{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:38:57Z","timestamp":1760708337151,"version":"3.37.3"},"reference-count":140,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,8,23]],"date-time":"2011-08-23T00:00:00Z","timestamp":1314057600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BMC Med Inform Decis Mak"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1186\/1472-6947-11-53","type":"journal-article","created":{"date-parts":[[2011,8,23]],"date-time":"2011-08-23T16:36:42Z","timestamp":1314117402000},"source":"Crossref","is-referenced-by-count":18,"title":["De-identifying a public use microdata file from the Canadian national discharge abstract database"],"prefix":"10.1186","volume":"11","author":[{"given":"Khaled El","family":"Emam","sequence":"first","affiliation":[]},{"given":"David","family":"Paton","sequence":"additional","affiliation":[]},{"given":"Fida","family":"Dankar","sequence":"additional","affiliation":[]},{"given":"Gunes","family":"Koru","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,23]]},"reference":[{"key":"430_CR1","volume-title":"Sharing Research Data","author":"S Fienberg","year":"1985","unstructured":"Fienberg S, Martin M, Straf M: Sharing Research Data. 1985, Committee on National Statistics, National Research Council"},{"issue":"3","key":"430_CR2","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1136\/bmj.322.7285.530","volume":"322","author":"D Hutchon","year":"2001","unstructured":"Hutchon D: Publishing raw data and real time statistical analysis on e-journals. British Medical Journal. 2001, 322 (3): 530-","journal-title":"British Medical Journal"},{"key":"430_CR3","doi-asserted-by":"crossref","unstructured":"Are journals doing enough to prevent fraudulent publication?. Canadian Medical Association Journal. 2006, 174 (4): 431-","DOI":"10.1503\/cmaj.060085"},{"key":"430_CR4","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s10182-005-0197-6","volume":"89","author":"K Abraham","year":"2005","unstructured":"Abraham K: Microdata access and labor market research: The US experience. Allegmeines Statistisches Archiv. 2005, 89: 121-139. 10.1007\/s10182-005-0197-6.","journal-title":"Allegmeines Statistisches Archiv"},{"key":"430_CR5","doi-asserted-by":"crossref","unstructured":"Vickers A: Whose data set is it anyway?. Sharing raw data from randomized trials. Trials. 2006, 7 (15):","DOI":"10.1186\/1745-6215-7-15"},{"key":"430_CR6","doi-asserted-by":"crossref","first-page":"1069","DOI":"10.1136\/bmj.323.7320.1069a","volume":"323","author":"D Altman","year":"2001","unstructured":"Altman D, Cates C: Authors should make their data available. BMJ. 2001, 323: 1069-","journal-title":"BMJ"},{"key":"430_CR7","doi-asserted-by":"crossref","first-page":"1241","DOI":"10.1136\/bmj.312.7041.1241","volume":"312","author":"T Delamothe","year":"1996","unstructured":"Delamothe T: Whose data are they anyway?. BMJ. 1996, 312: 1241-1242.","journal-title":"BMJ"},{"key":"430_CR8","doi-asserted-by":"crossref","first-page":"1519","DOI":"10.1136\/bmj.308.6943.1519","volume":"308","author":"GD Smith","year":"1994","unstructured":"Smith GD: Increasing the accessibility of data. BMJ. 1994, 308: 1519-1520.","journal-title":"BMJ"},{"key":"430_CR9","unstructured":"Commission of the European Communities. On scientific information in the digital age: Access, dissemination and preservation. 2007"},{"key":"430_CR10","volume-title":"Medical Research Council and the Wellcome Trust","author":"W Lowrance","year":"2006","unstructured":"Lowrance W: Access to collections of data and materials for health research: A report to the Medical Research Council and the Wellcome Trust. Medical Research Council and the Wellcome Trust. 2006"},{"issue":"26","key":"430_CR11","doi-asserted-by":"publisher","first-page":"1669","DOI":"10.1056\/NEJM198612253152608","volume":"315","author":"B Yolles","year":"1986","unstructured":"Yolles B, Connors J, Grufferman S: Obtaining access to data from government-sponsored medical research. NEJM. 1986, 315 (26): 1669-1672. 10.1056\/NEJM198612253152608.","journal-title":"NEJM"},{"issue":"Suppl I","key":"430_CR12","doi-asserted-by":"crossref","first-page":"103S","DOI":"10.1016\/0895-4356(91)90183-A","volume":"44","author":"C Hogue","year":"1991","unstructured":"Hogue C: Ethical issues in sharing epidemiologic data. Journal of Clinical Epidemiology. 1991, 44 (Suppl I): 103S-107S.","journal-title":"Journal of Clinical Epidemiology"},{"issue":"2","key":"430_CR13","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/BF01073124","volume":"12","author":"T Hedrick","year":"1988","unstructured":"Hedrick T: Justifications for the sharing of social science data. Law and Human Behavior. 1988, 12 (2): 163-171. 10.1007\/BF01073124.","journal-title":"Law and Human Behavior"},{"key":"430_CR14","volume-title":"Improving access to and confidentiality of research data: Report of a workshop","author":"C Mackie","year":"2000","unstructured":"Mackie C, Bradburn N: Improving access to and confidentiality of research data: Report of a workshop. 2000, Washington: The National Academies Press"},{"key":"430_CR15","volume-title":"United Nations Economic and social Commission for Asia and the Pacific Workshop on Census and Survey Microdata","author":"E Boyko","year":"2008","unstructured":"Boyko E: Why disseminate microdata?. United Nations Economic and social Commission for Asia and the Pacific Workshop on Census and Survey Microdata. 2008"},{"key":"430_CR16","volume-title":"US Census Bureau","author":"W Winkler","year":"1997","unstructured":"Winkler W: Producing Public-Use Microdata That Are Analytically Valid And Confidential. US Census Bureau. 