{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T23:45:08Z","timestamp":1773272708687,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,7,24]],"date-time":"2013-07-24T00:00:00Z","timestamp":1374624000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BMC Med Inform Decis Mak"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1186\/1472-6947-13-75","type":"journal-article","created":{"date-parts":[[2013,7,24]],"date-time":"2013-07-24T19:58:49Z","timestamp":1374695929000},"source":"Crossref","is-referenced-by-count":38,"title":["Pseudonymization of patient identifiers for translational research"],"prefix":"10.1186","volume":"13","author":[{"given":"Harald","family":"Aamot","sequence":"first","affiliation":[]},{"given":"Christian Dominik","family":"Kohl","sequence":"additional","affiliation":[]},{"given":"Daniela","family":"Richter","sequence":"additional","affiliation":[]},{"given":"Petra","family":"Knaup-Gregori","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,24]]},"reference":[{"issue":"6117","key":"702_CR1","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1126\/science.1229566","volume":"339","author":"M Gymrek","year":"2013","unstructured":"Gymrek M, McGuire AL, Golan D, Halperin E, Erlich Y: Identifying personal genomes by surname inference. Science. 2013, 339 (6117): 321-324. 10.1126\/science.1229566.","journal-title":"Science"},{"issue":"5681","key":"702_CR2","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1126\/science.1095019","volume":"305","author":"Z Lin","year":"2004","unstructured":"Lin Z, Owen AB, Altman RB: Genetics. Genomic research and human subject privacy. Science. 2004, 305 (5681): 183-10.1126\/science.1095019.","journal-title":"Science"},{"issue":"1","key":"702_CR3","doi-asserted-by":"crossref","first-page":"38","DOI":"10.3414\/ME9132","volume":"48","author":"HU Prokosch","year":"2009","unstructured":"Prokosch HU, Ganslandt T: Perspectives for medical informatics. Reusing the electronic medical record for clinical research. Methods Inf Med. 2009, 48 (1): 38-44.","journal-title":"Methods Inf Med"},{"issue":"2","key":"702_CR4","doi-asserted-by":"publisher","first-page":"e12","DOI":"10.1371\/journal.pcbi.0030012","volume":"3","author":"JP Mathew","year":"2007","unstructured":"Mathew JP, Taylor BS, Bader GD, Pyarajan S, Antoniotti M, Chinnaiyan AM, Sander C, Burakoff SJ, Mishra B: From bytes to bedside: data integration and computational biology for translational cancer research. PLoS Comput Biol. 2007, 3 (2): e12-10.1371\/journal.pcbi.0030012.","journal-title":"PLoS Comput Biol"},{"issue":"4","key":"702_CR5","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1038\/gim.2012.23","volume":"14","author":"SM Wolf","year":"2012","unstructured":"Wolf SM, Crock BN, Van Ness B, Lawrenz F, Kahn JP, Beskow LM, Cho MK, Christman MF, Green RC, Hall R: Managing incidental findings and research results in genomic research involving biobanks and archived data sets. Genet Med. 2012, 14 (4): 361-384. 10.1038\/gim.2012.23.","journal-title":"Genet Med"},{"issue":"12","key":"702_CR6","doi-asserted-by":"publisher","first-page":"e1002278","DOI":"10.1371\/journal.pcbi.1002278","volume":"7","author":"D Greenbaum","year":"2011","unstructured":"Greenbaum D, Sboner A, Mu XJ, Gerstein M: Genomics and privacy: implications of the new reality of closed data for the field. PLoS Comput Biol. 2011, 7 (12): e1002278-10.1371\/journal.pcbi.1002278.","journal-title":"PLoS Comput Biol"},{"issue":"16","key":"702_CR7","doi-asserted-by":"publisher","first-page":"844","DOI":"10.1055\/s-0031-1299040","volume":"137","author":"B Schutze","year":"2012","unstructured":"Schutze B: Use of medical treatment data outside of the patient supply: best way pseudonymisation. Dtsch Med Wochenschr. 2012, 137 (16): 844-850.","journal-title":"Dtsch Med Wochenschr"},{"key":"702_CR8","first-page":"110","volume":"2008","author":"JL Talmon","year":"2008","unstructured":"Talmon JL, Ros MG, Legemate DA: PSI: The Dutch Academic Infrastructure for shared biobanks for translational research. Summit on translational bioinformatics. 