{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:10:55Z","timestamp":1775913055048,"version":"3.50.1"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T00:00:00Z","timestamp":1741737600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T00:00:00Z","timestamp":1741737600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100002839","name":"Charit\u00e9 - Universit\u00e4tsmedizin Berlin","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100002839","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["BMC Med Inform Decis Mak"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:sec>\n            <jats:title>Background<\/jats:title>\n            <jats:p>Sharing health data holds great potential for advancing medical research but also poses many challenges, including the need to protect people\u2019s privacy. One approach to address this is data anonymization, which refers to the process of altering or transforming a dataset to preserve the privacy of the individuals contributing data. To this, privacy models have been designed to measure risks and optimization algorithms can be used to transform data to achieve a good balance between risks reduction and the preservation of the dataset\u2019s utility. However, this process is computationally complex and challenging to apply to large datasets. Previously suggested parallel algorithms have been tailored to specific risk models, utility models and transformation methods.<\/jats:p>\n          <\/jats:sec>\n          <jats:sec>\n            <jats:title>Methods<\/jats:title>\n            <jats:p>We present a novel parallel algorithm that supports a wide range of methods for measuring risks, optimizing utility and transforming data. The algorithm trades data utility for parallelization, by anonymizing partitions of the dataset in parallel. To ensure the correctness of the anonymization process, the algorithm carefully controls the process and if needed rearranges partitions and performs additional transformations.<\/jats:p>\n          <\/jats:sec>\n          <jats:sec>\n            <jats:title>Results<\/jats:title>\n            <jats:p>We demonstrate the effectiveness of our method through an open-source implementation. Our experiments show that our approach can reduce execution times by up to one order of magnitude with minor impacts on output data utility in a wide range of scenarios.<\/jats:p>\n          <\/jats:sec>\n          <jats:sec>\n            <jats:title>Conclusions<\/jats:title>\n            <jats:p>Our novel P4 algorithm for parallel and distributed data anonymization is, to the best of our knowledge, the first to systematically support a wide variety of privacy, transformation and utility models.<\/jats:p>\n          <\/jats:sec>","DOI":"10.1186\/s12911-025-02959-z","type":"journal-article","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T15:44:06Z","timestamp":1741794246000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Parallel privacy preservation through partitioning (P4): a scalable data anonymization algorithm for health data"],"prefix":"10.1186","volume":"25","author":[{"given":"Mehmed","family":"Halilovic","sequence":"first","affiliation":[]},{"given":"Thierry","family":"Meurers","sequence":"additional","affiliation":[]},{"given":"Karen","family":"Otte","sequence":"additional","affiliation":[]},{"given":"Fabian","family":"Prasser","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,12]]},"reference":[{"key":"2959_CR1","doi-asserted-by":"publisher","first-page":"e93","DOI":"10.1016\/S2589-7500(22)00195-9","volume":"5","author":"A-F N\u00e4her","year":"2023","unstructured":"N\u00e4her A-F, Vorisek CN, Klopfenstein SAI, Lehne M, Thun S, Alsalamah S, et al. Secondary data for global health digitalisation. Lancet Digital Health. 