{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:33:49Z","timestamp":1761060829150},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2019,7,5]],"date-time":"2019-07-05T00:00:00Z","timestamp":1562284800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,7,5]],"date-time":"2019-07-05T00:00:00Z","timestamp":1562284800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11623-019-1153-z","type":"journal-article","created":{"date-parts":[[2019,7,5]],"date-time":"2019-07-05T14:02:48Z","timestamp":1562335368000},"page":"507-512","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Sichere und datenschutzgerechte Umsetzung medizinischer Register"],"prefix":"10.1007","volume":"43","author":[{"given":"Tom","family":"Petersen","sequence":"first","affiliation":[]},{"given":"Maximilian","family":"Blochberger","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Mueller","sequence":"additional","affiliation":[]},{"given":"Hannes","family":"Federrath","sequence":"additional","affiliation":[]},{"given":"Christian-Alexander","family":"Behrendt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,5]]},"reference":[{"issue":"6","key":"1153_CR1","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1197\/jamia.M1087","volume":"9","author":"DG Arts","year":"2002","unstructured":"D. G. Arts, N.\u202fF. De Keizer und G. J. Scheffer. Defining and improving data quality in medical registries: a\u00a0literature review, case study, and generic framework. In: Journal of the American Medical Informatics Association 9.6 (2002), S. 600-611.","journal-title":"Journal of the American Medical Informatics Association"},{"key":"1153_CR2","volume-title":"Taschenbuch der Informatik","author":"H Federrath","year":"2012","unstructured":"H. Federrath und A. Pfitzmann. Datenschutz und Datensicherheit. In: Taschenbuch der Informatik, 7.\u00a0Auflage, Hrsg. Uwe Schneider. Carl Hanser Verlag, M\u00fcnchen 2012.","edition":"7"},{"key":"1153_CR3","unstructured":"G. Danezis, J. Domingo-Ferrer, M. Hansen, J.-H. Hoepman, D. Le M\u00e9tayer, R. Tirtea und S. Schiffner. Privacy and Data Protection by Design \u2013 from policy to engineering. In: arXiv e-prints arXiv:1501.03726 (2015)."},{"key":"1153_CR4","doi-asserted-by":"crossref","unstructured":"M. Lablans, A. Borg und F. \u00dcckert. A RESTful interface to pseudonymization services in modern web applications. In: BMC Medical Informatics and Decision Making 15.1 (2015).","DOI":"10.1186\/s12911-014-0123-5"},{"issue":"5","key":"1153_CR5","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"L. Sweeney. k-Anonymity: A Model for Protecting Privacy. In: International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10.5 (2002), S. 557-570.","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"1153_CR6","doi-asserted-by":"crossref","unstructured":"C. Dwork. Differential Privacy. In: International Colloquium on Automata, Languages, and Programming, Venedig, Italien, 2006.","DOI":"10.1007\/11787006_1"},{"issue":"3","key":"1153_CR7","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"C. Dwork und A. Roth. The Algorithmic Foundations of Differential Privacy. In: Foundations and Trends in Theoretical Computer Science 9.3 (2014), S. 211-407.","journal-title":"Foundations and Trends in Theoretical Computer Science"},{"key":"1153_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-70992-5","volume-title":"Privacy-Preserving Data Mining","author":"CC Aggarwal","year":"2008","unstructured":"C. C. Aggarwal und P. S. Yu. A General Survey of Privacy-Preserving Data Mining Models and Algorithms. In: Privacy-Preserving Data Mining, Hrsg. C. C. Aggarwal und P. S. Yu. Springer, Boston, MA 2008."},{"key":"1153_CR9","volume-title":"Sichere Mandantentrennung bei Webanwendungen und Web-Services (M 4.457)","author":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik","year":"2014","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik. Sichere Mandantentrennung bei Webanwendungen und Web-Services (M 4.457). 2014. URL: \n                    https:\/\/www.bsi.bund.de\/DE\/Themen\/ITGrundschutz\/ITGrundschutzKataloge\/Inhalt\/_content\/m\/m04\/m04457.html\n                    \n                   (Zugriff am 20.04.2019)."},{"key":"1153_CR10","unstructured":"E.-J. Goh. Secure Indexes. In: IACR Cryptology ePrint Archive 2003\/216 (2003)."},{"key":"1153_CR11","volume-title":"Kryptographische Verfahren: Empfehlungen und Schl\u00fcssell\u00e4ngen: Teil 2 \u2013 Verwendung von Transport Layer Security (TLS)","author":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik","year":"2019","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik. Kryptographische Verfahren: Empfehlungen und Schl\u00fcssell\u00e4ngen: Teil 2 \u2013 Verwendung von Transport Layer Security (TLS). 2019. URL: \n                    https:\/\/www.bsi.bund.de\/DE\/Publikationen\/TechnischeRichtlinien\/tr02102\/index_htm.html\n                    \n                   (Zugriff am 20.04.2019)."},{"key":"1153_CR12","unstructured":"D. L. Wheeler. zxcvbn: Low-Budget Password Strength Estimation In: 25th USENIX Security Symposium, Austin, TX, USA, 2016."},{"key":"1153_CR13","volume-title":"Sichere Passw\u00f6rter: Viele der herk\u00f6mmlichen Sicherheitsregeln bringen nichts","author":"FA Scherschel","year":"2017","unstructured":"F. A. Scherschel. Sichere Passw\u00f6rter: Viele der herk\u00f6mmlichen Sicherheitsregeln bringen nichts. 2017. URL: \n                    https:\/\/heise.de\/-3797935\n                    \n                   (Zugriff am 20.04.2019)."},{"key":"1153_CR14","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s11623-009-0109-0","volume":"7","author":"D Fox","year":"2009","unstructured":"Dirk Fox, Frank Schaefer. Passw\u00f6rter \u2013 f\u00fcnf Mythen und f\u00fcnf Vers\u00e4umnisse. DuD 7\/2009, S. 425-429.","journal-title":"DuD"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-019-1153-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-019-1153-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-019-1153-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,3]],"date-time":"2020-07-03T23:39:23Z","timestamp":1593819563000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-019-1153-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,5]]},"references-count":14,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["1153"],"URL":"https:\/\/doi.org\/10.1007\/s11623-019-1153-z","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,5]]},"assertion":[{"value":"5 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}