1997"},{"key":"430_CR17","volume-title":"2001 Census Public Use Microdata File: Individuals file user documentation","author":"Statistics Canada","year":"2001","unstructured":"Statistics Canada: 2001 Census Public Use Microdata File: Individuals file user documentation. 2001"},{"issue":"3","key":"430_CR18","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1111\/1467-985X.00212","volume":"164","author":"A Dale","year":"2001","unstructured":"Dale A, Elliot M: Proposals for the 2001 samples of anonymized records: An assessment of disclosure risk. Journal of the Royal Statistical Society. 2001, 164 (3): 427-447. 10.1111\/1467-985X.00212.","journal-title":"Journal of the Royal Statistical Society"},{"issue":"2","key":"430_CR19","doi-asserted-by":"publisher","first-page":"305","DOI":"10.2307\/2983043","volume":"154","author":"C Marsh","year":"1991","unstructured":"Marsh C, Skinner C, Arber S, Penhale B, Openshaw S, Hobcraft J, Lievesley D, Walford N: The case for samples of anonymized records from the 1991 census. Journal of the Royal Statistical Society, Series A (Statistics in Society). 1991, 154 (2): 305-340. 10.2307\/2983043.","journal-title":"Journal of the Royal Statistical Society, Series A (Statistics in Society)"},{"key":"430_CR20","volume-title":"Canadian Community Health Survey: Public Use Microdata File","author":"Statistics Canada","year":"2009","unstructured":"Statistics Canada: Canadian Community Health Survey: Public Use Microdata File. 2009, [\n                    http:\/\/www.statcan.gc.ca\/bsolc\/olc-cel\/olc-cel?catno=82M0013X&lang=eng\n                    \n                  ]"},{"issue":"1","key":"430_CR21","doi-asserted-by":"publisher","first-page":"35","DOI":"10.2307\/1403544","volume":"62","author":"C Marsh","year":"1994","unstructured":"Marsh C, Dale A, Skinner C: Safe data versus safe settings: Access to microdata from the British census. International Statistical Review. 1994, 62 (1): 35-53. 10.2307\/1403544.","journal-title":"International Statistical Review"},{"issue":"8","key":"430_CR22","first-page":"3","volume":"41","author":"L Alexander","year":"1978","unstructured":"Alexander L, Jabine T: Access to social security microdata files for research and statistical purposes. Social Security Bulletin. 1978, 41 (8): 3-17.","journal-title":"Social Security Bulletin"},{"key":"430_CR23","volume-title":"Comparative Effectiveness Research Public Use Data Pilot Project","author":"Department of Health and Human Services","year":"2010","unstructured":"Department of Health and Human Services: Comparative Effectiveness Research Public Use Data Pilot Project. 2010"},{"key":"430_CR24","volume-title":"CER-Public Use Data Pilot Project","author":"Department of Health and Human Services","year":"2010","unstructured":"Department of Health and Human Services: CER-Public Use Data Pilot Project. 2010"},{"key":"430_CR25","unstructured":"Consumer-Purchaser Disclosure Project. The state experience in health quality data collection. 2004"},{"key":"430_CR26","volume-title":"Healthcare cost and utilization project: SID\/SASD\/SEDD Application Kit","author":"Agency for Healthcare Research and Quality","year":"2010","unstructured":"Agency for Healthcare Research and Quality: Healthcare cost and utilization project: SID\/SASD\/SEDD Application Kit. 2010"},{"key":"430_CR27","volume-title":"2009-2010: Executive Summary","author":"Canadian Institute for Health Information","year":"2010","unstructured":"Canadian Institute for Health Information: Data Quality Documentation, Discharge Abstract Database. 2009-2010: Executive Summary. 2010"},{"key":"430_CR28","volume-title":"Privacy and security framework","author":"Canadian Institute for Health Information","year":"2010","unstructured":"Canadian Institute for Health Information: Privacy and security framework. 2010"},{"key":"430_CR29","volume-title":"Agency for Healthcare Research and Quality","author":"J Schoenman","year":"2005","unstructured":"Schoenman J, Sutton J, Kintala S, Love D, Maw R: The value of hospital discharge databases. Agency for Healthcare Research and Quality. 2005"},{"issue":"6","key":"430_CR30","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati P: Protecting respondents identities in microdata release. Knowledge and Data Engineering, IEEE Transactions on. 2001, 13 (6): 1010-1027. 10.1109\/69.971193. [10.1109\/69.971193]","journal-title":"Knowledge and Data Engineering, IEEE Transactions on"},{"issue":"5","key":"430_CR31","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L: k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems. 2002, 10 (5): 557-570. 10.1142\/S0218488502001648.","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"issue":"1","key":"430_CR32","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1111\/j.1467-9574.1992.tb01324.x","volume":"46","author":"C Skinner","year":"1992","unstructured":"Skinner C: On identification dislcosure and prediction disclosure for microdata. Statistics Neerlandica. 1992, 46 (1): 21-32. 10.1111\/j.1467-9574.1992.tb01324.x.","journal-title":"Statistics Neerlandica"},{"key":"430_CR33","unstructured":"Subcommittee on Disclosure Limitation Methodology - Federal Committee on Statistical Methodology. Statistical Policy Working paper 22: Report on statistical disclosure control. Statistical Policy Office, Office of Information and Regulatory Affairs, Office of Management and Budget. 1994"},{"issue":"1","key":"430_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1217299.1217300","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala A, Gehrke J, Kifer D: l-Diversity: Privacy Beyond k-Anonymity. Transactions on Knowledge Discovery from Data. 2007, 1 (1): 1-47. 