2008, 2008: 110-114.","journal-title":"Summit on translational bioinformatics"},{"issue":"7","key":"702_CR9","doi-asserted-by":"publisher","first-page":"e1002549","DOI":"10.1371\/journal.pcbi.1002549","volume":"8","author":"Y Joly","year":"2012","unstructured":"Joly Y, Dove ES, Knoppers BM, Bobrow M, Chalmers D: Data Sharing in the Post-Genomic World: The Experience of the International Cancer Genome Consortium (ICGC) Data Access Compliance Office (DACO). PLoS Comput Biol. 2012, 8 (7): e1002549-10.1371\/journal.pcbi.1002549.","journal-title":"PLoS Comput Biol"},{"issue":"1","key":"702_CR10","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.cmpb.2005.03.004","volume":"79","author":"A Faldum","year":"2005","unstructured":"Faldum A, Pommerening K: An optimal code for patient identifiers. Comput Methods Programs Biomed. 2005, 79 (1): 81-88. 10.1016\/j.cmpb.2005.03.004.","journal-title":"Comput Methods Programs Biomed"},{"key":"702_CR11","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1186\/1472-6947-4-9","volume":"4","author":"T Churches","year":"2004","unstructured":"Churches T, Christen P: Some methods for blindfolded record linkage. BMC Med Inform Decis Mak. 2004, 4: 9-10.1186\/1472-6947-4-9.","journal-title":"BMC Med Inform Decis Mak"},{"key":"702_CR12","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1186\/1472-6947-11-18","volume":"11","author":"C Quantin","year":"2011","unstructured":"Quantin C, Jaquet-Chiffelle DO, Coatrieux G, Benzenine E, Auverlot B, Allaert FA: Medical record: systematic centralization versus secure on demand aggregation. BMC Med Inform Decis Mak. 2011, 11: 18-10.1186\/1472-6947-11-18.","journal-title":"BMC Med Inform Decis Mak"},{"issue":"6","key":"702_CR13","doi-asserted-by":"publisher","first-page":"1004","DOI":"10.1016\/j.jbi.2011.08.003","volume":"44","author":"H Hu","year":"2011","unstructured":"Hu H, Correll M, Kvecher L, Osmond M, Clark J, Bekhash A, Schwab G, Gao D, Gao J, Kubatin V: DW4TR: A Data Warehouse for Translational Research. J Biomed Inform. 2011, 44 (6): 1004-1019. 10.1016\/j.jbi.2011.08.003.","journal-title":"J Biomed Inform"},{"key":"702_CR14","first-page":"502","volume":"169","author":"S Mate","year":"2011","unstructured":"Mate S, Burkle T, Kopcke F, Breil B, Wullich B, Dugas M, Prokosch HU, Ganslandt T: Populating the i2b2 database with heterogeneous EMR data: a semantic network approach. Stud Health Technol Inform. 2011, 169: 502-506.","journal-title":"Stud Health Technol Inform"},{"key":"702_CR15","volume-title":"Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences: 2008","author":"B Riedl","year":"2008","unstructured":"Riedl B, Grascher V, Fenz S, Neubauer T: Pseudonymization for improving the Privacy in E-Health Applications. Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences: 2008. 2008, IEEE Computer Society"},{"key":"702_CR16","first-page":"691","volume":"136","author":"T Neubauer","year":"2008","unstructured":"Neubauer T, Riedl B: Improving patients privacy with Pseudonymization. Stud Health Technol Inform. 2008, 136: 691-696.","journal-title":"Stud Health Technol Inform"},{"issue":"3","key":"702_CR17","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.ijmedinf.2010.10.016","volume":"80","author":"T Neubauer","year":"2010","unstructured":"Neubauer T, Heurix J: A methodology for the pseudonymization of medical data. Int J Med Inform. 2010, 80 (3): 190-204.","journal-title":"Int J Med Inform"},{"issue":"3","key":"702_CR18","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/s10278-006-1051-4","volume":"20","author":"R Noumeir","year":"2007","unstructured":"Noumeir R, Lemay A, Lina JM: Pseudonymization of radiology data for research purposes. J Digit Imaging. 2007, 20 (3): 284-295. 10.1007\/s10278-006-1051-4.","journal-title":"J Digit Imaging"},{"key":"702_CR19","first-page":"441","volume":"103","author":"K Pommerening","year":"2004","unstructured":"Pommerening K, Reng M: Secondary use of the EHR via pseudonymisation. Stud Health Technol Inform. 2004, 103: 441-446.","journal-title":"Stud Health Technol Inform"},{"key":"702_CR20","first-page":"17","volume":"1","author":"K Pommerening","year":"2005","unstructured":"Pommerening K, Reng M, Debold P, Semler S: Pseudonymization in medical research - the generic data protection concept of the TMF. GMS Medizinische Informatik, Biometrie und Epidemiologie. 