Table of Contents - X.1771 (04/2024) - Security guidelines for combining de-identified data using trusted third party

1	Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview
6.1 Combining de-identified datasets
6.2 Generation of a combining key
7 Use cases for combining de-identified datasets from organizations
8 Models for combining de-identified datasets
8.1 Model with one trusted third party: combining organization
8.2 Model with two trusted third parties: key management authority and combining organization
9 Procedures to combine de-identified datasets
9.1 Procedures for the model with one trusted third party
9.2 Procedures for the model with two trusted third parties
10 Controls for entities
10.1 Common technical controls applicable to all entities
10.2 Controls for trusted third party
Appendix I – Examples of typical de-identification techniques
Bibliography