10.1145\/1217299.1217300.","journal-title":"Transactions on Knowledge Discovery from Data"},{"key":"430_CR35","volume-title":"AOL Removes Search Data on Group of Web Users","author":"S Hansell","year":"2006","unstructured":"Hansell S: AOL Removes Search Data on Group of Web Users. 2006, New York Times"},{"key":"430_CR36","volume-title":"New York Times","author":"M Barbaro","year":"2006","unstructured":"Barbaro M, Zeller T: A Face Is Exposed for AOL Searcher No. 4417749. New York Times. 2006"},{"key":"430_CR37","volume-title":"AOL Moves to Increase Privacy on Search Queries New York Times","author":"T Zeller Jr","year":"2006","unstructured":"Zeller T: AOL Moves to Increase Privacy on Search Queries New York Times. 2006"},{"key":"430_CR38","volume-title":"Massachusetts Institute of Technology","author":"S Ochoa","year":"2001","unstructured":"Ochoa S, Rasmussen J, Robson C, Salib M: Reidentification of individuals in Chicago's homicide database: A technical and legal study. Massachusetts Institute of Technology. 2001"},{"key":"430_CR39","volume-title":"Robust de-anonymization of large datasets (how to break anonymity of the Netflix prize dataset)","author":"A Narayanan","year":"2008","unstructured":"Narayanan A, Shmatikov V: Robust de-anonymization of large datasets (how to break anonymity of the Netflix prize dataset). 2008, University of Texas at Austin"},{"key":"430_CR40","unstructured":"Appellate Court of Illinois - Fifth District. The Southern Illinoisan v. Department of Public Health. 2004"},{"key":"430_CR41","unstructured":"The Supreme Court of the State of Illinois. Southern Illinoisan vs. The Illinois Department of Public Health. 2006, Accessed on: February 1, 2011, [\n                    http:\/\/www.state.il.us\/court\/opinions\/supremecourt\/2006\/february\/opinions\/html\/98712.htm\n                    \n                  ]"},{"key":"430_CR42","volume-title":"Mike Gordon vs. The Minister of Health: Affidavit of Bill Wilson","author":"Federal Court (Canada)","year":"2006","unstructured":"Federal Court (Canada): Mike Gordon vs. The Minister of Health: Affidavit of Bill Wilson. 2006"},{"issue":"2","key":"430_CR43","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/MSP.2009.47","volume":"7","author":"K El Emam","year":"2009","unstructured":"El Emam K, Kosseim P: Privacy Interests in Prescription Records, Part 2: Patient Privacy. IEEE Security and Privacy. 2009, 7 (2): 75-78.","journal-title":"IEEE Security and Privacy"},{"key":"430_CR44","volume-title":"Fourth National HIPAA Summit West","author":"D Lafky","year":"2010","unstructured":"Lafky D: The Safe Harbor method of de-identification: An empirical test. Fourth National HIPAA Summit West. 2010"},{"key":"430_CR45","doi-asserted-by":"crossref","unstructured":"Fung BCM, Wang K, Chen R, Yu PS: Privacy-Preserving Data Publishing: A Survey of Recent Developments. ACM Computing Surveys. 2010, 42 (4):","DOI":"10.1145\/1749603.1749605"},{"issue":"1-2","key":"430_CR46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/1900000008","volume":"2","author":"B-C Chen","year":"2009","unstructured":"Chen B-C, Kifer D, LeFevre K, Machanavajjhala A: Privacy preserving data publishing. Foundations and Trends in Databases. 2009, 2 (1-2): 1-167.","journal-title":"Foundations and Trends in Databases"},{"issue":"8","key":"430_CR47","first-page":"3","volume":"41","author":"LA Alexander","year":"1978","unstructured":"Alexander LA, Jabine TB: Access to social security microdata files for research and statistical purposes. Social Security Bulletin. 1978, 41 (8): 3-17.","journal-title":"Social Security Bulletin"},{"issue":"1","key":"430_CR48","first-page":"95","volume":"22","author":"T de Waal","year":"1996","unstructured":"de Waal T, Willenborg L: A view on statistical disclosure control for microdata. Survey Methodology. 1996, 22 (1): 95-103.","journal-title":"Survey Methodology"},{"key":"430_CR49","volume-title":"Lecture Notes in Statistics","author":"L Willenborg","year":"2001","unstructured":"Willenborg L, de Waal T: Elements of Statistical Disclosure Control. Lecture Notes in Statistics. 2001, 155: Springer"},{"key":"430_CR50","first-page":"113","volume-title":"North-Holland: Amsterdam","author":"J Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer J, Torra Vc: Theory and Practical Applications for Statistical Agencies. North-Holland: Amsterdam. 2002, 113-134."},{"key":"430_CR51","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1111\/1467-9868.00365","volume":"64","author":"C Skinner","year":"2002","unstructured":"Skinner C, Elliot M: A measure of disclosure risk for microdata. Journal of the Royal Statistical Society Series B-Statistical Methodology. 2002, 64: 855--867. 10.1111\/1467-9868.00365.","journal-title":"Journal of the Royal Statistical Society Series B-Statistical Methodology"},{"key":"430_CR52","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s10618-005-0007-5","volume":"11","author":"J Domingo-Ferrer","year":"2005","unstructured":"Domingo-Ferrer J, Torra Vc: Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation. Data Min Knowl Discov. 2005, 11: 195-212. 10.1007\/s10618-005-0007-5. [10.1007\/s10618-005-0007-5]","journal-title":"Data Min Knowl Discov"},{"key":"430_CR53","first-page":"67","volume":"1","author":"M Templ","year":"2008","unstructured":"Templ M: Statistical Disclosure Control for Microdata Using the R-Package sdcMicro. Trans Data Privacy. 2008, 1: 67--85.","journal-title":"Trans Data Privacy"},{"key":"430_CR54","volume-title":"Joint ECE\/Eurostat Work Session on Statistical Data Confidentiality, Luxembourg","author":"RA Dandekar","year":"2003","unstructured":"Dandekar RA: Cost effective implementation of synthetic tabulation (a.k.a. controlled tabular adjustments) in legacy and new statistical data publication systems. Joint ECE\/Eurostat Work Session on Statistical Data Confidentiality, Luxembourg. 