Table of Contents - X.1771 (04/2024) - Security guidelines for combining de-identified data using trusted third party
1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview 6.1 Combining de-identified datasets 6.2 Generation of a combining key 7 Use cases for combining de-identified datasets from organizations 8 Models for combining de-identified datasets 8.1 Model with one trusted third party: combining organization 8.2 Model with two trusted third parties: key management authority and combining organization 9 Procedures to combine de-identified datasets 9.1 Procedures for the model with one trusted third party 9.2 Procedures for the model with two trusted third parties 10 Controls for entities 10.1 Common technical controls applicable to all entities 10.2 Controls for trusted third party Appendix I – Examples of typical de-identification techniques Bibliography
|