Fig. 2From: Pseudonymization risk analysis in distributed systemsA State-based Model of User PrivacyBack to article page