2003"},{"key":"430_CR55","volume-title":"Privacy in statistical databases","author":"RA Dandekar","year":"2004","unstructured":"Dandekar RA: Maximum Utility-Minimum Information Loss Table Server Design for Statistical Disclosure Control of Tabular Data. Privacy in statistical databases. Edited by: Josep Domingo-Ferrer, Vicen\\cc Torra. 2004"},{"key":"430_CR56","first-page":"171","volume-title":"European Journal of Operational Research","author":"J Castro","year":"2004","unstructured":"Castro J: Minimum-distance controlled perturbation methods for large-scale tabular data protection. European Journal of Operational Research. 2004, 171-"},{"key":"430_CR57","volume-title":"Privacy in statistical databases","author":"LH Cox","year":"2004","unstructured":"Cox LH, Kelly JP, Patil R: Balancing quality and confidentiality for multivariate tabular data. Privacy in statistical databases. Edited by: Josep Domingo-Ferrer, Torra V. 2004"},{"key":"430_CR58","volume-title":"Elsevier Science","author":"P Doyle","year":"2001","unstructured":"Doyle P, Lane JI, Theeuwes JJM, Zayatz LM: Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies. Elsevier Science. 2001, 1","edition":"1"},{"key":"430_CR59","volume-title":"Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies","author":"J Domingo-Ferrer","year":"2001","unstructured":"Domingo-Ferrer J, Torra Vc: Disclosure Control Methods and Information Loss for Microdata. Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies. Edited by: P. Doyle, et al. 2001, Elsevier Science"},{"key":"430_CR60","first-page":"370","volume-title":"Proceedings of the ASA Section on Survey Research Methodology","author":"JJ Kim","year":"1986","unstructured":"Kim JJ: A method for limiting disclosure in microdata based on random noise and transformation. Proceedings of the ASA Section on Survey Research Methodology. 1986, American Statistical Association: Alexandria, Virginia, 370-375."},{"issue":"2","key":"430_CR61","first-page":"407","volume":"9","author":"RJA Little","year":"1993","unstructured":"Little RJA: Statistical Analysis of Masked Data. Journal of Official Statistics. 1993, 9 (2): 407-426.","journal-title":"Journal of Official Statistics"},{"key":"430_CR62","first-page":"802","volume-title":"Proceedings of the American Statistical Association, Survey Methods Section","author":"G Sullivan","year":"1989","unstructured":"Sullivan G, Fuller WA: The use of measurement error to avoid disclosure. Proceedings of the American Statistical Association, Survey Methods Section. 1989, American Statistical Association: Alexandria, Virginia, 802-808."},{"key":"430_CR63","first-page":"435","volume-title":"Proceedings of the American Statistical Association, Survey Methods Section","author":"G Sullivan","year":"1990","unstructured":"Sullivan G, Fuller WA: The construction of masking error for categorical variables. Proceedings of the American Statistical Association, Survey Methods Section. 1990, American Statistical Association: Alexandria, Virginia, 435-440."},{"key":"430_CR64","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s10115-004-0173-6","volume":"7","author":"H Kargupta","year":"2005","unstructured":"Kargupta H, Datta S, Wang Q, Sivakumar K: Random data perturbation techniques and privacy preserving data mining. Knowledge and Information Systems. 2005, 7: 387-414. 10.1007\/s10115-004-0173-6.","journal-title":"Knowledge and Information Systems"},{"issue":"3","key":"430_CR65","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1145\/3979.4017","volume":"10","author":"CK Liew","year":"1985","unstructured":"Liew CK, Choi UJ, Liew CJ: A Data Distortion by Probability Distribution. ACM Transactions on Database Systems. 1985, 10 (3): 395-411. 10.1145\/3979.4017.","journal-title":"ACM Transactions on Database Systems"},{"key":"430_CR66","volume-title":"Proceedings of the 1992 Symposium on Design and Analysis of Longitudinal Surveys","author":"D Defays","year":"1993","unstructured":"Defays D, Nanopoulos P: Panels of enterprises and confidentiality: The small aggregates method. Proceedings of the 1992 Symposium on Design and Analysis of Longitudinal Surveys. 1993, Statistics Canada: Ottowa, Canada"},{"issue":"1 i 2","key":"430_CR67","first-page":"219","volume":"21","author":"P Nanopoulos","year":"1997","unstructured":"Nanopoulos P: Confidentiality In The European Statistical System. Q\u00fcestii\u00f3. 1997, 21 (1 i 2): 219-220.","journal-title":"Q\u00fcestii\u00f3"},{"key":"430_CR68","first-page":"449","volume":"14","author":"D Defays","year":"1998","unstructured":"Defays D, Anwar M: Masking data using micro-aggregation. Journal of Official Statistics. 1998, 14: 449-461.","journal-title":"Journal of Official Statistics"},{"issue":"1","key":"430_CR69","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/69.979982","volume":"14","author":"J Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer J, Mateo-Sanz J: Practical data-oriented microaggregation for statistical disclosure control. IEEE Transactions on Knowledge and Data Engineering. 2002, 14 (1): 189-201. 10.1109\/69.979982. [10.1109\/69.979982]","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"5","key":"430_CR70","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1142\/S0218488502001582","volume":"10","author":"G Sande","year":"2002","unstructured":"Sande G: Exact and approximate methods for data directed microaggregation in one or more dimensions. International Journal of Uncertainty, Fuziness, and Knowledge-Based Systems. 2002, 10 (5): 459-476. 