2023;5:e93\u2013101.","journal-title":"Lancet Digital Health"},{"key":"2959_CR2","doi-asserted-by":"publisher","unstructured":"Packer M. Data sharing in medical research. BMJ. 2018;(k510). https:\/\/doi.org\/10.1136\/bmj.k510.","DOI":"10.1136\/bmj.k510"},{"key":"2959_CR3","volume-title":"Deep medicine: how artificial intelligence can make healthcare human again","author":"E Topol","year":"2019","unstructured":"Topol E. Deep medicine: how artificial intelligence can make healthcare human again. 1st ed. USA: Basic Books, Inc.; 2019.","edition":"1st"},{"key":"2959_CR4","doi-asserted-by":"publisher","first-page":"e262","DOI":"10.1016\/S1470-2045(19)30149-4","volume":"20","author":"KY Ngiam","year":"2019","unstructured":"Ngiam KY, Khor IW. Big data and machine learning algorithms for health-care delivery. Lancet Oncol. 2019;20:e262\u201373. https:\/\/doi.org\/10.1016\/S1470-2045(19)30149-4.","journal-title":"Lancet Oncol"},{"key":"2959_CR5","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1177\/1556264615593485","volume":"10","author":"D Carr","year":"2015","unstructured":"Carr D, Littler K. Sharing Research Data to Improve Public Health: a Funder Perspective. J Empir Res Hum Res Ethics. 2015;10:314\u201316. https:\/\/doi.org\/10.1177\/1556264615593485.","journal-title":"J Empir Res Hum Res Ethics"},{"key":"2959_CR6","doi-asserted-by":"publisher","unstructured":"Weitzman ER, Kaci L, Mandl KD. Sharing medical data for health research: the early personal health record experience. J Med Internet Res. 2010;12:e14. doi:https:\/\/doi.org\/10.2196\/jmir.1356.","DOI":"10.2196\/jmir.1356"},{"key":"2959_CR7","doi-asserted-by":"publisher","unstructured":"Pilat D, Fukasaku Y. OECD principles and guidelines for access to research data from public funding. Data Sci J. 2007;6:OD4\u201311. doi:https:\/\/doi.org\/10.2481\/dsj.6.OD4.","DOI":"10.2481\/dsj.6.OD4"},{"key":"2959_CR8","unstructured":"United States Congress. Health Insurance Portability and Accountability Act of 1996. 1996."},{"key":"2959_CR9","unstructured":"European Parliament and Council of the European Union. Regulation (EU) 2016\/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46. 2016."},{"key":"2959_CR10","unstructured":"13th National People\u2019s Congress (Standing Committee of the National People\u2019s Congress of the People\u2019s Republic of China). Personal information protection law of the People\u2019s Republic of China. 2021."},{"key":"2959_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3168389","volume":"51","author":"I Wagner","year":"2019","unstructured":"Wagner I, Eckhoff D. Technical privacy metrics: a systematic survey. ACM Comput Surv. 2019;51:1\u201338. https:\/\/doi.org\/10.1145\/3168389.","journal-title":"ACM Comput Surv"},{"key":"2959_CR12","doi-asserted-by":"publisher","unstructured":"Narayanan A, Shmatikov V Robust de-anonymization of large sparse datasets. 2008 IEEE Symposium on Security and Privacy (sp 2008), Oakland, CA, USA: IEEE; 2008, p. 111\u201325. https:\/\/doi.org\/10.1109\/SP.2008.33.","DOI":"10.1109\/SP.2008.33"},{"key":"2959_CR13","unstructured":"Ohm P. Broken promises of privacy: responding to the surprising failure of anonymization. 2009."},{"key":"2959_CR14","doi-asserted-by":"publisher","DOI":"10.1201\/9781420091502","volume-title":"Introduction to privacy-preserving data publishing","author":"BCM Fung","year":"2010","unstructured":"Fung BCM, Wang K, Aw-c F, Yu PS. Introduction to privacy-preserving data publishing. 0 ed. Chapman and Hall\/CRC; 2010. doi: https:\/\/doi.org\/10.1201\/9781420091502.","edition":"0"},{"key":"2959_CR15","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-540-30570-5_17","volume-title":"Database Theory - ICDT 2005","author":"G Aggarwal","year":"2004","unstructured":"Aggarwal G, Feder T, Kenthapadi K, Motwani R, Panigrahy R, Thomas D, et al. Anonymizing Tables. In: Eiter T, Libkin L, editors. Database Theory - ICDT 2005. vol. 3363, Berlin, Heidelberg: Springer, 2004; p. 246\u201358. https:\/\/doi.org\/10.1007\/978-3-540-30570-5_17."