{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:33:37Z","timestamp":1774967617520,"version":"3.50.1"},"reference-count":144,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,4,22]],"date-time":"2020-04-22T00:00:00Z","timestamp":1587513600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,22]],"date-time":"2020-04-22T00:00:00Z","timestamp":1587513600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s10586-020-03106-1","type":"journal-article","created":{"date-parts":[[2020,4,22]],"date-time":"2020-04-22T19:02:58Z","timestamp":1587582178000},"page":"293-317","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":48,"title":["Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities"],"prefix":"10.1007","volume":"24","author":[{"given":"Tehsin","family":"Kanwal","sequence":"first","affiliation":[]},{"given":"Adeel","family":"Anjum","sequence":"additional","affiliation":[]},{"given":"Abid","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,22]]},"reference":[{"issue":"3","key":"3106_CR1","doi-asserted-by":"publisher","first-page":"621","DOI":"10.3390\/fi4030621","volume":"4","author":"E AbuKhousa","year":"2012","unstructured":"AbuKhousa, E., Mohamed, N., Al-Jaroodi, J.: e-Health cloud: opportunities and challenges. Future Internet 4(3), 621\u2013645 (2012)","journal-title":"Future Internet"},{"key":"3106_CR2","doi-asserted-by":"crossref","unstructured":"Lynda, K., Saliha, O.-K., Nadjia, B.: Data security and privacy in e-health cloud: comparative study. In: Proceedings of the International Conference on Intelligent Information Processing, Security and Advanced Communication. ACM (2015)","DOI":"10.1145\/2816839.2816930"},{"key":"3106_CR3","doi-asserted-by":"crossref","unstructured":"L\u00f6hr, H., Sadeghi, A.-R., Winandy, M.: Securing the e-health cloud. In: Proceedings of the 1st ACM International Health Informatics Symposium. ACM (2010)","DOI":"10.1145\/1882992.1883024"},{"issue":"5","key":"3106_CR4","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1109\/JBHI.2013.2257818","volume":"17","author":"B Arshdeep","year":"2013","unstructured":"Arshdeep, B., Madisetti, V.K.: A cloud-based approach for interoperable electronic health records (EHRs). IEEE J. Biomed. Health Inform. 17(5), 894\u2013906 (2013)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"3106_CR5","unstructured":"VistA Monograph. www.va.gov\/vistamonograph (2012)"},{"key":"3106_CR6","unstructured":"OpenEHR. http:\/\/www.openehr.org (2012)"},{"key":"3106_CR7","unstructured":"http:\/\/www.athenahealth.com"},{"issue":"6","key":"3106_CR8","first-page":"417","volume":"2","author":"EK Achampong","year":"2013","unstructured":"Achampong, E.K.: Electronic health record (EHR) and cloud security: the current issues. Int. J. Cloud Comput. Serv. Sci. 2(6), 417 (2013)","journal-title":"Int. J. Cloud Comput. Serv. Sci."},{"key":"3106_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2015.05.002","volume":"53","author":"J Heurix","year":"2015","unstructured":"Heurix, J., et al.: A taxonomy for privacy enhancing technologies. Comput. Secur. 53, 1\u201317 (2015)","journal-title":"Comput. Secur."},{"key":"3106_CR10","doi-asserted-by":"crossref","unstructured":"Abbas, A., Khan, S.U.: e-Health cloud: privacy concerns and mitigation strategies. In: Medical Data Privacy Handbook, pp. 389\u2013421. Springer, Berlin (2015)","DOI":"10.1007\/978-3-319-23633-9_15"},{"key":"3106_CR11","unstructured":"EU Commission Website. https:\/\/ec.europa.eu\/commission\/priorities\/justice-and-fundamental-rights\/data-protection\/2018-reform-eu-data-protection-rules_en. Accessed 28 May 2019"},{"issue":"1","key":"3106_CR12","first-page":"31","volume":"74","author":"J Demotes-Mainard","year":"2019","unstructured":"Demotes-Mainard, J., et al.: How the new European data protection regulation affects clinical research and recommendations? Th\u00e9rapie 74(1), 31\u201342 (2019)","journal-title":"Th\u00e9rapie"},{"key":"3106_CR13","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1016\/j.procs.2015.10.073","volume":"70","author":"H Taneja","year":"2015","unstructured":"Taneja, H., Singh, A.K.: Preserving privacy of patients based on re-identification risk. Procedia Comput. Sci. 70, 448\u2013454 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"3106_CR14","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.jbi.2014.06.002","volume":"50","author":"A Gkoulalas-Divanis","year":"2014","unstructured":"Gkoulalas-Divanis, A., Loukides, G., Sun, J.: Publishing data from electronic health records while preserving privacy: a survey of algorithms. J. Biomed. Inform. 50, 4\u201319 (2014)","journal-title":"J. Biomed. Inform."