{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T17:10:05Z","timestamp":1773681005483,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T00:00:00Z","timestamp":1769472000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T00:00:00Z","timestamp":1773619200000},"content-version":"vor","delay-in-days":48,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172082"],"award-info":[{"award-number":["62172082"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010086","name":"Foundation of Liaoning Province Education Administration","doi-asserted-by":"publisher","award":["LJKQZ20222440"],"award-info":[{"award-number":["LJKQZ20222440"]}],"id":[{"id":"10.13039\/501100010086","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s44443-026-00482-3","type":"journal-article","created":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T14:38:22Z","timestamp":1769524702000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An integrated AHP-CRITIC framework for scenario-driven comprehensive evaluation of PPRL technology"],"prefix":"10.1007","volume":"38","author":[{"given":"Shumin","family":"Han","sequence":"first","affiliation":[]},{"given":"Yue","family":"Li","sequence":"additional","affiliation":[]},{"given":"Derong","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Chuang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,27]]},"reference":[{"issue":"1","key":"482_CR1","first-page":"10","volume":"80","author":"AM Alsaqr","year":"2021","unstructured":"Alsaqr AM (2021) Remarks on the use of pearson\u2019s and spearman\u2019s correlation coefficients in assessing relationships in ophthalmic data. AOSIS 80(1):10","journal-title":"AOSIS"},{"key":"482_CR2","doi-asserted-by":"publisher","first-page":"2956","DOI":"10.1109\/TKDE.2013.91","volume":"26","author":"DE Ashley","year":"2014","unstructured":"Ashley DE, Murat K, Yuan X, Csaba T, Mehmet K, Bradley M (2014) Composite bloom filters for secure record linkage. IEEE Trans Knowl Data Eng 26:2956\u20132968","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"482_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31164-2","author":"P Christen","year":"2012","unstructured":"Christen P (2012) Data Matching: Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection. Springer Berlin Heidelberg Data-Centric Systems and Applications. https:\/\/doi.org\/10.1007\/978-3-642-31164-2","journal-title":"Springer Berlin Heidelberg Data-Centric Systems and Applications"},{"key":"482_CR4","doi-asserted-by":"crossref","unstructured":"Dimitrios K, Aris GD, S VV (2018) Federal: A framework for distance-aware privacy-preserving record linkage. IEEE Trans Knowl Data Eng 30:292\u2013304","DOI":"10.1109\/TKDE.2017.2761759"},{"key":"482_CR5","first-page":"394","volume":"13","author":"D Dong","year":"2019","unstructured":"Dong D, Shen D, Han S, Nie T, Kou Y, Yu G (2019) Multi-party strong-privacy-preserving record linkage method. Journal of Frontiers of Computer Science and Technology 13:394\u2013407","journal-title":"Journal of Frontiers of Computer Science and Technology"},{"issue":"4","key":"482_CR6","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.inffus.2011.04.004","volume":"13","author":"E Durham","year":"2012","unstructured":"Durham E, Xue Y, Kantarcioglu M, Malin B (2012) Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage. Inf Fusion 13(4):245\u2013259","journal-title":"Inf Fusion"},{"key":"482_CR7","unstructured":"Franke M, Sehili Z, Rohde F, Rahm E (2021) Evaluation of hardening techniques for privacy-preserving record linkage"},{"key":"482_CR8","doi-asserted-by":"crossref","unstructured":"Gentry, Craig (2009) Fully homomorphic encryption using ideal lattices. Stoc, 169\u2013178","DOI":"10.1145\/1536414.1536440"},{"key":"482_CR9","doi-asserted-by":"crossref","unstructured":"Gilliam D, Horne C, Kean J, Mucaj V (2022) Abstract 6346a: Privacy preserving record linkage of mortality data for oncology survival analyses. Cancer Research 82(12-Sup):2","DOI":"10.1158\/1538-7445.AM2022-6346A"},{"key":"482_CR10","unstructured":"Han S (2020) Research on privacy-preserving record linkage techniques. PhD thesis, Northeastern University"},{"issue":"22","key":"482_CR11","doi-asserted-by":"publisher","first-page":"3476","DOI":"10.3390\/math12223476","volume":"12","author":"S Han","year":"2024","unstructured":"Han S, Li Y, Shen D, Wang C (2024) Comprehensive