10.1142\/S0218488502001582.","journal-title":"International Journal of Uncertainty, Fuziness, and Knowledge-Based Systems"},{"key":"430_CR71","volume-title":"Privacy in Statistical Databases","author":"V Torra","year":"2004","unstructured":"Torra V: Microaggregation for categorical variables: A median based approach. Privacy in Statistical Databases. 2004, Springer LNCS"},{"issue":"11-12","key":"430_CR72","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S0898-1221(99)00281-3","volume":"38","author":"J Domingo-Ferrer","year":"1999","unstructured":"Domingo-Ferrer J, Mateo-Sanz JM: Resampling for statistical confidentiality in contingency tables. Computers and Mathematics with Applications. 1999, 38 (11-12): 13-32. 10.1016\/S0898-1221(99)00281-3.","journal-title":"Computers and Mathematics with Applications"},{"key":"430_CR73","volume-title":"Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies","author":"J Domingo-Ferrer","year":"2001","unstructured":"Domingo-Ferrer J, Torra V: Disclosure Control Methods and Information Loss for Microdata. Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies. Edited by: P. Doyle, et al. 2001"},{"key":"430_CR74","volume-title":"International Conference on Availability, Reliability and Security","author":"J Jimenez","year":"2009","unstructured":"Jimenez J, Torra V: Utility and Risk of JPEG-based Continuous Microdata Protection Methods. International Conference on Availability, Reliability and Security. 2009"},{"issue":"2","key":"430_CR75","first-page":"461","volume":"9","author":"DB Rubin","year":"1996","unstructured":"Rubin DB: Discussion Statistical Disclosure Limitation (also cited as: Satisfying confidentiality constraints through the use of synthetic multiply-imputed microdata). Journal of Official Statistics. 1996, 9 (2): 461--468.","journal-title":"Journal of Official Statistics"},{"key":"430_CR76","volume-title":"International Seminar on Statistical Confidentiality","author":"GR Heer","year":"1993","unstructured":"Heer GR: A Bootstrap Procedure to Preserve Statistical Confidentiality in Contingency Tables. International Seminar on Statistical Confidentiality. Edited by: D. Lievesley. 1993, Luxembourg, 261-271."},{"issue":"3","key":"430_CR77","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1287\/opre.50.3.501.7745","volume":"50","author":"R Gopal","year":"2002","unstructured":"Gopal R, Garfinkel R, Goes P: Confidentiality via Camouflage: The CVC Approach to Disclosure Limitation When Answering Queries to Databases. OPERATIONS RESEARCH. 2002, 50 (3): 501-516. 10.1287\/opre.50.3.501.7745.","journal-title":"OPERATIONS RESEARCH"},{"issue":"4","key":"430_CR78","first-page":"463","volume":"14","author":"JP Gouweleeuw","year":"1998","unstructured":"Gouweleeuw JP, Kooiman P, Willenborg LCRJ, P.-P dW: dW. Post Randomisation for Statistical Disclosure Control: Theory and Implementation. Journal of Official Statistics. 1998, 14 (4): 463--478.","journal-title":"Journal of Official Statistics"},{"key":"430_CR79","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-4028-0","volume-title":"Statistical Disclosure Control in Practice","author":"L Willenborg","year":"1996","unstructured":"Willenborg L, de Waal T: Statistical Disclosure Control in Practice. 1996, Springer, 1","edition":"1"},{"key":"430_CR80","volume-title":"3rd International Seminar on Statistical Confidentiality","author":"A Hundepool","year":"1996","unstructured":"Hundepool A, Willenborg L: $\\mu$- and $\\tau$-argus: Software for Statistical Disclosure Control. 3rd International Seminar on Statistical Confidentiality. 1996, Bled"},{"key":"430_CR81","volume-title":"Protecting privacy when disclosing information: k-anonymity and its enforcement through generalisation and suppression","author":"P Samarati","year":"1998","unstructured":"Samarati P, Sweeney L: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalisation and suppression. 1998, SRI International"},{"issue":"6","key":"430_CR82","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati P: Protecting respondents' identities in microdata release. IEEE Transactions on Knowledge and Data Engineering. 2001, 13 (6): 1010-1027. 10.1109\/69.971193.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"5","key":"430_CR83","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L: Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. 2002, 10 (5): 571-588. 10.1142\/S021848850200165X.","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"430_CR84","volume-title":"Secure Data Management in Decentralized Systems","author":"V Ciriani","year":"2007","unstructured":"Ciriani V, De Capitani di Vimercati SSF, Samarati P: k-Anonymity. Secure Data Management in Decentralized Systems. 2007, Springer"},{"key":"430_CR85","volume-title":"Data Privacy through Optimal k-Anonymization Proceedings of the 21st International Conference on Data Engineering","author":"R Bayardo","year":"2005","unstructured":"Bayardo R, Agrawal R: Data Privacy through Optimal k-Anonymization Proceedings of the 21st International Conference on Data Engineering. 2005"},{"key":"430_CR86","volume-title":"Proceedings of the ACM SIGKDD International Conference on Data Mining and Knowledge Discovery","author":"V Iyengar","year":"2002","unstructured":"Iyengar V: Transforming data to satisfy privacy constraints. Proceedings of the ACM SIGKDD International Conference on Data Mining and Knowledge Discovery. 2002"},{"key":"430_CR87","volume-title":"A Globally Optimal k-Anonymity Method for the De-identification of Health Data Journal of the American Medical Informatics Association","author":"K El Emam","year":"2009","unstructured":"El Emam K, Dankar F, Issa R, Jonker E, Amyot D, Cogo E, Corriveau J-P, Walker M, Chowdhury S, Vaillancourt R, Roffey T, Bottomley J: A Globally Optimal k-Anonymity Method for the De-identification of Health Data Journal of the American Medical Informatics Association. 