{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T21:19:16Z","timestamp":1761513556655},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"S1","content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["BMC Med Inform Decis Mak"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1186\/1472-6947-14-s1-s2","type":"journal-article","created":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T10:03:19Z","timestamp":1418032999000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Differentially private genome data dissemination through top-down specialization"],"prefix":"10.1186","volume":"14","author":[{"given":"Shuang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Noman","family":"Mohammed","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,8]]},"reference":[{"issue":"8","key":"860_CR1","doi-asserted-by":"publisher","first-page":"1000167","DOI":"10.1371\/journal.pgen.1000167","volume":"4","author":"N Homer","year":"2008","unstructured":"Homer N, Szelinger S, Redman M, Duggan D, Tembe W, Muehling J, Pearson JV, Stephan DA, Nelson SF, Craig DW: Resolving individuals contributing trace amounts of DNA to highly complex mixtures using highdensity SNP genotyping microarrays. PLoS Genetics. 2008, 4 (8): 1000167-10.1371\/journal.pgen.1000167.","journal-title":"PLoS Genetics"},{"key":"860_CR2","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1145\/1653662.1653726","volume-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security CCS '09","author":"R Wang","year":"2009","unstructured":"Wang R, Li YF, Wang XF, Tang H, Zhou X: Learning your identity and disease from research papers: information leaks in genome wide association study. Proceedings of the 16th ACM Conference on Computer and Communications Security CCS '09. 2009, New York, NY, USA, 534-544."},{"key":"860_CR3","first-page":"204","volume-title":"Security and Privacy","author":"MT Goodrich","year":"2009","unstructured":"Goodrich MT: The mastermind attack on genomic data. Security and Privacy. 2009, 30th IEEE Symposium, 204-218. (2009). IEEE"},{"issue":"6117","key":"860_CR4","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1126\/science.1229566","volume":"339","author":"M Gymrek","year":"2013","unstructured":"Gymrek M, McGuire AL, Golan D, Halperin E, Erlich Y: Identifying personal genomes by surname inference. Science. 2013, 339 (6117): 321-4. 10.1126\/science.1229566.","journal-title":"Science"},{"issue":"6117","key":"860_CR5","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1126\/science.1234593","volume":"339","author":"LL Rodriguez","year":"2013","unstructured":"Rodriguez LL, Brooks LD, Greenberg JH, Green ED: The complexities of genomic identifiability. Science. 2013, 339 (6117): 275-6. 10.1126\/science.1234593.","journal-title":"Science"},{"key":"860_CR6","unstructured":"Health Insurance Portability and Accountability Act (HIPAA). [http:\/\/www.hhs.gov\/ocr\/hipaa]"},{"key":"860_CR7","first-page":"1","volume-title":"Security ESORICS, Leuven, Belgium","author":"X Zhou","year":"2011","unstructured":"Zhou X, Peng B, Li Y, Chen Y: To release or not to release: Evaluating information leaks in aggregate human-genome data. Security ESORICS, Leuven, Belgium. 2011, 1-27. [http:\/\/www.springerlink.com\/index\/H114618683274291.pdf]http:\/\/link.springer.com\/chapter\/10.1007\/978-3-642-23822-2"},{"issue":"11","key":"860_CR8","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1038\/nrg1474","volume":"5","author":"T Weaver","year":"2004","unstructured":"Weaver T, Maurer J, Hayashizaki Y: Sharing genomes: an integrated approach to funding, managing and distributing genomic clone resources. Nature reviews Genetics. 2004, 5 (11): 861-6. 10.1038\/nrg1474.","journal-title":"Nature reviews Genetics"},{"issue":"3","key":"860_CR9","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.jbi.2004.04.005","volume":"37","author":"BA Malin","year":"2004","unstructured":"Malin BA, Sweeney LA: How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems. J Biomedical Informatics. 2004, 37 (3): 179-192. 10.1016\/j.jbi.2004.04.005.","journal-title":"J Biomedical Informatics"},{"key":"860_CR10","unstructured":"Presidential Commission for the Study of Bioethical Issues: Privacy and progress in Whole Genome Sequencing. 2012, (October)"},{"issue":"1","key":"860_CR11","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1136\/jamia.2010.004622","volume":"18","author":"B Malin","year":"2011","unstructured":"Malin B, Benitez K, Masys D: Never too old for anonymity: A statistical standard for demographic data sharing via the hipaa privacy rule. Journal of the American Medical Informatics Association. 2011, 18 (1): 3-10. 10.1136\/jamia.2010.004622.","journal-title":"Journal of the American Medical Informatics Association"},{"key":"860_CR12","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Proceedings of the 3rd Conference on Theory of Cryptography (TCC)","author":"C Dwork","year":"2006","unstructured":"Dwork C, McSherry F, Nissim K, Smith A: Calibrating noise to sensitivity in private data analysis. Proceedings of the 3rd Conference on Theory of Cryptography (TCC). 2006, 265-284."},{"issue":"9","key":"860_CR13","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1038\/ng.436","volume":"41","author":"S Sankararaman","year":"2009","unstructured":"Sankararaman S, Obozinski G, Jordan MI, Halperin E: Genomic privacy and limits of individual detection in a pool. Nature genetics. 2009, 41 (9): 965-7. 10.1038\/ng.436.","journal-title":"Nature genetics"},{"issue":"1","key":"860_CR14","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1197\/jamia.M1603","volume":"12","author":"BA Malin","year":"2005","unstructured":"Malin BA: An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future. J Am Med Inform Assoc. 2005, 12 (1): 28-34.","journal-title":"J Am Med Inform Assoc"},{"key":"860_CR15","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/1559845.1559850","volume-title":"Proceedings of the 35th SIGMOD International Conference on Management of Data (SIGMOD)","author":"F McSherry","year":"2009","unstructured":"McSherry F: Privacy integrated queries. Proceedings of the 35th SIGMOD International Conference on Management of Data (SIGMOD). 2009, 19-30."},{"key":"860_CR16","unstructured":"Human Genome Privacy Protection Challenge. [http:\/\/www.humangenomeprivacy.org\/]"}],"container-title":["BMC Medical Informatics and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-14-S1-S2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T19:51:21Z","timestamp":1630612281000},"score":1,"resource":{"primary":{"URL":"https:\/\/bmcmedinformdecismak.biomedcentral.com\/articles\/10.1186\/1472-6947-14-S1-S2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":16,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["860"],"URL":"https:\/\/doi.org\/10.1186\/1472-6947-14-s1-s2","relation":{},"ISSN":["1472-6947"],"issn-type":[{"value":"1472-6947","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12]]},"assertion":[{"value":"8 December 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"S2"}}