},{"key":"3106_CR15","doi-asserted-by":"crossref","unstructured":"Wang, W., Chen, L., Zhang, Q.: Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation. Comput. Netw. 88, 136\u2013148 (2015). ISSN 1389-1286. http:\/\/dx.doi.org\/10.1016\/j.comnet.2015.06.014","DOI":"10.1016\/j.comnet.2015.06.014"},{"key":"3106_CR16","unstructured":"Omnibus: Hipaa rule in the Federal Register. http:\/\/www.gpo.gov\/fdsys\/pkg\/FR-2013-01-25\/pdf\/2013-01073.pdf (2013)"},{"key":"3106_CR17","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MWC.2015.7224725","volume":"22","author":"W Wang","year":"2015","unstructured":"Wang, W., Zhang, Q.: Towards long-term privacy preservation: a context aware perspective. IEEE Wirel. Commun. 22, 34\u201340 (2015)","journal-title":"IEEE Wirel. Commun."},{"key":"3106_CR18","first-page":"1054","volume":"3","author":"KR Pandilakshmi","year":"2014","unstructured":"Pandilakshmi, K.R., Rashitha Banu, G.: An advanced bottom up generalization approach for big data on cloud. Int. J. Commun. Netw. Syst. 3, 1054\u20131059 (2014)","journal-title":"Int. J. Commun. Netw. Syst."},{"key":"3106_CR19","unstructured":"Sedayao, J.: Enhancing cloud security using data anonymization. White Paper, Intel Coporation (2012)"},{"key":"3106_CR20","doi-asserted-by":"crossref","unstructured":"Sinha, T., et al.: Trends and research directions for privacy preserving approaches on the cloud. In: Proceedings of the 6th ACM India Computing Convention. ACM (2013)","DOI":"10.1145\/2522548.2523138"},{"issue":"8","key":"3106_CR21","doi-asserted-by":"publisher","first-page":"e186","DOI":"10.2196\/jmir.2494","volume":"15","author":"JJPC Rodrigues","year":"2013","unstructured":"Rodrigues, J.J.P.C., et al.: Analysis of the security and privacy requirements of cloud-based electronic health records systems. J. Med. Internet Res. 15(8), e186 (2013)","journal-title":"J. Med. Internet Res."},{"issue":"4","key":"3106_CR22","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.1109\/JBHI.2014.2300846","volume":"18","author":"A Abbas","year":"2014","unstructured":"Abbas, A., Khan, S.U.: A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE J. Biomed. Health Inform. 18(4), 1431\u20131441 (2014)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"3106_CR23","doi-asserted-by":"crossref","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology\u2013EUROCRYPT 2005, pp. 457\u2013473. Springer, Berlin (2005)","DOI":"10.1007\/11426639_27"},{"key":"3106_CR24","doi-asserted-by":"crossref","unstructured":"Goyal, V., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security. ACM (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"3106_CR25","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, 2007. SP\u201907. IEEE (2007)"},{"key":"3106_CR26","doi-asserted-by":"crossref","unstructured":"Chase, M., Chow, S.S.M.: Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM (2009)","DOI":"10.1145\/1653662.1653678"},{"issue":"13","key":"3106_CR27","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/CC.2014.7022535","volume":"11","author":"C Danwei","year":"2014","unstructured":"Danwei, C., et al.: Securing patient-centric personal health records sharing system in cloud computing. China Commun. 11(13), 121\u2013127 (2014)","journal-title":"China Commun."},{"key":"3106_CR28","unstructured":"Song, D.X., Wagner, D, Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, 2000. S&P 2000. Proceedings. IEEE (2000)"},{"key":"3106_CR29","doi-asserted-by":"crossref","unstructured":"Narayan, S., Gagn\u00e9, M., Safavi-Naini, R.: Privacy preserving EHR system using attribute-based infrastructure. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop. ACM (2010)","DOI":"10.1145\/1866835.1866845"},{"key":"3106_CR30","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Advances in Cryptology. Springer, Berlin (1984)"},{"key":"3106_CR31","doi-asserted-by":"crossref","unstructured":"Benaloh, J., et al.: Patient controlled encryption: ensuring privacy of electronic medical records. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security. ACM (2009)","DOI":"10.1145\/1655008.1655024"},{"key":"3106_CR32","doi-asserted-by":"crossref","unstructured":"Gentry, C. Fully homomorphic encryption using ideal lattices.In: STOC. vol. 9 (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"3106_CR33","doi-asserted-by":"crossref","unstructured":"Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM Workshop on Cloud computing Security Workshop. ACM (2011)","DOI":"10.1145\/2046660.2046682"},{"issue":"6","key":"3106_CR34","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1109\/TIFS.2013.2255593","volume":"8","author":"H Lin","year":"2013","unstructured":"Lin, H., et al.: CAM: cloud-assisted privacy preserving mobile health monitoring. IEEE Trans. Inf. Forensics Secur. 8(6), 985\u2013997 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"3106_CR35","doi-asserted-by":"publisher","first-page":"3375","DOI":"10.1007\/s10916-012-9830-6","volume":"36","author":"Yu-Yi Chen","year":"2012","unstructured":"Chen, Yu-Yi, Jun-Chao, Lu, Jan, Jinn-Ke: A secure EHR system based on hybrid clouds. J. Med. Syst. 36(5), 3375\u20133384 (2012)","journal-title":"J. Med. Syst."},{"key":"3106_CR36","doi-asserted-by":"crossref","unstructured":"Li, Z.