{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T22:36:21Z","timestamp":1771886181500,"version":"3.50.1"},"reference-count":63,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2014,8,1]],"date-time":"2014-08-01T00:00:00Z","timestamp":1406851200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2016,2,25]],"date-time":"2016-02-25T00:00:00Z","timestamp":1456358400000},"content-version":"vor","delay-in-days":573,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":["j-biomed-inform.com","elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Biomedical Informatics"],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1016\/j.jbi.2013.12.002","type":"journal-article","created":{"date-parts":[[2013,12,12]],"date-time":"2013-12-12T10:30:18Z","timestamp":1386844218000},"page":"62-76","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":36,"special_numbering":"C","title":["A flexible approach to distributed data anonymization"],"prefix":"10.1016","volume":"50","author":[{"given":"Florian","family":"Kohlmayer","sequence":"first","affiliation":[]},{"given":"Fabian","family":"Prasser","sequence":"additional","affiliation":[]},{"given":"Claudia","family":"Eckert","sequence":"additional","affiliation":[]},{"given":"Klaus A.","family":"Kuhn","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jbi.2013.12.002_b0005","unstructured":"B. Consortium Goals\u2013International Cancer Genome Consortium. <http:\/\/icgc.org\/icgc\/goals-structure-policies-guidelines\/b-consortium-goals>."},{"key":"10.1016\/j.jbi.2013.12.002_b0010","unstructured":"Perola M, van Ommen G-J. BBMRI-LPC \u2013 a four-year project to help scientists to have better access to large European studies on health; 2013. <http:\/\/www.bbmri-lpc.org\/BBMRI-LPC_Press_release.pdf>."},{"key":"10.1016\/j.jbi.2013.12.002_b0015","unstructured":"Sharing research data to improve public health: full joint statement by funders of health research \u2013 Wellcome Trust. <http:\/\/www.wellcome.ac.uk\/About-us\/Policy\/Spotlight-issues\/Data-sharing\/Public-health-and-epidemiology\/WTDV030690.htm>."},{"key":"10.1016\/j.jbi.2013.12.002_b0020","unstructured":"OECD Principles and Guidelines for Access to Research Data from Public Funding. <http:\/\/www.oecd.org\/science\/sci-tech\/oecdprinciplesandguidelinesforaccesstoresearchdatafrompublicfunding.htm>."},{"issue":"3","key":"10.1016\/j.jbi.2013.12.002_b0025","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1152\/physiolgenomics.00050.2009","article-title":"Translational informatics: enabling high-throughput research paradigms","volume":"39","author":"Payne","year":"2009","journal-title":"Physiol Genomics"},{"issue":"1","key":"10.1016\/j.jbi.2013.12.002_b0030","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1159\/000294150","article-title":"Assessing the privacy risks of data sharing in genomics","volume":"14","author":"Heeney","year":"2011","journal-title":"Public Health Genomics"},{"key":"10.1016\/j.jbi.2013.12.002_b0035","unstructured":"Health insurance portability and accountability act of 1996, Public Law Gazette; 1996. p. 1\u2013349."},{"key":"10.1016\/j.jbi.2013.12.002_b0040","unstructured":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data. Off. J. Eur. Communities 38 (L. 281)."},{"key":"10.1016\/j.jbi.2013.12.002_b0045","first-page":"4","article-title":"ELSI 2.0 for genomics and society","author":"Kaye","year":"2012","journal-title":"Science"},{"issue":"2","key":"10.1016\/j.jbi.2013.12.002_b0050","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1183\/09031936.00165006","article-title":"Trends in ethical and legal frameworks for the use of human biobanks","volume":"30","author":"Cambon-Thomsen","year":"2007","journal-title":"Eur Respir J"},{"key":"10.1016\/j.jbi.2013.12.002_b0055","unstructured":"Samarati P, Sweeney L. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: Proc IEEE symp on security and privacy; 1998."},{"issue":"3","key":"10.1016\/j.jbi.2013.12.002_b0060","first-page":"329","article-title":"Finding a needle in a haystack or identifying anonymous census records","volume":"2","author":"Dalenius","year":"1986","journal-title":"J Off Stat"},{"key":"10.1016\/j.jbi.2013.12.002_b0065","unstructured":"Rasmussen L., et al. Rethinking the honest broker in the changing face of security and privacy. In: Proc AMIA annu symp; 2012. p. 1554\u20146."