{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T05:14:12Z","timestamp":1767676452945,"version":"3.45.0"},"reference-count":26,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2019,3,19]],"date-time":"2019-03-19T00:00:00Z","timestamp":1552953600000},"content-version":"vor","delay-in-days":18,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"funder":[{"DOI":"10.13039\/100000208","name":"Institute of Museum and Library Services","doi-asserted-by":"publisher","award":["-71-17-0094"],"award-info":[{"award-number":["-71-17-0094"]}],"id":[{"id":"10.13039\/100000208","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000873","name":"Andrew W. Mellon Foundation","doi-asserted-by":"publisher","award":["41500672"],"award-info":[{"award-number":["41500672"]}],"id":[{"id":"10.13039\/100000873","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000879","name":"Alfred P. Sloan Foundation","doi-asserted-by":"publisher","award":["2011-06-27"],"award-info":[{"award-number":["2011-06-27"]}],"id":[{"id":"10.13039\/100000879","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006733","name":"Indiana University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006733","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006976","name":"Lilly Endowment","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006976","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Data and Information Management"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.2478\/dim-2019-0005","type":"journal-article","created":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T05:31:48Z","timestamp":1560490308000},"page":"50-60","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":10,"title":["Safe Open Science for Restricted Data"],"prefix":"10.1016","volume":"3","author":[{"given":"Beth A.","family":"Plale","sequence":"first","affiliation":[]},{"given":"Eleanor","family":"Dickson","sequence":"additional","affiliation":[]},{"given":"Inna","family":"Kouper","sequence":"additional","affiliation":[]},{"given":"Samitha","family":"Harshani Liyanage","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Robert H.","family":"McDonald","sequence":"additional","affiliation":[]},{"given":"John A.","family":"Walsh","sequence":"additional","affiliation":[]},{"given":"Sachith","family":"Withana","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.2478\/dim-2019-0005_bib002","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1145\/335191.335438","article-title":"Privacy-preserving data mining. [ACM.]","volume":"29","author":"Agrawal","year":"2000","journal-title":"SIGMOD Record"},{"key":"10.2478\/dim-2019-0005_bib003","series-title":"Proc. of 18th USENIX Security Symposium","first-page":"367","article-title":"Protecting confidential data on personal computers with Storage Capsules","author":"Borders","year":"2009"},{"key":"10.2478\/dim-2019-0005_bib004","unstructured":"Bose, R. (2013, May). Implementing a Secure Data Enclave with Columbia University Central Resources. In IASSIST Conference Germany."},{"author":"Bureau","key":"10.2478\/dim-2019-0005_bib005"},{"issue":"2","key":"10.2478\/dim-2019-0005_bib006","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/772862.772867","article-title":"Tools for privacy preserving distributed data mining. [New York, NY, USA: ACM.]","volume":"4","author":"Clifton","year":"2002","journal-title":"SIGKDD Explorations"},{"key":"10.2478\/dim-2019-0005_bib007","series-title":"Taking Our Pulse: The OCLC Research Survey of Special Collections and Archives","first-page":"153","author":"Dooley","year":"2010"},{"key":"10.2478\/dim-2019-0005_bib008","series-title":"Theory and Applications of Models of Computation, 4978","first-page":"1","article-title":"Differential privacy: A survey of results","author":"Dwork","year":"2008"},{"issue":"1","key":"10.2478\/dim-2019-0005_bib009","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1177\/0002716217742610","article-title":"Research infrastructure for the safe analysis of sensitive data","volume":"675","author":"Foster","year":"2018","journal-title":"The Annals of the American Academy of Political and Social Science"},{"key":"10.2478\/dim-2019-0005_bib010","series-title":"Proc. of 2005 ACM Workshop on Storage Security and Survivability","first-page":"94","article-title":"Toward a Threat Model for Storage Systems","author":"Hasan","year":"2005"},{"key":"10.2478\/dim-2019-0005_bib011","unstructured":"Hill, R., Hansen, M., Janssen, E., Senders, S. A., Heiman, J. R., & Xiong, L. (2013, July). An empirical analysis of a differentially private social science dataset. In Proc. of PETools: Workshop on Privacy Enhancing Tools, Held in Conjunction with the Symp on Privacy Enhancing Tools Symposium Bloomington."