2005, 1: 17-","journal-title":"GMS Medizinische Informatik, Biometrie und Epidemiologie"},{"key":"702_CR21","first-page":"61","volume":"150","author":"M Dugas","year":"2009","unstructured":"Dugas M, Breil B, Thiemann V, Lechtenborger J, Vossen G: Single source information systems to connect patient care and clinical research. Stud Health Technol Inform. 2009, 150: 61-65.","journal-title":"Stud Health Technol Inform"},{"key":"702_CR22","first-page":"170","volume":"95","author":"B Claerhout","year":"2003","unstructured":"Claerhout B, De Moor GJ, De Meyer F: Secure communication and management of clinical and genomic data: the use of pseudonymisation as privacy enhancing technique. Stud Health Technol Inform. 2003, 95: 170-175.","journal-title":"Stud Health Technol Inform"},{"issue":"2\u20134","key":"702_CR23","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.ijmedinf.2004.03.008","volume":"74","author":"B Claerhout","year":"2005","unstructured":"Claerhout B, DeMoor GJ: Privacy protection for clinical and genomic data. The use of privacy-enhancing techniques in medicine. Int J Med Inform. 2005, 74 (2\u20134): 257-265.","journal-title":"Int J Med Inform"},{"key":"702_CR24","first-page":"111","volume":"141","author":"F De Meyer","year":"2008","unstructured":"De Meyer F, De Moor G, Reed-Fourquet L: Privacy Protection through pseudonymisation in eHealth. Stud Health Technol Inform. 2008, 141: 111-118.","journal-title":"Stud Health Technol Inform"},{"issue":"2","key":"702_CR25","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1055\/s-0038-1634326","volume":"42","author":"GJ De Moor","year":"2003","unstructured":"De Moor GJ, Claerhout B, De Meyer F: Privacy enhancing techniques - the key to secure communication and management of clinical and genomic data. Methods Inf Med. 2003, 42 (2): 148-153.","journal-title":"Methods Inf Med"},{"issue":"3","key":"702_CR26","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.cmpb.2009.12.001","volume":"99","author":"BS Elger","year":"2010","unstructured":"Elger BS, Iavindrasana J, Lo Iacono L, Muller H, Roduit N, Summers P, Wright J: Strategies for health data exchange for secondary, cross-institutional clinical research. Comput Methods Programs Biomed. 2010, 99 (3): 230-251. 10.1016\/j.cmpb.2009.12.001.","journal-title":"Comput Methods Programs Biomed"},{"key":"702_CR27","first-page":"239","volume":"126","author":"L Lo Iacono","year":"2007","unstructured":"Lo Iacono L: Multi-centric universal pseudonymisation for secondary use of the EHR. Stud Health Technol Inform. 2007, 126: 239-247.","journal-title":"Stud Health Technol Inform"},{"issue":"2","key":"702_CR28","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1055\/s-0038-1634649","volume":"35","author":"K Pommerening","year":"1996","unstructured":"Pommerening K, Miller M, Schmidtmann I, Michaelis J: Pseudonyms for cancer registries. Methods Inf Med. 1996, 35 (2): 112-121.","journal-title":"Methods Inf Med"},{"key":"702_CR29","unstructured":"Technical Directive TR-03116 for the eCard Projects of the German Federal Government.\n                    https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/TechnischeRichtlinien\/TR03116\/BSI-TR-03116.pdf?__blob=publicationFile\n                    \n                  ,"},{"key":"702_CR30","unstructured":"The Keyed-Hash Message Authentication Code (HMAC).\n                    http:\/\/csrc.nist.gov\/publications\/fips\/fips198-1\/FIPS-198-1_final.pdf\n                    \n                  ,"},{"key":"702_CR31","unstructured":"Advanced Encryption Standard (AES).\n                    http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf\n                    \n                  ,"},{"key":"702_CR32","unstructured":"PKCS #5 v2.1: Password-Based Cryptography Standard.\n                    http:\/\/www.rsa.com\/rsalabs\/pkcs\/files\/h11302-wp-pkcs5v2-1-password-based-cryptography-standard.pdf\n                    \n                  ,"},{"key":"702_CR33","first-page":"617","volume-title":"Making a faster cryptanalytic time-memory trade-off. In: Advances in Cryptology-Crypto 2003, Proceedings: 2003","author":"P Oechslin","year":"2003","unstructured":"Oechslin P: Making a faster cryptanalytic time-memory trade-off. In: Advances in Cryptology-Crypto 2003, Proceedings: 2003. 