{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:42:05Z","timestamp":1762033325978,"version":"3.41.0"},"publisher-location":"Cham","reference-count":61,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319236322"},{"type":"electronic","value":"9783319236339"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23633-9_6","type":"book-chapter","created":{"date-parts":[[2015,11,26]],"date-time":"2015-11-26T06:47:58Z","timestamp":1448520478000},"page":"111-148","source":"Crossref","is-referenced-by-count":49,"title":["Putting Statistical Disclosure Control into Practice: The ARX Data Anonymization Tool"],"prefix":"10.1007","author":[{"given":"Fabian","family":"Prasser","sequence":"first","affiliation":[]},{"given":"Florian","family":"Kohlmayer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Article 29 Data Protection Working Party: Opinion 05\/2014 on anonymisation techniques. http:\/\/www.cnpd.public.lu\/fr\/publications\/groupe-art29\/wp216_en.pdf. Accessed 22 Apr (2014)","key":"6_CR1"},{"unstructured":"ARX \u2013 Powerful Data Anonymization: http:\/\/arx.deidentifier.org\/. Accessed 06 May (2015)","key":"6_CR2"},{"doi-asserted-by":"crossref","unstructured":"Bayardo, R., Agrawal, R.: Data privacy through optimal k-anonymization. In: Proceedings of the International Conference on Data Engineering, pp. 217\u2013228 (2005)","key":"6_CR3","DOI":"10.1109\/ICDE.2005.42"},{"key":"6_CR4","first-page":"48","volume-title":"Lecture Notes in Computer Science","author":"Ji-Won Byun","year":"2006","unstructured":"Byun, J., Sohn, Y., Bertino, E., Li, N.: Secure anonymization for incremental datasets. In: Proceedings of VLDB Workshop Secure Data Management, pp. 48\u201363 (2006)"},{"unstructured":"Cavoukian, A., Castro, D.: Big data and innovation, setting the record straight: de-identification does work. Privacy by Design, Ontario, Canada. http:\/\/www2.itif.org\/2014-big-data-deidentification.pdf (2014). Accessed 06 May (2015)","key":"6_CR5"},{"key":"6_CR6","first-page":"79","volume":"14","author":"G. Chen","year":"1998","unstructured":"Chen, G., Keller-McNulty, S.: Estimation of identification disclosure risk in microdata. J. Off. Stat. 14, 79\u201395 (1998)","journal-title":"J. Off. Stat."},{"key":"6_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10073-9_27","volume-title":"k-anonymity of microdata with null values","author":"M. Ciglic","year":"2014","unstructured":"Ciglic, M., Eder, J., Koncilia, C.: k-anonymity of microdata with null values. In: Proceedings of International Conference on Database and Expert Systems Applications (2014)"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-0-387-27696-0_9","volume-title":"Secure Data Management in Decentralized Systems. Advances in Information Security","author":"V. Ciriani","year":"2007","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Microdata protection. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems. Advances in Information Security, vol. 33, pp. 291\u2013321. Springer, Berlin (2007)"},{"key":"6_CR9","volume-title":"TIAMAT: a tool for interactive analysis of microdata anonymization techniques","author":"C. Dai","year":"2009","unstructured":"Dai, C., Ghinita, G., Bertino, E., Byun, J.W., Li, N.: TIAMAT: a tool for interactive analysis of microdata anonymization techniques. In: Proceedings of the VLDB Endowment (2009)"},{"issue":"1","key":"6_CR10","first-page":"35","volume":"6","author":"F.K. Dankar","year":"2013","unstructured":"Dankar, F.K., Emam, K.E.: Practicing differential privacy in health care: a review. Trans. Data Privacy 6(1), 35\u201367 (2013)","journal-title":"Trans. Data Privacy"},{"issue":"1","key":"6_CR11","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1186\/1472-6947-12-66","volume":"12","author":"F. Dankar","year":"2012","unstructured":"Dankar, F., Emam, K.E., Neisa, A., Roffey, T.: Estimating the re-identification risk of clinical data sets. BMC Med. Inform. Decis. Mak. 12(1), 66 (2012)","journal-title":"BMC Med. Inform. Decis. Mak."