Fig. 1From: Pseudonymization risk analysis in distributed systemsExample data-flow diagram for sharing on dataBack to article page