Elliot, M.J., Mackey, E., O’Shea S., Tudor, C. and Spicer, K. (2016, Accepted) ‘Open Data or End User License: A Penetration Test.’ Journal of Official Statistics.
Ritchie, F. and Elliot, M. J. (2015) ’Principles- versus Rules-Based Output Statistical Disclosure Control in Re-mote Access Environments’. IASSIST Quarterly 39(2); 6-14
Shlomo, N., Antal, L. and Elliot, M.J. (2015) ‘Measuring Disclosure Risk and Data Utility for Flexible Table Generators’ Journal of Official Statistics 31(2) 305-324
Dibben, C., Elliot, M. J., Gowans, H. and Lightfoot, D. (2015) ‘The Data Linkage Environment’ in Methodological Developments in Data Linkage; Harron, K. Goldstien H. and Dibben, C. (eds) 36-62 Wiley
Purdam K. and Elliot, M.J. (2015) ‘The Changing Social Data Landscape’ in Halfpenny, P. and Procter, R. (eds.) Innovation in Digital Research Methods. 25-58 London: Sage
Elliot, M. J. and Purdam K. (2015) ‘Exploiting new sources of data’ in Halfpenny, P. and Procter, R. (eds.) Innovation in Digital Research Methods. 59-83 London: Sage
Elliot, M.J. Dibben, C., Gowans, H. Lightfoot, D., Mackey, E., O’Hara, K., and Purdam K. (2015) Functional Anonymisation and the Role of the Data Environment in Deter-mining the Classification of Data as (Non) Personal; CMIST working paper 2015-02
Samani, S., Huang, Z., Ayday, E., Fellay, J., Elliot, M. J., Hubaux, J. P., & Kutalik, Z. (2015) Quantifying Genomic Privacy via Inference Attack with High-Order SNV Correlations. In proceedings of 2nd International Workshop on Genome Privacy and Security (in conjunction with IEEE S&P; 2015)
Antal, L., Shlomo, N., and Elliot, M.J. (2015)’Disclosure Risk Measurement with Entropy in Two-Dimensional Sample Based Frequency Tables’ In proceedings of the UNECE worksession on statistical confidentiality, Helsinki, September 2015.
Shlomo, N., and Antal, L. and Elliot, M. J. (2015) ‘Disclosure Risk Measurement with Entropy in Sample Based Frequency Tables’ In Proc. NTTS.
Antal, L and Shlomo, N. and Elliot, M. J. (2014) ‘Measuring Disclosure Risk with Entropy in Population Based Frequency Tables.’ In proceedings of Privacy in Statistical Databases, Eivissa September 2014
Samani, S. Elliot, M. J. and Brass, A. (2014) ‘A Scenario Analysis of Privacy Attacks either on or using Genomic Data.’ In proceedings of Privacy in Statistical Databases, Eivissa September 2014.
Elliot, M. J. Mackey, E. O’Shea, S., Spicer, K. and Tudor, C. (2014) EUL to OGD: A simulated attack on two social survey datasets. In proceedings of Privacy in Statistical Databases, Eivissa September 2014.
Elliot, M. J. and Mackey, E. (2014) ‘The Social Data Environment’ in O’Hara, K , David, S.L., de Roure, D. Nguyen, C. M-H. (eds) Digital Enlightenment Yearbook 253-263
Antal, L. and Shlomo, N. and Elliot, M. J. (2014) Measuring Disclosure Risk with Entropy in Population Based Frequency Tables Privacy in Statistical Databases. Springer; Berlin.
O’Keefe, C. and Shlomo, N. (2014) A Discussion of the Applicability of Traditional Confidentiality Methods to Personal and Business Data. In PSD’2014 Privacy in Statistical Databases, (Ed. J. Domingo-Ferrer), Springer LNCS 8744, pp. 350-363.
Shlomo, N. (2014) Probabilistic Record Linkage for Disclosure risk Assessment. In PSD’2014 Privacy in Statistical Databases, (Ed. J. Domingo-Ferrer), Springer LNCS 8744, pp. 269-282.
Elliot, M.J. Singleton, P. Kalra, D. and Smith, D. (2014) ‘Practical Privacy Controls when Re-using Medical Data for Research’ Journal of Healthcare Information Management 28(4) 50-57
Smith, D. and Elliot, M. J. (2014) ‘A Graph-based Approach to Key Variable Mapping’ Confidentiality and Privacy. 6(2), 81-115 W
Smith, D. and Elliot, M. (Accepted subject to revision) A Graph-based Approach to Key Variable Mapping. Confidentiality and Privacy.
Elliot, M., Purdam, K. and Mackey, E. (2013) Data Horizons - New Forms of Data For Social Research. ESRC.
Babu, K.S., Reddy, N., Kumar, N., Elliot, M., Jena, S. K (2013) Achieving k-Anonymity Using Improved Greedy Heuristics for Very Large Relational Databases. Transactions in Data Privacy. 6(1),1-17
Mackey, E. and Elliot, M. (2013) Understanding the Data Environment? XRDS 20(1) 37-39
Shlomo, N., and Antal, L. and Elliot, M.J. (2013) Disclosure risk and data utility in flexible table generators. In Proc. NTTS.
Shadbolt, N., Elliot, M. J. O'Hara, K., Atz, U., Tennison, J., Tudor, C., & Mackey, E. (2013) ‘Anonymisation in the Modern Era’ Data Protection Law and Policy. 10(12); 8-9
Elliot, M., D. Kalra, P. Singleton and D. Smith (2012) Statistical Disclosure Control and Protecting Privacy within a Clinical Data Warehouse - CCSR Paper 2012-07.