},{"doi-asserted-by":"crossref","unstructured":"Dwork, C.: An ad omnia approach to defining and achieving private data analysis. In: Proceedings of PinKDD, pp. 1\u201313 (2007)","key":"6_CR12","DOI":"10.1007\/978-3-540-78478-4_1"},{"doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy. In: Encyclopedia of Cryptography and Security, pp. 338\u2013340. Springer, Berlin (2011)","key":"6_CR13","DOI":"10.1007\/978-1-4419-5906-5_752"},{"key":"6_CR14","first-page":"486","volume":"2006","author":"C. Dwork","year":"2006","unstructured":"Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: privacy via distributed noise generation. In: Proceedings of EUROCRYPT 2006, pp. 486\u2013503 (2006)","journal-title":"In: Proceedings of EUROCRYPT"},{"issue":"12","key":"6_CR15","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0028071","volume":"6","author":"K. El Emam","year":"2011","unstructured":"El Emam, K., Jonker, E., Arbuckle, L., Malin, B.: A systematic review of re-identification attacks on health data. PloS One 6(12), e28071 (2011)","journal-title":"PloS One"},{"issue":"5","key":"6_CR16","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1197\/jamia.M3144","volume":"16","author":"K.E. Emam","year":"2009","unstructured":"Emam, K.E., Dankar, F.K., Issa, R., Jonker, E., Amyot, D., Cogo, E., Corriveau, J., Walker, M., Chowdhury, S., Vaillancourt, R., Roffey, T., Bottomley, J.: A globally optimal k-anonymity method for the de-identification of health data. J. Am. Med. Inform. Assoc. 16(5), 670\u2013682 (2009)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"6_CR17","doi-asserted-by":"publisher","DOI":"10.1201\/9781420091502","volume-title":"Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques","author":"B. Fung","year":"2010","unstructured":"Fung, B., Wang, K., Fu, A., Yu, P.: Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques. CRC Press, Hoboken (2010)"},{"doi-asserted-by":"crossref","unstructured":"Gardner, J.J., Xiong, L., Li, K., Lu, J.J.: HIDE: heterogeneous information de-identification. In: Proceedings of International Conference on Extending Database Technology, pp. 1116\u20131119 (2009)","key":"6_CR18","DOI":"10.1145\/1516360.1516491"},{"unstructured":"Ghinita, G., Karras, P., Kalnis, P., Mamoulis, N.: Fast data anonymization with low information loss. In: Proceedings of the VLDB Endowment, pp. 758\u2013769 (2007)","key":"6_CR19"},{"key":"6_CR20","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.jbi.2014.06.002","volume":"50","author":"A. Gkoulalas-Divanis","year":"2014","unstructured":"Gkoulalas-Divanis, A., Loukides, G., Sun, J.: Publishing data from electronic health records while preserving privacy: a survey of algorithms. J. Biomed. Inform. 50, 4\u201319 (2014)","journal-title":"J. Biomed. Inform."},{"issue":"1","key":"6_CR21","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1111\/j.1467-9574.1992.tb01325.x","volume":"46","author":"B. Greenberg","year":"1992","unstructured":"Greenberg, B., Zayatz, L.: Strategies for measuring risk in public use micro-data files. Statistica Neerlandica 46(1), 33\u201348 (1992)","journal-title":"Statistica Neerlandica"},{"issue":"4","key":"6_CR22","first-page":"499","volume":"17","author":"N. Hoshino","year":"2001","unstructured":"Hoshino, N.: Applying Pitman\u2019s sampling formula to microdata disclosure risk assessment. J. Off. Stat. 17(4), 499\u2013520 (2001)","journal-title":"J. Off. Stat."},{"unstructured":"Hundepool, A., van de Wetering, A., Ramaswamy, R., Franconi, L., Polettini, S., Capobianchi, A., de Wolf, P.P., Domingo, J., Torra, V., Brand, R., Giessing, S.: \u03bc-Argus manual. http:\/\/neon.vb.cbs.nl\/casc\/Software\/MuManual4.2.pdf. Accessed 22 Apr (2008)","key":"6_CR23"},{"doi-asserted-by":"crossref","unstructured":"Iyengar, V.: Transforming data to satisfy privacy constraints. In: Proceedings of International Conference on Knowledge Discovery and Data Mining, pp. 279\u2013288 (2002)","key":"6_CR24","DOI":"10.1145\/775047.775089"},{"unstructured":"Kayaalp, M., Browne, A.C., Dodd, Z., Sagan, P., McDonald, C.: De-identification of address, date, and alphanumeric identifiers in narrative clinical reports. In: AMIA Annual Symposium Proceedings, pp. 767\u2013776 (2014)","key":"6_CR25"},{"key":"6_CR26","volume-title":"Flash: efficient, stable and optimal k-anonymity","author":"F. Kohlmayer","year":"2012","unstructured":"Kohlmayer, F., Prasser, F., Eckert, C., Kemper, A., Kuhn, K.A.: Flash: efficient, stable and optimal k-anonymity. In: Proceedings of International Conference on Information Privacy, Security, Risk and Trust (2012)"},{"key":"6_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2012.6266366","volume-title":"Highly efficient optimal k-anonymity for biomedical datasets","author":"F. Kohlmayer","year":"2012","unstructured":"Kohlmayer, F., Prasser, F., Eckert, C., Kemper, A., Kuhn, K.A.: Highly efficient optimal k-anonymity for biomedical datasets. In: Proceedings of International Symposium on Computer-Based Medical Systems (2012)"},{"key":"6_CR28","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.jbi.2013.12.002","volume":"50","author":"F. Kohlmayer","year":"2013","unstructured":"Kohlmayer, F., Prasser, F., Eckert, C., Kuhn, K.A.: A flexible approach to distributed data anonymization. J. Biomed. Inform. 