{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T07:21:40Z","timestamp":1775978500957,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","funder":[{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["No.R0190-15-2019"],"award-info":[{"award-number":["No.R0190-15-2019"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["BMC Med Inform Decis Mak"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1186\/s12911-017-0499-0","type":"journal-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T19:20:19Z","timestamp":1499714419000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":47,"title":["Utility-preserving anonymization for health data publishing"],"prefix":"10.1186","volume":"17","author":[{"given":"Hyukki","family":"Lee","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Soohyung","family":"Kim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jong Wook","family":"Kim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2070-5123","authenticated-orcid":false,"given":"Yon Dohn","family":"Chung","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,7,11]]},"reference":[{"issue":"6","key":"499_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1471-2105-15-S6-I1","volume":"15","author":"A Holzinger","year":"2014","unstructured":"Holzinger A, Dehmer M, Jurisica I. Knowledge discovery and interactive data mining in bioinformatics-state-of-the-art, future challenges and research directions. BMC Bioinforma. 2014; 15(6):1.","journal-title":"BMC Bioinforma"},{"key":"499_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-43968-5","volume-title":"Interactive Knowledge Discovery and Data Mining in Biomedical Informatics","author":"A Holzinger","year":"2014","unstructured":"Holzinger A, Jurisica I. Knowledge discovery and data mining in biomedical informatics: The future is in integrative, interactive machine learning solutions. In: Interactive Knowledge Discovery and Data Mining in Biomedical Informatics. Berlin: Springer: 2014. p. 1\u201318."},{"issue":"10","key":"499_CR3","first-page":"22","volume":"107","author":"B Malle","year":"2016","unstructured":"Malle B, Kieseberg P, Schrittwieser S, Holzinger A. Privacy aware machine learning and the right to be forgotten. ERCIM News. 2016; 107(10):22\u20133.","journal-title":"ERCIM News"},{"issue":"05","key":"499_CR4","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L. k-anonymity: A model for protecting privacy. Int J Uncertain Fuzziness Knowledge-Based Syst. 2002; 10(05):557\u201370.","journal-title":"Int J Uncertain Fuzziness Knowledge-Based Syst."},{"key":"499_CR5","unstructured":"Family Educational Rights and Privacy Act. 2015. Available at \n                        https:\/\/ed.gov\/policy\/gen\/guid\/fpco\/ferpa\n                        \n                    ."},{"key":"499_CR6","unstructured":"Guidelines for De-identification of Personal Data. 2016. Available at \n                        http:\/\/privacy.go.kr\n                        \n                    ."},{"issue":"4","key":"499_CR7","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/s40708-016-0046-2","volume":"3","author":"P Kieseberg","year":"2016","unstructured":"Kieseberg P, Malle B, Fr\u00fchwirt P, Weippl E, Holzinger A. A tamper-proof audit and control system for the doctor in the loop. Brain Inform. 2016; 3(4):269\u201379.","journal-title":"Brain Inform"},{"issue":"05","key":"499_CR8","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertain Fuzziness Knowledge-Based Syst. 2002; 10(05):571\u201388.","journal-title":"Int J Uncertain Fuzziness Knowledge-Based Syst"},{"key":"499_CR9","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.cose.2014.03.006","volume":"44","author":"ME Nergiz","year":"2014","unstructured":"Nergiz ME, G\u00f6k MZ. Hybrid k-anonymity. Comput Secur. 2014; 44:51\u201363.","journal-title":"Comput Secur"},{"issue":"1","key":"499_CR10","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1186\/s12911-016-0287-2","volume":"16","author":"F Prasser","year":"2016","unstructured":"Prasser F, Kohlmayer F, Kuhn KA. Efficient and effective pruning strategies for health data de-identification. BMC Med Inform Decis Making. 2016; 16(1):49.","journal-title":"BMC Med Inform Decis Making"},{"key":"499_CR11","doi-asserted-by":"crossref","DOI":"10.1201\/9781420091502","volume-title":"Introduction to Privacy-preserving Data Publishing: Concepts and Techniques.","author":"BC Fung","year":"2010","unstructured":"Fung BC, Wang K, Fu AW-C, Philip SY. Introduction to Privacy-preserving Data Publishing: Concepts and Techniques.Boca Raton: CRC Press; 2010."},{"key":"499_CR12","volume-title":"Proceedings of the 21st International Conference on Data Engineering","author":"RJ Bayardo","year":"2005","unstructured":"Bayardo RJ, Agrawal R. Data privacy through optimal k-anonymization. In: Proceedings of the 21st International Conference on Data Engineering. Tokyo: IEEE Computer Society: 2005. p. 217\u201328."},{"key":"499_CR13","volume-title":"Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"VS Iyengar","year":"2002","unstructured":"Iyengar VS. Transforming data to satisfy privacy constraints. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Edmonton: ACM: 2002. p. 279\u201388."