Skip to main content
. 2005 Jan-Feb;12(1):28–34. doi: 10.1197/jamia.M1603

Table 1.

General Susceptibility of Privacy Protection Models to Re-identification

Re-identification Attack
Privacy Protection System
TRUST SEMITRUST DENOM DEID
FAMILY Yes No Yes Yes
TRAIL No Yes No Yes
GENPHEN Yes Yes Yes Yes
DICTIONARY Yes Yes No No