Skinner, C.J. and Shlomo, N. (2012) Estimating Frequencies of Frequencies in Finite Populations. Statistics and Probability Letters Vol. 82, 2206-2212.
Shlomo, N. and Skinner, C.J. (2012) Privacy Protection from Sampling and Perturbation in Survey Microdata, Journal of Privacy and Confidentiality, Vol. 4, Issue 1.
O'Keefe, C.M. and Shlomo, N. (2012) Comparison of Remote Analysis with Statistical Disclosure Control for Protecting the Confidentiality of Business Data, Transactions on Data Privacy, Vol. 5, Issue 2, 403-432.
Shlomo, N. (2011) Discussion paper for: Risk-Utility Paradigms for Statistical Disclosure Limitation: How to Think, But Not How to Act by Lawrence H. Cox, Alan F. Karr and Satkartar K. Kinney, International Statistical Review, Vol. 79, Issue 2, pp. 194-197.
Elliot, K. Smith, D., Mackey, E. M. And Purdam, K.(2011) Key Variable Mapping System II Proceedings of UNECE work session on Statistical Confidentiality, Taragonna, October 2011.
Elliot, K. Smith, D., Mackey, E. M. And Purdam, K. (2011) Formalizing the Selection of Key Variables in Disclosure Risk Assessment, Proceedings of the 58th Congress of the International Statistical Institute, Dublin August 2011.
Duncan, G., Elliot, M. J. and Salazar, J. J. (2011) Statistical Confidentiality, Springer Verlag, New York
Mc Cullagh, K. (2011) Chapter 6 - Cloud Computing in Wild, C., Weinstein, S., MacEwan, N. & Geach, N. (2011) Electronic & Mobile Commerce: An analysis of crime, finance, media and trade in the digital age. Uni. of Hertfordshire Press.
Mc Cullagh, K. (2011) The prosecution of a whistleblowing blogger: Public interest v Private data, 26th Annual Conference of the British & Irish Law, Education & and Technology Association, Manchester Metropolitan University.
Mackey, E. and Elliot, M. (2011) End Game: Can Game Theory Help Us Explain How a Statistical Disclosure Might Occur and Play Out? CCSR Paper 2011-02
Buchan, I.; Ainsworth, J.; Carruthers, E.; Couch, P.; OFlaherty, M.; Smith, D; Williams, R. and Capewell, S. (2010) IMPACT: A generalisable system for simulating public health interventions. Presented at Medinfo 2010: 13th World Congress on Medical Informatics. Cape Town: IOS Press.
Elliot, M. J., Lomax, S., Mackey, E. and Purdam, K. (2010) Data Environment Analysis and the Key Variable Mapping System. In Domingo-Ferrer, J. and Magkos, E. (eds) Privacy in Statistical Databases. Springer; Berlin
Mackey, E. and Elliot, M. (2010) The application of Game theory to disclosure events. Proceedings of UNECE work-session on Statistical Confidentiality, Bilbao, December 2009.
Shlomo, N. and Skinner, C.J. (2010) Assessing the Protection Provided by Misclassification-Based Disclosure Limitation Methods for Survey Microdata. Annals of Applied Statistics, Vol. 4, No. 3 pp. 1291-1310.
Shlomo, N. (2010) Releasing Microdata: Disclosure Risk Estimation, Data Masking and Assessing Utility. Journal of Privacy and Confidentiality 2, Number 1, pp. 73-91.
Mc Cullagh, K. (2010) G-Cloud: Legal Storms forecast, Socio-Legal Studies Association Annual Conference (UWE)
Mac Sithigh, D. & Mc Cullagh, K. (2010) RIPA v HRA: An Analysis of Kennedy v UK, Ten years on: A Multi-perspective Evaluation of the Human Rights Act, Salford Human Rights Conference 2010
Mc Cullagh, K. (2009) Protecting privacy through control of personal data processing: A flawed approach International Review of Law Computers & Technology, Vol. 23, Nos. 1-2, 47-58
Mc Cullagh, K. (2009) IP addresses and personal data: K.U. v Finland, Data Protection Quarterly, Issue 22 January 2009
Elliot, M. J and Purdam, K. and Smith, D. (2008) Statistical Disclosure Control Architectures for Patient Records in Biomedical Information Systems The Journal of Bioinformatics. 41, pp 58-64
Elliot, M. J. (2008) Using Targeted Perturbation of Microdata to Protect Against Intelligent Linkage Proceedings of UNECE work session on Statistical Confidentiality, Manchester, December 2007.
Mc Cullagh, K. (2008) Blogging: Self Presentation and Privacy. Information and Communications Technology Law 17, 1, 3-23.
McCullagh, K. (2008) What is private data? 23rd Annual British & Irish Law, Education and Technology Association (BILETA) Conference, (Glasgow).
Skinner, C. J. and Shlomo, N. (2008) Assessing Identification Risk in Survey Micro-data Using Log Linear Models. Journal of American Statistical Association, Vol. 103, Number 483, pp 989-1001.
Shlomo, N. and De Waal T. (2008) Protection of Micro-data Subject to Edit Constraints Against Statistical Disclosure. Journal of Official Statistics, 24, No. 2, pp 1-26.
Smith, D.; Elliot, M. (2008) A Measure of Disclosure Risk for Tables of Counts. Transactions in Data Privacy. 1(1), 34-52.