<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "journalpublishing.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="2.0" xml:lang="en" article-type="research-article"><front><journal-meta><journal-id journal-id-type="nlm-ta">JMIR Med Inform</journal-id><journal-id journal-id-type="publisher-id">medinform</journal-id><journal-id journal-id-type="index">7</journal-id><journal-title>JMIR Medical Informatics</journal-title><abbrev-journal-title>JMIR Med Inform</abbrev-journal-title><issn pub-type="epub">2291-9694</issn></journal-meta><article-meta><article-id pub-id-type="publisher-id">53075</article-id><article-id pub-id-type="doi">10.2196/53075</article-id><title-group><article-title>Development of a Trusted Third Party at a Large University Hospital: Design and Implementation Study</article-title></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><name name-style="western"><surname>W&#x00FC;ndisch</surname><given-names>Eric</given-names></name><degrees>MSc</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Hufnagl</surname><given-names>Peter</given-names></name><degrees>Prof Dr</degrees><xref ref-type="aff" rid="aff2">2</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Brunecker</surname><given-names>Peter</given-names></name><degrees>Dr rer medic</degrees><xref ref-type="aff" rid="aff3">3</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Meier zu Ummeln</surname><given-names>Sophie</given-names></name><degrees>CEng</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Tr&#x00E4;ger</surname><given-names>Sarah</given-names></name><degrees>MA</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Kopp</surname><given-names>Marcus</given-names></name><degrees>BSc</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author" equal-contrib="yes"><name name-style="western"><surname>Prasser</surname><given-names>Fabian</given-names></name><degrees>Prof Dr</degrees><xref ref-type="aff" rid="aff4">4</xref><xref ref-type="fn" rid="equal-contrib1">*</xref></contrib><contrib contrib-type="author" equal-contrib="yes"><name name-style="western"><surname>Weber</surname><given-names>Joachim</given-names></name><degrees>Dr med</degrees><xref ref-type="aff" rid="aff1">1</xref><xref ref-type="aff" rid="aff5">5</xref><xref ref-type="aff" rid="aff6">6</xref><xref ref-type="fn" rid="equal-contrib1">*</xref></contrib></contrib-group><aff id="aff1"><institution>Core Unit THS, Berlin Institute of Health at Charit&#x00E9; &#x2013; Universit&#x00E4;tsmedizin Berlin</institution>, <addr-line>Berlin</addr-line>, <country>Germany</country></aff><aff id="aff2"><institution>Digital Pathology, Charit&#x00E9; &#x2013; Universit&#x00E4;tsmedizin Berlin</institution>, <addr-line>Berlin</addr-line>, <country>Germany</country></aff><aff id="aff3"><institution>Core Unit Research IT, Berlin Institute of Health at Charit&#x00E9; &#x2013; Universit&#x00E4;tsmedizin Berlin</institution>, <addr-line>Berlin</addr-line>, <country>Germany</country></aff><aff id="aff4"><institution>Medical Informatics Group, Center of Health Data Science, Berlin Institute of Health at Charit&#x00E9; &#x2013; Universit&#x00E4;tsmedizin Berlin</institution>, <addr-line>Berlin</addr-line>, <country>Germany</country></aff><aff id="aff5"><institution>Center for Stroke Research Berlin, Charit&#x00E9; &#x2013; Universit&#x00E4;tsmedizin Berlin</institution>, <addr-line>Berlin</addr-line>, <country>Germany</country></aff><aff id="aff6"><institution>German Centre for Cardiovascular Research (DZHK)</institution>, <addr-line>Berlin</addr-line>, <country>Germany</country></aff><contrib-group><contrib contrib-type="editor"><name name-style="western"><surname>Benis</surname><given-names>Arriel</given-names></name></contrib></contrib-group><contrib-group><contrib contrib-type="reviewer"><name name-style="western"><surname>Kim</surname><given-names>Hyo Jung</given-names></name></contrib><contrib contrib-type="reviewer"><name name-style="western"><surname>Wu</surname><given-names>Xiang</given-names></name></contrib></contrib-group><author-notes><corresp>Correspondence to Eric W&#x00FC;ndisch, MSc<email>eric.wuendisch@charite.de</email></corresp><fn fn-type="equal" id="equal-contrib1"><label>*</label><p>these authors contributed equally</p></fn></author-notes><pub-date pub-type="collection"><year>2024</year></pub-date><pub-date pub-type="epub"><day>17</day><month>4</month><year>2024</year></pub-date><volume>12</volume><elocation-id>e53075</elocation-id><history><date date-type="received"><day>25</day><month>09</month><year>2023</year></date><date date-type="rev-recd"><day>15</day><month>02</month><year>2024</year></date><date date-type="accepted"><day>17</day><month>02</month><year>2024</year></date></history><copyright-statement>&#x00A9; Eric W&#x00FC;ndisch, Peter Hufnagl, Peter Brunecker, Sophie Meier zu Ummeln, Sarah Tr&#x00E4;ger, Marcus Kopp, Fabian Prasser, Joachim Weber. Originally published in JMIR Medical Informatics (<ext-link ext-link-type="uri" xlink:href="https://medinform.jmir.org">https://medinform.jmir.org</ext-link>), 17.4.2024. </copyright-statement><copyright-year>2024</copyright-year><license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (<ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">https://creativecommons.org/licenses/by/4.0/</ext-link>), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Medical Informatics, is properly cited. The complete bibliographic information, a link to the original publication on <ext-link ext-link-type="uri" xlink:href="https://medinform.jmir.org/">https://medinform.jmir.org/</ext-link>, as well as this copyright and license information must be included.</p></license><self-uri xlink:type="simple" xlink:href="https://medinform.jmir.org/2024/1/e53075"/><abstract><sec><title>Background</title><p>Pseudonymization has become a best practice to securely manage the identities of patients and study participants in medical research projects and data sharing initiatives. This method offers the advantage of not requiring the direct identification of data to support various research processes while still allowing for advanced processing activities, such as data linkage. Often, pseudonymization and related functionalities are bundled in specific technical and organization units known as trusted third parties (TTPs). However, pseudonymization can significantly increase the complexity of data management and research workflows, necessitating adequate tool support. Common tasks of TTPs include supporting the secure registration and pseudonymization of patient and sample identities as well as managing consent.</p></sec><sec><title>Objective</title><p>Despite the challenges involved, little has been published about successful architectures and functional tools for implementing TTPs in large university hospitals. The aim of this paper is to fill this research gap by describing the software architecture and tool set developed and deployed as part of a TTP established at Charit&#x00E9; &#x2013; Universit&#x00E4;tsmedizin Berlin.</p></sec><sec sec-type="methods"><title>Methods</title><p>The infrastructure for the TTP was designed to provide a modular structure while keeping maintenance requirements low. Basic functionalities were realized with the free MOSAIC tools. However, supporting common study processes requires implementing workflows that span different basic services, such as patient registration, followed by pseudonym generation and concluded by consent collection. To achieve this, an integration layer was developed to provide a unified Representational state transfer (REST) application programming interface (API) as a basis for more complex workflows. Based on this API, a unified graphical user interface was also implemented, providing an integrated view of information objects and workflows supported by the TTP. The API was implemented using Java and Spring Boot, while the graphical user interface was implemented in PHP and Laravel. Both services use a shared Keycloak instance as a unified management system for roles and rights.</p></sec><sec sec-type="results"><title>Results</title><p>By the end of 2022, the TTP has already supported more than 10 research projects since its launch in December 2019. Within these projects, more than 3000 identities were stored, more than 30,000 pseudonyms were generated, and more than 1500 consent forms were submitted. In total, more than 150 people regularly work with the software platform. By implementing the integration layer and the unified user interface, together with comprehensive roles and rights management, the effort for operating the TTP could be significantly reduced, as personnel of the supported research projects can use many functionalities independently.</p></sec><sec sec-type="conclusions"><title>Conclusions</title><p>With the architecture and components described, we created a user-friendly and compliant environment for supporting research projects. We believe that the insights into the design and implementation of our TTP can help other institutions to efficiently and effectively set up corresponding structures.</p></sec></abstract><kwd-group><kwd>pseudonymisation</kwd><kwd>architecture</kwd><kwd>scalability</kwd><kwd>trusted third party</kwd><kwd>application</kwd><kwd>security</kwd><kwd>consent</kwd><kwd>identifying data</kwd><kwd>infrastructure</kwd><kwd>modular</kwd><kwd>software</kwd><kwd>implementation</kwd><kwd>user interface</kwd><kwd>health platform</kwd><kwd>data management</kwd><kwd>data privacy</kwd><kwd>health record</kwd><kwd>electronic health record</kwd><kwd>EHR</kwd><kwd>pseudonymization</kwd></kwd-group></article-meta></front><body><sec id="s1" sec-type="intro"><title>Introduction</title><sec id="s1-1"><title>Background</title><p>Medical research relies on the effective collection, management, and analysis of biomedical data [<xref ref-type="bibr" rid="ref1">1</xref>]. However, the complexity of associated data flows is increasing constantly due to the rising importance of data-driven approaches from the areas of data science and artificial intelligence [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref3">3</xref>]. These typically require data to be reused and shared to generate the necessary large data sets, for example in neuroscience [<xref ref-type="bibr" rid="ref4">4</xref>]. At the same time, relevant data are often highly sensitive and require protection against unauthorized use and disclosure [<xref ref-type="bibr" rid="ref5">5</xref>]. In alignment with this need, various laws, regulations, guidelines, and best practices suggest pseudonymization as a central data protection mechanism, especially in biomedical research [<xref ref-type="bibr" rid="ref6">6</xref>]. Pseudonymization refers to a process in which data that directly identifies individuals (henceforth denoted as identifying data), such as names and addresses, are stored separately from data and biosamples needed for scientific analyses, and research assets are identified using protected identifiers, known as pseudonyms [<xref ref-type="bibr" rid="ref7">7</xref>]. This protects the identity of patients or study participants while still allowing the implementation of complex research workflows, for example, data linkage. It is frequently suggested to bundle pseudonymization with other functionalities relevant to data protection and compliance, such as consent management, and that those should be carried out by particularly trusted units, knwon as trusted third parties (TTPs). One example of a concept recommending TTPs is the Guideline for Data Protection in Medical Research Projects by Technology, Methods, and Infrastructure for Networked Medical Research (TMF), the German umbrella organization for networked medical research [<xref ref-type="bibr" rid="ref8">8</xref>].