Raymond Heatherly

According to our database1, Raymond Heatherly authored at least 15 papers between 2009 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


A multi-institution evaluation of clinical profile anonymization.
JAMIA, 2016

R-U policy frontiers for health data de-identification.
JAMIA, 2015

Process-Driven Data Privacy.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

Methods to Mitigate Risk of Composition Attack in Independent Data Publications.
Proceedings of the Medical Data Privacy Handbook, 2015

A probabilistic approach to mitigate composition attacks on privacy in non-coordinated environments.
Knowl.-Based Syst., 2014

Size matters: How population size influences genotype-phenotype association studies in anonymized data.
Journal of Biomedical Informatics, 2014

SecureMA: protecting participant privacy in genetic association meta-analysis.
Bioinformatics, 2014

Preventing Private Information Inference Attacks on Social Networks.
IEEE Trans. Knowl. Data Eng., 2013

Efficient discovery of de-identification policy options through a risk-utility frontier.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Semantic web-based social network access control.
Computers & Security, 2011

Automatic sanitization of social network data to prevent inference attacks.
Proceedings of the 20th International Conference on World Wide Web, 2011

Extending the classification of nodes in social networks.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Inferring private information using social network data.
Proceedings of the 18th International Conference on World Wide Web, 2009

A semantic web based framework for social network access control.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Social network classification incorporating link type values.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009