{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:19:15Z","timestamp":1725455955353},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642328725"},{"type":"electronic","value":"9783642328732"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32873-2_4","type":"book-chapter","created":{"date-parts":[[2012,8,13]],"date-time":"2012-08-13T13:06:24Z","timestamp":1344863184000},"page":"45-57","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Protocol for Linking Distributed Medical Data"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Janusz","sequence":"first","affiliation":[]},{"given":"Martin","family":"Kost","sequence":"additional","affiliation":[]},{"given":"Johann-Christoph","family":"Freytag","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Agfa HealthCare, \n                    \n                      http:\/\/www.agfahealthcare.com"},{"key":"4_CR2","unstructured":"Allman, M., Blanton, E., Paxson, V., Shenker, S.: Fighting coordinated attackers with cross-organizational information sharing. In: Proceedings of 5th Workshop on Hot Topics in Networks, HotNets (2006)"},{"key":"4_CR3","unstructured":"Breebaart, J., Busch, C., Grave, J., Kindt, E.: A Reference Architecture for Biometric Template Protection based on Pseudo Identities. In: BIOSIG (2008)"},{"key":"4_CR4","volume-title":"NDSS 2009","author":"S.S.M. Chow","year":"2009","unstructured":"Chow, S.S.M., Lee, J.-H., Subramanian, L.: Two-party computation model for privacy-preserving queries over distributed databases. In: NDSS 2009. The Internet Society, San Diego (2009)"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y. Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 523\u2013540. Springer, Heidelberg (2004)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Elmagarmid, A., Panagiotis, G., Verykios, S.: Duplicate record detection: A survey. IEEE Transaction on Knowledge and Data Engineering (2007)","DOI":"10.1109\/TKDE.2007.250581"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Emekci, F., Agrawal, D., Abbadi, A.E., Gulbeden, A.: Privacy Preserving Query Processing Using Third Parties. In: ICDE (2006)","DOI":"10.1109\/ICDE.2006.116"},{"key":"4_CR8","unstructured":"European Union. Directive 95\/46\/EC of the European parliament and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1995)"},{"key":"4_CR9","doi-asserted-by":"crossref","first-page":"1183","DOI":"10.1080\/01621459.1969.10501049","volume":"64","author":"I.P. Felligi","year":"1969","unstructured":"Felligi, I.P., Sunter, A.B.: A theory for record linkage. Journal of the American Statistical Society\u00a064, 1183\u20131210 (1969)","journal-title":"Journal of the American Statistical Society"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-24676-3_1","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"M.J. Freedman","year":"2004","unstructured":"Freedman, M.J., Nissim, K., Pinkas, B.: Efficient Private Matching and Set Intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 1\u201319. Springer, Heidelberg (2004)"},{"key":"4_CR11","unstructured":"Goldreich, O.: General Cryptographic Protocols. In: The Foundations of Cryptography, vol.\u00a02. Cambridge University Press (2004)"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Gomatam, S., Carter, R., Ariet, M., Mitchell, G.: An empirical comparison of record linkage procedures. Statistics in Medicine, 1485\u20131496 (2002)","DOI":"10.1002\/sim.1147"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Inan, A., Kantarcioglu, M., Bertino, E., Scannapieco, M.: A hybrid approach to private record linkage. In: ICDE 2008, Cancun, Mexico. IEEE Computer Society (2008)","DOI":"10.1109\/ICDE.2008.4497458"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Karakasidis, A., Verykios, V.S.: Secure blocking + secure matching = secure record linkage. Journal of Computing Science and Engineering, 223\u2013235 (2011)","DOI":"10.5626\/JCSE.2011.5.3.223"},{"key":"4_CR15","unstructured":"P3P Preference Exchange Language v. 1.0 (APPEL1.0). W3C (2002), \n                    \n                      http:\/\/www.w3.org\/TR\/P3P-preferences"},{"key":"4_CR16","unstructured":"NIST. FIPS 180-3: Secure hash standard (SHS). Technical report, National Institute of Standards and Technology, NIST (2008), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips180-3\/fips180-3_final.pdf"},{"key":"4_CR17","unstructured":"Siemens Healthcare, \n                    \n                      http:\/\/www.medical.siemens.com"},{"key":"4_CR18","unstructured":"Sweeney, L.: Simple demographics often identify people uniquely. Carnegie Mellon University, Data Privacy Working Paper 3 (2000)"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 557\u2013570 (2002)","DOI":"10.1142\/S0218488502001648"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Li, Y., Tygar, J., Hellerstein, J.: Private matching. In: Computer Security in the 21st Century, pp. 25\u201350 (2005)","DOI":"10.1007\/0-387-24006-3_3"},{"key":"4_CR21","unstructured":"eXtensible Access Control Markup Language (XACML) v. 2.0. OASIS Standard (February 2005), \n                    \n                      http:\/\/docs.oasis-open.org\/xacml\/2.0\/accesscontrol-xacml-2.0-core-spec-os.pdf"}],"container-title":["Lecture Notes in Computer Science","Secure Data Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32873-2_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:19:00Z","timestamp":1620130740000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32873-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642328725","9783642328732"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32873-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}