Skip to main content

previous disabled Page of 3
and
  1. No Access

    Protocol

    Fabrication of Multilayer Microfluidic Arrays for Passive, Efficient DNA Trap** and Profiling

    Trace amounts of cell-free DNA containing cancer-specific biomarkers can be found in blood plasma. Detection of these biomarkers holds tremendous potential for applications such as noninvasive cancer diagnosti...

    Christine M. O’Keefe, Tza-Huei Jeff Wang in Microfluidic Systems for Cancer Diagnosis (2023)

  2. No Access

    Reference Work Entry In depth

    Data Privacy and Patient Consent

    David Hansen, Christine M. O’Keefe in Encyclopedia of Database Systems (2018)

  3. No Access

    Article

    Perturbed robust linear estimating equations for confidentiality protection in remote analysis

    National statistical agencies and other data custodians collect and hold a vast amount of survey and census data, containing information vital for research and policy analysis. However, the problem of allowing...

    Christine M. O’Keefe, Tim Ayre, Sebastien Lucie, Atikur R. Khan in Statistics and Computing (2017)

  4. No Access

    Living Reference Work Entry In depth

    Data Privacy and Patient Consent

    David Hansen, Christine M. O’Keefe in Encyclopedia of Database Systems

  5. No Access

    Chapter and Conference Paper

    Privacy and Confidentiality in Service Science and Big Data Analytics

    Vast amounts of data are now being collected from census and surveys, scientific research, instruments, observation of consumer and internet activities, and sensors of many kinds. These data hold a wealth of i...

    Christine M. O’Keefe in Privacy and Identity Management for the Fu… (2015)

  6. No Access

    Chapter and Conference Paper

    Comparison of Two Remote Access Systems Recently Developed and Implemented in Australia

    National Statistical Agencies and other data custodians are vital sources of data for research and policy analysis. However, external researchers must be provided with access to data in such a way that privacy...

    Christine M. O’Keefe, Phillip Gould, Tim Churches in Privacy in Statistical Databases (2014)

  7. No Access

    Chapter and Conference Paper

    Applicability of Confidentiality Methods to Personal and Business Data

    National Statistical Agencies and other data custodians have a responsibility to protect the confidentiality of commercially sensitive business data as well as personally private social and survey data. Howeve...

    Christine M. O’Keefe, Natalie Shlomo in Privacy in Statistical Databases (2014)

  8. Article

    Open Access

    Data linkage infrastructure for cross-jurisdictional health-related research in Australia

    The Centre for Data Linkage (CDL) has been established to enable national and cross-jurisdictional health-related research in Australia. It has been funded through the Population Health Research Network (PHRN)...

    James H Boyd, Anna M Ferrante, Christine M O’Keefe in BMC Health Services Research (2012)

  9. No Access

    Chapter and Conference Paper

    Confidentialising Maps of Mixed Point and Diffuse Spatial Data

    In this paper we provide an introduction to the area of disseminating spatial data through maps, including an overview of confidentialisation techniques. To date, published methods have focussed on confidentia...

    Christine M. O’Keefe in Privacy in Statistical Databases (2012)

  10. No Access

    Reference Work Entry In depth

    Data Privacy and Patient Consent

    David Hansen, Christine M. O’Keefe in Encyclopedia of Database Systems (2009)

  11. No Access

    Chapter and Conference Paper

    A Remote Analysis Server - What Does Regression Output Look Like?

    This paper is concerned with the problem of balancing the competing objectives of allowing statistical analysis of confidential data while maintaining standards of privacy and confidentiality. Remote analysis ser...

    Christine M. O’Keefe, Norm M. Good in Privacy in Statistical Databases (2008)

  12. No Access

    Chapter and Conference Paper

    Privacy-Preserving Sequential Pattern Release

    We investigate situations where releasing frequent sequential patterns can compromise individual’s privacy. We propose two concrete objectives for privacy protection: k-anonymity and α-dissociation. The first add...

    Huidong **, Jie Chen, Hongxing He in Advances in Knowledge Discovery and Data M… (2007)

  13. No Access

    Chapter and Conference Paper

    Mining Unexpected Associations for Signalling Potential Adverse Drug Reactions from Administrative Health Databases

    Adverse reactions to drugs are a leading cause of hospitalisation and death worldwide. Most post-marketing Adverse Drug Reaction (ADR) detection techniques analyse spontaneous ADR reports which underestimate A...

    Huidong **, Jie Chen, Chris Kelman in Advances in Knowledge Discovery and Data M… (2006)

  14. Article

    Partial Flocks of Non-Singular Quadrics in PG(2r + 1, q)

    We generalise the definition and many properties of partial flocks of non-singular quadrics in PG(3, q) to partial flocks of non-singular quadrics in PG(2r + 1, q).

    Matthew R. Brown, Christine M. O'Keefe in Journal of Algebraic Combinatorics (2004)

  15. No Access

    Article

    Geometrical contributions to secret sharing theory

    Finite geometry has found applications in many different fields and practical environments. We consider one such application, to the theory of secret sharing, where finite projective geometry has proved to b...

    Wen-Ai Jackson, Keith M. Martin, Christine M. O’Keefe in Journal of Geometry (2004)

  16. No Access

    Article

    Spreads of T 2(o), α-flocks and Ovals

    We establish a representation of a spread of the generalized quadrangle T 2(0), o an oval of PG(2, q), q even, in terms of a certain family of q ovals of PG(2, q) and investigate the properties of this representa...

    Matthew R. Brown, Christine M. O'Keefe, S. E. Payne in Designs, Codes and Cryptography (2004)

  17. No Access

    Article

    Providing Anonymity in Unconditionally Secure Secret Sharing Schemes

    We discuss the concept of anonymity in an unconditionally secure secret sharing scheme, proposing several types of anonymity and situations in which they might arise. We present a foundational framework and pr...

    Mida Guillermo, Keith M. Martin, Christine M. O'Keefe in Designs, Codes and Cryptography (2003)

  18. No Access

    Chapter and Conference Paper

    Permutations amongst the Dembowski-Ostrom Polynomials

    We note that certain Dembowski-Ostrom polynomials can be obtained from the product of two linearised polynomials. We examine this subclass for permutation behaviour over finite fields. In particular, a new inf...

    Aart Blokhuis, Robert S. Coulter, Marie Henderson in Finite Fields and Applications (2001)

  19. No Access

    Article

    Characterisations of Flock Quadrangles

    We characterise the Hermitian and Kantor flock generalized quadrangles of order (q 2,q), q even, (associated with the linear and Fisher–Thas–Walker flocks of a quadratic cone, and the Desarguesian and Betten–Walk...

    Christine M. O'Keefe, Tim Penttila in Geometriae Dedicata (2000)

  20. No Access

    Article

    Unitals which meet Baer subplanes in 1 moduloq points

    We prove that a parabolic unitalU in a translation plane π of orderq 2 with kernel containing GF(q) is a Buekenhout-Metz unital if and only if certain Baer subplanes containing the translation line of π meetU in ...

    S. G. Barwick, Christine M. O'Keefe, L. Storme in Journal of Geometry (2000)

previous disabled Page of 3