</p><p>Although the general functionalities required by medical research projects may be similar, the way they are combined into workflows often differs significantly. The reason is that due to varying study schedules and (data) modalities, studies often have different requirements concerning the necessary number and types of pseudonyms as well as the research assets that have to be registered. The timing of consent collection can also vary, for example, if reconsenting is required. Another factor that can contribute to heterogeneity is the need for integration of or linkage with data from external systems or institutions. As a result, studies often develop study- or project-specific solutions to fulfill specific registration, pseudonymization, linkage, and consenting requirements [<xref ref-type="bibr" rid="ref9">9</xref>]. Some open tools, such as Enterprise Identifier Cross-Referencing (E-PIX) [<xref ref-type="bibr" rid="ref10">10</xref>], Generic Pseudonym Administration Service (gPAS) [<xref ref-type="bibr" rid="ref11">11</xref>], Generic Informed Consent Service (gICS) [<xref ref-type="bibr" rid="ref12">12</xref>], or Mainzelliste [<xref ref-type="bibr" rid="ref13">13</xref>], have been developed and are in widespread use; however, they are usually not integrated with each other, making the implementation of more complex workflows involving different TTP operations challenging and potentially lead to systematic limitations (explained further in the <italic>Discussion</italic> section). Although research exists on the components mentioned above, the literature lacks insights into the design of more comprehensive architectures that support complex research workflows that are actually in production use [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>].</p></sec><sec id="s1-2"><title>Objectives</title><p>This paper presents the design of a comprehensive architecture for a TTP that aims to support a wide range of different research projects and studies using a unified system. As a first step, we present requirements elicited for this structure and then describe the implementation of a corresponding solution that reuses existing open components. These components are extended with a common application programming interface (API) and a common graphical user interface (GUI). We then present insights into our experiences with piloting this structure and describe our plans for future developments.</p></sec></sec><sec id="s2" sec-type="methods"><title>Methods</title><sec id="s2-1"><title>Requirements</title><p>TTPs typically offer a range of core functionalities based on their role in supporting research projects and clinical studies with data protection services. Three key functionalities provided are as follows: (1) identity management, through which patients and study participants are registered and their identities are managed across different systems using record linkage; (2) pseudonym management, which provides and manages pseudonyms for different research contexts and is thus critical for data protection compliance; and (3) consent management, to obtain and manage patient and participant consent for various research activities. Further components are usually included to make these core functionalities accessible. An API is necessary for the systematic retrieval of information, the implementation of complex workflows, and integration with further health care and research systems. Moreover, a well-designed GUI is necessary to enable TTP staff and study personnel to perform common tasks efficiently. An audit trail is required to ensure transparency and traceability. Furthermore, data import and export functions are necessary for transferring data from legacy systems and archiving in study-specific contexts. Finally, platform independence is an important nonfunctional requirement to support wide adoption.</p><p>A common set of tools providing these core functionalities and features (<xref ref-type="table" rid="table1">Table 1</xref>) are E-PIX [<xref ref-type="bibr" rid="ref10">10</xref>], gPAS [<xref ref-type="bibr" rid="ref11">11</xref>], and gICS [<xref ref-type="bibr" rid="ref12">12</xref>], which are provided as free web-based software by the MOSAIC project from the University of Greifswald (explained in the following section). They are successfully used in a range of research projects and infrastructures [<xref ref-type="bibr" rid="ref16">16</xref>]. <xref ref-type="table" rid="table1">Table 1</xref> illustrates which of the above-mentioned core requirements are fulfilled by which of the MOSAIC tools.</p><table-wrap id="t1" position="float"><label>Table 1.</label><caption><p>Core functional requirements and MOSAIC tools that fulfill them.</p></caption><table id="table1" frame="hsides" rules="groups"><thead><tr><td align="left" valign="top" colspan="2">Core functional requirements</td><td align="left" valign="top" colspan="3">Tools</td></tr><tr><td align="left" valign="bottom" colspan="2"/><td align="left" valign="bottom">E-PIX<sup><xref ref-type="table-fn" rid="table1fn1">a</xref></sup></td><td align="left" valign="bottom">gPAS<sup><xref ref-type="table-fn" rid="table1fn2">b</xref></sup></td><td align="left" valign="bottom">gICS<sup><xref ref-type="table-fn" rid="table1fn3">c</xref></sup></td></tr></thead><tbody><tr><td align="left" valign="top" colspan="5"><bold>Basic services</bold></td></tr><tr><td align="left" valign="top" rowspan="3"/><td align="left" valign="top">Identity management</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2014;<sup><xref ref-type="table-fn" rid="table1fn4">d</xref></sup></td><td align="left" valign="top">&#x2014;</td></tr><tr><td align="left" valign="top">Pseudonym management</td><td align="left" valign="top">&#x2014;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2014;</td></tr><tr><td align="left" valign="top">Consent management</td><td align="left" valign="top">&#x2014;</td><td align="left" valign="top">&#x2014;</td><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top" colspan="5"><bold>Additional features</bold></td></tr><tr><td align="left" valign="top" rowspan="4"/><td align="left" valign="top">Application programming interface</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top">Graphical user interface</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top">Audit trail</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2014;</td><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top">Data import and export</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td></tr></tbody></table><table-wrap-foot><fn id="table1fn1"><p><sup>a</sup>E-PIX: Enterprise Identifier Cross-Referencing.</p></fn><fn id="table1fn2"><p><sup>b</sup>gPAS: Generic Pseudonym Administration Service.</p></fn><fn id="table1fn3"><p><sup>c</sup>gICS: Generic Informed Consent Service.</p></fn><fn id="table1fn4"><p><sup>d</sup>Not applicable.</p></fn></table-wrap-foot></table-wrap><p>Although the MOSAIC tools provide the basic functionalities needed, we elicited additional requirements from our extensive experience with supporting research projects. An overview is provided in <xref ref-type="table" rid="table2">Table 2</xref>. A detailed discussion is available in the section <italic>Comparison With Prior Work</italic>.</p><table-wrap id="t2" position="float"><label>Table 2.</label><caption><p>Additional functional requirements and core services for which they are relevant.</p></caption><table id="table2" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom" colspan="2">Additional functional requirements</td><td align="left" valign="bottom">Identity management</td><td align="left" valign="bottom">Pseudonym management</td><td align="left" valign="bottom">Consent management</td></tr></thead><tbody><tr><td align="left" valign="top" colspan="5"><bold>Programmatic interfaces and workflows</bold></td></tr><tr><td align="left" valign="top"/><td align="left" valign="top">Modern REST<sup><xref ref-type="table-fn" rid="table2fn1">a</xref></sup> application programming interface</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top"/><td align="left" valign="top">Information exchange with other systems (eg, for ingesting consents documented in the EHR<sup><xref ref-type="table-fn" rid="table2fn2">b</xref></sup> system)</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top"/><td align="left" valign="top">Cross-system workflows (eg, creation of a primary identifier, combined with the creation of all necessary pseudonyms based on the domain tree and preparation of a consent document)</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top" colspan="5"><bold>User interfaces and services</bold></td></tr><tr><td align="left" valign="top"/><td align="left" valign="top">Integrated user interface across all services</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top"/><td align="left" valign="top">Common authentication and authorization framework with single-sign-on and associated rights and roles with the ability to connect to institutional directory services</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top"/><td align="left" valign="top">Sending status messages to users in case of relevant events (eg, when a new patient has been registered)</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top" colspan="5"><bold>Specific features</bold></td></tr><tr><td align="left" valign="top"/><td align="left" valign="top">Visualization of pseudonyms as QR codes</td><td align="left" valign="top">&#x2014;<sup><xref ref-type="table-fn" rid="table2fn3">c</xref></sup></td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2014;</td></tr><tr><td align="left" valign="top"/><td align="left" valign="top">Automated versioning when storing consent updates</td><td align="left" valign="top">&#x2014;</td><td align="left" valign="top">&#x2014;</td><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top"/><td align="left" valign="top">Kiosk mode for consent documentation</td><td align="left" valign="top">&#x2014;</td><td align="left" valign="top">&#x2014;</td><td align="left" valign="top">&#x2713;</td></tr></tbody></table><table-wrap-foot><fn id="table2fn1"><p><sup>a</sup>REST: representational state transfer.