50, 62\u201376 (2013).","journal-title":"J. Biomed. Inform."},{"doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: Proceedings of International Conference on Management of Data, pp. 49\u201360 (2005)","key":"6_CR29","DOI":"10.1145\/1066157.1066164"},{"key":"6_CR30","volume-title":"Multidimensional k-anonymity (TR-1521)","author":"K. LeFevre","year":"2005","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Multidimensional k-anonymity (TR-1521). Tech. Rep., University of Wisconsin (2005)"},{"doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: Proceedings of International Conference on Data Engineering, p. 25 (2006)","key":"6_CR31","DOI":"10.1109\/ICDE.2006.101"},{"doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and \u2113-diversity. In: Proceedings of International Conference on Data Engineering, pp. 106\u2013115 (2007)","key":"6_CR32","DOI":"10.1109\/ICDE.2007.367856"},{"unstructured":"Li, N., Qardaji, W.H., Su, D.: Provably private data anonymization: or, k-anonymity meets differential privacy. CoRR, abs\/1101.2604 49, 55 (2011)","key":"6_CR33"},{"issue":"3","key":"6_CR34","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TKDE.2010.236","volume":"24","author":"T. Li","year":"2012","unstructured":"Li, T., Li, N., Zhang, J., Molloy, I.: Slicing: a new approach for privacy preserving data publishing. Trans. Knowl. Data Eng. 24(3), 561\u2013574 (2012)","journal-title":"Trans. Knowl. Data Eng."},{"doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: \u2113-diversity: privacy beyond k-anonymity. Trans. Knowl. Discov. Data 1(1), 24\u201335 (2007)","key":"6_CR35","DOI":"10.1145\/1217299.1217302"},{"issue":"1","key":"6_CR36","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1136\/jamia.2010.004622","volume":"18","author":"B. Malin","year":"2011","unstructured":"Malin, B., Benitez, K., Masys, D.: Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA privacy rule. J. Am. Med. Inform. Assoc. 18(1), 3\u201310 (2011)","journal-title":"J. Am. Med. Inform. Assoc."},{"doi-asserted-by":"crossref","unstructured":"McSherry, F.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: Proceedings of International Conference on Management of Data, pp. 19\u201330 (2009)","key":"6_CR37","DOI":"10.1145\/1559845.1559850"},{"unstructured":"Minka, T.: Lightspeed Matlab toolbox. http:\/\/research.microsoft.com\/en-us\/um\/people\/minka\/software\/lightspeed\/. Accessed 22 Apr (2014)","key":"6_CR38"},{"unstructured":"Narayanan, A., Felten, E.: No silver bullet: de-identification still doesn\u2019t work. http:\/\/randomwalker.info\/publications\/no-silver-bullet-de-identification.pdf (2014). Accessed 06 May (2015)","key":"6_CR39"},{"doi-asserted-by":"crossref","unstructured":"Nergiz, M.E., Atzori, M., Clifton, C.: Hiding the presence of individuals from shared data-bases. In: Proceedings of International Conference on Management of Data, pp. 665\u2013676 (2007)","key":"6_CR40","DOI":"10.1145\/1247480.1247554"},{"key":"6_CR41","first-page":"353","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"Giorgos Poulis","year":"2013","unstructured":"Poulis, G., Loukides, G., Gkoulalas-Divanis, A., Skiadopoulos, S.: Anonymizing data with relational and transaction attributes. In: Proceedings of ECML PKDD, pp. 353\u2013369 (2013)"},{"unstructured":"Poulis, G., Gkoulalas-Divanis, A., Loukides, G., Skiadopoulos, S., Tryfonopoulos, C.: SECRETA: a system for evaluating and comparing relational and transaction anonymization algorithms. In: Proceedings of International Conference on Extending Database Technology, pp. 620\u2013623 (2014)","key":"6_CR42"},{"unstructured":"Prasser, F., Kohlmayer, F.: A simple benchmark of risk-based anonymization with ARX. https:\/\/www.github.com\/arx-deidentifier\/risk-benchmark. Accessed 22 Apr (2015)","key":"6_CR43"},{"key":"6_CR44","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2014.85","volume-title":"A benchmark of globally-optimal anonymization methods for biomedical data","author":"F. Prasser","year":"2014","unstructured":"Prasser, F., Kohlmayer, F., Kuhn, K.A.: A benchmark of globally-optimal anonymization methods for biomedical data. In: Proceedings of International Symposium on Computer-Based Medical Systems (2014)."