{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T15:44:25Z","timestamp":1732031065297},"reference-count":12,"publisher":"Elsevier BV","issue":"1-2","license":[{"start":{"date-parts":[[2002,9,1]],"date-time":"2002-09-01T00:00:00Z","timestamp":1030838400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Artificial Intelligence in Medicine"],"published-print":{"date-parts":[[2002,9]]},"DOI":"10.1016\/s0933-3657(02)00050-7","type":"journal-article","created":{"date-parts":[[2002,10,10]],"date-time":"2002-10-10T17:33:30Z","timestamp":1034271210000},"page":"25-36","source":"Crossref","is-referenced-by-count":69,"title":["Confidentiality issues for medical data miners"],"prefix":"10.1016","volume":"26","author":[{"given":"Jules J","family":"Berman","sequence":"first","affiliation":[]}],"member":"78","reference":[{"issue":"6","key":"10.1016\/S0933-3657(02)00050-7_BIB1","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1136\/jamia.1999.0060435","article-title":"Multicenter patient records research security policies and tools","volume":"6","author":"Behlen","year":"1999","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"10.1016\/S0933-3657(02)00050-7_BIB2","unstructured":"Berman JJ, Moore GW, Hutchins GM. Maintaining patient confidentiality in the public domain internet autopsy database. J Am Med Inform Assoc (JAMIA), Symp. Suppl. 1996;328\u201332."},{"key":"10.1016\/S0933-3657(02)00050-7_BIB3","unstructured":"Bouzelat H, Quantin C, Dusserre L. Extraction and anonymity protocol of medical file. Proc AMIA Annu Fall Symp 1996;323\u201327."},{"key":"10.1016\/S0933-3657(02)00050-7_BIB4","unstructured":"Department of Health and Human Services. 45 CFR (Code of Federal Regulations), Parts 160 through 164. Standards for Privacy of Individually Identifiable Health Information (Final Rule). Federal Register: vol. 65, number 250, 28 December 2000. p. 82461\u2013510."},{"key":"10.1016\/S0933-3657(02)00050-7_BIB5","unstructured":"Department of Health and Human Services. 45 CFR (Code of Federal Regulations), 46. Protection of Human Subjects (Common Rule). Federal Register, vol. 56, 18 June 1991. p. 28003."},{"issue":"5532","key":"10.1016\/S0933-3657(02)00050-7_BIB6","doi-asserted-by":"crossref","first-page":"1013","DOI":"10.1126\/science.293.5532.1013","article-title":"Death at Johns Hopkins","volume":"293","author":"Kennedy","year":"2001","journal-title":"Science"},{"key":"10.1016\/S0933-3657(02)00050-7_BIB7","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1055\/s-0038-1634527","article-title":"Automatic record hash coding and linkage for epidemiological follow-up data confidentiality","volume":"37","author":"Quantin","year":"1998","journal-title":"Meth. Inf. Med."},{"key":"10.1016\/S0933-3657(02)00050-7_BIB8","unstructured":"Rivest R. Request for Comments: 1321, The MD5 Message-Digest Algorithm."},{"key":"10.1016\/S0933-3657(02)00050-7_BIB9","unstructured":"Sweeney L. Guaranteeing anonymity when sharing medical data, the Datafly system. Proc AMIA Annu Fall Symp 1997;51\u20135."},{"key":"10.1016\/S0933-3657(02)00050-7_BIB10","unstructured":"Sweeney L. Computational disclosure control, a primer on data privacy protection. http:\/\/www.swiss.ai.mit.edu\/classes\/6.805\/articles\/privacy\/sweeney-thesis-draft.pdf."},{"issue":"6","key":"10.1016\/S0933-3657(02)00050-7_BIB11","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1016\/S0168-9525(00)02025-4","article-title":"US gene therapy in crisis","volume":"16","author":"Teichler Zallen","year":"2000","journal-title":"Trends Genet."},{"key":"10.1016\/S0933-3657(02)00050-7_BIB12","unstructured":"World Wide Web Consortium. SHA-1 Digest. http:\/\/www.w3.org\/TR\/1998\/REC-Dsig-label\/SHAI-1_0."}],"container-title":["Artificial Intelligence in Medicine"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0933365702000507?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0933365702000507?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,7]],"date-time":"2020-03-07T16:21:18Z","timestamp":1583598078000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0933365702000507"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,9]]},"references-count":12,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2002,9]]}},"alternative-id":["S0933365702000507"],"URL":"https:\/\/doi.org\/10.1016\/s0933-3657(02)00050-7","relation":{},"ISSN":["0933-3657"],"issn-type":[{"value":"0933-3657","type":"print"}],"subject":[],"published":{"date-parts":[[2002,9]]}}}