2003, Berlin: Springer-Verlag Berlin, 617-630."},{"issue":"4","key":"702_CR34","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TIT.1980.1056220","volume":"26","author":"M Hellman","year":"2006","unstructured":"Hellman M: A cryptanalytic time-memory trade-off. IEEE Trans Inf Theor. 2006, 26 (4): 401-406.","journal-title":"IEEE Trans Inf Theor"},{"issue":"12","key":"702_CR35","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1016\/j.ijmedinf.2010.09.005","volume":"79","author":"C Senger","year":"2010","unstructured":"Senger C, Kaltschmidt J, Schmitt SP, Pruszydlo MG, Haefeli WE: Misspellings in drug information system queries: characteristics of drug name spelling errors and strategies for their prevention. Int J Med Inform. 2010, 79 (12): 832-839. 10.1016\/j.ijmedinf.2010.09.005.","journal-title":"Int J Med Inform"},{"issue":"2","key":"702_CR36","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/966389.966390","volume":"47","author":"L Ahn","year":"2004","unstructured":"Ahn L, Blum M, Langford J: Telling humans and computers apart automatically. Commun ACM. 2004, 47 (2): 56-60. 10.1145\/966389.966390.","journal-title":"Commun ACM"},{"key":"702_CR37","unstructured":"EURAT: Ethical and Legal Aspects of Whole Genome Sequencing. \n                    http:\/\/www.uni-heidelberg.de\/totalsequenzierung\/english.html\n                    \n                  ]"},{"issue":"1","key":"702_CR38","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1136\/amiajnl-2012-001366","volume":"20","author":"CA Cassa","year":"2013","unstructured":"Cassa CA, Miller RA, Mandl KD: A novel, privacy-preserving cryptographic approach for sharing sequencing data. Journal of the American Medical Informatics Association : JAMIA. 2013, 20 (1): 69-76. 10.1136\/amiajnl-2012-001366.","journal-title":"Journal of the American Medical Informatics Association : JAMIA"},{"issue":"7560","key":"702_CR39","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1136\/bmj.333.7560.196","volume":"333","author":"D Kalra","year":"2006","unstructured":"Kalra D, Gertz R, Singleton P, Inskip HM: Confidentiality of personal health information used for research. BMJ. 2006, 333 (7560): 196-198. 10.1136\/bmj.333.7560.196.","journal-title":"BMJ"},{"key":"702_CR40","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1186\/1472-6939-12-16","volume":"12","author":"SM Fullerton","year":"2011","unstructured":"Fullerton SM, Lee SS: Secondary uses and the governance of de-identified data: lessons from the human genome diversity panel. BMC Med Ethics. 2011, 12: 16-10.1186\/1472-6939-12-16.","journal-title":"BMC Med Ethics"},{"key":"702_CR41","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586133","volume-title":"Securing passwords against dictionary attacks. In: Proceedings of the 9th ACM conference on Computer and communications security","author":"B Pinkas","year":"2002","unstructured":"Pinkas B, Sander T: Securing passwords against dictionary attacks. In: Proceedings of the 9th ACM conference on Computer and communications security. 2002, Washington, DC, USA: ACM"}],"container-title":["BMC Medical Informatics and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1472-6947-13-75\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-13-75.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-13-75","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-13-75.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,22]],"date-time":"2019-01-22T16:02:01Z","timestamp":1548172921000},"score":1,"resource":{"primary":{"URL":"https:\/\/bmcmedinformdecismak.biomedcentral.com\/articles\/10.1186\/1472-6947-13-75"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,24]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["702"],"URL":"https:\/\/doi.org\/10.1186\/1472-6947-13-75","relation":{},"ISSN":["1472-6947"],"issn-type":[{"value":"1472-6947","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,24]]},"article-number":"75"}}