{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:23:05Z","timestamp":1761744185760},"reference-count":40,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2015,9,21]],"date-time":"2015-09-21T00:00:00Z","timestamp":1442793600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Biomedical Informatics"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1016\/j.jbi.2015.09.007","type":"journal-article","created":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T18:31:43Z","timestamp":1442341903000},"page":"37-48","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":27,"special_numbering":"C","title":["The cost of quality: Implementing generalization and suppression for anonymizing biomedical data with minimal information loss"],"prefix":"10.1016","volume":"58","author":[{"given":"Florian","family":"Kohlmayer","sequence":"first","affiliation":[]},{"given":"Fabian","family":"Prasser","sequence":"additional","affiliation":[]},{"given":"Klaus A.","family":"Kuhn","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jbi.2015.09.007_b0005","doi-asserted-by":"crossref","unstructured":"A. Narayanan, V. Shmatikov, Robust de-anonymization of large sparse datasets, in: Proc. Symp. Security and Privacy, 2008, pp. 111\u2013125.","DOI":"10.1109\/SP.2008.33"},{"key":"10.1016\/j.jbi.2015.09.007_b0010","unstructured":"M. Zeller, T. Barbaro, A face is exposed for AOL searcher no. 4417749, The New York Times, August 2006."},{"key":"10.1016\/j.jbi.2015.09.007_b0015","unstructured":"L. Sweeney, Computational disclosure control \u2013 a primer on data privacy protection, Ph.D. thesis, Massachusetts Institute of Technology, 2001."},{"issue":"2","key":"10.1016\/j.jbi.2015.09.007_b0020","first-page":"161","article-title":"On syntactic anonymity and differential privacy","volume":"6","author":"Clifton","year":"2013","journal-title":"Tans. Data Priv."},{"issue":"12","key":"10.1016\/j.jbi.2015.09.007_b0025","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0028071","article-title":"A systematic review of re-identification attacks on health data","volume":"6","author":"El Emam","year":"2011","journal-title":"PloS One"},{"key":"10.1016\/j.jbi.2015.09.007_b0030","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.jbi.2014.06.002","article-title":"Publishing data from electronic health records while preserving privacy: a survey of algorithms","volume":"50","author":"Gkoulalas-Divanis","year":"2014","journal-title":"J. Biomed. Inform."},{"key":"10.1016\/j.jbi.2015.09.007_b0035","series-title":"Encyclopedia of Cryptography and Security","author":"Dwork","year":"2011"},{"key":"10.1016\/j.jbi.2015.09.007_b0040","unstructured":"U.S. health insurance portability and accountability act of 1996, Public Law, 1996, p. 1349."},{"key":"10.1016\/j.jbi.2015.09.007_b0045","unstructured":"Directive 95\/46\/EC of the European parliament and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data, Off J. Eur. Commun. 38 (1995) 281."},{"key":"10.1016\/j.jbi.2015.09.007_b0050","unstructured":"U.S. department of health and human services, Office for civil rights, HIPAA administrative simplification regulation, 45 CFR parts 160, 162, and 164, 2013."},{"key":"10.1016\/j.jbi.2015.09.007_b0055","unstructured":"F. Prasser, F. Kohlmayer, R. Lautenschlaeger, K. Kuhn, ARX \u2013 a comprehensive tool for anonymizing biomedical data, in: AMIA Annu. Symp. Proc., 2014."},{"key":"10.1016\/j.jbi.2015.09.007_b0060","unstructured":"ARX \u2013 powerful data anonymization, <http:\/\/arx.deidentifier.org\/> (accessed 06 May 2015)."},{"key":"10.1016\/j.jbi.2015.09.007_b0065","doi-asserted-by":"crossref","unstructured":"P. Samarati, L. Sweeney, Generalizing data to provide anonymity when disclosing information, in: Proc. Symp. Principles Database Syst., 1998.","DOI":"10.1145\/275487.275508"},{"issue":"6","key":"10.1016\/j.jbi.2015.09.007_b9005","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/69.971193","article-title":"Protecting respondents' identities in microdata release","volume":"13","author":"Samarati","year":"2001","journal-title":"Trans. Knowl. Data Eng."