</p></fn><fn id="table2fn2"><p><sup>b</sup>EHR: electronic health record.</p></fn><fn id="table2fn3"><p><sup>c</sup>Not applicable.</p></fn></table-wrap-foot></table-wrap><sec id="s2-1-1"><title>Programmatic Interfaces and Workflows</title><p>Representational state transfer (REST) services have become a de facto standard for modern applications over the last couple of years, as they are stateless, lean, and based on open web standards. Hence, we considered a REST API to be an important requirement for all 3 areas&#x2014;identity management, pseudonym management, and consent management. Together with other common technologies, such asJavaScript Object Notation, this makes the services offered by the TTP accessible to other systems and processes. It also fosters effective information exchange with other systems, for example, to automatically generate primary identifiers and pseudonyms in case a patient is registered in the electronic health record (EHR) system. Moreover, a common API across all services also enables cross-service workflows, which we consider particularly important. An example of this is the automatic creation of pseudonyms linked to the primary identifier when registering a patient or study participant.</p></sec><sec id="s2-1-2"><title>User Interfaces and Services</title><p>We considered an integrated user interface (UI) together with a shared authentication and authorization mechanism to be central for our TTP infrastructure. Important functionalities that the UI needs to support include depseudonymization, patient and participant registration, consent management and configuration, as well as administration. A tighter integration of the different components also facilitates sending status messages to users in case actions are required on their side.</p></sec><sec id="s2-1-3"><title>Specific Features</title><p>We further identified requirements in regard to specific management functionalities. For example, representing pseudonyms as QR codes is important for seamless workflows across different media; this includes printing the codes on accompanying documents or biospecimen tubes and then reading them using QR code readers. This is particularly important for biospecimen management. Moreover, we identified a need for versioning of managed consent documents. In the event of updates to consents, for example, due to wrong information on the consent form, versioning of the various consents in the system is important for traceability. This also requires the system to be able to assign consents or withdrawals to other participants (eg, if a wrong identifier has been used when originally collecting the form). In addition, a kiosk mode that locks the user into the application is needed for the secure collection of consents from patients using tablets.</p></sec><sec id="s2-1-4"><title>Nonfunctional Requirements</title><p>The most important nonfunctional requirements are as follows: (1) scalability, particularly when executing cross-service operations, and (2) documentation of administration functions.</p></sec></sec><sec id="s2-2"><title>Building Blocks</title><p>In this section, we will describe basic building blocks of the developed application stack.</p><sec id="s2-2-1"><title>MOSAIC Tools</title><p>As mentioned previously, the application has been developed around the MOSAIC tools [<xref ref-type="bibr" rid="ref17">17</xref>] as core components. Although these tools do not fulfill all our requirements, they provide a solid basis for implementing the core functionalities. The MOSAIC tools have been positively evaluated by the data protection authority of Mecklenburg-Vorpommern in Germany [<xref ref-type="bibr" rid="ref18">18</xref>] and have been successfully used in several research projects, for example, the BeLOVE (Berlin Longterm Observation of Vascular Events) [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref20">20</xref>] and NAKO (German National Cohort) studies [<xref ref-type="bibr" rid="ref21">21</xref>].</p><p>The MOSAIC suite consists of 3 tools [<xref ref-type="bibr" rid="ref22">22</xref>]: E-PIX provides a master patient index following the Integrating the Healthcare Enterprise (IHE) profiles, Patient Identifier Cross-Reference (PIX), and Patient Demographics Query [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref24">24</xref>]; gPAS provides associated pseudonymization functionalities; and gICS supports integrated consent management. More specifically, E-PIX enables the central management of directly identifying master data and supports probabilistic record linkage. The resolution of potential matches between identifying data is supported through the UI. gPAS supports the generation and management of pseudonyms on top of the identities managed by E-PIX using different pseudonym domains that can refer to different systems, locations, or contexts. Finally, gICS supports digitally managing informed consent and supports different consent templates and associated use policies.</p><p>Following our requirements, we implemented an authentication and authorization model as well as programmatic interfaces and graphical UIs around E-PIX, gPAS, and gICS to enable integrated workflows across all 3 tools and to improve their interfaces.</p></sec><sec id="s2-2-2"><title>Authorization and Authentication</title><p>We designed a simple, yet flexible 3-stage authorization model, which combines permissions for basic object access with permissions regarding the domain of the object to be accessed (with create, read, write, or delete permissions) by a machine or human user of the infrastructure. An overview is provided in <xref ref-type="fig" rid="figure1">Figure 1</xref>.</p><p>A domain defines the scope of the data managed by the TTP (eg, a research process, a study, a project, or an institute). Multiple domains can be created within a project (eg, to store pseudonyms used in specific subprojects or contexts). Additionally, in gPAS, a domain can have parent and child domains. This results in a tree structure that can be used to tailor permissions to different scopes within individual projects [<xref ref-type="bibr" rid="ref25">25</xref>].</p><p>On the implementation side, we mapped this model to OpenID Connect (OIDC), which is based on OAuth 2.0 [<xref ref-type="bibr" rid="ref26">26</xref>]. The JavaScript Object Notation Web Token generated in this process contains role names as attributes, which are platform independent and can also be processed on mobile devices. This is important for the additional UIs that we had to develop. As an identity and access management solution, we chose Keycloak, which is in widespread use, has a native administration interface, and is published as open-source software under the Apache License 2.0. Importantly, it can also be connected to a range of directory services usually maintained by hospitals for account and permission management.</p><fig position="float" id="figure1"><label>Figure 1.</label><caption><p>Stages of the functional authorization model.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="medinform_v12i1e53075_fig01.png"/></fig></sec><sec id="s2-2-3"><title>Programmatic Interface</title><p>We decided to implement a REST API to extend the programmatic interfaces of E-PIX, gPAS, and gICS and support cross-tool workflows. Due to its stateless nature, this design enables the management and sharing of data across different systems, combined workflows, and calls by external components. One important application of the unified REST API is to combine participant registration with automatic consent checking in gICS, indexing the participant in E-PIX, and generating pseudonyms in gPAS. Furthermore, the REST API can easily be integrated with the developed authentication and authorization model as well as logging and audit trail functionalities. Existing interfaces of MOSAIC tools can also be integrated with the permission model by wrapping them behind REST interfaces.</p></sec><sec id="s2-2-4"><title>Graphical Interfaces</title><sec id="s2-2-4-1"><title>Web Interface</title><p>Based on the integrated programmatic API that supports all services, we have also implemented an integrated GUI, which allows accessing all TTP services in a unified manner. Analogously to the programmatic API, the UIs are integrated with the described authentication and authorization model. Users can log into the platform with their account from the connected directory service, which is abstracted way using OIDC with Keycloak. The token generated at log-in contains all assigned permissions, which are used in the UI and sent as a bearer token with each request to the REST services. A strict content-security-policy workflow blocks the execution of foreign scripts outside the origin domain, thus increasing the level of security. Actions such as participant administration, depseudonymization, or consent administration can be performed through wizards. Users can request essential documents, such as copies of consent, directly from the web application.</p></sec><sec id="s2-2-4-2"><title>Mobile App</title><p>The final building block is provided by a mobile app that serves as a direct channel from the TTP services to the participants. The most important application is collecting consent and handling withdrawals. A typical deployment consists of installing the appl on a tablet, which is then configured by study personnel and handed over to the participants (<xref ref-type="fig" rid="figure2">Figure 2</xref>).</p><fig position="float" id="figure2"><label>Figure 2.</label><caption><p>Workflow of actions in the app.