-R., et al.: A secure electronic medical record sharing mechanism in the cloud computing platform. In: 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE). IEEE (2011)","DOI":"10.1109\/ISCE.2011.5973792"},{"key":"3106_CR37","doi-asserted-by":"crossref","unstructured":"Kumar, N., Mathuria, A., Das, M.L.: Achieving forward secrecy and unlinkability in cloud-based personal health record system. In: 2015 IEEE Trustcom\/BigDataSE\/ISPA, vol. 1. IEEE (2015)","DOI":"10.1109\/Trustcom.2015.513"},{"key":"3106_CR38","doi-asserted-by":"crossref","unstructured":"Zhang, R., Liu, L.: Security models and requirements for healthcare application clouds. In: 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD). IEEE (2010)","DOI":"10.1109\/CLOUD.2010.62"},{"key":"3106_CR39","unstructured":"Alshehri, S., Radziszowski, S., Raj, R.K.: Designing a secure cloud-based ehr system using ciphertext-policy attribute-based encryption. In: Proceedings of the Data Management in the Cloud Workshop, Washington, DC, USA (2012)"},{"issue":"2\u20133","key":"3106_CR40","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1504\/IJSN.2011.043666","volume":"6","author":"M Barua","year":"2011","unstructured":"Barua, M., et al.: ESPAC: enabling security and patient-centric access control for ehealth in cloud computing. Int. J. Secur. Netw. 6(2\u20133), 67\u201376 (2011)","journal-title":"Int. J. Secur. Netw."},{"key":"3106_CR41","doi-asserted-by":"crossref","unstructured":"Takabi, H.: Privacy aware access control for data sharing in cloud computing environments. In: Proceedings of the 2nd International Workshop on Security in Cloud Computing. ACM (2014)","DOI":"10.1145\/2600075.2600076"},{"issue":"6","key":"3106_CR42","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1016\/j.jbi.2008.03.014","volume":"41","author":"M Peleg","year":"2008","unstructured":"Peleg, M., et al.: Situation-based access control: privacy management via modelling of patient data access scenarios. J. Biomed. Inform. 41(6), 1028\u20131040 (2008)","journal-title":"J. Biomed. Inform."},{"key":"3106_CR43","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.future.2014.06.004","volume":"43","author":"J-J Yang","year":"2015","unstructured":"Yang, J.-J., Li, J.-Q., Niu, Y.: A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener. Comput. Syst. 43, 74\u201386 (2015)","journal-title":"Future Gener. Comput. Syst."},{"issue":"4","key":"3106_CR44","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1016\/j.comcom.2010.03.020","volume":"34","author":"X Sun","year":"2011","unstructured":"Sun, X., Sun, L., Wang, H.: Extended k-anonymity models against sensitive attribute disclosure. Comput. Commun. 34(4), 526\u2013535 (2011)","journal-title":"Comput. Commun."},{"key":"3106_CR45","doi-asserted-by":"crossref","unstructured":"Shrivastva, K.M.P.D., Rizvi, M.A., Singh, S.: Big data privacy based on differential privacy a hope for big data. In: 2014 International Conference on Computational Intelligence and Communication Networks (CICN). IEEE (2014)","DOI":"10.1109\/CICN.2014.167"},{"key":"3106_CR46","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-70992-5","volume-title":"A General Survey of Privacy-Preserving Data Mining Models and Algorithms","author":"CC Aggarwal","year":"2008","unstructured":"Aggarwal, C.C., Philip, S.Y.: A General Survey of Privacy-Preserving Data Mining Models and Algorithms. Springer, Berlin (2008)"},{"issue":"18","key":"3106_CR47","first-page":"20","volume":"53","author":"P Kiran","year":"2012","unstructured":"Kiran, P., Kavya, N.P.: A survey on methods, attacks and metric for privacy preserving data publishing. Int. J. Comput. Appl. 53(18), 20\u201328 (2012)","journal-title":"Int. J. Comput. Appl."},{"issue":"3","key":"3106_CR48","first-page":"1103","volume":"8","author":"Y Xu","year":"2014","unstructured":"Xu, Y., et al.: A survey of privacy preserving data publishing using generalization and suppression. Appl. Math. 8(3), 1103\u20131116 (2014)","journal-title":"Appl. Math."},{"issue":"4","key":"3106_CR49","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/1749603.1749605","volume":"42","author":"B Fung","year":"2010","unstructured":"Fung, B., et al.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. (CSUR) 42(4), 14 (2010)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"6","key":"3106_CR50","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1016\/j.ijinfomgt.2016.07.006","volume":"36","author":"HSG Pussewalage","year":"2016","unstructured":"Pussewalage, H.S.G., Oleshchuk, V.A.: Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions. Int. J. Inf. Manag. 36(6), 1161\u20131173 (2016)","journal-title":"Int. J. Inf. Manag."},{"key":"3106_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.future.2016.08.011","volume":"68","author":"B Y\u00fcksel","year":"2017","unstructured":"Y\u00fcksel, B., K\u00fcp\u00e7\u00fc, A., \u00d6zkasap, O.: Research issues for privacy and security of electronic health services. Future Gener. Comput. Syst. 68, 1\u201313 (2017)","journal-title":"Future Gener. Comput. Syst."