},{"issue":"5","key":"10.1016\/j.jbi.2013.12.002_b0070","doi-asserted-by":"crossref","first-page":"670","DOI":"10.1197\/jamia.M3144","article-title":"A globally optimal k-anonymity method for the de-identification of health data","volume":"16","author":"Emam","year":"2009","journal-title":"J Am Med Inform Assoc"},{"issue":"2","key":"10.1016\/j.jbi.2013.12.002_b0075","first-page":"149","article-title":"Efficient anonymizations with enhanced utility","volume":"3","author":"Goldberger","year":"2010","journal-title":"Trans Data Privacy"},{"key":"10.1016\/j.jbi.2013.12.002_b0080","series-title":"Introduction to privacy-preserving data publishing: concepts and techniques","author":"Fung","year":"2010"},{"key":"10.1016\/j.jbi.2013.12.002_b0085","unstructured":"Lefevre KR. Anonymity in data publishing and distribution. PhD thesis, Madison, WI, USA; 2007."},{"issue":"6","key":"10.1016\/j.jbi.2013.12.002_b0090","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/69.971193","article-title":"Protecting respondents\u2019 identities in microdata release","volume":"13","author":"Samarati","year":"2001","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"10.1016\/j.jbi.2013.12.002_b0095","series-title":"Proc int conf on management of data (SIGMOD)","first-page":"49","article-title":"Incognito: efficient full-domain k-anonymity","author":"LeFevre","year":"2005"},{"key":"10.1016\/j.jbi.2013.12.002_b0100","doi-asserted-by":"crossref","unstructured":"Kohlmayer F, Prasser F, et al. Flash: efficient, stable and optimal k-anonymity. In: Proc int conf on privacy, security, risk and trust; 2012. p. 708\u201317.","DOI":"10.1109\/SocialCom-PASSAT.2012.52"},{"issue":"5","key":"10.1016\/j.jbi.2013.12.002_b0105","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1142\/S021848850200165X","article-title":"Achieving k-anonymity privacy protection using generalization and suppression","volume":"10","author":"Sweeney","year":"2002","journal-title":"Int J Uncertain Fuzziness Knowl-Based Syst"},{"key":"10.1016\/j.jbi.2013.12.002_b0110","unstructured":"Ye H, Chen ES. Attribute utility motivated k-anonymization of datasets to support the heterogeneous needs of biomedical researchers. AMIA ann symp proc; 2011. p. 1573\u201382."},{"key":"10.1016\/j.jbi.2013.12.002_b0115","doi-asserted-by":"crossref","unstructured":"Fung B, et al. Top-down specialization for information and privacy preservation. In: Proc int conf on data engineering; 2005. p. 205\u201316.","DOI":"10.1109\/ICDE.2005.143"},{"key":"10.1016\/j.jbi.2013.12.002_b0120","series-title":"Proc int conf on data engineering","article-title":"Mondrian Multidimensional k-Anonymity","author":"LeFevre","year":"2006"},{"key":"10.1016\/j.jbi.2013.12.002_b0125","series-title":"Proc int conf database systems for advanced applications","first-page":"188","article-title":"Efficient k-anonymization using clustering techniques","author":"Byun","year":"2007"},{"key":"10.1016\/j.jbi.2013.12.002_b0130","series-title":"Proc int conf on data engineering","first-page":"744","article-title":"k-Anonymization revisited","author":"Gionis","year":"2008"},{"issue":"3","key":"10.1016\/j.jbi.2013.12.002_b0135","doi-asserted-by":"crossref","first-page":"622","DOI":"10.1016\/j.datak.2007.03.009","article-title":"Thoughts on k-anonymization","volume":"63","author":"Nergiz","year":"2007","journal-title":"Data Knowl Eng"},{"key":"10.1016\/j.jbi.2013.12.002_b0140","doi-asserted-by":"crossref","unstructured":"Machanavajjhala A, et al. l-Diversity: privacy beyond k-anonymity. ACM Trans Knowl Discovery Data; 2007 1 (1).","DOI":"10.1145\/1217299.1217302"},{"key":"10.1016\/j.jbi.2013.12.002_b0145","doi-asserted-by":"crossref","unstructured":"Li N, et al. t-Closeness: privacy beyond k-anonymity and l-diversity. In: Proc int conf on data engineering; 2007. p. 106\u201315.","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"4","key":"10.1016\/j.jbi.2013.12.002_b0150","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1857947.1857950","article-title":"Centralized and distributed anonymization for high-dimensional healthcare data","volume":"4","author":"Mohammed","year":"2010","journal-title":"ACM Trans Knowl Discovery Data"},{"key":"10.1016\/j.jbi.2013.12.002_b0155","series-title":"Proc int conf