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="medinform_v12i1e53075_fig02.png"/></fig><p>The study personnel can log into the app using the same log-in data as for the TTP web interface. After the project staff member enters a participant identification code and selects either a consent or a withdrawal form, the selected participant fills out the form. To prevent participants from accessing unauthorized information, the app will be started in kiosk mode. The identification code is either a temporary pseudonym or an already existing pseudonym for the participant, providing direct linkage to the research project managed by the TTP. In the latter case, the app automatically opens the associated consent template. After filling out the form, the participants can enter their name and place of residence, and then, they can put their signature in a designated field. Afterwards, the staff member provides their signature, confirming that the form has been completed with them as the assigned project staff member.</p></sec></sec></sec><sec id="s2-3"><title>Supported Pseudonym Algorithms</title><p>In our system, generated random numbers are used as pseudonyms. The length is configurable, with a minimum of 6 digits, and is chosen based on the number of pseudonyms that are needed for the respective project. Additionally, we use the Damm algorithm to detect single-digit errors and all adjacent transposition errors with a simple checksum [<xref ref-type="bibr" rid="ref27">27</xref>]. Moreover, pseudonyms are combined with study- and context-specific prefixes. For example, the pseudonym &#x201C;BLV-US-123456&#x201D; could represent an ultrasound (&#x201C;US&#x201D;) measurement for a study participant in a study called BeLOVE (&#x201C;BLV&#x201D;). Finally, our system can also import and manage existing pseudonyms. As those are usually generated using different algorithms and often do not contain a checksum, we mark them as &#x201C;external&#x201D; within the system.</p></sec><sec id="s2-4"><title>Ethical Considerations</title><p>This paper covers the design and implementation of a generic research service, which requires no ethics committee approval according to local policies. However, the individual studies that use the service have to apply for ethics approval. For example, the BeLOVE study, which is described as a case study in this paper, was approved by Charit&#x00E9;&#x2019;s ethics committee (vote number EA1/066/17).</p></sec></sec><sec id="s3" sec-type="results"><title>Results</title><p>In this section, we will first describe the general architecture of our solution, then cover important implementation details, and finally report on real-world experiences with the platform.</p><sec id="s3-1"><title>Architecture</title><p>The overall architecture is divided into the API, which wraps around the MOSAIC tools, the graphical interfaces oriented toward users, as well as the access and identity management component (<xref ref-type="fig" rid="figure3">Figure 3</xref> presents more details).</p><fig position="float" id="figure3"><label>Figure 3.</label><caption><p>Architecture overview, including wrapped MOSAIC stack (core components); systems maintained by the trusted third party (TTP; graphical components as well as access and identity components); systems queried by the TTP (electronic health record [EHR] system and directory services); and systems from which the TTP is queried (Research Electronic Data Capture [REDCap]). E-PIX: Enterprise Identifier Cross-Referencing; gICS: Generic Informed Consent Service; gPAS: Generic Pseudonym Administration Service.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="medinform_v12i1e53075_fig03.png"/></fig><p>As illustrated, the core components are provided with an interface to the EHR system to support the pseudonymization of patient identities for direct reuse in the respective research context. Other systems that can access the TTP services via the REST API are, for example, electronic data capture systems, such as Research Electronic Data Capture (REDCap), or biobank information systems. All components of the respective interfaces are containerized with Docker [<xref ref-type="bibr" rid="ref28">28</xref>] and deployed on a Docker swarm [<xref ref-type="bibr" rid="ref29">29</xref>]. By using OIDC based on OAuth 2.0 as the standard, we were able to integrate other systems via existing packages (eg, Spring-Boot-Security) and allow other applications to access the systems. When modeling the interfaces, we ensured that anything that could be done graphically could also be done programmatically. This keeps the platform open and supports other information systems with the integration of TTP services.</p></sec><sec id="s3-2"><title>Implementation</title><p>The REST API was implemented using Java 13 with the <named-content content-type="background:#ffeb3b">Spring Boot </named-content>framework [<xref ref-type="bibr" rid="ref30">30</xref>] by focusing on stable packages, including <named-content content-type="background:#ffeb3b">Spring Security</named-content> for OIDC, and relying on an established framework. The resulting platform is robust, maintainable, extensible, and flexible. We have implemented 35 generic interfaces so far, most of which are Create-Read-Update-Delete (CRUD) interfaces for the key information objects Domain, Participant, Identifier, Pseudonym, Consent, and Consent Template (<xref ref-type="fig" rid="figure4">Figure 4</xref>), as well as additional directory and search functions for pseudonyms and consents.</p><fig position="float" id="figure4"><label>Figure 4.</label><caption><p>Key information objects and their relationships.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="medinform_v12i1e53075_fig04.png"/></fig><p>The web-based interface (<xref ref-type="fig" rid="figure5">Figures 5</xref> and <xref ref-type="fig" rid="figure6">6</xref>) is implemented using the PHP-based lightweight enterprise web framework Laravel [<xref ref-type="bibr" rid="ref31">31</xref>]. Laravel uses a Model-View-Controller pattern [<xref ref-type="bibr" rid="ref32">32</xref>], has a template engine named Blade, and supports agile development processes. By integrating the open-source framework Bootstrap, we were able to implement a responsive front end that could be displayed in browsers on multiple types of devices. The web application directly interfaces with the REST API and does not manage any participant data in a separate database.</p><fig position="float" id="figure5"><label>Figure 5.</label><caption><p>Screenshots of the user interface: editing consent information.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="medinform_v12i1e53075_fig05.png"/></fig><fig position="float" id="figure6"><label>Figure 6.</label><caption><p>Screenshot of the user interface: overview of consent status.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="medinform_v12i1e53075_fig06.png"/></fig><p>The app front end (see <xref ref-type="fig" rid="figure7">Figures 7</xref><xref ref-type="fig" rid="figure8"/>-<xref ref-type="fig" rid="figure9">9</xref>) was developed in React Native [<xref ref-type="bibr" rid="ref33">33</xref>] and then significantly extended to work on tablets integrated into our mobile device management. The application does not permanently store any data on the device, and processing is carried out exclusively via React Native state management.</p><fig position="float" id="figure7"><label>Figure 7.</label><caption><p>Screenshot of the consent app: entering or scanning an ID.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="medinform_v12i1e53075_fig07.png"/></fig><fig position="float" id="figure8"><label>Figure 8.</label><caption><p>Screenshot of the consent app: filling out consent forms.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="medinform_v12i1e53075_fig08.png"/></fig><fig position="float" id="figure9"><label>Figure 9.</label><caption><p>Screenshot of the consent app: sign and submit.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="medinform_v12i1e53075_fig09.png"/></fig></sec><sec id="s3-3"><title>Core Functionalities for Research Projects</title><p>As a result of our development efforts, the TTP software stack provides a wide range of functionalities that research projects need. <xref ref-type="table" rid="table3">Table 3</xref> provides an overview of frequently used common features.</p><table-wrap id="t3" position="float"><label>Table 3.</label><caption><p>Essential functionalities provided to research projects.</p></caption><table id="table3" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Component</td><td align="left" valign="bottom">Process</td><td align="left" valign="bottom">Description</td></tr></thead><tbody><tr><td align="left" valign="top">API<sup><xref ref-type="table-fn" rid="table3fn1">a</xref></sup></td><td align="left" valign="top">Obtaining a temporary pseudonym</td><td align="left" valign="top">Automated creation of participant placeholders that can be used in third-party systems and later linked to the study identity</td></tr><tr><td align="left" valign="top">App</td><td align="left" valign="top">Electronic consent management</td><td align="left" valign="top">Viewing, completing, saving, and printing an electronic consent template of the respective project under a pseudonym</td></tr><tr><td align="left" valign="top">Web UI<sup><xref ref-type="table-fn" rid="table3fn2">b</xref></sup></td><td align="left" valign="top">Participant registration</td><td align="left" valign="top">Master data and contact details can be entered manually or imported from the EHR<sup><xref ref-type="table-fn" rid="table3fn3">c</xref></sup> system</td></tr><tr><td align="left" valign="top">Web UI</td><td align="left" valign="top">Participant overview</td><td align="left" valign="top">Provides an overview of the participants and pseudonyms associated with a specific project</td></tr><tr><td align="left" valign="top">API</td><td align="left" valign="top">Integration with other systems</td><td align="left" valign="top">Interface for pseudonymization, depseudonymization, and linkage for third-party systems</td></tr><tr><td align="left" valign="top">Web UI</td><td align="left" valign="top">Depseudonymization</td><td align="left" valign="top">Resolve pseudonym to participant master data</td></tr><tr><td align="left" valign="top">Web UI</td><td align="left" valign="top">Retrieval of usage permissions based on consent information</td><td align="left" valign="top">Retrieve electronic representation of usage permissions from consents associated with a specific patient or participant pseudonym</td></tr><tr><td align="left" valign="top">Web UI</td><td align="left" valign="top">Update participant information</td><td align="left" valign="top">Use pseudonyms to update participant information</td></tr></tbody></table><table-wrap-foot><fn id="table3fn1"><p><sup>a</sup>API: application programming interface.