National Strategy to Advance Privacy-Preserving Data Sharing and Analytics
40
50
Trade Regulation Rule on Commercial Surveillance and Data Security. (2022, August 22). Federal Register.
https://www.federalregister.gov/documents/2022/08/22/2022-17752/trade-regulation-rule-on-commercial-
surveillance-and-data-security
51
Albrecht, M., Chase, M., Chen, H., & HomomorphicEncryption.org. (2017, November). Homomorphic Encryption
Security Standard. homomorphicencryption.org. https://homomorphicencryption.org/standard
52
ZKProof. (2022, November 29). Homepage - ZKProof Standards. ZKProof Standards. https://zkproof.org/
53
A database reconstruction attack is a type of privacy attack on aggregate data that reconstructs a significant
portion of a raw dataset. A linkage attack is an attempt to re-identify individuals in an anonymized dataset by
combining that data with background information.
54
Centers for Disease Control and Prevention (2022). COVID-19. CDC. https://data.cdc.gov/browse?tags=covid-19
55
SAGE Publications. (n.d.). Protecting Privacy and Transforming COVID-19 Case Surveillance Datasets for Public
Use - Brian Lee, et. al, 2021. SAGE Journals.
https://journals.sagepub.com/doi/full/10.1177/00333549211026817
56
Wood, E., Baltrusaitis, T., Hewitt, C., Dziadzio, S., Johnson, M. P., Estellers, V., Cashman, T. J., & Shotton, J.
(2021). Fake it till you make it: face analysis in the wild using synthetic data alone. International Conference on
Computer Vision. https://doi.org/10.1109/iccv48922.2021.00366
57
Chen, R., et al. (2021). Synthetic data in machine learning for medicine and healthcare. Nature Biomedical
Engineering, 5(6), 493–497. https://doi.org/10.1038/s41551-021-00751-8
58
The Advanced Computing Systems Association. Zhang, Z., et al. (2021, August 11). PrivSyn: Differentially Private
Data Synthesis. www.usenix.org. https://www.usenix.org/system/files/sec21-zhang-zhikun.pdf
59
Lindell, Y. (2020). Secure multiparty computation. Communications of the ACM, 64(1), 86–96.
https://doi.org/10.1145/3387108
60
Albrecht, M., Chase, M., Chen, H., & HomomorphicEncryption.org. (2017, November). Homomorphic Encryption
Security Standard. homomorphicencryption.org. https://homomorphicencryption.org/standard
61
Goldwasser, S., Micali, S., & Rackoff, C. (1989). The Knowledge Complexity of Interactive Proof Systems. SIAM
Journal on Computing, 18(1), 186–208. https://doi.org/10.1137/0218012
62
Ben-Sasson, E., & Chiesa, A., et al. (2014, May 18). Zerocash: Decentralized Anonymous Payments from Bitcoin.
zerocash.org. http://zerocash-project.org/media/pdf/zerocash-extended-20140518.pdf
63
Liu, T., Xie, X., & Zhang, Y. (2021). zkCNN: Zero Knowledge Proofs for Convolutional Neural Network Predictions
and Accuracy. Computer and Communications Security. https://doi.org/10.1145/3460120.3485379
64
Schneider, M., Masti, R. J., Shinde, S., Capkun, S., & Perez, R. (2022). SoK: Hardware-supported Trusted
Execution Environments. arXiv.org. https://arxiv.org/pdf/2205.12742.pdf
65
Xue, T., Wen, Y., Luo, B., Li, G., Li, Y., Zhang, B., Zheng, Y., Hu, Y., & Meng, D. (2022). SparkAC: Fine-Grained
Access Control in Spark for Secure Data Sharing and Analytics. IEEE Transactions on Dependable and Secure
Computing, 1. https://doi.org/10.1109/tdsc.2022.3149544
66
Miorandi, D., Rizzardi, A., Sicari, S., & Coen-Porisini, A. (2020). Sticky Policies: A Survey. IEEE Transactions on
Knowledge and Data Engineering, 32(12), 2481–2499. https://doi.org/10.1109/tkde.2019.2936353
67
The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. (n.d.). https://www.w3.org/TR/P3P/
68
Xu, R., Joshi, J., & Krishnamurthy, P. (2021). An Integrated Privacy Preserving Attribute-Based Access Control
Framework Supporting Secure Deduplication. IEEE Transactions on Dependable and Secure Computing, 18(2),
706–721. https://doi.org/10.1109/tdsc.2019.2946073
69
Arora, S., et al. (2022, May 1). A Tale of Two Regulatory Regimes: Creation and Analysis of a Bilingual Privacy
Policy Corpus. NSF Public Access. https://par.nsf.gov/biblio/10336685