on management of data (SIGMOD)","first-page":"665","article-title":"Hiding the presence of individuals from shared databases","author":"Nergiz","year":"2007"},{"key":"10.1016\/j.jbi.2013.12.002_b0160","series-title":"Proc int conf on knowl disc data min (KDD)","first-page":"754","article-title":"(\u03b1,k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing","author":"Wong","year":"2006"},{"key":"10.1016\/j.jbi.2013.12.002_b0165","doi-asserted-by":"crossref","unstructured":"Truta T, Vinay B. Privacy protection: p-sensitive k-anonymity property. In: Proc int conf on data engineering; 2006. p. 94.","DOI":"10.1109\/ICDEW.2006.116"},{"key":"10.1016\/j.jbi.2013.12.002_b0170","series-title":"Proc int conf on data engineering","first-page":"116","article-title":"Aggregate query answering on anonymized tables","author":"Zhang","year":"2007"},{"key":"10.1016\/j.jbi.2013.12.002_b0175","series-title":"Proc int conf on management of data (SIGMOD)","first-page":"473","article-title":"Preservation of proximity privacy in publishing numerical sensitive data","author":"Li","year":"2008"},{"key":"10.1016\/j.jbi.2013.12.002_b0180","series-title":"Proc int conf on data engineering","first-page":"1279","article-title":"A general proximity privacy principle","author":"Wang","year":"2009"},{"key":"10.1016\/j.jbi.2013.12.002_b0185","series-title":"Proc int conf on management of data (SIGMOD)","first-page":"689","article-title":"M-invariance: towards privacy preserving re-publication of dynamic datasets","author":"Xiao","year":"2007"},{"key":"10.1016\/j.jbi.2013.12.002_b0190","doi-asserted-by":"crossref","unstructured":"Jurczyk P, Xiong L. Distributed Anonymization: achieving privacy for both data subjects and data providers. In: Proc ann IFIP WG 11.3 working conf on data and applications security; 2009. p. 191\u2013207.","DOI":"10.1007\/978-3-642-03007-9_13"},{"key":"10.1016\/j.jbi.2013.12.002_b0195","volume":"vol. 2","author":"Goldreich","year":"2009"},{"issue":"4","key":"10.1016\/j.jbi.2013.12.002_b0200","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1007\/s00778-006-0008-z","article-title":"A secure distributed framework for achieving k-anonymity","volume":"15","author":"Jiang","year":"2006","journal-title":"VLDB J"},{"key":"10.1016\/j.jbi.2013.12.002_b0205","doi-asserted-by":"crossref","unstructured":"Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In: Proc int conf on the theory and application of cryptographic techniques; 1999. p. 223\u201338.","DOI":"10.1007\/3-540-48910-X_16"},{"key":"10.1016\/j.jbi.2013.12.002_b0210","doi-asserted-by":"crossref","unstructured":"Mohammed N, et al. Privacy-preserving data mashup. In: Proc int conf on extending database technology; 2009. p. 228.","DOI":"10.1145\/1516360.1516388"},{"key":"10.1016\/j.jbi.2013.12.002_b0215","series-title":"Applied cryptography: protocols, algorithms, and source code in C","author":"Schneier","year":"1995"},{"issue":"2","key":"10.1016\/j.jbi.2013.12.002_b0220","doi-asserted-by":"crossref","first-page":"11:1","DOI":"10.1145\/2188349.2188353","article-title":"Secure distributed computation of anonymized views of shared databases","volume":"37","author":"Tassa","year":"2012","journal-title":"ACM Trans Database Syst"},{"key":"10.1016\/j.jbi.2013.12.002_b0225","series-title":"Proc ACM symp on principles of database systems","first-page":"139","article-title":"Privacy-enhancing k-anonymization of customer data","author":"Zhong","year":"2005"},{"issue":"9","key":"10.1016\/j.jbi.2013.12.002_b0230","doi-asserted-by":"crossref","first-page":"1026","DOI":"10.1109\/TKDE.2004.45","article-title":"Privacy-preserving distributed mining of association rules on horizontally partitioned data","volume":"16","author":"Kantarcioglu","year":"2004","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"10.1016\/j.jbi.2013.12.002_b0235","series-title":"Cryptanalysis of number theoretic ciphers (computational mathematics)","author":"Wagstaff","year":"2002"},{"key":"10.1016\/j.jbi.2013.12.002_b0240","unstructured":"ANSI, ANSI X9.62:2005 Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA) (2005)."