{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:46:26Z","timestamp":1725475586527},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540687900"},{"type":"electronic","value":"9783540687931"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11957454_24","type":"book-chapter","created":{"date-parts":[[2006,12,11]],"date-time":"2006-12-11T04:15:43Z","timestamp":1165810543000},"page":"413-429","source":"Crossref","is-referenced-by-count":5,"title":["The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment"],"prefix":"10.1007","author":[{"given":"Bradley","family":"Malin","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Edoardo","family":"Airoldi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"Altman, R.: Bioinformatics in support of molecular medicine. In: Proceedings of the American Medical Informatics Association Annual Symposium, Miami Beach, FL, pp. 53\u201361 (1998)"},{"key":"24_CR2","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1055\/s-0038-1634006","volume":"44","author":"U. Sax","year":"2005","unstructured":"Sax, U., Schmidt, S.: Integration of genomic data in electronic health records: opportunities and dilemmas. Methods of Information in Medicine\u00a044, 546\u2013550 (2005)","journal-title":"Methods of Information in Medicine"},{"key":"24_CR3","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1146\/annurev.pharmtox.42.082401.140850","volume":"42","author":"R. Altman","year":"2002","unstructured":"Altman, R., Klein, T.: Challenges for biomedical informatics and pharmacogenomics. Annual Review of Pharmacology and Toxicology\u00a042, 113\u2013133 (2002)","journal-title":"Annual Review of Pharmacology and Toxicology"},{"key":"24_CR4","unstructured":"Department of Health and Human Services: 45 cfr (code of federal regulations), parts 160 - 164. standards for privacy of individually identifiable health information, final rule. Federal Register\u00a067, 53182\u201353273 (2002)"},{"key":"24_CR5","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.jbi.2004.04.005","volume":"37","author":"B. Malin","year":"2004","unstructured":"Malin, B., Sweeney, L.: How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems. Journal of Biomedical Informatics\u00a037, 179\u2013192 (2004)","journal-title":"Journal of Biomedical Informatics"},{"key":"24_CR6","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/1107458.1107491","volume":"49","author":"C. Karat","year":"2006","unstructured":"Karat, C., Brodie, C., Karat, J.: Usable privacy and security for personal information management. Communications of the ACM\u00a049, 51\u201355 (2006)","journal-title":"Communications of the ACM"},{"key":"24_CR7","unstructured":"Malin, B.: Betrayed by my shadow: learning data identity via trail matching. Journal of Privacy Technology, 20050609001 (2005)"},{"key":"24_CR8","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1055\/s-0038-1634326","volume":"42","author":"G. Moor de","year":"2003","unstructured":"de Moor, G., Claerhout, B., de Meyer, F.: Privacy enhancing technologies: the key to secure communication and management of clinical and genomic data. Methods of Information in Medicine\u00a042, 148\u2013153 (2003)","journal-title":"Methods of Information in Medicine"},{"key":"24_CR9","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1038\/sj.ejhg.5200530","volume":"8","author":"J. Gulcher","year":"2000","unstructured":"Gulcher, J., Kristjansson, K., Gudbjartsson, H., Stefansson, K.: Protection of privacy by third-party encryption in genetic research. European Journal of Human Genetics\u00a08, 739\u2013742 (2000)","journal-title":"European Journal of Human Genetics"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Lin, Z., Owen, A., Altman, R.: Genomic research and human subject privacy. Science\u00a0305 (2004)","DOI":"10.1126\/science.1095019"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Malin, B., Sweeney, L.: Composition and disclosure of unlinkable distributed databases. In: Proceedings of the 22\n                    nd\n                   IEEE International Conference on Data Engineering, Atlanta, GA (2006)","DOI":"10.1109\/ICDE.2006.41"},{"key":"24_CR12","unstructured":"Airoldi, E.M.: A statistical theory of record linkage with applications to privacy. Technical Report CMU-ISRI-05-112, School of Computer Science, Carnegie Mellon University (2004) Revision (December 2005)"},{"key":"24_CR13","first-page":"373","volume":"18","author":"S. Bender","year":"2001","unstructured":"Bender, S., Brand, R., Bacher, J.: Re-identifying register data by survey data: an empirical study. Statistical Journal of the United Nations ECE\u00a018, 373\u2013381 (2001)","journal-title":"Statistical Journal of the United Nations ECE"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Griffith, V., Jakobsson, M.: Messin with texas: deriving mother\u2019s maiden name using public records. In: Proceedings of the Applied Cryptography and Network Security Conference, New York, NY (2005)","DOI":"10.1007\/11496137_7"},{"key":"24_CR15","unstructured":"Malin, B., Sweeney, L.: Determining the identifiability of dna database entries. In: Proceedings of the American Medical Informatics Association Annual Symposium, Los Angeles, CA, pp. 537\u2013541 (2000)"},{"key":"24_CR16","unstructured":"Sweeney, L.: Uniqueness of simple demographics in the us population. Technical Report LIDAP-WP04, Data Privacy Laboratory, Carnegie Mellon University, Pittsburgh, PA (2000)"},{"key":"24_CR17","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-4028-0","volume-title":"Statistical Disclosure Control in Practice","author":"L. Willenborg","year":"1996","unstructured":"Willenborg, L., de Waal, T.: Statistical Disclosure Control in Practice. Springer, New York (1996)"},{"key":"24_CR18","series-title":"Lecture Notes in Computer Science","volume-title":"Information Security and Privacy","author":"G. Danezis","year":"2001","unstructured":"Danezis, G., Serjantov, A.: Statistical disclosure or intersection attacks on anonymity systems. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol.\u00a02119, Springer, Heidelberg (2001)"},{"key":"24_CR19","series-title":"Lecture Notes in Computer Science","volume-title":"Information Security and Privacy","author":"D. Kesdogan","year":"2001","unstructured":"Kesdogan, D., Agrawal, D., Penz, S.: Limits of anonymity in open environments. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol.\u00a02119, Springer, Heidelberg (2001)"},{"key":"24_CR20","first-page":"355","volume-title":"Business Survey Methods","author":"W.E. Winkler","year":"1995","unstructured":"Winkler, W.E.: Matching and record linkage. In: Cox, et al. (eds.) Business Survey Methods, pp. 355\u2013384. J. Wiley, New York (1995)"},{"key":"24_CR21","unstructured":"Winkler, W.: Data cleaning methods. In: Proceedings of the ACM SIGKDD Workshop on Data Cleaning, Record Linkage, and Object Consolidation, Washington, DC (2003)"},{"key":"24_CR22","unstructured":"State of Illinois Health Care Cost Containment Council: Data release overview. State of Illinois Health Care Cost Containment Council, Springfield, IL (March 1998)"},{"key":"24_CR23","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1287\/isre.10.4.287","volume":"10","author":"R. Kraut","year":"2000","unstructured":"Kraut, R., Mukhopadhyay, T., Szczypula, J., Kiesler, S., Scherlis, B.: Information and communication: alternative uses of the internet in households. Information Systems Research\u00a010, 287\u2013303 (2000)","journal-title":"Information Systems Research"},{"key":"24_CR24","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C.E. Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell System Technical Journal\u00a027, 379\u2013423 (1948)","journal-title":"Bell System Technical Journal"},{"key":"24_CR25","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1002\/j.1538-7305.1948.tb00917.x","volume":"27","author":"C.E. Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell System Technical Journal\u00a027, 623\u2013656 (1948)","journal-title":"Bell System Technical Journal"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11957454_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:21:38Z","timestamp":1619493698000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11957454_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540687900","9783540687931"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/11957454_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}