{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:17:56Z","timestamp":1742941076587,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642229602"},{"type":"electronic","value":"9783642229619"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22961-9_11","type":"book-chapter","created":{"date-parts":[[2011,8,19]],"date-time":"2011-08-19T01:25:02Z","timestamp":1313717102000},"page":"135-145","source":"Crossref","is-referenced-by-count":3,"title":["Pseudonymization Service for X-Road eGovernment Data Exchange Layer"],"prefix":"10.1007","author":[{"given":"Jan","family":"Willemson","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","first-page":"86","volume-title":"Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, SIGMOD 2003","author":"R. Agrawal","year":"2003","unstructured":"Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, SIGMOD 2003, pp. 86\u201397. ACM, New York (2003)"},{"key":"11_CR2","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/CSAC.2003.1254335","volume-title":"Proceedings of the 19th Annual Computer Security Applications Conference","author":"A. Ansper","year":"2003","unstructured":"Ansper, A., Buldas, A., Freudenthal, M., Willemson, J.: Scalable and eficient PKI for inter-organizational communication. In: Proceedings of the 19th Annual Computer Security Applications Conference, pp. 308\u2013318. IEEE, Los Alamitos (2003)"},{"key":"11_CR3","first-page":"62","volume-title":"Proceedings of the 1st ACM Conference on Computer and Communications Security, CCS 1993","author":"M. Bellare","year":"1993","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, CCS 1993, pp. 62\u201373. ACM, New York (1993)"},{"key":"11_CR4","first-page":"257","volume-title":"CCS 2008: Proceedings of the 15th ACM conference on Computer and communications security","author":"A. Ben-David","year":"2008","unstructured":"Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: a system for secure multi-party computation. In: CCS 2008: Proceedings of the 15th ACM conference on Computer and communications security, pp. 257\u2013266. ACM, New York (2008)"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-540-88313-5_13","volume-title":"Computer Security - ESORICS 2008","author":"D. Bogdanov","year":"2008","unstructured":"Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A framework for fast privacy-preserving computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.\u00a05283, pp. 192\u2013206. Springer, Heidelberg (2008)"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-642-03549-4_20","volume-title":"Financial Cryptography and Data Security","author":"P. Bogetoft","year":"2009","unstructured":"Bogetoft, P., Christensen, D.L., Damg\u00e5rd, I., Geisler, M., Jakobsen, T.P., Kr\u00f8igaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M.I., Toft, T.: Secure multiparty computation goes live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol.\u00a05628, pp. 325\u2013343. Springer, Heidelberg (2009)"},{"key":"11_CR7","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1145\/1008731.1008734","volume":"51","author":"R. Canetti","year":"2004","unstructured":"Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. J. ACM\u00a051, 557\u2013594 (2004)","journal-title":"J. ACM"},{"issue":"10","key":"11_CR8","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: Transaction systems to make big brother obsolete. Commun. ACM\u00a028(10), 1030\u20131044 (1985)","journal-title":"Commun. ACM"},{"key":"11_CR9","unstructured":"Galindo, D., Verheul, E.R.: Microdata sharing via pseudonymization. In: Work Session on Statistical Data Confidentiality, Manchester, December 17-19, 2007, pp. 24\u201332. Eurostat (2009)"},{"key":"11_CR10","series-title":"Advanced Information and Knowledge Processing","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-1-84996-238-4_8","volume-title":"Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems","author":"D. Galindo","year":"2010","unstructured":"Galindo, D., Verheul, E.R.: Pseudonymized Data Sharing. In: Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems. Advanced Information and Knowledge Processing, pp. 157\u2013179. Springer, Heidelberg (2010)"},{"key":"11_CR11","first-page":"169","volume-title":"Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009","author":"C. Gentry","year":"2009","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, pp. 