},{"key":"2959_CR16","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.1002\/spe.2812","volume-title":"Flexible data anonymization using ARX\u2014Current status and challenges ahead","author":"F Prasser","year":"2020","unstructured":"Prasser F, Eicher J, Spengler H, Bild R, Kuhn KA. Flexible data anonymization using ARX\u2014Current status and challenges ahead. Softw: Pract Exper, 2020;vol. 50, 1277\u2013304. https:\/\/doi.org\/10.1002\/spe.2812."},{"key":"2959_CR17","volume-title":"Anonymizing health data: case studies and methods to get you started","author":"K El Emam","year":"2014","unstructured":"El Emam K, Arbuckle L. Anonymizing health data: case studies and methods to get you started. First ed. Beijing: O\u2019Reilly; 2014.","edition":"First"},{"key":"2959_CR18","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L. k-Anonymity: a Model for protecting privacy. Int J Unc Fuzz Knowl Based Syst. 2002;10:557\u201370. https:\/\/doi.org\/10.1142\/S0218488502001648.","journal-title":"Int J Unc Fuzz Knowl Based Syst"},{"key":"2959_CR19","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1186\/1472-6947-12-66","volume":"12","author":"FK Dankar","year":"2012","unstructured":"Dankar FK, El Emam K, Neisa A, Roffey T. Estimating the re-identification risk of clinical data sets. BMC Med Inform Decis Mak. 2012;12:66. https:\/\/doi.org\/10.1186\/1472-6947-12-66.","journal-title":"BMC Med Inform Decis Mak"},{"key":"2959_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork C. Differential privacy. In: Bugliesi M, Preneel B, Sassone V, Wegener I, editors. Automata, languages and programming. 4052, Berlin, Heidelberg: Springer, 2006; p. 1\u201312. https:\/\/doi.org\/10.1007\/11787006_1."},{"key":"2959_CR21","doi-asserted-by":"publisher","unstructured":"Bayardo RJ, Agrawal R Data privacy through optimal k-anonymization. 21st International Conference on Data Engineering (ICDE\u201905), Tokyo, Japan: IEEE; 2005, p. 217\u201328. https:\/\/doi.org\/10.1109\/ICDE.2005.42.","DOI":"10.1109\/ICDE.2005.42"},{"key":"2959_CR22","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.jbi.2015.09.007","volume":"58","author":"F Kohlmayer","year":"2015","unstructured":"Kohlmayer F, Prasser F, Kuhn KA. The cost of quality: IMPLEMENTING generalization and suppression for anonymizing biomedical data with minimal information loss. J Biomed Informat. 2015;58:37\u201348. https:\/\/doi.org\/10.1016\/j.jbi.2015.09.007.","journal-title":"J Biomed Informat"},{"key":"2959_CR23","doi-asserted-by":"publisher","unstructured":"Li N, Li T, Venkatasubramanian S t-Closeness: privacy beyond k-anonymity and l-diversity. 2007 IEEE 23rd International Conference on Data Engineering, Istanbul: IEEE; 2007, p. 106\u201315. https:\/\/doi.org\/10.1109\/ICDE.2007.367856.","DOI":"10.1109\/ICDE.2007.367856"},{"key":"2959_CR24","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M. L -diversity: privacy beyond k -anonymity. ACM Trans Knowl Discov Data. 2007;1:3. https:\/\/doi.org\/10.1145\/1217299.1217302.","journal-title":"ACM Trans Knowl Discov Data"},{"key":"2959_CR25","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-45381-1_11","volume-title":"Privacy in Statistical Databases","author":"S Stammler","year":"2016","unstructured":"Stammler S, Katzenbeisser S, Hamacher K. Correcting finite sampling issues in entropy l-diversity. In: Domingo-Ferrer J, Peji\u0107-Bach M, editors. Privacy in Statistical Databases. 9867. Cham: Springer International Publishing; 2016. p. 135\u201346. doi:https:\/\/doi.org\/10.1007\/978-3-319-45381-1_11."},{"key":"2959_CR26","doi-asserted-by":"publisher","unstructured":"Brickell J, Shmatikov V The cost of privacy: destruction of data-mining utility in anonymized data publishing. Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, Las Vegas Nevada USA: ACM; 2008, p. 70\u201378. https:\/\/doi.org\/10.1145\/1401890.1401904.","DOI":"10.1145\/1401890.1401904"},{"key":"2959_CR27","doi-asserted-by":"crossref","unstructured":"Cao J, Karras P. Publishing microdata with a robust privacy guarantee. 2012.","DOI":"10.14778\/2350229.2350255"},{"key":"2959_CR28","doi-asserted-by":"publisher","first-page":"347","DOI":"10.3414\/ME16-01-0012","volume":"55","author":"F Prasser","year":"2016","unstructured":"Prasser F, Kohlmayer F, Kuhn K. The importance of context: risk-based de-identification of biomedical data. Methods Inf Med. 2016;55:347\u201355. https:\/\/doi.org\/10.3414\/ME16-01-0012.","journal-title":"Methods Inf Med"},{"key":"2959_CR29","first-page":"1430","volume":"2017","author":"F Prasser","year":"2017","unstructured":"Prasser F, Gaupp J, Wan Z, Xia W, Vorobeychik Y, Kantarcioglu M, et al. An open source tool for game theoretic health data de-identification. AMIA Annu Symp Proc. 2017;2017:1430\u201339.","journal-title":"AMIA Annu Symp Proc"},{"key":"2959_CR30","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1197\/jamia.M2716","volume":"15","author":"K El Emam","year":"2008","unstructured":"El Emam K, Dankar FK. Protecting privacy using k-Anonymity. J Am Med Inf Assoc. 2008;15:627\u201337. https:\/\/doi.org\/10.1197\/jamia.M2716.","journal-title":"J Am Med Inf Assoc"},{"key":"2959_CR31","doi-asserted-by":"publisher","unstructured":"Becker B, Kohavi R. Adult 1996. https:\/\/doi.org\/10.24432\/C5XW20.","DOI":"10.24432\/C5XW20"},{"key":"2959_CR32","doi-asserted-by":"publisher","unstructured":"Blewett LA, Drew JAR, King ML, Williams KCW, Chen A, Richards S, et al. IPUMS Health Surveys: National Health Interview Survey, Version 7 3. 2023. https:\/\/doi.org\/10.18128\/D070.V7.3.","DOI":"10.18128\/D070.V7.3"},{"key":"2959_CR33","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/TPDS.2013.48","volume":"25","author":"X Zhang","year":"2014","unstructured":"Zhang X, Yang LT, Liu C, Chen J. A scalable two-phase top-down specialization approach for data anonymization using mapreduce on cloud. IEEE Trans Parallel Distrib Syst. 2014;25:363\u201373. https:\/\/doi.org\/10.1109\/TPDS.2013.48.","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"2959_CR34","doi-asserted-by":"publisher","unstructured":"Kohlmayer F, Prasser F, Eckert C, Kemper A, Kuhn KA Flash: efficient, stable and optimal K-anonymity. 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, Amsterdam, Netherlands: IEEE; 2012, p. 708\u201317. https:\/\/doi.org\/10.1109\/SocialCom-PASSAT.2012.52.","DOI":"10.1109\/SocialCom-PASSAT.2012.52"},{"key":"2959_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1857947.1857950","volume":"4","author":"N Mohammed","year":"2010","unstructured":"Mohammed N, Fung BCM, Hung PCK, Lee C-K. Centralized and distributed anonymization for high-dimensional healthcare data. ACM Trans Knowl Discov Data. 2010;4:1\u201333. https:\/\/doi.org\/10.1145\/1857947.1857950.","journal-title":"ACM Trans Knowl Discov Data"},{"key":"2959_CR36","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.jbi.2013.12.002","volume":"50","author":"F Kohlmayer","year":"2014","unstructured":"Kohlmayer F, Prasser F, Eckert C, Kuhn KA. A flexible approach to distributed data anonymization. J Biomed Informat. 2014;50:62\u201376. https:\/\/doi.org\/10.1016\/j.jbi.2013.12.002.","journal-title":"J Biomed Informat"},{"key":"2959_CR37","doi-asserted-by":"publisher","unstructured":"Zhong G, Hengartner U A distributed k-anonymity protocol for location privacy. 