</p></fn><fn id="table3fn2"><p><sup>b</sup>UI: user interface.</p></fn><fn id="table3fn3"><p><sup>c</sup>EHR: electronic health record.</p></fn></table-wrap-foot></table-wrap><p>On the API level, these features include integration with other systems to manage pseudonymization, depseudonymization, and data linkage. The app specializes in electronic consent management, specifically viewing, completing, and saving of consent templates. The web-based UI permits registration of participant details; provides an overview of participants, consents, and pseudonyms; supports depseudonymization as well as the retrieval of use permissions based on consent information. CRUD operations for major participant properties and printing consents are also supported.</p></sec><sec id="s3-4"><title>Experiences in Real-World Operational Settings</title><p>The TTP has already supported more than 10 research projects since it was launched in December 2019. As of December 2022, our TTP system manages data of 3610 registered participants with 384,813 pseudonyms and 1762 consent documents. The pseudonyms fall into 2 categories: 40,867 pseudonyms have been assigned to individual participants managed by the TTP and 343,946 pseudonyms to other identifiers (eg, health insurance numbers that are managed by the TTP as part of its support for data linkage). On average, the TTP manages about 11 pseudonyms for each individual participant. As many as 153 research personnel actively engage with the software on a daily basis. Backups of our databases are created every night. These backups are stored for 90 days along with all log files.</p><p>As a case study, we will describe how the TTP services are being used by the large-scale BeLOVE study [<xref ref-type="bibr" rid="ref20">20</xref>], which is carried out as a cooperation between several sites and departments at Charit&#x00E9;. BeLOVE uses all services provided, from patient as well as participant registration and consent management, to pseudonym generation for the various diagnostics and phenotyping activities performed during hospitalizations or study visits (about 12 pseudonyms per participant). Compared to the initial planning of the study, which required 2 study staff for the administrative tasks, these staff requirements were in the meantime reduced to zero due to the functionality of our TTP and the associated secure outsourcing of tasks to all study staff. The use of central TTP services has also significantly reduced the efforts required for coordinating BeLOVE and its substudies with the data protection and information security officers. Within Charit&#x00E9;&#x2019;s internal data integration platform, consistent pseudonyms and API access to mapping rules are frequently used to link data collected about BeLOVE participants with routine health care data collected during inpatient and outpatient encounters for various types of analyses. Secondary pseudonyms have already been generated for 10 projects in which the data have been analyzed or shared with others.</p></sec></sec><sec id="s4" sec-type="discussion"><title>Discussion</title><sec id="s4-1"><title>Principal Results</title><p>In this paper, we have presented a software stack to support a TTP with its core tasks at a large German academic medical center. Our architecture extends existing systems for key functionalities, identity management, pseudonymization, and consent management with a fine-grained authentication and authorization model, a modern REST API, two types of UIs, and connections to third-party systems. These extensions were necessary to support cross-service workflows on the programmatic as well as the user level and to meet further functional and nonfunctional requirements. Our application is built using various open-source enterprise frameworks and standards (eg, OIDC) to ensure sustainability and integration with important institutional services (eg, our user directory and leading master patient index). Our experiences with supporting a wide range of research projects with TTP services over a longer period have shown that our approach works and provides functionalities that are generic enough to support a wide range of applications.</p></sec><sec id="s4-2"><title>Comparison With Prior Work</title><p>Our architecture and implementation are based on the MOASIC tools [<xref ref-type="bibr" rid="ref16">16</xref>], which we have extended with additional components to overcome functional and nonfunctional shortcomings. Most importantly, the publicly available basic versions of the MOSAIC tools are not suitable for handling more complex and flexible workflows with fine-grained authorization. For example, supporting cross-service workflows, like registering a patient, generating pseudonyms, and preparing a consent form as an integrated operation, cannot be implemented without an additional dispatcher component that is currently not publicly available. We solved this by implementing a cross-service REST API. Although the MOSAIC tools already come with an API, it is provided individually for each service and is based on the Simple Object Access Protocol [<xref ref-type="bibr" rid="ref34">34</xref>], which originates from the IHE web service standards [<xref ref-type="bibr" rid="ref35">35</xref>] and is complex and slow, requiring managing server-side state. Analogously to an API, the MOSAIC tools also offer GUIs. However, they are provided individually for each service and hence do not enable users to seamlessly perform operations that require interactions with multiple core services. For this reason, we developed a cross-service UI that is based on our API. Additionally, we added functionalities for generating QR codes, versioning consent documents, and starting the system in kiosk mode. Finally, our extensions also improve the system&#x2019;s scalability when executing cross-service operations, such as querying for links between pseudonyms and identifiers, which can be slow when using the MOSAIC tools [<xref ref-type="bibr" rid="ref36">36</xref>]. We also added comprehensive documentation of administration functions, which is not fully available for the current open-source versions without registration with the vendor [<xref ref-type="bibr" rid="ref37">37</xref>].</p><p>Prior work on TTP-related services usually focused on individual components or algorithms that could support TTP operations, deployments in specific research projects, or high-level architecture overviews.</p><p>One well-known example is the one-way hash approach employed by Vanderbilt University Medical Center as part of the ingest process into their deidentified layer within a research data warehouse [<xref ref-type="bibr" rid="ref38">38</xref>]. Pommering et al [<xref ref-type="bibr" rid="ref39">39</xref>] describe strategies for how pseudonymization could be used in different contexts, for example, in the secondary use of EHR data or in medical research networks and biobanks. They introduced two models that support repeated depseudonymization as well as one-time use [<xref ref-type="bibr" rid="ref40">40</xref>]. The former model was later integrated into a concept for sharing large data sets in medical research networks and biobanks [<xref ref-type="bibr" rid="ref39">39</xref>].</p><p>Building on this, Lo Iacono [<xref ref-type="bibr" rid="ref41">41</xref>] investigated a cryptographic approach for generating consistent pseudonyms in multicentric studies but without describing a specific implementation within a concrete project. Dangl et al [<xref ref-type="bibr" rid="ref42">42</xref>] describe concepts and requirements for TTP services for a specific biobank of a clinical research group. Heinze et al [<xref ref-type="bibr" rid="ref43">43</xref>] developed two services based on IHE profiles that have been implemented into the Heidelberg Personal Electronic Health Record. One service is used to capture patient consent, while the other provides a GUI to manage consents. Further components (eg, for pseudonym or identity management) were not described in detail.</p><p>Lablans et al [<xref ref-type="bibr" rid="ref13">13</xref>] introduce the Mainzeliste, which supports managing patient identities and pseudonyms through a web-based front end. Bialke et al [<xref ref-type="bibr" rid="ref10">10</xref>] introduce the MOSAIC tools, which we also use in our work, as a set of tools supporting central data management for studies or research networks. They also introduce the &#x201C;dispatcher&#x201D; as an additional component for building complex workflows [<xref ref-type="bibr" rid="ref22">22</xref>], which is, as we described above, unfortunately not publicly available.</p><p>Aamot et al [<xref ref-type="bibr" rid="ref44">44</xref>] compare different strategies for depseudonymization in which, among others, the strategy of Pommering et al [<xref ref-type="bibr" rid="ref39">39</xref>] is compared with alternative approaches. Based on this comparison, they develop a pseudonymization approach using deterministic one-way mappings based on cryptographic protocols. Lautenschl&#x00E4;ger et al [<xref ref-type="bibr" rid="ref45">45</xref>] implement and describe a generic and tightly coupled architecture and component for pseudonymization that has been used in several research projects. On the application side, Bahls et al [<xref ref-type="bibr" rid="ref14">14</xref>] describe a TTP architecture using the MOSAIC tools for the Routine Anonymized Data for Advanced Health Services Research project. Hampf et al [<xref ref-type="bibr" rid="ref17">17</xref>] benchmark parts of the MOSAIC tools and conclude that it would take several days to register 2 million patients with the hardware setup utilized.</p></sec><sec id="s4-3"><title>Limitations and Future Work</title><p>As the most recent versions of the MOSAIC tools are not distributed as open-source software in a public repository [<xref ref-type="bibr" rid="ref37">37</xref>], it was not possible for us to make changes to the core tools used. Instead, workarounds had to be implemented at the API or UI level, which is not ideal from an architecture perspective. Moreover, our TTP platform is currently focused on providing intra-institutional services only. In future work, we plan to extend our platform with external interfaces, enabling the TTP to act as a central trustee for multicentric projects. We also aim to implement additional programmatic interfaces following international interoperability standards, in particular, Health Level 7 Fast Healthcare Interoperability Resources [<xref ref-type="bibr" rid="ref46">46</xref>] and enable study personnel to directly manage the permissions of associated staff. Finally, we plan to introduce a unified pool of consent policy keys to harmonize the permission information that can be queried from our system to enable automated downstream processing that considers consent information.