},{"key":"10.1016\/j.jbi.2015.09.007_b0070","doi-asserted-by":"crossref","unstructured":"R. Bayardo, R. Agrawal, Data privacy through optimal k-anonymization, in: Proc. Int. Conf. Data Engineering, 2005, pp. 217\u2013228.","DOI":"10.1109\/ICDE.2005.42"},{"key":"10.1016\/j.jbi.2015.09.007_b0075","doi-asserted-by":"crossref","unstructured":"K. LeFevre, D. DeWitt, R. Ramakrishnan, Incognito: efficient full-domain k-anonymity, in: Proc. Conf. Management Data, 2005, pp. 49\u201360.","DOI":"10.1145\/1066157.1066164"},{"issue":"3","key":"10.1016\/j.jbi.2015.09.007_b0080","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1109\/TKDE.2010.236","article-title":"Slicing: a new approach for privacy preserving data publishing","volume":"24","author":"Li","year":"2012","journal-title":"Trans. Knowl. Data Eng."},{"key":"10.1016\/j.jbi.2015.09.007_b0085","doi-asserted-by":"crossref","unstructured":"M. Nergiz, M. Atzori, C. Clifton, Hiding the presence of individuals from shared databases, in: Proc. Conf. Management of Data, 2007, pp. 665\u2013676.","DOI":"10.1145\/1247480.1247554"},{"key":"10.1016\/j.jbi.2015.09.007_b0090","doi-asserted-by":"crossref","unstructured":"A. Machanavajjhala, J. Gehrke, D. Kifer, M. Venkitasubramaniam, l-Diversity: privacy beyond k-anonymity, in: Proc. Int. Conf. Data Engineering, vol. 1, 2007.","DOI":"10.1145\/1217299.1217302"},{"key":"10.1016\/j.jbi.2015.09.007_b0095","doi-asserted-by":"crossref","unstructured":"N. Li, T. Li, S. Venkatasubramanian, t-Closeness: privacy beyond k-anonymity and l-diversity, in: Proc. Int. Conf. Data Engineering, 2007, pp. 106\u2013115.","DOI":"10.1109\/ICDE.2007.367856"},{"key":"10.1016\/j.jbi.2015.09.007_b0100","series-title":"Introduction to Privacy-preserving Data Publishing: Concepts and Techniques","author":"Fung","year":"2010"},{"key":"10.1016\/j.jbi.2015.09.007_b0105","doi-asserted-by":"crossref","unstructured":"K. LeFevre, D. DeWitt, R. Ramakrishnan, Mondrian multidimensional k-anonymity, in: Proc. Int. Conf. Data Engineering, 2006.","DOI":"10.1109\/ICDE.2006.101"},{"issue":"5","key":"10.1016\/j.jbi.2015.09.007_b0110","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1142\/S021848850200165X","article-title":"Achieving k-anonymity privacy protection using generalization and suppression","volume":"10","author":"Sweeney","year":"2002","journal-title":"J. Uncertain Fuzzy Knowl. Syst."},{"issue":"2","key":"10.1016\/j.jbi.2015.09.007_b0115","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1109\/TKDE.2008.129","article-title":"k-Anonymization with minimal loss of information","volume":"21","author":"Gionis","year":"2009","journal-title":"Trans. Knowl. Data Eng."},{"key":"10.1016\/j.jbi.2015.09.007_b0120","doi-asserted-by":"crossref","unstructured":"F. Kohlmayer, F. Prasser, C. Eckert, A. Kemper, K. Kuhn, Flash: efficient, stable and optimal k-anonymity, in: Proc. Int. Conf. Privacy, Security, Risk and Trust, 2012, pp. 708\u2013717.","DOI":"10.1109\/SocialCom-PASSAT.2012.52"},{"key":"10.1016\/j.jbi.2015.09.007_b0125","series-title":"Introduction to Lattices and Order","author":"Davey","year":"2002"},{"issue":"5","key":"10.1016\/j.jbi.2015.09.007_b0130","doi-asserted-by":"crossref","first-page":"670","DOI":"10.1197\/jamia.M3144","article-title":"A globally optimal k-anonymity method for the de-identification of health data","volume":"16","author":"El Emam","year":"2009","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"10.1016\/j.jbi.2015.09.007_b0135","doi-asserted-by":"crossref","unstructured":"F. Prasser, F. Kohlmayer, K. Kuhn, A benchmark of globally-optimal anonymization methods for biomedical data, in: Proc. Int. Symp. Computer-Based Med. Syst., 2014, pp. 66\u201371.","DOI":"10.1109\/CBMS.2014.85"},{"key":"10.1016\/j.jbi.2015.09.007_b0140","unstructured":"Committee on strategies for responsible sharing of clinical trial data, Sharing clinical trial data: maximizing benefits, minimizing risk, Springer, 2015, Chapter: Appendix B: concepts and methods for de-identifying clinical trial data, p. 280."