},{"key":"499_CR14","volume-title":"Proceedings of the 32nd International Conference on Very Large Data Bases","author":"X Xiao","year":"2006","unstructured":"Xiao X, Tao Y. Anatomy: Simple and effective privacy preservation. In: Proceedings of the 32nd International Conference on Very Large Data Bases. Seoul: VLDB Endowment: 2006. p. 139\u201350."},{"key":"499_CR15","volume-title":"Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data","author":"X Xiao","year":"2007","unstructured":"Xiao X, Tao Y. M-invariance: Towards privacy preserving re-publication of dynamic datasets. In: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data. Beijing: ACM: 2007. p. 689\u2013700."},{"key":"499_CR16","volume-title":"Proceedings of the 2012 ASE\/IEEE International Conference on Social Computing and 2012 ASE\/IEEE International Conference on Privacy, Security, Risk and Trust","author":"F Kohlmayer","year":"2012","unstructured":"Kohlmayer F, Prasser F, Eckert C, Kemper A, Kuhn KA. Flash: Efficient, stable and optimal k-anonymity. In: Proceedings of the 2012 ASE\/IEEE International Conference on Social Computing and 2012 ASE\/IEEE International Conference on Privacy, Security, Risk and Trust. Amsterdam: IEEE Computer Society: 2012. p. 708\u201317."},{"issue":"5","key":"499_CR17","doi-asserted-by":"crossref","first-page":"670","DOI":"10.1197\/jamia.M3144","volume":"16","author":"K El Emam","year":"2009","unstructured":"El Emam K, Dankar FK, Issa R, Jonker E, Amyot D, Cogo E, Corriveau JP, Walker M, Chowdhury S, Vaillancourt R, et al.A globally optimal k-anonymity method for the de-identification of health data. J Am Med Inform Assoc. 2009; 16(5):670\u201382.","journal-title":"J Am Med Inform Assoc"},{"key":"499_CR18","unstructured":"UCI Repository of Machine Learning Databases. 2013. Available at \n                        http:\/\/archive.ics.uci.edu\/ml\n                        \n                    ."},{"key":"499_CR19","unstructured":"Health Insurance Review and Assessment Service in Korea. 2012. Available at \n                        http:\/\/opendata.hira.or.kr\n                        \n                    ."},{"issue":"1","key":"499_CR20","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M. l-diversity: Privacy beyond k-anonymity. ACM Trans Knowl Discov Data (TKDD). 2007; 1(1):3.","journal-title":"ACM Trans Knowl Discov Data (TKDD)"},{"key":"499_CR21","volume-title":"Proceedings of the 21st International Conference on Data Engineering","author":"N Li","year":"2007","unstructured":"Li N, Li T, Venkatasubramanian S. t-closeness: Privacy beyond k-anonymity and l-diversity. In: Proceedings of the 21st International Conference on Data Engineering. Istanbul: IEEE Computer Society: 2007. p. 106\u201315."},{"issue":"1","key":"499_CR22","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1186\/s12911-016-0293-4","volume":"16","author":"WY Lin","year":"2016","unstructured":"Lin WY, Yang DC, Wang JT. Privacy preserving data anonymization of spontaneous ade reporting system dataset. BMC Med Inform Decis Making. 2016; 16(1):58.","journal-title":"BMC Med Inform Decis Making"},{"key":"499_CR23","volume-title":"Computer-Based Medical Systems (CBMS), 2012 25th International Symposium On","author":"F Kohlmayer","year":"2012","unstructured":"Kohlmayer F, Prasser F, Eckert C, Kemper A, Kuhn KA. Highly efficient optimal k-anonymity for biomedical datasets. In: Computer-Based Medical Systems (CBMS), 2012 25th International Symposium On. Rome: IEEE: 2012. p. 1\u20136."},{"key":"499_CR24","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.jbi.2015.09.007","volume":"58","author":"F Kohlmayer","year":"2015","unstructured":"Kohlmayer F, Prasser F, Kuhn KA. The cost of quality: Implementing generalization and suppression for anonymizing biomedical data with minimal information loss. J Biomed Inform. 2015; 58:37\u201348.","journal-title":"J Biomed Inform"},{"key":"499_CR25","volume-title":"International Conference on Database Systems for Advanced Applications","author":"JW Byun","year":"2007","unstructured":"Byun JW, Kamra A, Bertino E, Li N. Efficient k-anonymization using clustering techniques. In: International Conference on Database Systems for Advanced Applications. Berlin: Springer: 2007. p. 188\u2013200."},{"key":"499_CR26","volume-title":"Data Engineering, 2006. ICDE\u201906. Proceedings of the 22nd International Conference On","author":"K LeFevre","year":"2006","unstructured":"LeFevre K, DeWitt DJ, Ramakrishnan R. Mondrian multidimensional k-anonymity. In: Data Engineering, 2006. ICDE\u201906. Proceedings of the 22nd International Conference On. Atlanta: IEEE: 2006. p. 25\u20135."}],"container-title":["BMC Medical Informatics and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s12911-017-0499-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T19:20:38Z","timestamp":1499714438000},"score":1,"resource":{"primary":{"URL":"http:\/\/bmcmedinformdecismak.biomedcentral.com\/articles\/10.1186\/s12911-017-0499-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,11]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["499"],"URL":"https:\/\/doi.org\/10.1186\/s12911-017-0499-0","relation":{},"ISSN":["1472-6947"],"issn-type":[{"value":"1472-6947","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,11]]},"article-number":"104"}}