Christine M. O'Keefe

Orcid: 0000-0001-8193-7820

Affiliations:
  • CSIRO, Canberra, Australia


According to our database1, Christine M. O'Keefe authored at least 64 papers between 1990 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Bootstrap Differential Privacy.
Trans. Data Priv., 2019

Advancing the ethical use of digital data in human research: challenges and strategies to promote ethical practice.
Ethics Inf. Technol., 2019

2018
Data Privacy and Patient Consent.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Assessing privacy risks in population health publications using a checklist-based approach.
J. Am. Medical Informatics Assoc., 2018

Functional anonymisation: Personal data and the data environment.
Comput. Law Secur. Rev., 2018

Digital High-Resolution Melt Platform for Rapid and Parallelized Molecule-by-Molecule Genetic Profiling.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

2017
Perturbed robust linear estimating equations for confidentiality protection in remote analysis.
Stat. Comput., 2017

Anonymization for outputs of population health and health services research conducted via an online data center.
J. Am. Medical Informatics Assoc., 2017

Disclosure risk reduction for generalized linear model output in a remote analysis system.
Data Knowl. Eng., 2017

2016
Decentralised scheduling with confidentiality protection.
Oper. Res. Lett., 2016

2015
A Bootstrap Mechanism for Response Masking in Remote Analysis Systems.
Decis. Sci., 2015

2014
An Evaluation Framework for Privacy-Preserving Record Linkage.
J. Priv. Confidentiality, 2014

Applicability of Confidentiality Methods to Personal and Business Data.
Proceedings of the Privacy in Statistical Databases, 2014

Comparison of Two Remote Access Systems Recently Developed and Implemented in Australia.
Proceedings of the Privacy in Statistical Databases, 2014

Privacy and Confidentiality in Service Science and Big Data Analytics.
Proceedings of the Privacy and Identity Management for the Future Internet in the Age of Globalisation, 2014

2013
On Regression-Tree-Based Synthetic Data Methods for Business Data.
J. Priv. Confidentiality, 2013

Biomedical data privacy: problems, perspectives, and recent advances.
J. Am. Medical Informatics Assoc., 2013

2012
Comparison of Remote Analysis with Statistical Disclosure Control for Protecting the Confidentiality of Business Data.
Trans. Data Priv., 2012

Confidentialising Survival Analysis Output in a Remote Data Access System.
J. Priv. Confidentiality, 2012

Confidentialising Maps of Mixed Point and Diffuse Spatial Data.
Proceedings of the Privacy in Statistical Databases, 2012

2011
Applicability of Regression-Tree-Based Synthetic Data Methods for Business Data.
Proceedings of the Data Mining Workshops (ICDMW), 2011

2010
Signaling Potential Adverse Drug Reactions from Administrative Health Databases.
IEEE Trans. Knowl. Data Eng., 2010

Mining consequence events in temporal health data.
Intell. Data Anal., 2010

2009
Data Privacy and Patient Consent.
Proceedings of the Encyclopedia of Database Systems, 2009

Regression output from a remote analysis server.
Data Knowl. Eng., 2009

2008
Mining Unexpected Temporal Associations: Applications in Detecting Adverse Drug Reactions.
IEEE Trans. Inf. Technol. Biomed., 2008

Remote access methods for exploratory data analysis and statistical modelling: Privacy-Preserving Analytics<sup>®</sup>.
Comput. Methods Programs Biomed., 2008

A Remote Analysis Server - What Does Regression Output Look Like?.
Proceedings of the Privacy in Statistical Databases, 2008

2007
Privacy-Preserving Sequential Pattern Release.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

2006
Mining Unexpected Associations for Signalling Potential Adverse Drug Reactions from Administrative Health Databases.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2006

A Data Network for Health e-Research.
Proceedings of the European Conference on eHealth 2006, 2006

2005
A Decentralised Approach to Electronic Consent and Health Information Access Control.
J. Res. Pract. Inf. Technol., 2005

2004
Optimal Updating of Ideal Threshold Schemes.
IACR Cryptol. ePrint Arch., 2004

Spreads of T<sub>2</sub>(o), alpha-flocks and Ovals.
Des. Codes Cryptogr., 2004

Privacy-preserving data linkage protocols.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

A Service Oriented Architecture for a Health Research Data Network.
Proceedings of the 16th International Conference on Scientific and Statistical Database Management (SSDBM 2004), 2004

2003
Providing Anonymity in Unconditionally Secure Secret Sharing Schemes.
Des. Codes Cryptogr., 2003

Role and Expression of Consent in Web Services.
Proceedings of the International Conference on Web Services, ICWS '03, June 23, 2003

2002
Automorphism Groups of Generalized Quadrangles via an Unusual Action of P L (2, 2<sup>Sph</sup>).
Eur. J. Comb., 2002

2001
Subquadrangles of Generalized Quadrangles of Order (q<sup>2</sup>, q), q Even.
J. Comb. Theory, Ser. A, 2001

2000
Quasi-quadrics and related structures.
Australas. J Comb., 2000

1999
On deriving unitals.
Discret. Math., 1999

Triads, Flocks of Conics and Q.
Des. Codes Cryptogr., 1999

On Unitals with Many Baer Sublines.
Des. Codes Cryptogr., 1999

1997
Mutually Trusted Authority-Free Secret Sharing Schemes.
J. Cryptol., 1997

Ovals in Translation Hyperovals and Ovoids.
Eur. J. Comb., 1997

1996
Ideal Secret Sharing Schemes with Multiple Secrets.
J. Cryptol., 1996

Images of conics under derivation.
Discret. Math., 1996

Ovoids in PG(3, q): a survey.
Discret. Math., 1996

A Construction for Multisecret Threshold Schemes.
Des. Codes Cryptogr., 1996

1995
Ovoids of the quadric Q(2n, q).
Eur. J. Comb., 1995

Key Distribution Patterns Using Minkowski Planes.
Des. Codes Cryptogr., 1995

Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract).
Proceedings of the Advances in Cryptology, 1995

1994
Symmetries of Arcs.
J. Comb. Theory, Ser. A, 1994

On Sharing Many Secrets (Extended Abstract).
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
Block-transitive, point-imprimitive designs with lambda = 1.
Discret. Math., 1993

Spreads and Group Divisible Designs.
Des. Codes Cryptogr., 1993

Applications of finite geometries to information security.
Australas. J Comb., 1993

Multisecret Threshold Schemes.
Proceedings of the Advances in Cryptology, 1993

1992
Hyperovals in Hall planes.
Eur. J. Comb., 1992

The Block-Transitive, Point-Imprimitive 2-(729, 8, 1) Designs.
Appl. Algebra Eng. Commun. Comput., 1992

A Comparison of Key Distribution Patterns Constructed from Circle Geometries.
Proceedings of the Advances in Cryptology, 1992

1991
Hyperovals in PG(2, 16).
Eur. J. Comb., 1991

1990
Ovals in Desarguesian planes.
Australas. J Comb., 1990


  Loading...