{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:46Z","timestamp":1750309546695,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T00:00:00Z","timestamp":1719964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,3]]},"DOI":"10.1145\/3698322.3698337","type":"proceedings-article","created":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T16:46:22Z","timestamp":1733849182000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Patterns of Data Anonymization"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-0272-7461","authenticated-orcid":false,"given":"Mariana","family":"Monteiro","sequence":"first","affiliation":[{"name":"Faculty of Engineering of the University of Porto, Porto, Portugal and HumanISE, INESC TEC, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6653-1598","authenticated-orcid":false,"given":"Filipe","family":"Correia","sequence":"additional","affiliation":[{"name":"Faculty of Engineering of the University of Porto, Porto, Portugal and HumanISE, INESC TEC, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3993-0208","authenticated-orcid":false,"given":"Paulo","family":"Queiroz","sequence":"additional","affiliation":[{"name":"Computing Department, Federal University of the Semi-Arid Region (UFERSA), Mossor\u00f3, RN, Brazil and HumanISE, INESC TEC, Mossor\u00f3, RN, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9635-6815","authenticated-orcid":false,"given":"Rui","family":"Ramos","sequence":"additional","affiliation":[{"name":"HumanISE, INESC TEC, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6624-3441","authenticated-orcid":false,"given":"Dinis","family":"Trigo","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, University of Porto, Porto, Portugal and HumanISE, INESC TEC, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3849-9065","authenticated-orcid":false,"given":"Gon\u00e7alo","family":"Gon\u00e7alves","sequence":"additional","affiliation":[{"name":"HumanISE, INESC TEC, Porto, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2024,12,10]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"Abiodun\u00a0L. Adeoye. 2023. Privacy-Preserving in E-health Big Data Sharing. https:\/\/medium.com\/@abbelylee\/privacy-preserving-in-e-health-big-data-sharing-2ef5cd7521d2."},{"key":"e_1_3_3_1_3_2","volume-title":"A pattern language: towns, buildings, construction","author":"Alexander Christopher","year":"2018","unstructured":"Christopher Alexander. 2018. A pattern language: towns, buildings, construction. Oxford university press."},{"key":"e_1_3_3_1_4_2","unstructured":"amnesia [n. d.]. Features. https:\/\/amnesia.openaire.eu\/features.html."},{"key":"e_1_3_3_1_5_2","unstructured":"ARX. [n. d.]. Framework. https:\/\/arx.deidentifier.org\/development\/framework\/."},{"key":"e_1_3_3_1_6_2","unstructured":"arx_hg [n. d.]. Configuration. https:\/\/arx.deidentifier.org\/anonymization-tool\/configuration\/#a23."},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"T\u00e2nia Carvalho Nuno Moniz Pedro Faria and Lu\u00eds Antunes. 2023. Survey on Privacy-Preserving Techniques for Microdata Publication. Comput. Surveys 55 14s (Dec. 2023) 1\u201342. https:\/\/dl.acm.org\/doi\/10.1145\/3588765.","DOI":"10.1145\/3588765"},{"key":"e_1_3_3_1_8_2","unstructured":"ENISA. 2018. Recommendations on shaping technology according to GDPR provisions - An overview on data pseudonymisation. https:\/\/www.enisa.europa.eu\/publications\/recommendations-on-shaping-technology-according-to-gdpr-provisions."},{"volume-title":"Pseudonymisation techniques and best practices","year":"2019","key":"e_1_3_3_1_9_2","unstructured":"ENSINA. 2019. Pseudonymisation techniques and best practices. Report\/Study. ESINA. https:\/\/www.enisa.europa.eu\/publications\/pseudonymisation-techniques-and-best-practices."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Benjamin\u00a0CM Fung Ke Wang Rui Chen and Philip\u00a0S Yu. 2010. Privacy-preserving data publishing: A survey of recent developments. ACM Computing Surveys (Csur) 42 4 (2010) 1\u201353.","DOI":"10.1145\/1749603.1749605"},{"key":"e_1_3_3_1_11_2","unstructured":"Alexander Gabel and Ina Schiering. 2019. Privacy patterns for pseudonymity. Privacy and Identity Management. Fairness Accountability and Transparency in the Age of Big Data: 13th IFIP WG 9.2 9.6\/11.7 11.6\/SIG 9.2. 2 International Summer School Vienna Austria August 20-24 2018 Revised Selected Papers 13 (2019) 155\u2013172."},{"key":"e_1_3_3_1_12_2","unstructured":"GDPR. [n. d.]. Data protection by design and by default. https:\/\/gdpr-info.eu\/art-25-gdpr\/."},{"key":"e_1_3_3_1_13_2","unstructured":"google [n. d.]. How Google Anonymizes Data. https:\/\/policies.google.com\/technologies\/anonymization?hl=en-US."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/1415472.1415481"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"U.