},{"key":"10.2478\/dim-2019-0005_bib012","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5334\/johd.3","article-title":"The HathiTrust Research Center workset ontology: A descriptive framework for non-consumptive research collections","volume":"2","author":"Jett","year":"2016","journal-title":"Journal of Open Humanities Data"},{"author":"Kelly","key":"10.2478\/dim-2019-0005_bib013"},{"issue":"1","key":"10.2478\/dim-2019-0005_bib014","doi-asserted-by":"crossref","first-page":"128","DOI":"10.2218\/ijdc.v2i1.20","article-title":"Using a remote access data enclave for data dissemination","volume":"2","author":"Lane","year":"2008","journal-title":"International Journal of Digital Curation"},{"key":"10.2478\/dim-2019-0005_bib016","series-title":"Curating Research Data, Volume Two: A Handbook of Current Practice","first-page":"258","article-title":"Reuse of Restricted-Use Research Data","author":"Mathur","year":"2017"},{"year":"2015","series-title":"The Data Capsule for Non-Consumptive Research: Final Report. Tech. rep","author":"Plale","key":"10.2478\/dim-2019-0005_bib017"},{"key":"10.2478\/dim-2019-0005_bib018","article-title":"European Parliament Approves Horizon 2020 Funding Plan","author":"Rabesandratana","year":"2013","journal-title":"Science Magazine"},{"year":"1962","series-title":"Diffusion of innovations","author":"Rogers","key":"10.2478\/dim-2019-0005_bib019"},{"key":"10.2478\/dim-2019-0005_bib020","series-title":"Proc. of 7th Annual Dept of Defense\/NBS Computer Security Conference","first-page":"294","article-title":"A Trusted computing base for embedded systems","author":"Rushby","year":"1984"},{"author":"Sinclair","key":"10.2478\/dim-2019-0005_bib021"},{"author":"Stiles","key":"10.2478\/dim-2019-0005_bib022"},{"year":"1996","series-title":"Safety Critical Computer Systems","author":"Storey","key":"10.2478\/dim-2019-0005_bib023"},{"issue":"3","key":"10.2478\/dim-2019-0005_bib026","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: Toward a unified view","volume":"27","author":"Venkatesh","year":"2003","journal-title":"Management Information Systems Quarterly"},{"author":"White","key":"10.2478\/dim-2019-0005_bib027"},{"author":"Withana","key":"10.2478\/dim-2019-0005_bib028"},{"author":"Withana","key":"10.2478\/dim-2019-0005_bib029"},{"key":"10.2478\/dim-2019-0005_bib030","series-title":"Proc. 5th ACM Workshop on Scientific Cloud Computing","first-page":"9","article-title":"Cloud computing Data Capsules for non-consumptive use of texts","author":"Zeng","year":"2014"}],"container-title":["Data and Information Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/content.sciendo.com\/view\/journals\/dim\/3\/1\/article-p50.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2543925122000742?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2543925122000742?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.sciendo.com\/pdf\/10.2478\/dim-2019-0005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:18:56Z","timestamp":1762874336000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2543925122000742"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["S2543925122000742"],"URL":"https:\/\/doi.org\/10.2478\/dim-2019-0005","relation":{},"ISSN":["2543-9251"],"issn-type":[{"type":"print","value":"2543-9251"}],"subject":[],"published":{"date-parts":[[2019,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Safe Open Science for Restricted Data","name":"articletitle","label":"Article Title"},{"value":"Data and Information Management","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.2478\/dim-2019-0005","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2019 \u00a9 2019 Beth A. Plale et al., published by Sciendo. Published by Elsevier Ltd","name":"copyright","label":"Copyright"}]}}