{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:56:55Z","timestamp":1742972215825,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030878719"},{"type":"electronic","value":"9783030878726"}],"license":[{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-87872-6_2","type":"book-chapter","created":{"date-parts":[[2021,9,21]],"date-time":"2021-09-21T04:02:39Z","timestamp":1632196959000},"page":"13-22","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Estimating Re-identification Risk by Means of Formal Conceptualization"],"prefix":"10.1007","author":[{"given":"Gonzalo A.","family":"Aranda-Corral","sequence":"first","affiliation":[]},{"given":"Joaqu\u00edn","family":"Borrego-D\u00edaz","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Gal\u00e1n-P\u00e1ez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,22]]},"reference":[{"key":"2_CR1","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-030-00485-9_8","volume-title":"Trends in Mathematics and Computational Intelligence","author":"GA Aranda-Corral","year":"2019","unstructured":"Aranda-Corral, G.A., Borrego-D\u00edaz, J., Gal\u00e1n-P\u00e1ez, J., Caballero, A.T.: On experimental efficiency for retraction operator to stem basis. In: Cornejo, M.E., K\u00f3czy, L.T., Medina, J., De Barros Ruano, A.E. (eds.) Trends in Mathematics and Computational Intelligence. SCI, vol. 796, pp. 73\u201379. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-00485-9_8"},{"key":"2_CR2","unstructured":"Canadian Institute for Health Information: Best practice guidelines for managing the disclosure of de-identified health information. Technical report, Canadian Institute for Health Information (2011)"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/3-540-64383-4_33","volume-title":"Research and Development in Knowledge Discovery and Data Mining","author":"R Cole","year":"1998","unstructured":"Cole, R., Eklund, P., Walker, D.: Constructing conceptual scales in formal concept analysis. In: Wu, X., Kotagiri, R., Korb, K.B. (eds.) PAKDD 1998. LNCS, vol. 1394, pp. 378\u2013379. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/3-540-64383-4_33"},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1017\/dce.2020.3","volume":"1","author":"L Dodds","year":"2020","unstructured":"Dodds, L., L\u2019H\u00e9naff, P., Maddison, J., Yates, D.: A manifesto for increasing access to data in engineering. Data-Cent. Eng. 1, 11 (2020). https:\/\/doi.org\/10.1017\/dce.2020.3","journal-title":"Data-Cent. Eng."},{"issue":"1","key":"2_CR5","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"C Dwork","year":"2011","unstructured":"Dwork, C.: A firm foundation for private data analysis. Commun. ACM 54(1), 86\u201395 (2011)","journal-title":"Commun. ACM"},{"issue":"3","key":"2_CR6","doi-asserted-by":"publisher","first-page":"17","DOI":"10.29012\/jpc.v7i3.405","volume":"7","author":"C Dwork","year":"2017","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. J. Priv. Confident. 7(3), 17\u201351 (2017)","journal-title":"J. Priv. Confident."},{"key":"2_CR7","unstructured":"El Emam, K., Arbuckle, L.: Anonymizing Health Data: Case Studies and Methods to Get You Started, 1st edn. O\u2019Reilly Media, Inc. (2013)"},{"issue":"12","key":"2_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1371\/journal.pone.0028071","volume":"6","author":"K El Emam","year":"2011","unstructured":"El Emam, K., Jonker, E., Arbuckle, L., Malin, B.: A systematic review of re-identification attacks on health data. PLoS One 6(12), 1\u201312 (2011)","journal-title":"PLoS One"},{"key":"2_CR9","unstructured":"Federal Committee on Statistical Methodology: Report on Statistical Disclosure Limitation Methodology. Technical report 12, Federal Committee on Statistical Methodology (2005)"},{"key":"2_CR10","volume-title":"Formal Concept Analysis: Mathematical Foundations","author":"B Ganter","year":"1997","unstructured":"Ganter, B., Wille, R.: Formal Concept Analysis: Mathematical Foundations, 1st edn. Springer, New York (1997)","edition":"1"},{"key":"2_CR11","unstructured":"ICO: Anonymisation: managing data protection risk code of practice. Technical report, UK\u2019s Information Commissioner\u2019s Office (2012)"},{"key":"2_CR12","unstructured":"Institute of Medicine: Sharing Clinical Trial Data: Maximizing Benefits. Minimizing Risk. The National Academies Press, Washington, DC (2015)"},{"key":"2_CR13","unstructured":"Office for Civil Rights: Guidance Regarding Methods for De-identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule. Technical report, U.S. Department of Health & Human Services, Washington, DC (2012)"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Ribeiro-Navarrete, S., Saura, J.R., Palacios-Marqu\u00e9s, D.: Towards a new era of mass data collection: Assessing pandemic surveillance technologies to preserve user privacy. Technol. Forecast. Soc. Change 167, 120,681 (2021)","DOI":"10.1016\/j.techfore.2021.120681"},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41467-019-10933-3","volume":"10","author":"L Rocher","year":"2019","unstructured":"Rocher, L., Hendrickx, J., de Montjoye, Y.A.: Estimating the success of re-identifications in incomplete datasets using generative models. Nat. Commun. 10, 1\u20139 (2019)","journal-title":"Nat. Commun."}],"container-title":["Advances in Intelligent Systems and Computing","14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87872-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,22]],"date-time":"2022-01-22T07:02:58Z","timestamp":1642834978000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87872-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,22]]},"ISBN":["9783030878719","9783030878726"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87872-6_2","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2021,9,22]]},"assertion":[{"value":"22 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIS - ICEUTE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computational Intelligence in Security for Information Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bilbao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisis-spain2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.iceuteconference.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}