\u00a0H. W.\u00a0A. Hewage R. Sinha and M.\u00a0Asif Naeem. 2023. Privacy-preserving data (stream) mining techniques and their impact on data mining accuracy: a systematic literature review. Artificial Intelligence Review 56 9 (Sept. 2023) 10427\u201310464. https:\/\/link.springer.com\/10.1007\/s10462-023-10425-3 annote = 10.1007\/s10462-023-10425-3.","DOI":"10.1007\/s10462-023-10425-3"},{"key":"e_1_3_3_1_16_2","unstructured":"ISO. 2017. Health informatics \u2013 Pseudonymization. ISO 25237:2017. 7\u00a0pages. https:\/\/www.iso.org\/standard\/63553.html."},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Abdul Majeed. 2023. Attribute-Centric and Synthetic Data Based Privacy Preserving Methods: A Systematic Review. Journal of Cybersecurity and Privacy 3 3 (Sept. 2023) 638\u2013661. https:\/\/www.mdpi.com\/2624-800X\/3\/3\/30.","DOI":"10.3390\/jcp3030030"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3698322.3698360"},{"key":"e_1_3_3_1_19_2","unstructured":"Anna Monreale Roberto Pellungrini et\u00a0al. 2023. A survey on privacy in human mobility. Transactions on Data Privacy 16 1 (2023) 51\u201382."},{"key":"e_1_3_3_1_20_2","unstructured":"Mariana\u00a0Mirra Monteiro. 2024. Patterns for anonymization and pseudonymization of datasets. Master\u2019s thesis. Faculdade de Engenharia da Universidade do Porto."},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Mehmet\u00a0Ercan Nergiz and Muhammed\u00a0Zahit G\u00f6k. 2014. Hybrid k-anonymity. Computers & security 44 (2014) 51\u201363.","DOI":"10.1016\/j.cose.2014.03.006"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Fl\u00e1vio Neves Rafael Souza Juliana Sousa Michel Bonfim and Vinicius Garcia. 2023. Data privacy in the Internet of Things based on anonymization: A review. Journal of Computer Security 31 3 (May 2023) 261\u2013291. https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospress&doi=10.3233\/JCS-210089.","DOI":"10.3233\/JCS-210089"},{"key":"e_1_3_3_1_23_2","unstructured":"Iyiola\u00a0E. Olatunji Jens Rauch Matthias Katzensteiner and Megha Khosla. 2022. A Review of Anonymization for Healthcare Data. Big Data (March 2022) big.2021.0169. https:\/\/www.liebertpub.com\/doi\/10.1089\/big.2021.0169."},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Fabian Prasser Johanna Eicher Helmut Spengler Raffael Bild and Klaus\u00a0A Kuhn. 2020. Flexible data anonymization using ARX\u2014Current status and challenges ahead. Software: Practice and Experience 50 7 (2020) 1277\u20131304.","DOI":"10.1002\/spe.2812"},{"key":"e_1_3_3_1_25_2","unstructured":"EUROPEAN DATA\u00a0PROTECTION SUPERVISOR. [n. d.]. https:\/\/www.edps.europa.eu\/data-protection\/data-protection\/glossary\/d_en."},{"key":"e_1_3_3_1_26_2","first-page":"51","volume-title":"Proceedings of the AMIA Annual Fall Symposium","author":"Sweeney Latanya","year":"1997","unstructured":"Latanya Sweeney. 1997. Guaranteeing anonymity when sharing medical data, the Datafly System.. In Proceedings of the AMIA Annual Fall Symposium. American Medical Informatics Association, 51."},{"key":"e_1_3_3_1_27_2","unstructured":"Latanya Sweeney. 2000. Simple demographics often identify people uniquely. Health (San Francisco) 671 2000 (2000) 1\u201334."},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"crossref","unstructured":"Olga Vovk Gunnar Piho and Peeter Ross. 2023. Methods and tools for healthcare data anonymization: a literature review. International Journal of General Systems 52 3 (April 2023) 326\u2013342. https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/03081079.2023.2173749 annote = 10.1080\/03081079.2023.2173749.","DOI":"10.1080\/03081079.2023.2173749"},{"key":"e_1_3_3_1_29_2","unstructured":"Ben Wolford. 2018. What is GDPR the EU\u2019s new data protection law? https:\/\/gdpr.eu\/what-is-gdpr\/."}],"event":{"name":"EuroPLoP 2024: 29th European Conference on Pattern Languages of Programs, People, and Practices","acronym":"EuroPLoP 2024","location":"Irsee Germany"},"container-title":["Proceedings of the 29th European Conference on Pattern Languages of Programs, People, and Practices"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3698322.3698337","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3698322.3698337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:42Z","timestamp":1750295922000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3698322.3698337"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,3]]},"references-count":28,"alternative-id":["10.1145\/3698322.3698337","10.1145\/3698322"],"URL":"https:\/\/doi.org\/10.1145\/3698322.3698337","relation":{},"subject":[],"published":{"date-parts":[[2024,7,3]]},"assertion":[{"value":"2024-12-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}