},{"key":"10.1016\/j.jbi.2015.09.007_b0145","doi-asserted-by":"crossref","unstructured":"L. Sweeney, Datafly: a system for providing anonymity in medical data, in: Proc. Int. Conf. Database Security, 1997, pp. 356\u2013381.","DOI":"10.1007\/978-0-387-35285-5_22"},{"issue":"1","key":"10.1016\/j.jbi.2015.09.007_b0150","first-page":"1","article-title":"Achieving k-anonymity using improved greedy heuristics for very large relational databases","volume":"6","author":"Babu","year":"2013","journal-title":"Trans. Data Privacy"},{"key":"10.1016\/j.jbi.2015.09.007_b0155","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1093\/idpl\/ipu033","article-title":"A critical appraisal of the article 29 working party opinion 05\/2014 on data anonymization techniques","volume":"5","author":"El Emam","year":"2015","journal-title":"Int. Data Privacy Law"},{"key":"10.1016\/j.jbi.2015.09.007_b0160","unstructured":"Article 29 data protection working party, Opinion 05\/2014 on anonymisation techniques, 2014, <http:\/\/www.cnpd.public.lu\/de\/publications\/groupe-art29\/wp216_en.pdf> (accessed 06 May 2015)."},{"key":"10.1016\/j.jbi.2015.09.007_b0165","doi-asserted-by":"crossref","unstructured":"K. Benitez, G. Loukides, B. Malin, Beyond safe harbor: automatic discovery of health information de-identification policy alternatives, in: Proc. ACM Int. Health Informatics Symposium, 2010, pp. 163\u2013172.","DOI":"10.1145\/1882992.1883017"},{"key":"10.1016\/j.jbi.2015.09.007_b0170","doi-asserted-by":"crossref","unstructured":"F. Dankar, K. El Emam, A method for evaluating marketer re-identification risk, in: Proc. EDBT\/ICDT Workshops, 2010.","DOI":"10.1145\/1754239.1754271"},{"issue":"1","key":"10.1016\/j.jbi.2015.09.007_b0175","first-page":"35","article-title":"Practicing differential privacy in health care: a review","volume":"6","author":"Dankar","year":"2013","journal-title":"Trans. Data Privacy"},{"key":"10.1016\/j.jbi.2015.09.007_b0180","unstructured":"A. Cavoukian, D. Castro, Big data and innovation, setting the record straight: de-identification does work, privacy by Design, Ontario Canada. 2014, <http:\/\/www2.itif.org\/2014-big-data-deidentification.pdf> (accessed 06 May 2015)."},{"key":"10.1016\/j.jbi.2015.09.007_b0185","unstructured":"A. Narayanan, E. Felten, No silver bullet: de-identification still doesn\u2019t work, 2014, <http:\/\/randomwalker.info\/publications\/no-silver-bullet-de-identification.pdf> (accessed 06 May 2015)."},{"issue":"1","key":"10.1016\/j.jbi.2015.09.007_b0190","doi-asserted-by":"crossref","first-page":"11","DOI":"10.2310\/JIM.0b013e3181c9b2ea","article-title":"Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research","volume":"58","author":"Malin","year":"2010","journal-title":"J. Investig. Med."},{"key":"10.1016\/j.jbi.2015.09.007_b0195","series-title":"Anonymizing Health Data: Case Studies and Methods to Get you Started","author":"El Emam","year":"2014"}],"container-title":["Journal of Biomedical Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1532046415002002?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1532046415002002?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T16:03:38Z","timestamp":1567181018000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1532046415002002"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":40,"alternative-id":["S1532046415002002"],"URL":"https:\/\/doi.org\/10.1016\/j.jbi.2015.09.007","relation":{},"ISSN":["1532-0464"],"issn-type":[{"value":"1532-0464","type":"print"}],"subject":[],"published":{"date-parts":[[2015,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"The cost of quality: Implementing generalization and suppression for anonymizing biomedical data with minimal information loss","name":"articletitle","label":"Article Title"},{"value":"Journal of Biomedical Informatics","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jbi.2015.09.007","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2015 The Authors. Published by Elsevier Inc.","name":"copyright","label":"Copyright"}]}}