{"id":"https://openalex.org/W4292409490","doi":"https://doi.org/10.1007/s10207-022-00607-5","title":"A systematic overview on methods to protect sensitive data provided for various analyses","display_name":"A systematic overview on methods to protect sensitive data provided for various analyses","publication_year":2022,"publication_date":"2022-08-18","ids":{"openalex":"https://openalex.org/W4292409490","doi":"https://doi.org/10.1007/s10207-022-00607-5"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-022-00607-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-022-00607-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-022-00607-5.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-022-00607-5.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077456710","display_name":"Matthias Templ","orcid":"https://orcid.org/0000-0002-8638-5276"},"institutions":[{"id":"https://openalex.org/I858936495","display_name":"ZHAW Zurich University of Applied Sciences","ror":"https://ror.org/05pmsvm27","country_code":"CH","type":"education","lineage":["https://openalex.org/I858936495"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Matthias Templ","raw_affiliation_strings":["Zurich University of Applied Sciences, Institute of Data Analysis and Process Design, Rosenstrasse 3, 8401, Winterthur, Switzerland"],"affiliations":[{"raw_affiliation_string":"Zurich University of Applied Sciences, Institute of Data Analysis and Process Design, Rosenstrasse 3, 8401, Winterthur, Switzerland","institution_ids":["https://openalex.org/I858936495"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102842494","display_name":"Murat Sariyar","orcid":"https://orcid.org/0000-0003-3432-2860"},"institutions":[{"id":"https://openalex.org/I130692619","display_name":"Bern University of Applied Sciences","ror":"https://ror.org/02bnkt322","country_code":"CH","type":"education","lineage":["https://openalex.org/I130692619"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Murat Sariyar","raw_affiliation_strings":["Bern University of Applied Sciences, Engineering and Information Technology Institute of Medical Informatics, H\u00f6heweg 80, 2502, Biel, Switzerland"],"affiliations":[{"raw_affiliation_string":"Bern University of Applied Sciences, Engineering and Information Technology Institute of Medical Informatics, H\u00f6heweg 80, 2502, Biel, Switzerland","institution_ids":["https://openalex.org/I130692619"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5077456710"],"corresponding_institution_ids":["https://openalex.org/I858936495"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":3.0551,"has_fulltext":true,"cited_by_count":24,"citation_normalized_percentile":{"value":0.92445023,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"21","issue":"6","first_page":"1233","last_page":"1246"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9750999808311462,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8693379759788513},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6712411642074585},{"id":"https://openalex.org/keywords/categorization","display_name":"Categorization","score":0.6613545417785645},{"id":"https://openalex.org/keywords/panacea","display_name":"Panacea (medicine)","score":0.6373984813690186},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.594840407371521},{"id":"https://openalex.org/keywords/data-anonymization","display_name":"Data anonymization","score":0.5821670293807983},{"id":"https://openalex.org/keywords/data-publishing","display_name":"Data publishing","score":0.5676541328430176},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.5327280759811401},{"id":"https://openalex.org/keywords/ontology","display_name":"Ontology","score":0.5132524967193604},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5103105902671814},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.454522043466568},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.4354208707809448},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3953641951084137},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3391469717025757},{"id":"https://openalex.org/keywords/publishing","display_name":"Publishing","score":0.2708752155303955},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2668779492378235},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22933423519134521},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13958308100700378}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8693379759788513},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6712411642074585},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.6613545417785645},{"id":"https://openalex.org/C26993612","wikidata":"https://www.wikidata.org/wiki/Q910154","display_name":"Panacea (medicine)","level":3,"score":0.6373984813690186},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.594840407371521},{"id":"https://openalex.org/C2776945810","wikidata":"https://www.wikidata.org/wiki/Q17006654","display_name":"Data anonymization","level":3,"score":0.5821670293807983},{"id":"https://openalex.org/C2781396290","wikidata":"https://www.wikidata.org/wiki/Q17051824","display_name":"Data publishing","level":3,"score":0.5676541328430176},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.5327280759811401},{"id":"https://openalex.org/C25810664","wikidata":"https://www.wikidata.org/wiki/Q44325","display_name":"Ontology","level":2,"score":0.5132524967193604},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5103105902671814},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.454522043466568},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.4354208707809448},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3953641951084137},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3391469717025757},{"id":"https://openalex.org/C151719136","wikidata":"https://www.wikidata.org/wiki/Q3972943","display_name":"Publishing","level":2,"score":0.2708752155303955},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2668779492378235},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22933423519134521},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13958308100700378},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/s10207-022-00607-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-022-00607-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-022-00607-5.