evaluation method of privacy-preserving record linkage technology based on the modified criteria importance through intercriteria correlation method. Mathematics 12(22):3476. https:\/\/doi.org\/10.3390\/math12223476","journal-title":"Mathematics"},{"key":"482_CR12","doi-asserted-by":"publisher","unstructured":"Han S, Shen D, Nie T, Kou Y, Yu G (2017) A method for multi-party record linkage under privacy protection. Journal of Software 28:2281\u20132292. https:\/\/doi.org\/10.13328\/j.cnki.jos.005187","DOI":"10.13328\/j.cnki.jos.005187"},{"issue":"3","key":"482_CR13","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1016\/j.is.2012.07.001","volume":"38","author":"T Hashem","year":"2013","unstructured":"Hashem T, Kulik L, Zhang R (2013) Countering overlapping rectangle privacy attack for moving knn queries. Inf Syst 38(3):430\u2013453","journal-title":"Inf Syst"},{"issue":"2","key":"482_CR14","doi-asserted-by":"publisher","first-page":"87","DOI":"10.2478\/v10117-011-0021-1","volume":"30","author":"J Hauke","year":"2011","unstructured":"Hauke J, Kossowski T (2011) Comparison of values of pearson\u2019s and spearman\u2019s correlation coefficients on the same sets of data. Quaestiones Geographicae 30(2):87\u201393","journal-title":"Quaestiones Geographicae"},{"key":"482_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20309-1_52","volume-title":"Multi-party privacy-preserving record linkage method based on trusted execution environment","author":"X He","year":"2022","unstructured":"He X, Wei H, Han S, Shen D (2022) Multi-party privacy-preserving record linkage method based on trusted execution environment. Springer, Cham"},{"key":"482_CR16","doi-asserted-by":"publisher","unstructured":"Hu H, Zhang J, Chen C, Lu G, Zhang G, Lin H, Chen X (2023) Slope stability evaluation and prediction model based on an improved critic-weighted machine learning algorithm. Highway Engineering 48:74\u201383. https:\/\/doi.org\/10.19782\/j.cnki.1674-0610.2023.06.011","DOI":"10.19782\/j.cnki.1674-0610.2023.06.011"},{"key":"482_CR17","doi-asserted-by":"crossref","unstructured":"Irvine, K., Smith, M., Vos, R.D., Brown, A., Thackway, S.: Real world performance of privacy preserving record linkage. International Journal for Population Data Science. 3(4) (2018)","DOI":"10.23889\/ijpds.v3i4.990"},{"issue":"Sup1","key":"482_CR18","first-page":"3","volume":"142","author":"M Jiangms","year":"2023","unstructured":"Jiangms M, Hewitt A, Zuloaga J, Neiderhiser A, Vu TX, Simmons H (2023) Mrd assessment in patients with newly diagnosed multiple myeloma using tokenized real world data sources. Blood 142(Sup1):3","journal-title":"Blood"},{"key":"482_CR19","doi-asserted-by":"crossref","unstructured":"Korolova A (2010) Privacy violations using microtargeted ads: A case study. IEEE","DOI":"10.1109\/ICDMW.2010.137"},{"key":"482_CR20","doi-asserted-by":"crossref","unstructured":"Mascetti S, Bertolaja L, Bettini C (2013) A practical location privacy attack in proximity services. In: IEEE International Conference on Mobile Data Management","DOI":"10.1109\/MDM.2013.19"},{"issue":"2","key":"482_CR21","doi-asserted-by":"publisher","first-page":"413","DOI":"10.3233\/SJI-210891","volume":"38","author":"LB Mirel","year":"2022","unstructured":"Mirel LB, Resnick DM, Aram J, Cox CS (2022) A methodological assessment of privacy preserving record linkage using survey and administrative data. Stat J IAOS 38(2):413\u2013421","journal-title":"Stat J IAOS"},{"issue":"2","key":"482_CR22","doi-asserted-by":"publisher","first-page":"413","DOI":"10.3233\/SJI-210891","volume":"38","author":"LB Mirel","year":"2022","unstructured":"Mirel LB, Resnick DM, Aram J, Cox CS (2022) A methodological assessment of privacy preserving record linkage using survey and administrative data. Stat J IAOS 38(2):413\u2013421","journal-title":"Stat J IAOS"},{"issue":"1","key":"482_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2767007","volume":"48","author":"M Naveed","year":"2015","unstructured":"Naveed M, Ayday E, Clayton EW, Fellay J, Gunter CA, Hubaux JP, Malin BA, Wang X (2015) Privacy in the genomic era. ACM Comput Surv 48(1):1\u201344","journal-title":"ACM Comput Surv"},{"key":"482_CR24","unstructured":"Ping X, Tian-Qing Z, Xiao-Feng W (2014) Differential privacy and applications. Chinese Journal of Computers"},{"issue":"1","key":"482_CR25","first-page":"087","volume":"1","author":"T