Reidentification Primer Using Four Metrics

Written by:
Working Paper Number: CED-WP-2020-008

Introduction

Re-identification studies look for vulnerabilities in an entire database to attacks from an external source or collection of sources. This working paper updates our methodology for re-identification studies. We introduce the concept of ranking by value to two of the three methods, as used by our external stakeholder from HUD for his adhoc custom scoring method. We also introduce thresholds to enhance the ranking procedure in the adhoc method.

Page Last Revised - January 13, 2023