2009 IEEE International Conference on Pervasive Computing and Communications, Galveston, TX, USA: IEEE; 2009, p. 1\u201310. https:\/\/doi.org\/10.1109\/PERCOM.2009.4912774.","DOI":"10.1109\/PERCOM.2009.4912774"},{"key":"2959_CR38","first-page":"161","volume":"9","author":"F Prasser","year":"2016","unstructured":"Prasser F, Bild R, Eicher J, Spengler H, Kohlmayer F, Kuhn KA. Lightning: utility-driven anonymization of high-dimensional data. Trans Data Priv. 2016;9:161\u201385.","journal-title":"Trans Data Priv"},{"key":"2959_CR39","doi-asserted-by":"publisher","unstructured":"Meurers T, Bild R, Do K-M, Prasser F. A scalable software solution for anonymizing high-dimensional biomedical data. GigaScience. 2021;10:giab068. doi:https:\/\/doi.org\/10.1093\/gigascience\/giab068.","DOI":"10.1093\/gigascience\/giab068"},{"key":"2959_CR40","doi-asserted-by":"publisher","unstructured":"De Capitani Di Sabrina Vimercati S, Facchinetti D, Foresti S, Livraga G, Oldani G, Paraboschi S, et al. Scalable distributed data anonymization for large datasets. IEEE Trans Big Data. 2023;9(3):818\u2013831. https:\/\/doi.org\/10.1109\/TBDATA.2022.3207521","DOI":"10.1109\/TBDATA.2022.3207521"},{"key":"2959_CR41","doi-asserted-by":"publisher","unstructured":"LeFevre K, DeWitt DJ, Ramakrishnan RMMK-A. 22nd International conference on data engineering (ICDE\u201906), Atlanta, GA, USA: IEEE; 2006, p. 25\u201325. https:\/\/doi.org\/10.1109\/ICDE.2006.101.","DOI":"10.1109\/ICDE.2006.101"},{"key":"2959_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2020.07.066","volume":"546","author":"F Ashkouti","year":"2021","unstructured":"Ashkouti F, Khamforoosh K, Sheikhahmadi A. DI-mondrian: distributed improved mondrian for satisfaction of the L-diversity privacy model using apache spark. Inf Sci. 2021;546:1\u201324. https:\/\/doi.org\/10.1016\/j.ins.2020.07.066.","journal-title":"Inf Sci"},{"key":"2959_CR43","doi-asserted-by":"publisher","first-page":"2616","DOI":"10.1007\/s11227-021-03958-3","volume":"78","author":"F Ashkouti","year":"2022","unstructured":"Ashkouti F, Khamforoosh K, Sheikhahmadi A, Khamfroush H. DHkmeans-\u2113diversity: distributed hierarchical K-means for satisfaction of the \u2113-diversity privacy model using apache spark. J Supercomput. 2022;78:2616\u201350. https:\/\/doi.org\/10.1007\/s11227-021-03958-3.","journal-title":"J Supercomput"},{"key":"2959_CR44","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/TBDATA.2017.2787661","volume":"8","author":"X Zhang","year":"2022","unstructured":"Zhang X, Qi L, Dou W, He Q, Leckie C, Kotagiri R, et al. MRMondrian: scalable multidimensional anonymisation for big data privacy preservation. IEEE Trans Big Data. 2022;8:125\u201339.","journal-title":"IEEE Trans Big Data"},{"key":"2959_CR45","doi-asserted-by":"publisher","unstructured":"Zakerzadeh H, Aggarwal CC, Barker K Privacy-preserving big data publishing. Proceedings of the 27th International Conference on Scientific and Statistical Database Management, La Jolla California: ACM; 2015, p. 1\u201311. https:\/\/doi.org\/10.1145\/2791347.2791380.","DOI":"10.1145\/2791347.2791380"},{"key":"2959_CR46","doi-asserted-by":"publisher","unstructured":"Fung BCM, Ke Wang YPS. Top-down specialization for information and privacy preservation. 21st International Conference on Data Engineering (ICDE\u201905), Tokyo, Japan: IEEE; 2005, p. 205\u201316. https:\/\/doi.org\/10.1109\/ICDE.2005.143.","DOI":"10.1109\/ICDE.2005.143"},{"key":"2959_CR47","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1197\/jamia.M3144","volume":"16","author":"K El Emam","year":"2009","unstructured":"El Emam K, Dankar FK, Issa R, Jonker E, Amyot D, Cogo E, et al. A globally optimal k-anonymity method for the de-identification of health data. J Am Med Inf Assoc. 