},{"issue":"3","key":"3106_CR52","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1016\/j.jbi.2012.12.003","volume":"46","author":"JL Fern\u00e1ndez-Alem\u00e1n","year":"2013","unstructured":"Fern\u00e1ndez-Alem\u00e1n, J.L., et al.: Security and privacy in electronic health records: a systematic literature review. J. Biomed. Informat. 46(3), 541\u2013562 (2013)","journal-title":"J. Biomed. Informat."},{"issue":"6","key":"3106_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-016-0509-2","volume":"40","author":"A Sajid","year":"2016","unstructured":"Sajid, A., Abbas, H.: Data privacy in cloud-assisted healthcare systems: state of the art and future challenges. J. Med. Syst. 40(6), 1\u201316 (2016)","journal-title":"J. Med. Syst."},{"key":"3106_CR54","doi-asserted-by":"crossref","unstructured":"Ruj, S., Stojmenovic, M., Nayak, A.: Privacy preserving access control with authentication for securing data in clouds. In: 2012 12th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid). IEEE (2012)","DOI":"10.1109\/CCGrid.2012.92"},{"issue":"6","key":"3106_CR55","doi-asserted-by":"publisher","first-page":"994","DOI":"10.1002\/sec.817","volume":"7","author":"R Zhang","year":"2014","unstructured":"Zhang, R., Liu, L., Xue, R.: Role-based and time-bound access and management of EHR data. Secur. Commun. Netw. 7(6), 994\u20131015 (2014)","journal-title":"Secur. Commun. Netw."},{"issue":"2","key":"3106_CR56","doi-asserted-by":"publisher","first-page":"e26","DOI":"10.1016\/j.ijmedinf.2010.10.001","volume":"80","author":"S Haas","year":"2011","unstructured":"Haas, S., et al.: Aspects of privacy for electronic health records. Int. J. Med. Inform. 80(2), e26\u2013e31 (2011)","journal-title":"Int. J. Med. Inform."},{"key":"3106_CR57","unstructured":"Xu, L., Cremers, A.B., Wilken, T.: Pseudonymization for secondary use of cloud based electronic health records (2015)"},{"key":"3106_CR58","doi-asserted-by":"crossref","unstructured":"Pecarina, J., Pu, S., Liu, J.-C.: SAPPHIRE: anonymity for enhanced control and private collaboration in healthcare clouds. In: 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom). IEEE (2012)","DOI":"10.1109\/CloudCom.2012.6427488"},{"issue":"2","key":"3106_CR59","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1109\/JBHI.2013.2294932","volume":"18","author":"Y Tong","year":"2014","unstructured":"Tong, Y., et al.: Cloud-assisted mobile-access of health data with privacy and auditability. IEEE J. Biomed. Health Inform. 18(2), 419\u2013429 (2014)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"3106_CR60","doi-asserted-by":"crossref","unstructured":"Riedl, B., Grascher, V., Fenz, S., Neubauer, T.: Pseudonymization for improving the privacy in e-health applications. In: Proceedings of the Annual Hawaii International Conference System Sciences, pp. 1\u20139 (2008)","DOI":"10.1109\/HICSS.2008.366"},{"issue":"9","key":"3106_CR61","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1016\/j.compbiomed.2009.06.004","volume":"39","author":"LC Huang","year":"2009","unstructured":"Huang, L.C., Chu, H.C., Lien, C.Y., Hsiao, C.H., Kao, T.: Privacy preservation and information security protection for patients\u2019 portable electronic health records. Comput. Biol. Med. 39(9), 743\u2013750 (2009)","journal-title":"Comput. Biol. Med."},{"key":"3106_CR62","doi-asserted-by":"crossref","unstructured":"Alhaqbani, B., Fidge, C.: Privacy-preserving electronic health record linkage using pseudonym identifiers. In: Proceedings of the International Conference E-Health Networking, Applications and Services Healthcom, pp. 108\u2013117 (2008)","DOI":"10.1109\/HEALTH.2008.4600120"},{"key":"3106_CR63","doi-asserted-by":"crossref","unstructured":"Zhang, K., et al.: Sedic: privacy-aware data intensive computing on hybrid clouds. In: Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM (2011)","DOI":"10.1145\/2046707.2046767"},{"key":"3106_CR64","unstructured":"Zhou, Z., et al.: Prometheus: privacy-aware data retrieval on hybrid cloud. In: INFOCOM, 2013 Proceedings IEEE. IEEE (2013)"},{"issue":"05","key":"3106_CR65","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"issue":"5","key":"3106_CR66","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1197\/jamia.M2716","volume":"15","author":"K El Emam","year":"2008","unstructured":"El Emam, K., Dankar, F.K.: Protecting privacy using k-anonymity. J. Am. Med. Inform. Assoc. 15(5), 627\u2013637 (2008)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"3106_CR67","doi-asserted-by":"crossref","unstructured":"Gionis, A., Mazza, A., Tassa, T.: k-Anonymization revisited. In: 2008 IEEE 24th International Conference on Data Engineering. IEEE (2008)","DOI":"10.1109\/ICDE.2008.4497483"},{"key":"3106_CR68","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data. ACM (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"3106_CR69","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: 22nd International Conference on Data Engineering (ICDE\u201906). IEEE (2006)","DOI":"10.1109\/ICDE.2006.101"},{"key":"3106_CR70","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Workload-aware a Jian, et al. \u201cUtility-based anonymization using local recoding.