</p></sec><sec id="s4-4"><title>Conclusions</title><p>Scalable and comprehensive TTP services are central to modern data-driven medical research. However, community-based comprehensive platforms that can be used to implement such services are still lacking. We believe that our description of key requirements as well as the insights provided into our flexible architecture that combines core tools with user- and application-oriented workflows and interfaces, including third-party applications, can help other institutions setting up comparable services.</p></sec></sec></body><back><ack><p>The authors would like to thank the BeLOVE (Berlin Longterm Observation of Vascular Events) study team, who have contributed to the improvement of the entire system with their constant feedback. This work was, in part, supported by the German Federal Ministry of Education and Research under grant agreement number 16DTM215 (THS-MED).</p></ack><fn-group><fn fn-type="conflict"><p>None declared.</p></fn></fn-group><glossary><title>Abbreviations</title><def-list><def-item><term id="abb1">API</term><def><p>application programming interface</p></def></def-item><def-item><term id="abb2">BeLOVE</term><def><p>Berlin Longterm Observation of Vascular Events</p></def></def-item><def-item><term id="abb3">BLV</term><def><p>BeLOVE</p></def></def-item><def-item><term id="abb4">CRUD</term><def><p>Create-Read-Update-Delete</p></def></def-item><def-item><term id="abb5">E-PIX</term><def><p>Enterprise Identifier Cross-Referencing</p></def></def-item><def-item><term id="abb6">EHR</term><def><p>Electronic Health Record</p></def></def-item><def-item><term id="abb7">gICS</term><def><p>Generic Informed Consent Service</p></def></def-item><def-item><term id="abb8">gPAS</term><def><p>Generic Pseudonym Administration Service</p></def></def-item><def-item><term id="abb9">GUI</term><def><p>Graphical user interface</p></def></def-item><def-item><term id="abb10">IHE</term><def><p>Integrating the Healthcare Enterprise</p></def></def-item><def-item><term id="abb11">NAKO</term><def><p>German National Cohort</p></def></def-item><def-item><term id="abb12">OIDC</term><def><p>OpenID Connect</p></def></def-item><def-item><term id="abb13">PHP</term><def><p>Hypertext Preprocessor</p></def></def-item><def-item><term id="abb14">PIX</term><def><p>Patient Identifier Cross-Reference</p></def></def-item><def-item><term id="abb15">REDCap</term><def><p>Research Electronic Data Capture</p></def></def-item><def-item><term id="abb16">REST</term><def><p>representational state transfer</p></def></def-item><def-item><term id="abb17">TMF</term><def><p>Technology, Methods, and Infrastructure for Networked Medical Research</p></def></def-item><def-item><term id="abb18">TTP</term><def><p>trusted third party</p></def></def-item></def-list></glossary><ref-list><title>References</title><ref id="ref1"><label>1</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Pommerening</surname><given-names>K</given-names></name><name name-style="western"><surname>Sax</surname><given-names>U</given-names></name><name name-style="western"><surname>M&#x00FC;ller</surname><given-names>T</given-names></name><name name-style="western"><surname>Speer</surname><given-names>R</given-names></name><name name-style="western"><surname>Ganslandt</surname><given-names>T</given-names></name><name name-style="western"><surname>Drepper</surname><given-names>J</given-names></name></person-group><article-title>Integrating eHealth and medical research: the TMF data protection scheme</article-title><source>EHealth Comb Health Telemat Telemed Biomed Eng Bioinforma Edge</source><year>2008</year><month>01</month><access-date>2024-04-10</access-date><fpage>5</fpage><lpage>10</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://www.staff.uni-mainz.de/pommeren/Artikel/CeHR_POM_Publ.pdf">https://www.staff.uni-mainz.de/pommeren/Artikel/CeHR_POM_Publ.pdf</ext-link></comment></nlm-citation></ref><ref id="ref2"><label>2</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Borda</surname><given-names>A</given-names></name><name name-style="western"><surname>Gray</surname><given-names>K</given-names></name><name name-style="western"><surname>Fu</surname><given-names>Y</given-names></name></person-group><article-title>Research data management in health and biomedical citizen science: practices and prospects</article-title><source>JAMIA Open</source><year>2019</year><month>12</month><volume>3</volume><issue>1</issue><fpage>113</fpage><lpage>125</lpage><pub-id pub-id-type="doi">10.1093/jamiaopen/ooz052</pub-id><pub-id pub-id-type="medline">32607493</pub-id></nlm-citation></ref><ref id="ref3"><label>3</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Wang</surname><given-names>X</given-names></name><name name-style="western"><surname>Williams</surname><given-names>C</given-names></name><name name-style="western"><surname>Liu</surname><given-names>ZH</given-names></name><name name-style="western"><surname>Croghan</surname><given-names>J</given-names></name></person-group><article-title>Big data management challenges in health research-a literature review</article-title><source>Brief Bioinform</source><year>2019</year><month>01</month><day>18</day><volume>20</volume><issue>1</issue><fpage>156</fpage><lpage>167</lpage><pub-id pub-id-type="doi">10.1093/bib/bbx086</pub-id><pub-id pub-id-type="medline">28968677</pub-id></nlm-citation></ref><ref id="ref4"><label>4</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Zhao</surname><given-names>Z</given-names></name><name name-style="western"><surname>Chuah</surname><given-names>JH</given-names></name><name name-style="western"><surname>Lai</surname><given-names>KW</given-names></name><etal/></person-group><article-title>Conventional machine learning and deep learning in Alzheimer's disease diagnosis using neuroimaging: a review</article-title><source>Front Comput Neurosci</source><year>2023</year><month>02</month><day>6</day><volume>17</volume><fpage>1038636</fpage><pub-id pub-id-type="doi">10.3389/fncom.2023.1038636</pub-id><pub-id pub-id-type="medline">36814932</pub-id></nlm-citation></ref><ref id="ref5"><label>5</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Eggert</surname><given-names>K</given-names></name><name name-style="western"><surname>W&#x00FC;llner</surname><given-names>U</given-names></name><name name-style="western"><surname>Antony</surname><given-names>G</given-names></name><etal/></person-group><article-title>Data protection in biomaterial banks for Parkinson's disease research: the model of GEPARD (Gene Bank Parkinson's Disease Germany)</article-title><source>Mov Disord</source><year>2007</year><month>04</month><day>15</day><volume>22</volume><issue>5</issue><fpage>611</fpage><lpage>618</lpage><pub-id pub-id-type="doi">10.1002/mds.21331</pub-id><pub-id pub-id-type="medline">17230444</pub-id></nlm-citation></ref><ref id="ref6"><label>6</label><nlm-citation citation-type="book"><person-group person-group-type="editor"><name name-style="western"><surname>Bourka</surname><given-names>A</given-names></name><name name-style="western"><surname>Drogkaris</surname><given-names>P</given-names></name></person-group><source>Recommendations on Shaping Technology According to GDPR Provisions - An Overview on Data Pseudonymisation</source><year>2019</year><publisher-name>The European Union Agency for Network and Information Security (ENISA)</publisher-name></nlm-citation></ref><ref id="ref7"><label>7</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kohlmayer</surname><given-names>F</given-names></name><name name-style="western"><surname>Lautenschl&#x00E4;ger</surname><given-names>R</given-names></name><name name-style="western"><surname>Prasser</surname><given-names>F</given-names></name></person-group><article-title>Pseudonymization for research data collection: is the juice worth the squeeze?</article-title><source>BMC Med Inform Decis Mak</source><year>2019</year><month>09</month><day>4</day><volume>19</volume><issue>1</issue><fpage>178</fpage><pub-id pub-id-type="doi">10.1186/s12911-019-0905-x</pub-id><pub-id pub-id-type="medline">31484555</pub-id></nlm-citation></ref><ref id="ref8"><label>8</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Pommerening</surname><given-names>K</given-names></name><name name-style="western"><surname>Drepper</surname><given-names>J</given-names></name><name name-style="western"><surname>Helbing</surname><given-names>K</given-names></name><name name-style="western"><surname>Ganslandt</surname><given-names>T</given-names></name></person-group><source>Leitfaden Zum Datenschutz in Medizinischen Forschungsprojekte</source><year>2015</year><publisher-name>Medizinisch Wissenschaftliche Verlagsgesellschaft (MWV)</publisher-name><pub-id pub-id-type="other">978-3-95466-295-1</pub-id></nlm-citation></ref><ref id="ref9"><label>9</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Lowrance</surname><given-names>W</given-names></name></person-group><article-title>Learning from experience: privacy and the secondary use of data in health research</article-title><source>J Health Serv Res Policy</source><year>2003</year><month>07</month><volume>8 Suppl 1</volume><fpage>S1:2-7</fpage><pub-id pub-id-type="doi">10.1258/135581903766468800</pub-id><pub-id pub-id-type="medline">12869330</pub-id></nlm-citation></ref><ref id="ref10"><label>10</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bialke</surname><given-names>M</given-names></name><name name-style="western"><surname>Bahls</surname><given-names>T</given-names></name><name name-style="western"><surname>Havemann</surname><given-names>C</given-names></name><etal/></person-group><article-title>MOSAIC&#x2014;a modular approach to data management in epidemiological studies</article-title><source>Methods Inf Med</source><year>2015</year><volume>54</volume><issue>4</issue><fpage>364</fpage><lpage>371</lpage><pub-id pub-id-type="doi">10.3414/ME14-01-0133</pub-id><pub-id pub-id-type="medline">26196494</pub-id></nlm-citation></ref><ref id="ref11"><label>11</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Geidel</surname><given-names>L</given-names></name><name name-style="western"><surname>Bahls</surname><given-names>T</given-names></name><name name-style="western"><surname>Hoffmann</surname><given-names>W</given-names></name></person-group><article-title>Generische Pseudonymisierung ALS Modul des Zentralen Datenmanagements Medizinischer