U.S. flag

An official website of the United States government

Skip Header


Reidentification Primer Using Four Metrics

Written by:
Working Paper Number CED-WP-2020-008

Introduction

Re-identification studies look for vulnerabilities in an entire database to attacks from an external source or collection of sources. This working paper updates our methodology for re-identification studies. We introduce the concept of ranking by value to two of the three methods, as used by our external stakeholder from HUD for his adhoc custom scoring method. We also introduce thresholds to enhance the ranking procedure in the adhoc method.

Page Last Revised - January 13, 2023
Is this page helpful?
Thumbs Up Image Yes Thumbs Down Image No
NO THANKS
255 characters maximum 255 characters maximum reached
Thank you for your feedback.
Comments or suggestions?

Top

Back to Header