\u201d In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM (2006)"},{"key":"3106_CR71","doi-asserted-by":"crossref","unstructured":"Xu, J., et al.: Utility-based anonymization using local recoding. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM (2006)","DOI":"10.1145\/1150402.1150504"},{"key":"3106_CR72","unstructured":"Fung, B.C.M., Wang, K., Yu, P.S.: Top-down specialization for information and privacy preservation. In: 21st International Conference on Data Engineering (ICDE\u201905). IEEE (2005)"},{"key":"3106_CR73","doi-asserted-by":"crossref","unstructured":"Li, J., et al.: Achieving k-anonymity by clustering in attribute hierarchical structures. In: International Conference on Data Warehousing and Knowledge Discovery. Springer, Berlin (2006)","DOI":"10.1007\/11823728_39"},{"issue":"1","key":"3106_CR74","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., et al.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 3 (2007)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"3106_CR75","doi-asserted-by":"crossref","unstructured":"Wong, R.C.-W., et al.: (\u03b1, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM (2006)","DOI":"10.1145\/1150402.1150499"},{"key":"3106_CR76","doi-asserted-by":"crossref","unstructured":"Truta, T.M., Vinay, B.: Privacy protection: p-sensitive k-anonymity property. In: ICDE Workshops (2006)","DOI":"10.1109\/ICDEW.2006.116"},{"key":"3106_CR77","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: privacy beyond k-anonymity and l-diversity. IEEE 23rd International Conference on Data Engineering, 2007. ICDE 2007. IEEE (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"7","key":"3106_CR78","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1109\/TKDE.2009.139","volume":"22","author":"N Li","year":"2010","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: Closeness: a new privacy measure for data publishing. IEEE Trans. Knowl. Data Eng. 22(7), 943\u2013956 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"3106_CR79","unstructured":"Xiao, X., Tao, Y.: Anatomy: simple and effective privacy preservation. In: Proceedings of the 32nd International Conference on Very Large Data Bases. VLDB Endowment (2006)"},{"key":"3106_CR80","doi-asserted-by":"crossref","unstructured":"Nergiz, M.E., Atzori, M., Clifton, C.: Hiding the presence of individuals from shared databases. In: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data. ACM (2007)","DOI":"10.1145\/1247480.1247554"},{"issue":"6","key":"3106_CR81","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TKDE.2009.125","volume":"22","author":"ME Nergiz","year":"2010","unstructured":"Nergiz, M.E., Clifton, C.: \u03b4-presence without complete world knowledge. IEEE Trans. Knowl. Data Eng. 22(6), 868\u2013883 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"3106_CR82","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.ins.2015.01.025","volume":"305","author":"M Ali","year":"2015","unstructured":"Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357\u2013383 (2015)","journal-title":"Inf. Sci."},{"key":"3106_CR83","doi-asserted-by":"crossref","unstructured":"Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Proceeding of the IEEE INFOCOM (2011)","DOI":"10.1109\/INFCOM.2011.5935306"},{"key":"3106_CR84","doi-asserted-by":"crossref","unstructured":"Yuan, J., Yu, S.: Efficient privacy-preserving biometric identification in cloud computing. In: Proceedings of the IEEE INFOCOM (2013)","DOI":"10.1109\/INFCOM.2013.6567073"},{"issue":"6","key":"3106_CR85","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"3106_CR86","doi-asserted-by":"crossref","unstructured":"Pino, C., Di Salvo, R.: A survey of cloud computing architecture and applications in health. In: International Conference on Computer Science and Electronics Engineering (2013)","DOI":"10.2991\/iccsee.2013.413"},{"issue":"2","key":"3106_CR87","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s12553-015-0106-2","volume":"5","author":"S Chandrasekaran","year":"2015","unstructured":"Chandrasekaran, S., Mohan, S., Natarajan, R.: Survey on HealthCloud characteristics. Health Technol. 5(2), 135\u2013146 (2015)","journal-title":"Health Technol."