Forschungsdaten</article-title><source>Universit&#x00E4;tsmedizin</source><year>2013</year><access-date>2024-04-10</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.ths-greifswald.de/wp-content/uploads/2019/09/Poster_DGEpi_PSN_2013_09_27.pdf">https://www.ths-greifswald.de/wp-content/uploads/2019/09/Poster_DGEpi_PSN_2013_09_27.pdf</ext-link></comment></nlm-citation></ref><ref id="ref12"><label>12</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Rau</surname><given-names>H</given-names></name><name name-style="western"><surname>Geidel</surname><given-names>L</given-names></name><name name-style="western"><surname>Bialke</surname><given-names>M</given-names></name><etal/></person-group><article-title>The generic informed consent service gICS: implementation and benefits of a modular consent software tool to master the challenge of electronic consent management in research</article-title><source>J Transl Med</source><year>2020</year><month>07</month><day>29</day><volume>18</volume><issue>1</issue><fpage>287</fpage><pub-id pub-id-type="doi">10.1186/s12967-020-02457-y</pub-id><pub-id pub-id-type="medline">32727514</pub-id></nlm-citation></ref><ref id="ref13"><label>13</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Lablans</surname><given-names>M</given-names></name><name name-style="western"><surname>Borg</surname><given-names>A</given-names></name><name name-style="western"><surname>&#x00DC;ckert</surname><given-names>F</given-names></name></person-group><article-title>A restful interface to pseudonymization services in modern web applications</article-title><source>BMC Med Inform Decis Mak</source><year>2015</year><month>02</month><day>7</day><volume>15</volume><fpage>2</fpage><pub-id pub-id-type="doi">10.1186/s12911-014-0123-5</pub-id><pub-id pub-id-type="medline">25656224</pub-id></nlm-citation></ref><ref id="ref14"><label>14</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bahls</surname><given-names>T</given-names></name><name name-style="western"><surname>Pung</surname><given-names>J</given-names></name><name name-style="western"><surname>Heinemann</surname><given-names>S</given-names></name><etal/></person-group><article-title>Designing and piloting a generic research architecture and workflows to unlock German primary care data for secondary use</article-title><source>J Transl Med</source><year>2020</year><month>10</month><day>19</day><volume>18</volume><issue>1</issue><fpage>394</fpage><pub-id pub-id-type="doi">10.1186/s12967-020-02547-x</pub-id><pub-id pub-id-type="medline">33076938</pub-id></nlm-citation></ref><ref id="ref15"><label>15</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bruland</surname><given-names>P</given-names></name><name name-style="western"><surname>Doods</surname><given-names>J</given-names></name><name name-style="western"><surname>Brix</surname><given-names>T</given-names></name><name name-style="western"><surname>Dugas</surname><given-names>M</given-names></name><name name-style="western"><surname>Storck</surname><given-names>M</given-names></name></person-group><article-title>Connecting healthcare and clinical research: workflow optimizations through seamless integration of EHR, pseudonymization services and EDC systems</article-title><source>Int J Med Inform</source><year>2018</year><month>11</month><volume>119</volume><fpage>103</fpage><lpage>108</lpage><pub-id pub-id-type="doi">10.1016/j.ijmedinf.2018.09.007</pub-id><pub-id pub-id-type="medline">30342678</pub-id></nlm-citation></ref><ref id="ref16"><label>16</label><nlm-citation citation-type="web"><article-title>Projekte</article-title><source>Unabh&#x00E4;ngige Treuhandstelle</source><access-date>2023-08-09</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.ths-greifswald.de/forscher/projekte/">https://www.ths-greifswald.de/forscher/projekte/</ext-link></comment></nlm-citation></ref><ref id="ref17"><label>17</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hampf</surname><given-names>C</given-names></name><name name-style="western"><surname>Geidel</surname><given-names>L</given-names></name><name name-style="western"><surname>Zerbe</surname><given-names>N</given-names></name><etal/></person-group><article-title>Assessment of scalability and performance of the record linkage tool E-PIX in managing multi-million patients in research projects at a large university hospital in Germany</article-title><source>J Transl Med</source><year>2020</year><month>02</month><day>17</day><volume>18</volume><issue>1</issue><fpage>86</fpage><pub-id pub-id-type="doi">10.1186/s12967-020-02257-4</pub-id><pub-id pub-id-type="medline">32066455</pub-id></nlm-citation></ref><ref id="ref18"><label>18</label><nlm-citation citation-type="web"><article-title>Unabh&#x00E4;ngige Treuhandstelle der Universit&#x00E4;tsmedizin Greifswald</article-title><source>Universit&#x00E4;tsmedizin</source><access-date>2023-08-09</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.medizin.uni-greifswald.de/de/forschung-lehre/core-units/treuhandstelle/">https://www.medizin.uni-greifswald.de/de/forschung-lehre/core-units/treuhandstelle/</ext-link></comment></nlm-citation></ref><ref id="ref19"><label>19</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Siegerink</surname><given-names>B</given-names></name><name name-style="western"><surname>Weber</surname><given-names>J</given-names></name><name name-style="western"><surname>Ahmadi</surname><given-names>M</given-names></name><etal/></person-group><article-title>Disease Overarching mechanisms that explain and predict outcome of patients with high cardiovascular risk: rationale and design of the Berlin long-term observation of vascular events (Belove) study</article-title><source>medRxiv</source><year>2019</year><month>07</month><day>15</day><fpage>19001024</fpage><pub-id pub-id-type="doi">10.1101/19001024</pub-id></nlm-citation></ref><ref id="ref20"><label>20</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Weber</surname><given-names>JE</given-names></name><name name-style="western"><surname>Ahmadi</surname><given-names>M</given-names></name><name name-style="western"><surname>Boldt</surname><given-names>L-H</given-names></name><etal/></person-group><article-title>Protocol of the Berlin long-term observation of vascular events (BeLOVE): a prospective cohort study with deep Phenotyping and long-term follow up of cardiovascular high-risk patients</article-title><source>BMJ Open</source><year>2023</year><month>10</month><day>31</day><volume>13</volume><issue>10</issue><fpage>e076415</fpage><pub-id pub-id-type="doi">10.1136/bmjopen-2023-076415</pub-id><pub-id pub-id-type="medline">37907297</pub-id></nlm-citation></ref><ref id="ref21"><label>21</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Bozoyan</surname><given-names>C</given-names></name><name name-style="western"><surname>Fitzer</surname><given-names>K</given-names></name><name name-style="western"><surname>Ostrzinski</surname><given-names>S</given-names></name><etal/></person-group><article-title>Unabh&#x00E4;ngige Treuhandstelle (THS)</article-title><source>NAKO Treuhandstellenkonzept</source><year>2014</year><access-date>2023-08-09</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://nako.de/allgemeines/der-verein-nako-e-v/unabhaengig-treuhandstelle/">https://nako.de/allgemeines/der-verein-nako-e-v/unabhaengig-treuhandstelle/</ext-link></comment></nlm-citation></ref><ref id="ref22"><label>22</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bialke</surname><given-names>M</given-names></name><name name-style="western"><surname>Penndorf</surname><given-names>P</given-names></name><name name-style="western"><surname>Wegner</surname><given-names>T</given-names></name><etal/></person-group><article-title>A Workflow-driven approach to integrate generic software modules in a trusted third party</article-title><source>J Transl Med</source><year>2015</year><month>06</month><day>4</day><access-date>2024-04-10</access-date><volume>13</volume><fpage>176</fpage><comment><ext-link ext-link-type="uri" xlink:href="https://translational-medicine.biomedcentral.com/articles/10.1186/s12967-015-0545-6">https://translational-medicine.biomedcentral.com/articles/10.1186/s12967-015-0545-6</ext-link></comment></nlm-citation></ref><ref id="ref23"><label>23</label><nlm-citation citation-type="web"><person-group person-group-type="author"><collab>GmbH GG</collab></person-group><article-title>Das Sollten SIE &#x00DC;ber EAN Nummern Wissen</article-title><source>GS1 Germany</source><access-date>2024-01-04</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.gs1-germany.de/ean-nummern/">https://www.gs1-germany.de/ean-nummern/</ext-link></comment></nlm-citation></ref><ref id="ref24"><label>24</label><nlm-citation citation-type="web"><article-title>23 patient identifier cross-referencing Hl7 V3 (Pixv3)</article-title><source>IHE International</source><access-date>2023-09-25</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://profiles.ihe.net/ITI/TF/Volume1/ch-23.html">https://profiles.ihe.net/ITI/TF/Volume1/ch-23.html</ext-link></comment></nlm-citation></ref><ref id="ref25"><label>25</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Hampf</surname><given-names>C</given-names></name><name name-style="western"><surname>Bialke</surname><given-names>M</given-names></name></person-group><article-title>Unabh&#x00E4;ngige Treuhandstelle der Universit&#x00E4;tsmedizin Greifswald</article-title><source>gPAS Anwenderhandbuch</source><year>2023</year><comment><ext-link ext-link-type="uri" xlink:href="https://www.ths-greifswald.de/gpas/handbuch">https://www.ths-greifswald.de/gpas/handbuch</ext-link></comment></nlm-citation></ref><ref id="ref26"><label>26</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Ma</surname><given-names>W</given-names></name><name name-style="western"><surname>Sartipi</surname><given-names>K</given-names></name><name name-style="western"><surname>Sharghigoorabi</surname><given-names>H</given-names></name><name name-style="western"><surname>Koff</surname><given-names>D</given-names></name><name name-style="western"><surname>Bak</surname><given-names>P</given-names></name></person-group><article-title>Openid connect as a security service in cloud-based medical imaging systems</article-title><source>J Med Imaging (Bellingham)</source><year>2016</year><month>04</month><volume>3</volume><issue>2</issue><fpage>026501</fpage><pub-id pub-id-type="doi">10.1117/1.JMI.3.2.026501</pub-id><pub-id pub-id-type="medline">27340682</pub-id></nlm-citation></ref><ref id="ref27"><label>27</label><nlm-citation citation-type="thesis"><person-group person-group-type="author"><name