{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:54:34Z","timestamp":1743033274234,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":3,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461482666"},{"type":"electronic","value":"9781461482659"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-1-4614-8265-9_1490","type":"book-chapter","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T12:14:31Z","timestamp":1544098471000},"page":"2932-2933","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Pseudonymity"],"prefix":"10.1007","author":[{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"1490_CR16813","unstructured":"Pfitzmann A, Hansen M. A terminology for talking about privacy by data minimization: anonymity, unlinkability, unobservability, pseudonymity, and identity management. Version 0.34. http:\/\/dud.inf.tu-dresden.de\/Anon_Terminology.shtml. 10 Aug 2010."},{"key":"1490_CR16814","unstructured":"EU Commission. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Off J Eur Union. L 119\/1. 4 May 2016."},{"key":"1490_CR16815","unstructured":"Common Criteria for Information Technology Security Evaluation. Version 3.1, revision 4 Sept 2012. Part 2: Functional security components. http:\/\/www.commoncriteriaportal.org."}],"container-title":["Encyclopedia of Database Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-8265-9_1490","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T22:09:22Z","timestamp":1591049362000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-8265-9_1490"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9781461482666","9781461482659"],"references-count":3,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-8265-9_1490","relation":{},"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"7 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}