathematics, 1993

Spreads and Group Divisible Designs.
Des. Codes Cryptography, 1993

Applications of finite geometries to information security.
Australasian J. Combinatorics, 1993

Multisecret Threshold Schemes.
Proceedings of the Advances in Cryptology, 1993

Hyperovals in Hall planes.
Eur. J. Comb., 1992

The Block-Transitive, Point-Imprimitive 2-(729, 8, 1) Designs.
Appl. Algebra Eng. Commun. Comput., 1992

A Comparison of Key Distribution Patterns Constructed from Circle Geometries.
Proceedings of the Advances in Cryptology, 1992

Hyperovals in PG(2, 16).
Eur. J. Comb., 1991

Ovals in Desarguesian planes.
Australasian J. Combinatorics, 1990