1. Sweeney L (2002) k‑anonymity: a model for protecting privacy. Int J Uncertain Fuzz 10:557–570. https://doi.org/10.1142/S0218488502001648
2. Narayanan A, Shmatikov V (2008) Robust de-anonymization of large sparse datasets. Proceedings of the 2008 IEEE Symposium on Security and Privacy, 2008 IEEE Computer Society, USA, S S 111–S 125
3. Dick T, Dwork C, Kearns M et al (2023) Confidence-ranked reconstruction of census microdata from published statistics. PNAS 120:e2218605120. https://doi.org/10.1073/pnas.2218605120
4. Desai T, Ritchie F, Welpton R (2016) Five Safes: Designing data access for research. Economics Working Paper Series 1601. University of the West of England. https://www2.uwe.ac.uk/faculties/BBS/Documents/1601.pdf. Zugegriffen: 24. Juli 2023
5. Swart E, Ihle P, Gothe H, Matusiewicz D (Hrsg) (2014) Routinedaten im Gesundheitswesen. Handbuch Sekundärdatenanalyse: Grundlagen, Methoden und Perspektiven. Huber, Bern