{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:49:01Z","timestamp":1762004941574,"version":"3.41.0"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319678153"},{"type":"electronic","value":"9783319678160"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67816-0_10","type":"book-chapter","created":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T10:43:16Z","timestamp":1505212996000},"page":"163-179","source":"Crossref","is-referenced-by-count":2,"title":["Towards a Toolkit for Utility and\u00a0Privacy-Preserving Transformation of Semi-structured Data Using Data Pseudonymization"],"prefix":"10.1007","author":[{"given":"Saffija","family":"Kasem-Madani","sequence":"first","affiliation":[]},{"given":"Michael","family":"Meier","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Wehner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,13]]},"reference":[{"key":"10_CR1","unstructured":"Ben-Kiki, O., Evans, C., Ingerson, B.: Yaml Ain\u2019t Markup Language (yaml) Version 1.1. yaml.org. Technical report (2005)"},{"key":"10_CR2","unstructured":"Biskup, J., Flegel, U.: On pseudonymization of audit data for intrusion detection. In: International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, pp. 161\u2013180. Springer-Verlag, New York Inc., New York (2001). http:\/\/dl.acm.org\/citation.cfm?id=371931.371988"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-642-38980-1_7","volume-title":"Applied Cryptography and Network Security","author":"D Boneh","year":"2013","unstructured":"Boneh, D., Gentry, C., Halevi, S., Wang, F., Wu, D.J.: Private database queries using somewhat homomorphic encryption. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) ACNS 2013. LNCS, vol. 7954, pp. 102\u2013118. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-38980-1_7"},{"key":"10_CR4","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, ITCS 2012, NY, USA, pp. 309\u2013325 (2012). http:\/\/doi.acm.org\/10.1145\/2090236.2090262"},{"key":"10_CR5","unstructured":"BSI: Kryptographische Verfahren: Empfehlungen und Schl\u00fcssellangen. Technische Richtlinie TR-02102-1, Bundesamt fur Sicherheit in der Informationstechnik (2017)"},{"key":"10_CR6","unstructured":"Crockford, D.: The application\/json media type for javascript object notation (json) 2006a (2006). http:\/\/tools.ietf.org\/html\/rfc4627"},{"key":"10_CR7","unstructured":"Daemen, J., Rijmen, V.: AES proposal: Rijndael (1999)"},{"issue":"1","key":"10_CR8","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1197\/jamia.M1888","volume":"13","author":"RH Dolin","year":"2006","unstructured":"Dolin, R.H., Alschuler, L., Boyer, S., Beebe, C., Behlen, F.M., Biron, P.V., Shabo, A.: HL7 clinical document architecture, release 2. J. Am. Med. Inf. Assoc. 13(1), 30\u201339 (2006)","journal-title":"J. Am. Med. Inf. Assoc."},{"key":"10_CR9","unstructured":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union L119\/59, May 2016. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=OJ:L:2016:119:TOC"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Flegel, U., Hoffmann, J., Meier, M.: Cooperation enablement for centralistic early warning systems. In: Proceedings of the 2010 ACM Symposium on Applied Computing, SAC 2010, NY, USA, pp. 2001\u20132008 (2010). http:\/\/doi.acm.org\/10.1145\/1774088.1774509","DOI":"10.1145\/1774088.1774509"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10\u201318. Springer, Heidelberg (1985). doi: 10.1007\/3-540-39568-7_2"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Gentry, C., et al.: Fully homomorphic encryption using ideal lattices. In: STOC, vol. 9, pp. 169\u2013178 (2009)","DOI":"10.1145\/1536414.1536440"},{"issue":"2","key":"10_CR13","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270\u2013299 (1984)","journal-title":"J. Comput. Syst. Sci."},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Heurix, J., Khosravipour, S., Tjoa, A.M., Rawassizadeh, R.: LiDSec- A lightweight pseudonymization approach for privacy-preserving publishing of textual personal information. In: 2012 Seventh International Conference on Availability, Reliability and Security, pp. 603\u2013608 (2011)","DOI":"10.1109\/ARES.2011.93"},{"key":"10_CR15","unstructured":"Kasem-Madani, S., Meier, M.: Security and Privacy Policy Languages: A Survey, Categorization and Gap Identification. arXiv preprint arXiv:1512.00201 (2015)"},{"key":"10_CR16","unstructured":"Kerschbaum, F.: Distance-preserving Pseudonymization for timestamps and spatial data. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, WPES 2007, NY, USA, pp. 68\u201371 (2007). http:\/\/doi.acm.org\/10.1145\/1314333.1314346"},{"key":"10_CR17","unstructured":"Kumaraguru, P., Calo, S.: A survey of privacy policy languages. In: Workshop on Usable IT Security Management (USM 2007): Proceedings of the 3rd Symposium on Usable Privacy and Security. ACM (2007)"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Naveed, M., Kamara, S., Wright, C.V.: Inference attacks on property-preserving encrypted databases. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015, NY, USA, pp. 644\u2013655 (2015). http:\/\/doi.acm.org\/10.1145\/2810103.2813651","DOI":"10.1145\/2810103.2813651"},{"key":"10_CR19","first-page":"691","volume":"136","author":"T Neubauer","year":"2008","unstructured":"Neubauer, T., Riedl, B.: Improving patients privacy with pseudonymization. Stud. Health Technol. Inf. 136, 691 (2008)","journal-title":"Stud. Health Technol. Inf."},{"key":"10_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). doi: 10.1007\/3-540-48910-X_16"},{"key":"10_CR21","unstructured":"Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: CryptDB: protecting confidentiality with encrypted query processing. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP 2011, NY, USA, pp. 85\u2013100 (2011). http:\/\/doi.acm.org\/10.1145\/2043556.2043566"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Riedl, B., Neubauer, T., Goluch, G., Boehm, O., Reinauer, G., Krumboeck, A.: A secure architecture for the pseudonymization of medical data. In: The Second International Conference on Availability, Reliability and Security, ARES 2007, pp. 318\u2013324. IEEE (2007)","DOI":"10.1109\/ARES.2007.22"},{"issue":"2","key":"10_CR23","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"10_CR24","unstructured":"Rossum, G.: Python Reference Manual. Technical report, Amsterdam, The Netherlands (1995)"},{"key":"10_CR25","unstructured":"Schaad, A., Bkakria, A., Kerschbaum, F., Cuppens, F., Cuppens-Boulahia, N., Gross-Amblard, D.: Optimized and controlled provisioning of encrypted outsourced data. In: 19th ACM Symposium on Access Control Models and Technologies, SACMAT 2014, London, ON, Canada, 25\u201327 June 2014, pp. 141\u2013152 (2014). http:\/\/doi.acm.org\/10.1145\/2613087.2613100"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Shafranovich, Y.: Common format and MIME type for comma-separated values (csv) files (2005)","DOI":"10.17487\/rfc4180"},{"key":"10_CR27","unstructured":"Slagell, A., Lakkaraju, K., Luo, K.: FLAIM: a multi-level anonymization framework for computer and network logs. In: LISA 2006: Proceedings of the 20th conference on Large Installation System Administration, p. 6. USENIX Association, Berkeley (2006)"},{"issue":"5","key":"10_CR28","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/2828636","volume":"59","author":"S Wendzel","year":"2006","unstructured":"Wendzel, S.: How to increase the security of smart buildings? Commun. ACM 59(5), 47\u201349 (2006). http:\/\/doi.acm.org\/10.1145\/2828636","journal-title":"Commun. ACM"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Zhao, J., Binns, R., Van Kleek, M., Shadbolt, N.: Privacy languages: are we there yet to enable user controls? In: Proceedings of the 25th International Conference Companion on World Wide Web, WWW 2016 Companion, pp. 799\u2013806. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland (2016). http:\/\/dx.doi.org\/10.1145\/2872518.2890590","DOI":"10.1145\/2872518.2890590"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67816-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T18:10:16Z","timestamp":1750875016000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67816-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319678153","9783319678160"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67816-0_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}