2009;16:670\u201382.","journal-title":"J Am Med Inf Assoc"},{"key":"2959_CR48","doi-asserted-by":"publisher","first-page":"e49445","DOI":"10.2196\/49445","volume":"26","author":"L Pilgram","year":"2024","unstructured":"Pilgram L, Meurers T, Malin B, Schaeffner E, Eckardt K-U, Prasser F, et al. The costs of anonymization: case study using clinical data. J Med Internet Res. 2024;26:e49445.","journal-title":"J Med Internet Res"},{"key":"2959_CR49","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1089\/big.2021.0169","volume":"12","author":"IE Olatunji","year":"2024","unstructured":"Olatunji IE, Rauch J, Katzensteiner M, Khosla M. A review of anonymization for healthcare data. Big Data. 2024;12:538\u201355. https:\/\/doi.org\/10.1089\/big.2021.0169.","journal-title":"Big Data"},{"key":"2959_CR50","first-page":"28","volume":"1601","author":"T Desai","year":"2016","unstructured":"Desai T, Ritchie F, Welpton R. Five safes: designing data access for research. Economics Working Paper Series. 2016;1601:28. others.","journal-title":"Economics Working Paper Series"},{"key":"2959_CR51","doi-asserted-by":"publisher","unstructured":"Gadotti A, Rocher L, Houssiau F, Cre\u0163u A-M, De Montjoye Y-A. Anonymization: the imperfect science of using data while preserving privacy. Sci Adv. 2024;10:eadn7053. doi:https:\/\/doi.org\/10.1126\/sciadv.adn7053.","DOI":"10.1126\/sciadv.adn7053"},{"key":"2959_CR52","doi-asserted-by":"publisher","unstructured":"Abu Attieh H, Neves DT, Guedes M, Mirandola M, Dellacasa C, Rossi E, et al. A scalable pseudonymization tool for rapid deployment in large biomedical research networks: development and evaluation study. JMIR Med Inform. 2024:12:e49646. https:\/\/doi.org\/10.2196\/49646.","DOI":"10.2196\/49646"},{"key":"2959_CR53","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1038\/s41746-024-01359-3","volume":"8","author":"B Kaabachi","year":"2025","unstructured":"Kaabachi B, Despraz J, Meurers T, Otte K, Halilovic M, Kulynych B, et al. A scoping review of privacy and utility metrics in medical synthetic data. NPJ Digit Med. 2025;8:60.","journal-title":"NPJ Digit Med"},{"key":"2959_CR54","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, y ABA. Communication-efficient learning of deep networks from decentralized data. In: Singh A, Zhu J, editors. Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, 54, PMLR; 2017, p. 1273\u201382."},{"key":"2959_CR55","doi-asserted-by":"publisher","first-page":"3759","DOI":"10.1007\/s40747-022-00756-z","volume":"9","author":"K Munjal","year":"2023","unstructured":"Munjal K, Bhatia R. A systematic review of homomorphic encryption and its contributions in healthcare industry. Complex Intell Syst. 2023;9:3759\u201386. https:\/\/doi.org\/10.1007\/s40747-022-00756-z.","journal-title":"Complex Intell Syst"},{"key":"2959_CR56","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1515\/popets-2018-0004","volume":"2018","author":"R Bild","year":"2018","unstructured":"Bild R, Kuhn KA, Prasser F. SafePub: a truthful data anonymization algorithm with strong privacy guarantees. Proceedings on Privacy Enhancing Technologies. 2018;2018:67\u201387. https:\/\/doi.org\/10.1515\/popets-2018-0004.","journal-title":"Proceedings on Privacy Enhancing Technologies"}],"container-title":["BMC Medical Informatics and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s12911-025-02959-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s12911-025-02959-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s12911-025-02959-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T15:44:15Z","timestamp":1741794255000},"score":1,"resource":{"primary":{"URL":"https:\/\/bmcmedinformdecismak.biomedcentral.com\/articles\/10.1186\/s12911-025-02959-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,12]]},"references-count":56,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["2959"],"URL":"https:\/\/doi.org\/10.1186\/s12911-025-02959-z","relation":{},"ISSN":["1472-6947"],"issn-type":[{"value":"1472-6947","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,12]]},"assertion":[{"value":"13 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"All authors declare that they have no financial or non-financial competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"129"}}