},{"key":"6_CR45","volume-title":"ARX: a comprehensive tool for anonymizing biomedical data","author":"F. Prasser","year":"2014","unstructured":"Prasser, F., Kohlmayer, F., Lautenschlaeger, R., Eckert, C., Kuhn, K.A.: ARX: a comprehensive tool for anonymizing biomedical data. In: AMIA Annual Symposium Proceedings (2014)."},{"unstructured":"Privacy Analytics Inc.: About PARAT de-identification software. http:\/\/www.privacyanalytics.ca\/software\/parat\/. Accessed 22 Apr (2015)","key":"6_CR46"},{"unstructured":"Rinott, Y.: On models for statistical disclosure risk estimation. In: Proceedings of ECE\/Eurostat Work Session on Statistical Data Confidentiality, pp. 275\u2013285 (2003)","key":"6_CR47"},{"doi-asserted-by":"crossref","unstructured":"Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information. In: Proceedings of Symposium on Principles of Database Systems, p. 188 (1998)","key":"6_CR48","DOI":"10.1145\/275487.275508"},{"key":"6_CR49","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1007\/978-0-387-35285-5_22","volume-title":"Database Security XI","author":"Latanya Sweeney","year":"1998","unstructured":"Sweeney, L.: Datafly: a system for providing anonymity in medical data. In: Database Security, XI: Status and Prospects, p. 20 (1998)"},{"unstructured":"Sweeney, L.: Computational disclosure control: a primer on data privacy protection. Ph.D. thesis, MIT (2001)","key":"6_CR50"},{"issue":"2","key":"6_CR51","first-page":"67","volume":"1","author":"M. Templ","year":"2008","unstructured":"Templ, M.: Statistical disclosure control for microdata using the r-package sdcmicro. Trans. Data Privacy 1(2), 67\u201385 (2008)","journal-title":"Trans. Data Privacy"},{"key":"6_CR52","volume-title":"Privacy-preserving anonymization of set-valued data","author":"M. Terrovitis","year":"2008","unstructured":"Terrovitis, M., Mamoulis, N., Kalnis, P.: Privacy-preserving anonymization of set-valued data. In: Proceedings of the VLDB Endowment (2008)"},{"unstructured":"U.S. Health Insurance Portability and Accountability Act of 1996. Public Law 1-349 (1996)","key":"6_CR53"},{"unstructured":"UTD Data Security and Privacy Lab: UTD anonymization toolbox. http:\/\/www.cs.utdallas.edu\/dspl\/cgi-bin\/toolbox\/index.php. Accessed 10 June (2012)","key":"6_CR54"},{"unstructured":"Wikipedia: Hasse diagram. https:\/\/en.wikipedia.org\/wiki\/Hasse_diagram. Accessed 22 Apr (2015)","key":"6_CR55"},{"unstructured":"Wikipedia: Newton\u2019s method. https:\/\/en.wikipedia.org\/wiki\/Newton\u2019s_method. Accessed 22 Apr (2015)","key":"6_CR56"},{"unstructured":"Wikipedia: Polygamma function. https:\/\/en.wikipedia.org\/wiki\/Polygamma_function. Accessed 22 Apr (2015)","key":"6_CR57"},{"unstructured":"Xiao, X., Tao, Y.: Anatomy: simple and effective privacy preservation. In: Proceedings of the VLDB Endowment, pp. 139\u2013150 (2006)","key":"6_CR58"},{"doi-asserted-by":"crossref","unstructured":"Xiao, X., Wang, G., Gehrke, J.: Interactive anonymization of sensitive data. In: Proceedings of International Conference on Management of Data, pp. 1051\u20131054 (2009)","key":"6_CR59","DOI":"10.1145\/1559845.1559979"},{"doi-asserted-by":"crossref","unstructured":"Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.W.: Utility-based anonymization using local recoding. In: Proceedings of International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013790 (2006)","key":"6_CR60","DOI":"10.1145\/1150402.1150504"},{"unstructured":"Zayatz, L.V.: Estimation of the percent of unique population elements on a microdata file using the sample. Statistical Research Division Report Number: Census\/SRD\/RR-91\/08 (1991)","key":"6_CR61"}],"container-title":["Medical Data Privacy Handbook"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23633-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T15:13:43Z","timestamp":1748704423000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-23633-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319236322","9783319236339"],"references-count":61,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23633-9_6","relation":{},"subject":[],"published":{"date-parts":[[2015]]}}}