},{"key":"10.1016\/j.jbi.2013.12.002_b0245","doi-asserted-by":"crossref","unstructured":"Barker E, et al. Recommendation for key management Part 1: General (revision 3). NIST special publication (July); 2011. p. 1\u2013147.","DOI":"10.6028\/NIST.SP.800-57p1r3"},{"key":"10.1016\/j.jbi.2013.12.002_b0250","unstructured":"The GNU Multiple Precision Arithmetic Library; August 2013. <http:\/\/gmplib.org\/>."},{"key":"10.1016\/j.jbi.2013.12.002_b0255","unstructured":"ARX \u2013 Powerful Data Anonymization; August 2013. <http:\/\/arx.deidentifier.org\/>."},{"key":"10.1016\/j.jbi.2013.12.002_b0260","unstructured":"Suga T, et al. Weakness of provably secure searchable encryption against frequency analysis. In: Proc int conf on communications, computers and applications (MIC-CCA). IEEE; October 2012. p. 142\u20137."},{"key":"10.1016\/j.jbi.2013.12.002_b0265","first-page":"535","article-title":"Deterministic and efficiently searchable encryption","volume":"vol. 4622","author":"Bellare","year":"2007"},{"key":"10.1016\/j.jbi.2013.12.002_b0270","unstructured":"Health Insurance Portability and Accountability Act (HIPAA), Public Law; 1996. p. 1\u2013349."},{"issue":"4","key":"10.1016\/j.jbi.2013.12.002_b0275","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1007\/s00778-010-0214-6","article-title":"Anonymity meets game theory: secure data integration with malicious participants","volume":"20","author":"Mohammed","year":"2011","journal-title":"VLDB J"},{"key":"10.1016\/j.jbi.2013.12.002_b0280","unstructured":"Talukder N, et al. Detecting inconsistencies in private data with secure function evaluation. Tech rep 11-006, Purdue University; 2011."},{"issue":"1","key":"10.1016\/j.jbi.2013.12.002_b0285","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.datak.2007.06.013","article-title":"Privacy-preserving imputation of missing data","volume":"65","author":"Jagannathan","year":"2008","journal-title":"Data Knowl Eng"},{"key":"10.1016\/j.jbi.2013.12.002_b0290","doi-asserted-by":"crossref","unstructured":"Dierks T, Rescorla E. RFC 5246 \u2013 The Transport Layer Security (TLS) protocol version 1.2. Tech rep; August 2008.","DOI":"10.17487\/rfc5246"},{"key":"10.1016\/j.jbi.2013.12.002_b0295","doi-asserted-by":"crossref","unstructured":"El Emam K, et al. A systematic review of re-identification attacks on health data. PloS one; 2011 6 (12).","DOI":"10.1371\/journal.pone.0028071"},{"issue":"1","key":"10.1016\/j.jbi.2013.12.002_b0300","doi-asserted-by":"crossref","first-page":"11","DOI":"10.2310\/JIM.0b013e3181c9b2ea","article-title":"Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research","volume":"58","author":"Malin","year":"2010","journal-title":"J Investig Med"},{"issue":"3","key":"10.1016\/j.jbi.2013.12.002_b0305","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/s00439-011-1042-5","article-title":"and mitigation strategies","volume":"130","author":"Malin","year":"2011","journal-title":"Hum Genet"},{"issue":"1","key":"10.1016\/j.jbi.2013.12.002_b0310","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1186\/1471-2288-13-83","article-title":"Use of generalised additive models to categorise continuous variables in clinical prediction","volume":"13","author":"Barrio","year":"2013","journal-title":"BMC Med Res Methodol"},{"key":"10.1016\/j.jbi.2013.12.002_b0315","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/11535218_15","article-title":"Privacy-preserving set operations","author":"Kissner","year":"2005"}],"container-title":["Journal of Biomedical Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1532046413001937?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1532046413001937?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,3,19]],"date-time":"2022-03-19T15:41:34Z","timestamp":1647704494000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1532046413001937"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":63,"alternative-id":["S1532046413001937"],"URL":"https:\/\/doi.org\/10.1016\/j.jbi.2013.12.002","relation":{},"ISSN":["1532-0464"],"issn-type":[{"value":"1532-0464","type":"print"}],"subject":[],"published":{"date-parts":[[2014,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A flexible approach to distributed data anonymization","name":"articletitle","label":"Article Title"},{"value":"Journal of Biomedical Informatics","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jbi.2013.12.002","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2013 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}