{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:22:01Z","timestamp":1743128521565,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319417622"},{"type":"electronic","value":"9783319417639"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-41763-9_23","type":"book-chapter","created":{"date-parts":[[2016,7,6]],"date-time":"2016-07-06T07:21:44Z","timestamp":1467789704000},"page":"343-358","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Ontology-Based Obfuscation and Anonymisation for Privacy"],"prefix":"10.1007","author":[{"given":"Leonardo H.","family":"Iwaya","sequence":"first","affiliation":[]},{"given":"Fausto","family":"Giunchiglia","sequence":"additional","affiliation":[]},{"given":"Leonardo A.","family":"Martucci","sequence":"additional","affiliation":[]},{"given":"Alethia","family":"Hume","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[]},{"given":"Ronald","family":"Chenu-Abente","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,7]]},"reference":[{"key":"23_CR1","unstructured":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official J. L 281, 0031\u20130050 (1995). \n                  http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=CELEX:31995L0046:EN:HTML"},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2004.97","volume":"6","author":"DE Bakken","year":"2004","unstructured":"Bakken, D.E., Parameswaran, R., Blough, D.M., Franz, A.A., Palmer, T.J.: Data obfuscation: anonymity and desensitization of usable data sets. IEEE Secur. Priv. 6, 34\u201341 (2004)","journal-title":"IEEE Secur. Priv."},{"issue":"2","key":"23_CR3","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1136\/jamia.2009.000026","volume":"17","author":"K Benitez","year":"2010","unstructured":"Benitez, K., Malin, B.: Evaluating re-identification risks with respect to the hipaa privacy rule. J. Am. Med. Inform. Assoc. 17(2), 169\u2013177 (2010)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Sommer, D., Fischer-H\u00fcbner, S., Hansen, M., Krasemann, H., Lacoste, G., Leenes, R., Tseng, J., et al.: Privacy and identity management for everyone. In: Proceedings of the 2005 Workshop on Digital Identity Management, pp. 20\u201327. ACM (2005)","DOI":"10.1145\/1102486.1102491"},{"issue":"4","key":"23_CR5","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1186\/gm239","volume":"3","author":"K El Emam","year":"2011","unstructured":"El Emam, K.: Methods for the de-identification of electronic health records for genomic research. Genome Med. 3(4), 25 (2011). \n                  http:\/\/genomemedicine.com\/content\/3\/4\/25","journal-title":"Genome Med."},{"key":"23_CR6","unstructured":"EU Commission: Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) (2015). \n                  http:\/\/data.consilium.europa.eu\/doc\/document\/ST-9565-2015-INIT\/en\/pdf"},{"key":"23_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04396-7","volume-title":"Ontologies","author":"D Fensel","year":"2001","unstructured":"Fensel, D.: Ontologies. Springer, Heidelberg (2001)"},{"issue":"2","key":"23_CR8","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/0004-3702(92)90021-O","volume":"57","author":"F Giunchiglia","year":"1992","unstructured":"Giunchiglia, F., Walsh, T.: A theory of abstraction. Artif. Intell. 57(2), 323\u2013389 (1992)","journal-title":"Artif. Intell."},{"key":"23_CR9","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-319-18621-4_16","volume-title":"Privacy and Identity Management for the Future Internet in the Age of Globalisation","author":"M Hartswood","year":"2015","unstructured":"Hartswood, M., Jirotka, M., Chenu-Abente, R., Hume, A., Giunchiglia, F., Martucci, L.A., Fischer-H\u00fcbner, S.: Privacy for peer profiling in collective adaptive systems. In: Camenisch, J., Fischer-H\u00fcbner, S., Hansen, M. (eds.) Privacy and Identity 2014. IFIP AICT, vol. 457, pp. 237\u2013252. Springer, Heidelberg (2015). doi:\n                  10.1007\/978-3-319-18621-4_16"},{"key":"23_CR10","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International Conference on Data Engineering, 2007. ICDE 2007, pp. 106\u2013115, April 2007"},{"issue":"1","key":"23_CR11","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"Ashwin Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1) (2007). \n                  http:\/\/doi.acm.org\/10.1145\/1217299.1217302","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"23_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-642-16292-3_24","volume-title":"Modeling Decisions for Artificial Intelligence","author":"S Mart\u00ednez","year":"2010","unstructured":"Mart\u00ednez, S., S\u00e1nchez, D., Valls, A.: Ontology-based anonymization of categorical values. In: Torra, V., Narukawa, Y., Daumas, M. (eds.) MDAI 2010. LNCS, vol. 6408, pp. 243\u2013254. Springer, Heidelberg (2010)"},{"issue":"2","key":"23_CR13","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.jbi.2012.11.005","volume":"46","author":"S Mart\u00ednez","year":"2013","unstructured":"Mart\u00ednez, S., S\u00e1nchez, D., Valls, A.: A semantic framework to protect the privacy of electronic health records with non-numerical attributes. J. Biomed. Inform. 46(2), 294\u2013303 (2013)","journal-title":"J. Biomed. Inform."},{"key":"23_CR14","unstructured":"OCR: Guidance Regarding Methods for De-identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule. Office for Civil Rights (2012). \n                  http:\/\/www.hhs.gov\/sites\/default\/files\/ocr\/privacy\/hipaa\/understanding\/coveredentities\/De-identification\/hhs_deid_guidance.pdf"},{"key":"23_CR15","unstructured":"Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management (August 2010). \n                  http:\/\/dud.inf.tu-dresden.de\/literatur\/Anon_Terminology_v0.34.pdf\n                  \n                , \n                  http:\/\/dud.inf.tu-dresden.de\/literatur\/Anon_Terminology_v0.34.pdf\n                  \n                . v0.34"},{"key":"23_CR16","unstructured":"Rahman, F., Addo, I.D., Ahamed, S.I.: PriSN: a privacy protection framework for healthcare social networking sites. In: Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, pp. 66\u201371. RACS 2014. ACM, New York (2014). \n                  http:\/\/doi.acm.org\/10.1145\/2663761.2664199"},{"issue":"5","key":"23_CR17","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl.-Based Syst."},{"key":"23_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/11426646_26","volume-title":"Location- and Context-Awareness","author":"R Wishart","year":"2005","unstructured":"Wishart, R., Henricksen, K., Indulska, J.: Context obfuscation for privacy via ontological descriptions. In: Strang, T., Linnhoff-Popien, C. (eds.) LoCA 2005. LNCS, vol. 3479, pp. 276\u2013288. Springer, Heidelberg (2005)"},{"key":"23_CR19","unstructured":"WP29: Opinion 05\/2014 on anonymisation techniques, April 2014. \n                  http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2014\/wp216_en.pdf"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management. Time for a Revolution?"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-41763-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,20]],"date-time":"2020-07-20T00:13:29Z","timestamp":1595204009000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-41763-9_23"}},"subtitle":["A Case Study on Healthcare"],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319417622","9783319417639"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-41763-9_23","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"7 July 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}