name-style="western"><surname>Damm</surname><given-names>MH</given-names></name></person-group><source>Total Anti-Symmetrische Quasigruppen [article in German]</source><year>2004</year><access-date>2024-04-10</access-date><publisher-name>Philipps-Universit&#x00E4;t Marburg</publisher-name><comment><ext-link ext-link-type="uri" xlink:href="https://archiv.ub.uni-marburg.de/diss/z2004/0516/">https://archiv.ub.uni-marburg.de/diss/z2004/0516/</ext-link></comment></nlm-citation></ref><ref id="ref28"><label>28</label><nlm-citation citation-type="web"><article-title>Docker overview</article-title><source>Docker Docs</source><year>2023</year><access-date>2023-08-09</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://docs.docker.com/get-started/overview/">https://docs.docker.com/get-started/overview/</ext-link></comment></nlm-citation></ref><ref id="ref29"><label>29</label><nlm-citation citation-type="web"><article-title>Docker swarm overview</article-title><source>Docker Docs</source><year>2023</year><access-date>2023-10-09</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://docs.docker.com/engine/swarm/">https://docs.docker.com/engine/swarm/</ext-link></comment></nlm-citation></ref><ref id="ref30"><label>30</label><nlm-citation citation-type="web"><source>Spring Boot</source><access-date>2023-08-14</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://spring.io/projects/spring-boot/">https://spring.io/projects/spring-boot/</ext-link></comment></nlm-citation></ref><ref id="ref31"><label>31</label><nlm-citation citation-type="web"><article-title>The PHP framework for web artisans</article-title><source>Laravel</source><access-date>2023-08-14</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://laravel.com/">https://laravel.com/</ext-link></comment></nlm-citation></ref><ref id="ref32"><label>32</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Krasner</surname><given-names>G</given-names></name><name name-style="western"><surname>Pope</surname><given-names>S</given-names></name></person-group><article-title>A cookbook for using the model-view controller user interface paradigm in Smalltalk-80</article-title><source>JOOP</source><year>1988</year><month>01</month><access-date>2024-04-10</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.lri.fr/~mbl/ENS/FONDIHM/2013/papers/Krasner-JOOP88.pdf">https://www.lri.fr/~mbl/ENS/FONDIHM/2013/papers/Krasner-JOOP88.pdf</ext-link></comment></nlm-citation></ref><ref id="ref33"><label>33</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Kopp</surname><given-names>M</given-names></name></person-group><source>Entwicklung Einer App Zur Erfassung von Einverst&#x00E4;ndniserkl&#x00E4;rungen Zur Datenverarbeitung Im Rahmen Einer Medizinischen Studie an Der Charit&#x00E9; Berlin</source><year>2021</year><publisher-name>HTW Berlin</publisher-name></nlm-citation></ref><ref id="ref34"><label>34</label><nlm-citation citation-type="web"><article-title>SOAP version 1.2 part 1: messaging framework (second edition)</article-title><source>W3</source><access-date>2023-08-10</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.w3.org/TR/soap12/">https://www.w3.org/TR/soap12/</ext-link></comment></nlm-citation></ref><ref id="ref35"><label>35</label><nlm-citation citation-type="web"><article-title>Appendix V: web services for IHE transactions</article-title><access-date>2023-09-25</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://profiles.ihe.net/ITI/TF/Volume2/ch-V.html">https://profiles.ihe.net/ITI/TF/Volume2/ch-V.html</ext-link></comment></nlm-citation></ref><ref id="ref36"><label>36</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Fischer</surname><given-names>H</given-names></name><name name-style="western"><surname>R&#x00F6;hrig</surname><given-names>R</given-names></name><name name-style="western"><surname>Thiemann</surname><given-names>VS</given-names></name></person-group><article-title>A generic IT infrastructure for identity management and pseudonymization in small research projects with heterogeneous and distributed data sources under consideration of the GDPR</article-title><source>Stud Health Technol Inf</source><year>2019</year><month>08</month><day>21</day><volume>264</volume><fpage>1837</fpage><lpage>1838</lpage><pub-id pub-id-type="doi">10.3233/shti190673</pub-id></nlm-citation></ref><ref id="ref37"><label>37</label><nlm-citation citation-type="web"><article-title>Community</article-title><source>Unabh&#x00E4;ngige Treuhandstelle</source><access-date>2023-08-11</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.ths-greifswald.de/forscher/community/#collapse-1-5454">https://www.ths-greifswald.de/forscher/community/#collapse-1-5454</ext-link></comment></nlm-citation></ref><ref id="ref38"><label>38</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Danciu</surname><given-names>I</given-names></name><name name-style="western"><surname>Cowan</surname><given-names>JD</given-names></name><name name-style="western"><surname>Basford</surname><given-names>M</given-names></name><etal/></person-group><article-title>Secondary use of clinical data: the Vanderbilt approach</article-title><source>J Biomed Inform</source><year>2014</year><month>12</month><volume>52</volume><fpage>28</fpage><lpage>35</lpage><pub-id pub-id-type="doi">10.1016/j.jbi.2014.02.003</pub-id><pub-id pub-id-type="medline">24534443</pub-id></nlm-citation></ref><ref id="ref39"><label>39</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Pommerening</surname><given-names>K</given-names></name><name name-style="western"><surname>Schr&#x00F6;der</surname><given-names>M</given-names></name><name name-style="western"><surname>Petrov</surname><given-names>D</given-names></name><name name-style="western"><surname>Schl&#x00F6;sser-Fa&#x00DF;bender</surname><given-names>M</given-names></name><name name-style="western"><surname>Semler</surname><given-names>SC</given-names></name><name name-style="western"><surname>Drepper</surname><given-names>J</given-names></name></person-group><article-title>Pseudonymization service and data custodians in medical research networks- and biobanks</article-title><year>2006</year><access-date>2023-08-09</access-date><publisher-name>Gesellschaft f&#x00FC;r Informatik eV</publisher-name><comment><ext-link ext-link-type="uri" xlink:href="https://dl.gi.de/handle/20.500.12116/23646">https://dl.gi.de/handle/20.500.12116/23646</ext-link></comment></nlm-citation></ref><ref id="ref40"><label>40</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Pommerening</surname><given-names>K</given-names></name><name name-style="western"><surname>Reng</surname><given-names>M</given-names></name></person-group><article-title>Secondary use of the EHR via pseudonymisation</article-title><source>Stud Health Technol Inform</source><year>2004</year><volume>103</volume><fpage>441</fpage><lpage>446</lpage><pub-id pub-id-type="medline">15747953</pub-id></nlm-citation></ref><ref id="ref41"><label>41</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Lo Iacono</surname><given-names>L</given-names></name></person-group><article-title>Multi-centric universal pseudonymisation for secondary use of the EHR</article-title><source>Stud Health Technol Inform</source><year>2007</year><volume>126</volume><fpage>239</fpage><lpage>247</lpage><pub-id pub-id-type="medline">17476066</pub-id></nlm-citation></ref><ref id="ref42"><label>42</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Dangl</surname><given-names>A</given-names></name><name name-style="western"><surname>Demiroglu</surname><given-names>SY</given-names></name><name name-style="western"><surname>Gaedcke</surname><given-names>J</given-names></name><etal/></person-group><article-title>The IT-infrastructure of a biobank for an academic medical center</article-title><source>Stud Health Technol Inform</source><year>2010</year><volume>160</volume><issue>Pt 2</issue><fpage>1334</fpage><lpage>1338</lpage><pub-id pub-id-type="medline">20841901</pub-id></nlm-citation></ref><ref id="ref43"><label>43</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Heinze</surname><given-names>O</given-names></name><name name-style="western"><surname>Birkle</surname><given-names>M</given-names></name><name name-style="western"><surname>K&#x00F6;ster</surname><given-names>L</given-names></name><name name-style="western"><surname>Bergh</surname><given-names>B</given-names></name></person-group><article-title>Architecture of a consent management suite and integration into IHE-based regional health information networks</article-title><source>BMC Med Inform Decis Mak</source><year>2011</year><month>10</month><day>4</day><volume>11</volume><fpage>58</fpage><pub-id pub-id-type="doi">10.1186/1472-6947-11-58</pub-id><pub-id pub-id-type="medline">21970788</pub-id></nlm-citation></ref><ref id="ref44"><label>44</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Aamot</surname><given-names>H</given-names></name><name name-style="western"><surname>Kohl</surname><given-names>CD</given-names></name><name name-style="western"><surname>Richter</surname><given-names>D</given-names></name><name name-style="western"><surname>Knaup-Gregori</surname><given-names>P</given-names></name></person-group><article-title>Pseudonymization of patient Identifiers for translational research</article-title><source>BMC Med Inform Decis Mak</source><year>2013</year><month>07</month><day>24</day><volume>13</volume><issue>1</issue><fpage>75</fpage><pub-id pub-id-type="doi">10.1186/1472-6947-13-75</pub-id><pub-id pub-id-type="medline">23883409</pub-id></nlm-citation></ref><ref id="ref45"><label>45</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Lautenschl&#x00E4;ger</surname><given-names>R</given-names></name><name name-style="western"><surname>Kohlmayer</surname><given-names>F</given-names></name><name name-style="western"><surname>Prasser</surname><given-names>F</given-names></name><name name-style="western"><surname>Kuhn</surname><given-names>KA</given-names></name></person-group><article-title>A generic solution for web-based management of pseudonymized data</article-title><source>BMC Med Inform Decis Mak</source><year>2015</year><month>11</month><day>30</day><volume>15</volume><fpage>100</fpage><pub-id pub-id-type="doi">10.1186/s12911-015-0222-y</pub-id><pub-id pub-id-type="medline">26621059</pub-id></nlm-citation></ref><ref id="ref46"><label>46</label><nlm-citation citation-type="web"><person-group person-group-type="author"><collab>HL7 FHIR</collab></person-group><access-date>2023-08-09</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.hl7.org/fhir/">https://www.hl7.org/fhir/</ext-link></comment></nlm-citation></ref></ref-list></back></article>