2009"},{"key":"430_CR88","volume-title":"A Network of Excellence in the European Statistical System in the field of Statistical Disclosure Control","author":"A Hundepool","year":"2010","unstructured":"Hundepool A, Domingo-Ferrer J, Franconi L, Giessing S, Lenz R, Naylor J, Nordholt ES, Seri G, Wolf P-PD: Handbook on Statistical Disclosure Control (Version 1.2). A Network of Excellence in the European Statistical System in the field of Statistical Disclosure Control. 2010"},{"issue":"2","key":"430_CR89","first-page":"50","volume":"1","author":"WE Winkler","year":"1998","unstructured":"Winkler WE: Re-identification methods for evaluating the confidentiality of analytically valid microdata. Research in Official Statistics. 1998, 1 (2): 50--69.","journal-title":"Research in Official Statistics"},{"key":"430_CR90","first-page":"807","volume-title":"Proceedings of ETK-NTTS 2001","author":"J Domingo-Ferrer","year":"2001","unstructured":"Domingo-Ferrer J, Mateo-sanz JM, Torra Vc: Comparing SDC Methods for Microdata on the Basis of Information Loss and Disclosure. Proceedings of ETK-NTTS 2001. 2001, Luxemburg: Eurostat, 807-826. Eurostat"},{"key":"430_CR91","first-page":"27","volume-title":"The Bell System Technical Journal","author":"CE Shannon","year":"1948","unstructured":"Shannon CE: A Mathematical Theory of Communication. The Bell System Technical Journal. 1948, 27-"},{"key":"430_CR92","volume-title":"The Bell System Technical Journal","author":"CE Shannon","year":"1949","unstructured":"Shannon CE: Communication Theory of Secrecy Systems. The Bell System Technical Journal. 1949"},{"key":"430_CR93","unstructured":"de Waal T, Willenborg L: Information loss through global recoding and local suppression. Netherlands Official Statistics. 1999, 17-20. Spring Special Issue"},{"key":"430_CR94","volume-title":"Statistics Netherlands, Division Research and Development, Department of Statistical Methods","author":"P Kooiman","year":"1997","unstructured":"Kooiman P, Willenborg L, Gouweleeuw J: PRAM: a method for disclosure limitation of microdata. Statistics Netherlands, Division Research and Development, Department of Statistical Methods. 1997"},{"issue":"2","key":"430_CR95","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1109\/TKDE.2008.129","volume":"21","author":"A Gionis","year":"2009","unstructured":"Gionis A, Tassa T: k-Anonymization with Minimal Loss of Information. Knowledge and Data Engineering, IEEE Transactions on. 2009, 21 (2): 206-219.","journal-title":"Knowledge and Data Engineering, IEEE Transactions on"},{"issue":"5","key":"430_CR96","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1197\/jamia.M3144","volume":"16","author":"K El Emam","year":"2009","unstructured":"El Emam K, Dankar FK, Issa R, Jonker E, Amyot D, Cogo E, Corriveau J-P, Walker M, Chowdhury S, Vaillancourt R, Roffey T, Bottomley J: A globally optimal k-anonymity method for the de-identification of health data. Journal of the American Medical Informatics Association. 2009, 16 (5): 670-82. 10.1197\/jamia.M3144. [10.1197\/jamia.M3144]","journal-title":"Journal of the American Medical Informatics Association"},{"key":"430_CR97","volume-title":"Massachusetts Institute of Technology","author":"L Sweeney","year":"2001","unstructured":"Sweeney L: Computational disclosure control: A primer on data privacy protection. Massachusetts Institute of Technology. 2001"},{"key":"430_CR98","first-page":"217","volume-title":"Proceedings of the 21st International Conference on Data Engineering","author":"RJ Bayardo","year":"2005","unstructured":"Bayardo RJ, Agrawal R: Data privacy through optimal k-anonymization. Proceedings of the 21st International Conference on Data Engineering. 2005, 217-228."},{"issue":"5","key":"430_CR99","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1197\/jamia.M2716","volume":"15","author":"K El Emam","year":"2008","unstructured":"El Emam K, Dankar FK: Protecting privacy using k-anonymity. Journal of the American Medical Informatics Association. 2008, 15 (5): 627-37. 10.1197\/jamia.M2716. [10.1197\/jamia.M2716]","journal-title":"Journal of the American Medical Informatics Association"},{"key":"430_CR100","first-page":"25","volume-title":"Proceedings of the 22nd International Conference on Data Engineering","author":"K LeFevre","year":"2006","unstructured":"LeFevre K, DeWitt DJ, Ramakrishnan R: Mondrian Multidimensional K-Anonymity. Proceedings of the 22nd International Conference on Data Engineering. 2006, IEEE Computer Society: Washington, DC, USA, 25-"},{"key":"430_CR101","volume-title":"SIAM International Conference on Data Mining (SDM)","author":"B Hore","year":"2007","unstructured":"Hore B, Jammalamadaka RC, Mehrotra S: Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach. SIAM International Conference on Data Mining (SDM). 2007"},{"key":"430_CR102","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/1233321.1233324","volume":"8","author":"J Xu","year":"2006","unstructured":"Xu J, Wang W, Pei J, Wang X, Shi B, Fu AW-C: Utility-based anonymization for privacy preservation with less information loss. SIGKDD Explorations Newsletter. 2006, 8: 21--30. 10.1145\/1233321.1233324. [\n                    http:\/\/doi.acm.org\/10.1145\/1233321.1233324\n                    \n                  ]","journal-title":"SIGKDD Explorations Newsletter"},{"key":"430_CR103","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1016\/j.datak.2007.03.009","volume":"63","author":"ME Nergiz","year":"2007","unstructured":"Nergiz ME, Clifton C: Thoughts on k-anonymization. Data Knowl Eng. 2007, 63: 622-645. 