Fig. 3From: Pseudonymization risk analysis in distributed systemsOverall Workflow DiagramBack to article page