{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T18:04:59Z","timestamp":1764439499787,"version":"3.37.3"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Biomed. Health Inform."],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/jbhi.2017.2676880","type":"journal-article","created":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T05:48:40Z","timestamp":1490334520000},"page":"611-622","source":"Crossref","is-referenced-by-count":24,"title":["A Scalable and Pragmatic Method for the Safe Sharing of High-Quality Health Data"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3172-3095","authenticated-orcid":false,"given":"Fabian","family":"Prasser","sequence":"first","affiliation":[]},{"given":"Florian","family":"Kohlmayer","sequence":"additional","affiliation":[]},{"given":"Helmut","family":"Spengler","sequence":"additional","affiliation":[]},{"given":"Klaus A.","family":"Kuhn","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2015.09.007"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2007.4376991"},{"key":"ref33","first-page":"6-8","article-title":"Transmart: An open source and community-driven informatics and data sharing platform for clinical and translational research","volume":"2013","author":"athey","year":"2013","journal-title":"AMIA Summits Transl Sci Proc"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1136\/jamia.2009.000893"},{"key":"ref31","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation)","volume":"l119 59","year":"2016","journal-title":"Official J Eur Union"},{"key":"ref30","first-page":"1","article-title":"Appendix B: Concepts and methods for de-identifying clinical trial data","author":"emam","year":"2015","journal-title":"Institute of Medicine Sharing Clinical Trial Data Maximizing Benefits Minimizing Risk"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6143"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/257874.257896"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-010-0115-7"},{"key":"ref60","first-page":"82462","article-title":"Standards for privacy of individually identifiable health information","volume":"65","year":"2000","journal-title":"Federal Register"},{"key":"ref62","article-title":"Docker: Lightweight linux containers for consistent development and deployment","volume":"2014","author":"merkel","year":"2014","journal-title":"Linux J"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2011-000316"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2012.2212281"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.2310\/JIM.0b013e3181c9b2ea"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0053875"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1057\/elmr.2008.73"},{"key":"ref65","first-page":"901","article-title":"On k-anonymity and the curse of dimensionality","author":"aggarwal","year":"0","journal-title":"Proc Int Conf Very Large Databases"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1159\/000336663"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMp1401111"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/nbt.2749"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7802-8_7"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-15-S5-S1"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2014.04.003"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-14-S1-S3"},{"key":"ref23","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"0","journal-title":"Proc Theory Cryptography"},{"journal-title":"Expanding Access to Research Data Reconciling Risks and Opportunities","year":"2005","author":"council","key":"ref26"},{"key":"ref25","first-page":"35","article-title":"Practicing differential privacy in health care: A review.","volume":"6","author":"dankar","year":"2013","journal-title":"Trans Data Privacy"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1201\/b14764"},{"key":"ref51","first-page":"79","article-title":"Estimation of identification disclosure risk in microdata","volume":"14","author":"chen","year":"1998","journal-title":"J Official Stat"},{"key":"ref59","first-page":"161","article-title":"Lightning: Utility-driven anonymization of high-dimensional data","volume":"9","author":"prasser","year":"2016","journal-title":"Trans Data Privacy"},{"year":"2016","key":"ref58","article-title":"Uniqueness benchmark."},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2014.85"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M2716"},{"year":"2016","key":"ref55","article-title":"Lightspeed Matlab Toolbox."},{"key":"ref54","doi-asserted-by":"crossref","DOI":"10.1201\/b18186","author":"mickens","year":"2015","journal-title":"Difference Equations Theory Applications and Advanced Topics"},{"article-title":"Estimation of the percent of unique population elements on a microdata file using the sample","year":"1991","author":"zayatz","key":"ref53"},{"key":"ref52","first-page":"499","article-title":"Applying pitman's sampling formula to microdata disclosure risk assessment","volume":"17","author":"hoshino","year":"2001","journal-title":"J Official Stat"},{"key":"ref10","first-page":"31","article-title":"Directive 95\/46\/EC of the European parliament and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data","volume":"l281 38","year":"1995","journal-title":"Official J Eur Union"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275508"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-016-0287-2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23633-9_6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M3144"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipu033"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0120592"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-12-66"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3414\/ME16-01-0012"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7802-8"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"5","DOI":"10.29173\/iq778","article-title":"Principles- versus rules- based output statistical disclosure control in remote access environments","volume":"39","author":"ritchie","year":"2015","journal-title":"IAssist Quarterly"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2015.2252"},{"journal-title":"U S National Institutes of Health","article-title":"NIH genomic data sharing policy&#x2014;NOT-OD-14-124","year":"2014","key":"ref3"},{"article-title":"Computational disclosure control&#x2014;A primer on data privacy protection","year":"2001","author":"sweeney","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2012.03.005"},{"journal-title":"U S Department of Health and Human Services&#x2013;Office for Civil Rights","article-title":"HIPAA administrative simplification statute and rules, 45 CFR Parts 160, 162, and 164","year":"2013","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocv004"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2076397"},{"journal-title":"Public Law 1996 1&#x2013;349","article-title":"U.S. Health insurance portability and accountability act of 1996","year":"1996","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775089"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.42"},{"journal-title":"Anonymizing Healh Data Case Studies and Methods to Get You Started","year":"2014","author":"emam","key":"ref48"},{"key":"ref47","first-page":"17","article-title":"Information loss through global recoding and local suppression","volume":"14","author":"de waal","year":"1999","journal-title":"Netherlands Official Statistics"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.101"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2006.147"}],"container-title":["IEEE Journal of Biomedical and Health Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221020\/8306527\/07885563.pdf?arnumber=7885563","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:26:24Z","timestamp":1642004784000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7885563\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":65,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jbhi.2017.2676880","relation":{},"ISSN":["2168-2194","2168-2208"],"issn-type":[{"type":"print","value":"2168-2194"},{"type":"electronic","value":"2168-2208"}],"subject":[],"published":{"date-parts":[[2018,3]]}}}