10.1016\/j.datak.2007.03.009. [\n                    http:\/\/dx.doi.org\/10.1016\/j.datak.2007.03.009\n                    \n                  ]","journal-title":"Data Knowl Eng"},{"key":"430_CR104","unstructured":"note on the individual risk of disclosure A. Silvia Polettini. Istituto Nazionale di Statistica. 2003"},{"key":"430_CR105","volume-title":"ACM Trans Knowl Discov Data","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M: L-diversity: Privacy beyond k-anonymity. ACM Trans Knowl Discov Data. 2007, 1: [\n                    http:\/\/doi.acm.org\/10.1145\/1217299.1217302\n                    \n                  ]"},{"key":"430_CR106","volume-title":"Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects","author":"L Sweeney","year":"1997","unstructured":"Sweeney L: Datafly: A system for providing anoinymity to medical data. Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects. 1997"},{"key":"430_CR107","doi-asserted-by":"crossref","DOI":"10.1201\/9781420091502","volume-title":"Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques","author":"BCM Fung","year":"2010","unstructured":"Fung BCM, Wang K, Fu AW-C, Yu PS: Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques. 2010, Chapman and Hall\/CRC, 1","edition":"1"},{"key":"430_CR108","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1145\/1142473.1142500","volume-title":"Proceedings of the 2006 ACM SIGMOD international conference on Management of data","author":"X Xiao","year":"2006","unstructured":"Xiao X, Tao Y: Personalized privacy preservation. Proceedings of the 2006 ACM SIGMOD international conference on Management of data. 2006, ACM: New York, NY, USA, 229-240."},{"key":"430_CR109","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1145\/775047.775089","volume-title":"Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining","author":"VS Iyengar","year":"2002","unstructured":"Iyengar VS: Transforming data to satisfy privacy constraints. Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining. 2002, ACM: New York, NY, USA, 279-288."},{"key":"430_CR110","first-page":"205","volume-title":"ICDE 2005. Proceedings. 21st International Conference on Data Engineering","author":"BCM Fung","year":"2005","unstructured":"Fung BCM, Wang K, Yu PS: Top-down specialization for information and privacy preservation. ICDE 2005. Proceedings. 21st International Conference on Data Engineering. 2005, 205-216."},{"issue":"5","key":"430_CR111","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/TKDE.2007.1015","volume":"19","author":"BCM Fung","year":"2007","unstructured":"Fung BCM, Wang K, Yu PS: Anonymizing Classification Data for Privacy Preservation. IEEE Transactions on Knowledge and Data Engineering (TKDE). 2007, 19 (5): 711--725.","journal-title":"IEEE Transactions on Knowledge and Data Engineering (TKDE)"},{"issue":"3","key":"430_CR112","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MSP.2010.103","volume":"8","author":"K El Emam","year":"2010","unstructured":"El Emam K: Risk-based de-identification of health data. IEEE Security and Privacy. 2010, 8 (3): 64-67.","journal-title":"IEEE Security and Privacy"},{"key":"430_CR113","volume-title":"Handbook for creating public use microdata files","author":"Statistics Canada","year":"2006","unstructured":"Statistics Canada: Handbook for creating public use microdata files. 2006"},{"key":"430_CR114","unstructured":"Cancer Care Ontario Data Use and Disclosure Policy. Cancer Care Ontario. 2005"},{"key":"430_CR115","unstructured":"Security and confidentiality policies and procedures. Health Quality Council. 2004"},{"key":"430_CR116","unstructured":"Privacy code. Health Quality Council. 2004"},{"key":"430_CR117","unstructured":"Privacy code. Manitoba Center for Health Policy. 2002"},{"key":"430_CR118","unstructured":"Subcommittee on Disclosure Limitation Methodology - Federal Committee on Statistical Methodology. Working paper 22: Report on statistical disclosure control. 1994, Office of Management and Budget"},{"key":"430_CR119","volume-title":"Therapeutic abortion survey","author":"Canada Statistics","year":"2007","unstructured":"Statistics Canada: Therapeutic abortion survey. 2007"},{"key":"430_CR120","unstructured":"Office of the Information and Privacy Commissioner of British Columbia. 1998, Order No. 261-1998"},{"key":"430_CR121","unstructured":"Office of the Information and Privacy Commissioner of Ontario."},{"key":"430_CR122","unstructured":"Ministry of Health and Long Term care (Ontario). Corporate Policy. 1984, 3-1-21"},{"key":"430_CR123","volume-title":"Private Lives and Public Policies: Confidentiality and Accessibility of Government Statistics","author":"G Duncan","year":"1993","unstructured":"Duncan G, Jabine T, de Wolf S: Private Lives and Public Policies: Confidentiality and Accessibility of Government Statistics. 1993, National Academies Press"},{"issue":"1","key":"430_CR124","first-page":"95","volume":"22","author":"A de Waal","year":"1996","unstructured":"de Waal A, Willenborg L: A view on statistical disclosure control for microdata. Survey Methodology. 1996, 22 (1): 95-103.","journal-title":"Survey Methodology"},{"key":"430_CR125","unstructured":"Office of the Privacy Commissioner of Quebec (CAI). Chenard v. Ministere de l'agriculture, des pecheries et de l'alimentation (141). 1997"},{"key":"430_CR126","unstructured":"National Center for Education Statistics. NCES Statistical Standards. 