},{"key":"3106_CR88","unstructured":"Burke, M.J.: Enabling anonymous crime reporting on mobile phones in the developing world (2013)"},{"key":"3106_CR89","unstructured":"Panackal, J.J., Pillai, A.S.: Privacy preserving data mining: an extensive survey. In: ACEEE. International Conference on Multimedia Processing, Communication and Information Technology (2013)"},{"issue":"3","key":"3106_CR90","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TKDE.2010.236","volume":"24","author":"T Li","year":"2012","unstructured":"Li, T., et al.: Slicing: a new approach for privacy preserving data publishing. IEEE Trans. Knowl. Data Eng. 24(3), 561\u2013574 (2012)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"3106_CR91","doi-asserted-by":"crossref","unstructured":"Zhang, Q., et al.: Aggregate query answering on anonymized tables. In: 2007 IEEE 23rd International Conference on Data Engineering. IEEE (2007)","DOI":"10.1109\/ICDE.2007.367857"},{"key":"3106_CR92","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Tao, Y., Kalnis, P.: On the anonymization of sparse high-dimensional data. In: 2008 IEEE 24th International Conference on Data Engineering. IEEE (2008)","DOI":"10.1109\/ICDE.2008.4497480"},{"key":"3106_CR93","doi-asserted-by":"crossref","unstructured":"Zheleva, E., Getoor, L.: Preserving the privacy of sensitive relationships in graph data. In: Privacy, Security, and Trust in KDD, 153\u2013171. Springer, Berlin (2008)","DOI":"10.1007\/978-3-540-78478-4_9"},{"key":"3106_CR94","doi-asserted-by":"crossref","unstructured":"Fung, B.C.M.: Privacy-preserving data publishing. Diss. Simon Fraser University (2007)","DOI":"10.4018\/978-1-59140-989-2.ch139"},{"key":"3106_CR95","unstructured":"Sehatkar, M.: Towards a Privacy Preserving Framework for Publishing Longitudinal Data. Diss. University of Ottawa (2014)"},{"key":"3106_CR96","unstructured":"Gkountouna, O. A Survey on Privacy Preservation Methods. NTUA, Technical Report (2011)"},{"key":"3106_CR97","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C., Philip, S.Y.: A condensation approach to privacy preserving data mining. In: Advances in Database Technology-EDBT 2004, pp. 183\u2013199. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-24741-8_12"},{"issue":"4","key":"3106_CR98","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s10115-004-0173-6","volume":"7","author":"H Kargupta","year":"2005","unstructured":"Kargupta, H., et al.: Random-data perturbation techniques and privacy-preserving data mining. Knowl. Inf. Syst. 7(4), 387\u2013414 (2005)","journal-title":"Knowl. Inf. Syst."},{"key":"3106_CR99","doi-asserted-by":"crossref","unstructured":"Saygin, Y., Hakkani-Tur, D., Tur, G.: Sanitization and anonymization of document repositories. In: Web and Information Security, p. 133 (2006)","DOI":"10.4018\/978-1-59140-588-7.ch007"},{"key":"3106_CR100","unstructured":"Guo, L.: Randomization Based Privacy Preserving Categorical Data Analysis. Diss. The University of North Carolina at Charlotte (2010)"},{"key":"3106_CR101","doi-asserted-by":"crossref","unstructured":"Li, C., Aggarwal, C.C., Wang, J.: On Anonymization of Multi-graphs. SDM (2011)","DOI":"10.1137\/1.9781611972818.61"},{"issue":"05","key":"3106_CR102","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(05), 571\u2013588 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"3106_CR103","doi-asserted-by":"crossref","unstructured":"Liu, J., Wang, K.: Anonymizing transaction data by integrating suppression and generalization. In: Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-13657-3_20"},{"key":"3106_CR104","doi-asserted-by":"crossref","unstructured":"Xu, Y., et al.: Anonymizing transaction databases for publication. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM (2008)","DOI":"10.1145\/1401890.1401982"},{"key":"3106_CR105","doi-asserted-by":"crossref","unstructured":"Chakaravarthy, V.T., et al.: Efficient techniques for document sanitization. In: Proceedings of the 17th ACM Conference on Information and Knowledge Management. ACM (2008)","DOI":"10.1145\/1458082.1458194"},{"key":"3106_CR106","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.ins.2011.07.035","volume":"231","author":"R Chen","year":"2013","unstructured":"Chen, R., et al.: Privacy-preserving trajectory data publishing by local suppression. Inf. Sci. 231, 83\u201397 (2013)","journal-title":"Inf. Sci."},{"key":"3106_CR107","doi-asserted-by":"crossref","unstructured":"Zigomitros, A., Solanas, A., Patsakis, C.: The role of inference in the anonymization of medical records. In: 2014 IEEE 27th International Symposium on Computer-Based Medical Systems (CBMS). IEEE (2014)","DOI":"10.1109\/CBMS.2014.88"},{"key":"3106_CR108","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/s10844-015-0373-4","volume":"47","author":"D Li","year":"2015","unstructured":"Li, D., et al.: Permutation anonymization. J. Intell. Inf. Syst. 47, 427\u2013445 (2015)","journal-title":"J. Intell. Inf. Syst."