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},{"id":"pmh:oai:arbor.bfh.ch:18480","is_oa":true,"landing_page_url":"https://arbor.bfh.ch/18480/","pdf_url":null,"source":{"id":"https://openalex.org/S4406922806","display_name":"ARBOR - Bern University of Applied Sciences Repository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Templ, Matthias; Sariyar, Murat (2022). A systematic overview on methods to protect sensitive data provided for various analyses International Journal of Information Security, 21(6), pp. 1233-1246. Springer 10.1007/s10207-022-00607-5 &lt;http://dx.doi.org/10.1007/s10207-022-00607-5&gt;","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:digitalcollection.zhaw.ch:11475/26691","is_oa":true,"landing_page_url":"https://hdl.handle.net/11475/26691","pdf_url":null,"source":{"id":"https://openalex.org/S4306401810","display_name":"Z\u00fcrcher Hochschule f\u00fcr Angewandte Wissenschaften digital collection (Zurich University of Applied Sciences)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200744771","host_organization_name":"ZHAW Zurich University of Applied Sciences","host_organization_lineage":["https://openalex.org/I200744771"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1007/s10207-022-00607-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-022-00607-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-022-00607-5.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6200000047683716}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4292409490.pdf","grobid_xml":"https://content.openalex.org/works/W4292409490.grobid-xml"},"referenced_works_count":55,"referenced_works":["https://openalex.org/W79252830","https://openalex.org/W1492029671","https://openalex.org/W1572536875","https://openalex.org/W1802346448","https://openalex.org/W1913989311","https://openalex.org/W1975967982","https://openalex.org/W1996182198","https://openalex.org/W2000870107","https://openalex.org/W2020111942","https://openalex.org/W2029712629","https://openalex.org/W2030411911","https://openalex.org/W2039096157","https://openalex.org/W2053637704","https://openalex.org/W2065830459","https://openalex.org/W2090519737","https://openalex.org/W2109426455","https://openalex.org/W2119067110","https://openalex.org/W2129751437","https://openalex.org/W2134167315","https://openalex.org/W2136114025","https://openalex.org/W2150881078","https://openalex.org/W2161298561","https://openalex.org/W2292209830","https://openalex.org/W2294375985","https://openalex.org/W2303543664","https://openalex.org/W2478460150","https://openalex.org/W2544063074","https://openalex.org/W2555015880","https://openalex.org/W2591882872","https://openalex.org/W2625392123","https://openalex.org/W2742634874","https://openalex.org/W2747433492","https://openalex.org/W2751152274","https://openalex.org/W2751384916","https://openalex.org/W2751398136","https://openalex.org/W2800679800","https://openalex.org/W2892090366","https://openalex.org/W2907507670","https://openalex.org/W2952858546","https://openalex.org/W2964829966","https://openalex.org/W2990105411","https://openalex.org/W3016632787","https://openalex.org/W3022385539","https://openalex.org/W3024430195","https://openalex.org/W3084308983","https://openalex.org/W3128672374","https://openalex.org/W3165142516","https://openalex.org/W3176551993","https://openalex.org/W3192820662","https://openalex.org/W4206996002","https://openalex.org/W4230872509","https://openalex.org/W4232760955","https://openalex.org/W4247858607","https://openalex.org/W4248861293","https://openalex.org/W4399591386"],"related_works":["https://openalex.org/W2961912854","https://openalex.org/W3094463742","https://openalex.org/W2915559073","https://openalex.org/W3169192711","https://openalex.org/W2884294946","https://openalex.org/W3013987925","https://openalex.org/W3209392453","https://openalex.org/W2741549564","https://openalex.org/W2951798800","https://openalex.org/W2031844830"],"abstract_inverted_index":{"Abstract":[0],"In":[1],"view":[2,110],"of":[3,11,111,121],"the":[4,9,47,86,112,117,139],"various":[5,29],"methodological":[6],"developments":[7],"regarding":[8],"protection":[10],"sensitive":[12],"data,":[13],"especially":[14],"with":[15],"respect":[16],"to":[17,43],"privacy-preserving":[18,102],"computation":[19,83],"and":[20,26,70,123,146],"federated":[21,79],"learning,":[22],"a":[23,99,128,131],"conceptual":[24],"categorization":[25,120],"comparison":[27],"between":[28],"methods":[30,69,124],"stemming":[31],"from":[32],"different":[33],"fields":[34],"is":[35,41,61,125,143],"often":[36],"desired.":[37],"More":[38],"concretely,":[39],"it":[40,60],"important":[42],"provide":[44,91],"guidance":[45],"for":[46,56,64,74,81,101,134],"practice,":[48,118],"which":[49,105],"lacks":[50],"an":[51,92],"overview":[52,93],"over":[53],"suitable":[54],"approaches":[55],"certain":[57],"scenarios,":[58],"whether":[59],"differential":[62],"privacy":[63],"interactive":[65],"queries,":[66],"k":[67],"-anonymity":[68],"synthetic":[71],"data":[72,75,87,103],"generation":[73],"publishing,":[76],"or":[77],"secure":[78],"analysis":[80],"multiparty":[82],"without":[84],"sharing":[85],"itself.":[88],"Here,":[89],"we":[90],"based":[94],"on":[95],"central":[96],"criteria":[97],"describing":[98],"context":[100,148],"handling,":[104],"allows":[106],"informed":[107],"decisions":[108],"in":[109],"many":[113],"alternatives.":[114],"Besides":[115],"guiding":[116],"this":[119],"concepts":[122],"destined":[126],"as":[127],"step":[129],"towards":[130],"comprehensive":[132],"ontology":[133],"anonymization.":[135],"We":[136],"emphasize":[137],"throughout":[138],"paper":[140],"that":[141,147],"there":[142],"no":[144],"panacea":[145],"matters.":[149]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