2003, US Department of Education"},{"key":"430_CR127","volume-title":"Report to the Secretary of the US Department of Health and Human Services on Enhanced Protections for Uses of Health Data: A Stewardship Framework for \"Secondary Uses\" of Electronically Collected and Transmitted Health Data","author":"National Committee on Vital and Health Statistics","year":"2007","unstructured":"National Committee on Vital and Health Statistics: Report to the Secretary of the US Department of Health and Human Services on Enhanced Protections for Uses of Health Data: A Stewardship Framework for \"Secondary Uses\" of Electronically Collected and Transmitted Health Data. 2007"},{"key":"430_CR128","volume-title":"Workshop on the HIPAA Privacy Rule's De-Identification Standard","author":"L Sweeney","year":"2010","unstructured":"Sweeney L: Data sharing under HIPAA: 12 years later. Workshop on the HIPAA Privacy Rule's De-Identification Standard. 2010, Department of Health and Human Services"},{"issue":"4","key":"430_CR129","doi-asserted-by":"publisher","first-page":"e28","DOI":"10.2196\/jmir.8.4.e28","volume":"8","author":"K El Emam","year":"2006","unstructured":"El Emam K, Jabbouri S, Sams S, Drouet Y, Power M: Evaluating common de-identification heuristics for personal health information. Journal of Medical Internet Research. 2006, 8 (4): e28-10.2196\/jmir.8.4.e28. [PMID: 17213047 ]","journal-title":"Journal of Medical Internet Research"},{"key":"430_CR130","volume-title":"De-Identification Guidelines for Personal Health Information","author":"K El Emam","year":"2007","unstructured":"El Emam K, Jonker E, Sams S, Neri E, Neisa A, Gao T, Chowdhury S: De-Identification Guidelines for Personal Health Information. 2007, Report produced for the Office of the Privacy Commissioner of Canada: Ottawa"},{"issue":"2","key":"430_CR131","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1136\/jamia.2009.000026","volume":"17","author":"K Benitez","year":"2010","unstructured":"Benitez K, Malin B: Evaluating re-identification risks with respect to the HIPAA privacy rule. Journal of the American Medical Informatics Association. 2010, 17 (2): 169-177. 10.1136\/jamia.2009.000026.","journal-title":"Journal of the American Medical Informatics Association"},{"key":"430_CR132","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/978-3-540-36519-8_7","volume-title":"Information Fusion in Data Mining","author":"V Torra","year":"2003","unstructured":"Torra V, Domingo-Ferrer J: Record linkage methods for multidatabase data mining. Information Fusion in Data Mining. 2003, 101-132."},{"key":"430_CR133","first-page":"233","volume-title":"Using Mahalanobis distance-based record linkage for dislcosure risk assessment","author":"V Torra","year":"2006","unstructured":"Torra V, Abowd J, Domingo-Ferrer J: Using Mahalanobis distance-based record linkage for dislcosure risk assessment. 2006, 233-242. Springer LNCS"},{"key":"430_CR134","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1197\/jamia.M2716","volume":"15","author":"K El Emam","year":"2008","unstructured":"El Emam K, Dankar F: Protecting privacy using k-anonymity. Journal of the American Medical Informatics Association. 2008, 15: 627-637. 10.1197\/jamia.M2716.","journal-title":"Journal of the American Medical Informatics Association"},{"key":"430_CR135","unstructured":"World Health Organization: International Classification of Diseases. [\n                    http:\/\/www.who.int\/classifications\/icd\/en\/\n                    \n                  ]"},{"key":"430_CR136","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1136\/jamia.2009.002725","volume":"17","author":"G Loukides","year":"2010","unstructured":"Loukides G, Denny J, Malin B: The disclosure of diagnosis codes can breach research participants' privacy. Journal of the American Medical Informatics Association. 2010, 17: 322-327.","journal-title":"Journal of the American Medical Informatics Association"},{"key":"430_CR137","doi-asserted-by":"crossref","unstructured":"El Emam K: Methods for the de-identification of electronic health records for genomic research. Genome Medicine. 2011, 3 (25):","DOI":"10.1186\/gm239"},{"key":"430_CR138","volume-title":"Proceedings of the 23rd Conference on the Principles of Database Systems","author":"A Meyerson","year":"2004","unstructured":"Meyerson A, Williams R: On the complexity of optimal k-anonymity. Proceedings of the 23rd Conference on the Principles of Database Systems. 2004"},{"key":"430_CR139","volume-title":"Proceedings of the 10th International Conference on Database Theory (ICDT05)","author":"G Aggarwal","year":"2005","unstructured":"Aggarwal G, Feder T, Kenthapadi K, Motwani R, Panigrahy R, Thomas D, Zhu A: Anonymizing Tables. Proceedings of the 10th International Conference on Database Theory (ICDT05). 2005"},{"issue":"4","key":"430_CR140","first-page":"307","volume":"62","author":"K El Emam","year":"2009","unstructured":"El Emam K, Dankar F, Vaillancourt R, Roffey T, Lysyk M: Evaluating patient re-identification risk from hospital prescription records. Canadian Journal of Hospital Pharmacy. 2009, 62 (4): 307-319.","journal-title":"Canadian Journal of Hospital Pharmacy"}],"container-title":["BMC Medical Informatics and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1472-6947-11-53\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-11-53.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-11-53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-11-53.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,22]],"date-time":"2019-01-22T09:51:27Z","timestamp":1548150687000},"score":1,"resource":{"primary":{"URL":"https:\/\/bmcmedinformdecismak.biomedcentral.com\/articles\/10.1186\/1472-6947-11-53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8,23]]},"references-count":140,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["430"],"URL":"https:\/\/doi.org\/10.1186\/1472-6947-11-53","relation":{},"ISSN":["1472-6947"],"issn-type":[{"type":"electronic","value":"1472-6947"}],"subject":[],"published":{"date-parts":[[2011,8,23]]},"article-number":"53"}}