},{"issue":"7","key":"3106_CR109","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1109\/TKDE.2009.65","volume":"21","author":"Y Tao","year":"2009","unstructured":"Tao, Y., et al.: Angel: enhancing the utility of generalization for privacy preserving publication. IEEE Trans. Knowl. Data Eng. 21(7), 1073\u20131087 (2009)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"3106_CR110","unstructured":"Brickell, J.L.: Privacy-preserving computatiaon for data mining (2009)"},{"key":"3106_CR111","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Theory and Applications of Models of Computation, pp. 1\u201319. Springer, Berlin (2008)","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"3106_CR112","unstructured":"Ganz, N.: Data Anonymization and its Effect on Personal Privacy. Diss. State University Of New York (2015)"},{"key":"3106_CR113","doi-asserted-by":"crossref","unstructured":"Li, N., Qardaji, W., Su, D.: On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. ACM (2012)","DOI":"10.1145\/2414456.2414474"},{"issue":"11","key":"3106_CR114","doi-asserted-by":"publisher","first-page":"1087","DOI":"10.14778\/3402707.3402744","volume":"4","author":"JR Chen","year":"2011","unstructured":"Chen, J.R., et al.: Publishing set-valued data via differential privacy. Proc. VLDB Endow. 4(11), 1087\u20131098 (2011)","journal-title":"Proc. VLDB Endow."},{"key":"3106_CR115","doi-asserted-by":"crossref","unstructured":"Andr\u00e9s, M.E., et al. Geo-indistinguishability: differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM (2013)","DOI":"10.1145\/2508859.2516735"},{"key":"3106_CR116","doi-asserted-by":"crossref","unstructured":"Gupta, A., Roth, A., Ullman, J.: Iterative constructions and private data release. Theory of Cryptography Conference. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-28914-9_19"},{"key":"3106_CR117","doi-asserted-by":"crossref","unstructured":"Sala, A., et al.: Sharing graphs using differentially private graph models. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference. ACM (2011)","DOI":"10.1145\/2068816.2068825"},{"key":"3106_CR118","doi-asserted-by":"crossref","unstructured":"Hay, M., et al.: Accurate estimation of the degree distribution of private networks. In: 2009 Ninth IEEE International Conference on Data Mining. IEEE (2009)","DOI":"10.1109\/ICDM.2009.11"},{"issue":"11","key":"3106_CR119","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.14778\/3402707.3402749","volume":"4","author":"V Karwa","year":"2011","unstructured":"Karwa, V., et al.: Private analysis of graph structure. Proc. VLDB Endow. 4(11), 1146\u20131157 (2011)","journal-title":"Proc. VLDB Endow."},{"key":"3106_CR120","doi-asserted-by":"crossref","unstructured":"Proserpio, D., Goldberg, S., McSherry, F.: A workflow for differentially-private graph synthesis. In: Proceedings of the 2012 ACM Workshop on Workshop on Online Social Networks. ACM (2012)","DOI":"10.1145\/2342549.2342553"},{"key":"3106_CR121","doi-asserted-by":"crossref","unstructured":"De Mauro, A., Greco, M., Grimaldi, M.: What is big data? A consensual definition and a review of key research topics. In: AIP Conference Proceedings, vol. 1644(1) (2015)","DOI":"10.1063\/1.4907823"},{"key":"3106_CR122","doi-asserted-by":"crossref","unstructured":"Sagiroglu, S., Sinanc, D.: Big data: a review. In: 2013 International Conference on Collaboration Technologies and Systems (CTS). IEEE (2013)","DOI":"10.1109\/CTS.2013.6567202"},{"key":"3106_CR123","doi-asserted-by":"crossref","unstructured":"Gharehchopogh, F.S., Khalifelu, Z.A.: Analysis and evaluation of unstructured data: text mining versus natural language processing. In: 2011 5th International Conference on Application of Information and Communication Technologies (AICT). IEEE (2011)","DOI":"10.1109\/ICAICT.2011.6111017"},{"key":"3106_CR124","doi-asserted-by":"crossref","unstructured":"Poulis, G., et al.: Anonymizing data with relational and transaction attributes. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-40994-3_23"},{"issue":"1","key":"3106_CR125","doi-asserted-by":"publisher","first-page":"115","DOI":"10.14778\/1453856.1453874","volume":"1","author":"M Terrovitis","year":"2008","unstructured":"Terrovitis, M., Mamoulis, N., Kalnis, P.: Privacy-preserving anonymization of set-valued data. Proc. VLDB Endow. 1(1), 115\u2013125 (2008)","journal-title":"Proc. VLDB Endow."},{"issue":"2","key":"3106_CR126","first-page":"238","volume":"20","author":"J Liu","year":"2011","unstructured":"Liu, J.: Optimal anonymization for transaction publishing. Chin. J. Electron. 20(2), 238\u2013242 (2011)","journal-title":"Chin. J. Electron."},{"key":"3106_CR127","unstructured":"Jiang, W., et al.: t-Plausibility: semantic preserving text sanitization. In: International Conference on Computational Science and Engineering, 2009. CSE\u201909. Vol. 3. IEEE (2009)"},{"key":"3106_CR128","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Personalized privacy preservation. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data. ACM (2006)","DOI":"10.1145\/1142473.1142500"},{"issue":"14","key":"3106_CR129","first-page":"19","volume":"108","author":"LR Nair","year":"2014","unstructured":"Nair, L.R., Shetty, S.D.: Research in big data and analytics: an overview. Int. J. Comput. Appl 108(14), 19\u201323 (2014)","journal-title":"Int. J. Comput. Appl"},{"issue":"4","key":"3106_CR130","doi-asserted-by":"publisher","first-page":"1193","DOI":"10.1109\/JBHI.2015.2450362","volume":"19","author":"J Andreu-Perez","year":"2015","unstructured":"Andreu-Perez, J., et al.: Big data for health. IEEE J. Biomed. Health Inform. 