Skip to main content
. 2021 Jan 15;28(4):744–752. doi: 10.1093/jamia/ocaa327

Table 1.

A summary of the variables used in the framework

Variable Description
D={d1,..,dn} The set of records in the dataset
F={f1,,fm} The set of attributes in the dataset
S={sd1,...,sdn} The set of data subjects, sdiis the subject associated with a record di
{F'i,1 , …, F'i,hi} The set of attributes groups for dataset sdi, F'i,a F, F'i,aF'i,b= for any ab
{P'i,1 , …, P'i,hi} The probability that the attacker can obtain each attribute group from {F'i,1, …, F'i,hi} for an arbitrary subject sdi
pm pm=P(Xm=True) , the probability that the subject’s presence in the de-identified dataset is disclosed to the attacker.
pc pc=P(Xc=True) , the probability that the attacker confirms that a record corresponds to the subject of interest.
pfm

pfm=(Xlm=True| Xm=True and

 

 Xud=True), the probability that the attacker discovers that the subject is in the dataset given that the subject’s presence in the dataset is known.

pcu pcu=PXlu=True Xup=True) , the probability that the attacker confirms that a subject is unique in the population for a set of attributes given that the data subject is unique.