169\u2013178. ACM, New York (2009)"},{"key":"11_CR12","unstructured":"Kalja, A.: System integration process of government information systems. In: Kocaoglu, D., Anderson, T., Piscataway, N. (eds.) Proceedings of PICMET 2003: Portland International Conference on Management of Engineering and Technology (2003)"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Kalja, A., Reitsakas, A., Saard, N.: eGovernment in Estonia: best practices. In: Anderson, T.R., Daim, T.U., Kocaoglu, D.F., Piscataway, N. (eds.) Technology Management: A Unifying Discipline for Melting the Boundaries, pp. 500\u2013506 (2005)","DOI":"10.1109\/PICMET.2005.1509730"},{"key":"11_CR14","first-page":"239","volume":"126","author":"L. Lo Iacono","year":"2007","unstructured":"Lo Iacono, L.: Multi-centric universal pseudonymisation for secondary use of the EHR. Studies in Health Technology and Informatics\u00a0126, 239\u2013247 (2007)","journal-title":"Studies in Health Technology and Informatics"},{"key":"11_CR15","first-page":"287","volume-title":"SSYM 2004: Proceedings of the 13th Conference on USENIX Security Symposium","author":"D. Malkhi","year":"2004","unstructured":"Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay\u2014a secure two-party computation system. In: SSYM 2004: Proceedings of the 13th Conference on USENIX Security Symposium, pp. 287\u2013302. USENIX Association, Berkeley (2004)"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: IEEE Symposium on Security and Privacy, pp. 111\u2013125 (2008)","DOI":"10.1109\/SP.2008.33"},{"key":"11_CR17","unstructured":"Neubauer, T., Heurix, J.: A methodology for the pseudonymization of medical data. International Journal of Medical Informatics, 1\u201315 (November 2010) (in print)"},{"key":"11_CR18","first-page":"7","volume-title":"Fourth International Conference on Systems","author":"T. Neubauer","year":"2009","unstructured":"Neubauer, T., Kolb, M.: Technologies for the Pseudonymization of Medical Data: A Legal Evaluation. In: Fourth International Conference on Systems, pp. 7\u201312. IEEE, Los Alamitos (2009)"},{"key":"11_CR19","first-page":"441","volume":"103","author":"K. Pommerening","year":"2004","unstructured":"Pommerening, K., Reng, M.: Secondary use of the EHR via pseudonymisation. Studies in Health Technology and Informatics\u00a0103, 441\u2013446 (2004)","journal-title":"Studies in Health Technology and Informatics"},{"key":"11_CR20","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/HICSS.2008.366","volume-title":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","author":"B. Riedl","year":"2008","unstructured":"Riedl, B., Grascher, V., Fenz, S., Neubauer, T.: Pseudonymization for improving the Privacy in E-Health Applications. In: Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), pp. 255\u2013264. IEEE, Los Alamitos (January 2008)"},{"issue":"2","key":"11_CR21","doi-asserted-by":"publisher","first-page":"23","DOI":"10.4304\/jsw.3.2.23-32","volume":"3","author":"B. Riedl","year":"2008","unstructured":"Riedl, B., Grascher, V., Neubauer, T.: A Secure e-Health Architecture based on the Appliance of Pseudonymization. Journal of Software\u00a03(2), 23\u201332 (2008)","journal-title":"Journal of Software"},{"key":"11_CR22","unstructured":"Song, J., Poovendran, R., Lee, J., Iwata, T.: The AES-CMAC Algorithm. IETF RFC 4493 (June 2006), http:\/\/www.ietf.org\/rfc\/rfc4493.txt"},{"key":"11_CR23","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1109\/ARES.2008.90","volume-title":"2008 Third International Conference on Availability, Reliability and Security","author":"J. Willemson","year":"2008","unstructured":"Willemson, J., Ansper, A.: A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications. In: 2008 Third International Conference on Availability, Reliability and Security, pp. 572\u2013577. IEEE, Los Alamitos (2008)"}],"container-title":["Lecture Notes in Computer Science","Electronic Government and the Information Systems Perspective"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22961-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T22:58:47Z","timestamp":1741474727000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22961-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642229602","9783642229619"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22961-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}