{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T00:05:05Z","timestamp":1751760305046,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/hpcsim.2015.7237028","type":"proceedings-article","created":{"date-parts":[[2015,9,3]],"date-time":"2015-09-03T17:45:56Z","timestamp":1441302356000},"page":"106-114","source":"Crossref","is-referenced-by-count":5,"title":["A security framework for population-scale genomics analysis"],"prefix":"10.1109","author":[{"given":"Ali","family":"Gholami","sequence":"first","affiliation":[]},{"given":"Jim","family":"Dowling","sequence":"additional","affiliation":[]},{"given":"Erwin","family":"Laure","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref33","article-title":"RFC6238, Time-Based One-Time Password (TOTP)"},{"volume":"3 1","year":"2013","author":"manual","key":"ref32"},{"year":"2014","key":"ref31","article-title":"Custom JAAS realm"},{"year":"2014","key":"ref30","article-title":"SOC 1 Report (Service Organization Controls Report)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btq693"},{"key":"ref36","article-title":"Understanding Password Database Compromises","author":"mirante","year":"2013","journal-title":"Technical Report NYU-Poly"},{"key":"ref35","article-title":"Genomic cloud computing: legal and ethical points to consider","author":"dove","year":"2014","journal-title":"Public Population Project in Genomics and Society (P3G) International Steering Committee International Cancer Genome Consortium (ICGC) Ethics and Policy Committee and M Knoppers"},{"year":"2014","key":"ref34","article-title":"JavaTM Authentication and Authorization Service (JAAS) Reference Guide"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.08.073"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.12720\/jomb.4.2.117-125"},{"key":"ref13","first-page":"67","article-title":"Statistical disclosure control for microdata using the rpackage sdcmicro","volume":"1","author":"templ","year":"2008","journal-title":"Trans Data Privacy"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43352-2_4"},{"key":"ref15","first-page":"8388","article-title":"Towards scalable authentication in health services","author":"ahn","year":"2002","journal-title":"Enabling Technologies Infrastructure for Collaborative Enterprises 2002 WET ICE 2002 Proceedings Eleventh IEEE International Workshops on"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICMB.2005.12"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/11507840_32"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.57"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(03)00084-7"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.333"},{"year":"2015","key":"ref4","article-title":"Biobanks, Ethics and Regulations"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54568-9_9"},{"year":"2015","key":"ref3","article-title":"The Finnish biobanks"},{"journal-title":"Health Insurance Portability and Accountability Act of 1996 [microform] conference report (to accompany H R 3103) U S G P O [Washington D C ]","year":"1996","author":"states","key":"ref6"},{"key":"ref29","article-title":"Private computation on encrypted genomic data","author":"lauter","year":"2014","journal-title":"Tech Rep MSR-TR-2014-93"},{"key":"ref5","article-title":"95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of such Data","volume":"23","author":"directive","year":"1995","journal-title":"Official J EC"},{"journal-title":"Writing Secure Code","year":"2002","author":"howard","key":"ref8"},{"journal-title":"Managing Information Security Risks The OCTAVE Approach","year":"2002","author":"alberts","key":"ref7"},{"year":"2015","key":"ref2","article-title":"Scalable, secure storage and analysis of biobank data"},{"key":"ref9","article-title":"Cloud privacy threat modeling","author":"gholami","year":"2013","journal-title":"The 8th International IFIP Summer School on Privacy and Identity Management for Emerging Services and Technologies Nijmegen the Netherlands"},{"key":"ref1","article-title":"Biobanks in europe: Prospects for harmonisation and networking","author":"zika","year":"2010","journal-title":"Publications Office of the European Union"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76843-2_33"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSECOMPANION.2007.69"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-322-89183-9_20"},{"year":"2011","key":"ref24","article-title":"Security guidance for critical areas of focus in cloud computing, v3.0"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-2911-7_38"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-010-0115-7"},{"key":"ref25","first-page":"342","article-title":"Privacy, security and trust in cloud computing","author":"pearson","year":"2013","journal-title":"Privacy and Security for Cloud Computing"}],"event":{"name":"2015 International Conference on High Performance Computing & Simulation (HPCS)","start":{"date-parts":[[2015,7,20]]},"location":"Amsterdam, Netherlands","end":{"date-parts":[[2015,7,24]]}},"container-title":["2015 International Conference on High Performance Computing &amp; Simulation (HPCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7214433\/7237005\/07237028.pdf?arnumber=7237028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T01:27:49Z","timestamp":1490405269000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7237028\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/hpcsim.2015.7237028","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}