Ranbaduge","year":"2017","unstructured":"Ranbaduge T, Vatsalan D, Randall S, Christen P (2017) Evaluation of advanced techniques for multi-party privacy-preserving record linkage on real-world health databases. International Population Data Linkage Network 1(1):087","journal-title":"International Population Data Linkage Network"},{"issue":"1","key":"482_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12874-022-01510-2","volume":"22","author":"S Randall","year":"2022","unstructured":"Randall S, Wichmann H, Brown A, Boyd J, Eitelhuber T, Merchant A, Ferrante A (2022) A blinded evaluation of privacy preserving record linkage with bloom filters. BMC Med Res Methodol 22(1):1\u20137","journal-title":"BMC Med Res Methodol"},{"issue":"1","key":"482_CR27","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1186\/1472-6947-9-41","volume":"9","author":"R Schnell","year":"2009","unstructured":"Schnell R, Bachteler T, Reiher J (2009) Privacy-preserving record linkage using bloom filters. BMC Med Inform Decis Mak 9(1):41","journal-title":"BMC Med Inform Decis Mak"},{"issue":"2","key":"482_CR28","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s12525-015-0191-0","volume":"25","author":"S Spiekermann","year":"2015","unstructured":"Spiekermann S, Acquisti A, Bhme R, Hui KL (2015) The challenges of personal data markets and privacy. Electron Mark 25(2):161\u2013167","journal-title":"Electron Mark"},{"issue":"4","key":"482_CR29","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1108\/13683040610719254","volume":"10","author":"GS Sureshchandar","year":"2006","unstructured":"Sureshchandar GS, Leisten R (2006) A framework for evaluating the criticality of software metrics: an analytic hierarchy process (ahp) approach. Meas Bus Excell 10(4):22\u201333","journal-title":"Meas Bus Excell"},{"key":"482_CR30","doi-asserted-by":"crossref","unstructured":"Vatsalan D, Christen P, O\u2019Keefe CM, Verykios VS (2014) An evaluation framework for privacy-preserving record linkage. Journal of Privacy and Confidentiality 6(1):35\u201375","DOI":"10.29012\/jpc.v6i1.636"},{"key":"482_CR31","doi-asserted-by":"crossref","unstructured":"Vatsalan D, Christen P (2014) Scalable privacy-preserving record linkage for multiple databases. ACM, 1795\u20131798","DOI":"10.1145\/2661829.2661875"},{"key":"482_CR32","doi-asserted-by":"crossref","unstructured":"Vatsalan D, Sehili Z, Christen P, Rahm E (2017) Privacy-preserving record linkage for big data: Current approaches and research challenges. Springer International Publishing","DOI":"10.1007\/978-3-319-49340-4_25"},{"key":"482_CR33","unstructured":"Wang JH, Huang Q, Jao D (2010) Privacy-preserving data aggregation using homomorphic encryption. US"},{"key":"482_CR34","doi-asserted-by":"publisher","unstructured":"Wu L, Zhao G (2024) Weighting method and comparison of academic journal evaluation indicators based on structural critic method. Statistics and Decision 40:56\u201362. https:\/\/doi.org\/10.13546\/j.cnki.tjyjc.2024.01.010","DOI":"10.13546\/j.cnki.tjyjc.2024.01.010"},{"issue":"3","key":"482_CR35","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1016\/S0377-2217(99)00082-X","volume":"126","author":"Z Xu","year":"2000","unstructured":"Xu Z (2000) On consistency of the weighted geometric mean complex judgement matrix in ahp. Eur J Oper Res 126(3):683\u2013687","journal-title":"Eur J Oper Res"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-026-00482-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-026-00482-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-026-00482-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T16:35:15Z","timestamp":1773678915000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-026-00482-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,27]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["482"],"URL":"https:\/\/doi.org\/10.1007\/s44443-026-00482-3","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"value":"1319-1578","type":"print"},{"value":"2213-1248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,27]]},"assertion":[{"value":"17 October 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"Materials are available from the corresponding author on reasonable request.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Materials availability"}}],"article-number":"94"}}