19(4), 1193\u20131208 (2015)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"3106_CR131","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1109\/ACCESS.2014.2332453","volume":"2","author":"H Hu","year":"2014","unstructured":"Hu, H., et al.: Toward scalable systems for big data analytics: a technology tutorial. IEEE Access 2, 652\u2013687 (2014)","journal-title":"IEEE Access"},{"issue":"5","key":"3106_CR132","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1016\/j.jcss.2014.02.007","volume":"80","author":"X Zhang","year":"2014","unstructured":"Zhang, X., et al.: A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud. J. Comput. Syst. Sci. 80(5), 1008\u20131020 (2014)","journal-title":"J. Comput. Syst. Sci."},{"issue":"3","key":"3106_CR133","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/3168389","volume":"51","author":"I Wagner","year":"2018","unstructured":"Wagner, I., Eckhoff, D.: Technical privacy metrics: a systematic survey. ACM Comput. Surv. (CSUR) 51(3), 57 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"3106_CR134","unstructured":"Zhang, Q., et al.: Aggregate query answering on anonymized tables. In: IEEE 23rd International Conference on Data Engineering, 2007. ICDE 2007. IEEE (2007)"},{"key":"3106_CR135","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: m-Invariance: towards privacy preserving re-publication of dynamic datasets. In: SIGMOD (2007)","DOI":"10.1145\/1247480.1247556"},{"issue":"12","key":"3106_CR136","first-page":"42","volume":"7","author":"M Rahimi","year":"2015","unstructured":"Rahimi, M.: Extended K-anonymity model for privacy preserving on micro data. Int. J. Comput. Netw. Inf. Secur. 7(12), 42\u201351 (2015)","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"key":"3106_CR137","doi-asserted-by":"crossref","unstructured":"Li, X., Jiexing, Tao, Yufei, Xiao: Preservation of proximity privacy in publishing numerical sensitive data. In: Proceedings of the 2008 ACM SIGMOD International Conference Management data (2008)","DOI":"10.1145\/1376616.1376666"},{"issue":"10","key":"3106_CR138","doi-asserted-by":"publisher","first-page":"944","DOI":"10.14778\/2336664.2336668","volume":"5","author":"M Terrovitis","year":"2012","unstructured":"Terrovitis, M., et al.: Privacy preservation by disassociation. Proc. VLDB Endow. 5(10), 944\u2013955 (2012)","journal-title":"Proc. VLDB Endow."},{"issue":"5","key":"3106_CR139","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1007\/s00778-014-0351-4","volume":"23","author":"J Soria-Comas","year":"2014","unstructured":"Soria-Comas, J., et al.: Enhancing data utility in differential privacy via micro aggregation-based k-anonymity. VLDB J. 23(5), 771\u2013794 (2014)","journal-title":"VLDB J."},{"key":"3106_CR140","doi-asserted-by":"crossref","unstructured":"Anjum, A., Raschia, G.: Anonymizing sequential releases under arbitrary updates. In: Proceedings of the Joint EDBT\/ICDT 2013 Workshops, EDBT\u201913, pp. 145\u2013154 (2013)","DOI":"10.1145\/2457317.2457342"},{"key":"3106_CR141","doi-asserted-by":"publisher","first-page":"9114","DOI":"10.1109\/ACCESS.2018.2800288","volume":"6","author":"K Seol","year":"2018","unstructured":"Seol, K., et al.: Privacy-preserving attribute-based access control model for XML-based electronic health record system. IEEE Access 6, 9114\u20139128 (2018)","journal-title":"IEEE Access"},{"key":"3106_CR142","doi-asserted-by":"crossref","unstructured":"Gruschka, N., et al.: Privacy issues and data protection in big data: a case study analysis under GDPR. In: 2018 IEEE International Conference on Big Data (Big Data). IEEE (2018)","DOI":"10.1109\/BigData.2018.8622621"},{"key":"3106_CR143","unstructured":"Aurucci, P., et al.: \u201cGDPR\u201d impact on health data exchange in European digital environment. In: E-health 2018 ICT, Society and Human Beings, vol 45 (2018)"},{"key":"3106_CR144","first-page":"484","volume":"136","author":"T Van Deursen","year":"2008","unstructured":"Van Deursen, T., Koster, P., Petkovic, M.: Reliable personal health records. Stud. Health Technol. Inform. 136, 484 (2008)","journal-title":"Stud. Health Technol. Inform."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-020-03106-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-020-03106-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-020-03106-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,30]],"date-time":"2023-09-30T06:58:14Z","timestamp":1696057094000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-020-03106-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,22]]},"references-count":144,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["3106"],"URL":"https:\/\/doi.org\/10.1007\/s10586-020-03106-1","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,22]]},"assertion":[{"value":"18 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 October 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 April 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}